Unpolluting SVN Revision keyword

Sometimes Revision keywords get expanded, too. Fix those.
unstable
Tod Beardsley 2012-03-01 16:59:54 -06:00
parent 3626d48db2
commit 302853f5a4
38 changed files with 38 additions and 38 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'ContentKeeper Web Appliance mimencode File Access', 'Name' => 'ContentKeeper Web Appliance mimencode File Access',
'Version' => '$Revision: 14288 $', 'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module abuses the 'mimencode' binary present within This module abuses the 'mimencode' binary present within
ContentKeeper Web filtering appliances to retrieve arbitrary ContentKeeper Web filtering appliances to retrieve arbitrary

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Tomcat Administration Tool Default Access', 'Name' => 'Tomcat Administration Tool Default Access',
'Version' => '$Revision: 13394 $', 'Version' => '$Revision$',
'Description' => 'Detect the Tomcat administration interface.', 'Description' => 'Detect the Tomcat administration interface.',
'References' => 'References' =>
[ [

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability', 'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
'Version' => '$Revision: 14288 $', 'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module tests whether a directory traversal vulnerablity is present This module tests whether a directory traversal vulnerablity is present
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0 in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal', 'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
'Version' => '$Revision: 14288 $', 'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module tests whether a directory traversal vulnerablity is present This module tests whether a directory traversal vulnerablity is present
in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294. in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294.

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 14735 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et' ], 'Author' => [ 'et' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP SSL Certificate Checker', 'Name' => 'HTTP SSL Certificate Checker',
'Version' => '$Revision: 11796 $', 'Version' => '$Revision$',
'Author' => 'nebulus', 'Author' => 'nebulus',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Description' => %q{ 'Description' => %q{

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability', 'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability',
'Version' => '$Revision: 14532 $', 'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module tests whether a directory traversal vulnerablity is present This module tests whether a directory traversal vulnerablity is present
in versions of Cisco Network Access Manager 4.8.x You may wish to change in versions of Cisco Network Access Manager 4.8.x You may wish to change

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et' ], 'Author' => [ 'et' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -41,7 +41,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'OSVDB', '54555' ], [ 'OSVDB', '54555' ],
[ 'BID', '34993' ], [ 'BID', '34993' ],
], ],
'Version' => '$Revision: 14034 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et' ], 'Author' => [ 'et' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 14288 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'FrontPage Server Extensions Login Utility', 'Name' => 'FrontPage Server Extensions Login Utility',
'Version' => '$Revision: 12623 $', 'Version' => '$Revision$',
'Description' => 'This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed.', 'Description' => 'This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed.',
'References' => 'References' =>
[ [

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP Version Detection', 'Name' => 'HTTP Version Detection',
'Version' => '$Revision: 14597 $', 'Version' => '$Revision$',
'Description' => 'Display version information about each system', 'Description' => 'Display version information about each system',
'Author' => 'hdm', 'Author' => 'hdm',
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et' ], 'Author' => [ 'et' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 10394 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
requires either Basic, Digest or NTLM authentication. requires either Basic, Digest or NTLM authentication.
}, },
'Author' => [ 'et', 'patrick' ], 'Author' => [ 'et', 'patrick' ],
'Version' => '$Revision: 14034 $', 'Version' => '$Revision$',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'HTTP Open Proxy Detection', 'Name' => 'HTTP Open Proxy Detection',
'Version' => '$Revision: 14316 $', 'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
Checks if an HTTP proxy is open. False positive are avoided Checks if an HTTP proxy is open. False positive are avoided
verifing the HTTP return code and matching a pattern. verifing the HTTP return code and matching a pattern.

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP Options Detection', 'Name' => 'HTTP Options Detection',
'Version' => '$Revision: 12623 $', 'Version' => '$Revision$',
'Description' => 'Display available HTTP options for each system', 'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'], 'Author' => ['CG'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP Robots.txt Content Scanner', 'Name' => 'HTTP Robots.txt Content Scanner',
'Version' => '$Revision: 13183 $', 'Version' => '$Revision$',
'Description' => 'Detect robots.txt files and analize its content', 'Description' => 'Detect robots.txt files and analize its content',
'Author' => ['et'], 'Author' => ['et'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: 14560 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ], 'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 14252 $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['URL', 'http://sqlmap.sourceforge.net'], ['URL', 'http://sqlmap.sourceforge.net'],

View File

@ -23,7 +23,7 @@ class Metasploit4 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP SSL Certificate Information', 'Name' => 'HTTP SSL Certificate Information',
'Version' => '$Revision: 14319 $', 'Version' => '$Revision$',
'Description' => 'Parse the server SSL certificate to obtain the common name and signature algorithm', 'Description' => 'Parse the server SSL certificate to obtain the common name and signature algorithm',
'Author' => 'Author' =>
[ [

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP Subversion Scanner', 'Name' => 'HTTP Subversion Scanner',
'Version' => '$Revision: 11796 $', 'Version' => '$Revision$',
'Description' => 'Detect subversion directories and files and analize its content. Only SVN Version > 7 supported', 'Description' => 'Detect subversion directories and files and analize its content. Only SVN Version > 7 supported',
'Author' => ['et'], 'Author' => ['et'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP TRACE Detection', 'Name' => 'HTTP TRACE Detection',
'Version' => '$Revision: $', 'Version' => '$Revision$',
'Description' => 'Test if TRACE is actually enabled. 405 (Apache) 501(IIS) if its disabled, 200 if it is', 'Description' => 'Test if TRACE is actually enabled. 405 (Apache) 501(IIS) if its disabled, 200 if it is',
'Author' => ['CG'], 'Author' => ['CG'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP trace.axd Content Scanner', 'Name' => 'HTTP trace.axd Content Scanner',
'Version' => '$Revision: 11796 $', 'Version' => '$Revision$',
'Description' => 'Detect trace.axd files and analize its content', 'Description' => 'Detect trace.axd files and analize its content',
'Author' => ['c4an'], 'Author' => ['c4an'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -37,7 +37,7 @@ require 'cgi'
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 13183 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et' ], 'Author' => [ 'et' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 11796 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP WebDAV Internal IP Scanner', 'Name' => 'HTTP WebDAV Internal IP Scanner',
'Version' => '$Revision: 14137 $', 'Version' => '$Revision$',
'Description' => 'Detect webservers internal IPs though WebDAV', 'Description' => 'Detect webservers internal IPs though WebDAV',
'Author' => ['et'], 'Author' => ['et'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP WebDAV Scanner', 'Name' => 'HTTP WebDAV Scanner',
'Version' => '$Revision: 14527 $', 'Version' => '$Revision$',
'Description' => 'Detect webservers with WebDAV enabled', 'Description' => 'Detect webservers with WebDAV enabled',
'Author' => ['et'], 'Author' => ['et'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP WebDAV Website Content Scanner', 'Name' => 'HTTP WebDAV Website Content Scanner',
'Version' => '$Revision: 14067 $', 'Version' => '$Revision$',
'Description' => 'Detect webservers disclosing its content though WebDAV', 'Description' => 'Detect webservers disclosing its content though WebDAV',
'Author' => ['et'], 'Author' => ['et'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit . com' ], 'Author' => [ 'et [at] metasploit . com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 13983 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [