Start cleaning as requested

bug/bundler_fix
Thanat0s 2014-04-28 11:32:46 +02:00
parent 07ed8d832a
commit 328acc44fa
1 changed files with 6 additions and 6 deletions

View File

@ -14,10 +14,10 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'F5 Bigip Backend IP/PORT Cookie Disclosure.', 'Name' => 'F5 Bigip Backend IP/PORT Cookie Disclosure.',
'Description' => %q{ 'Description' => %q{
This module identify F5 BigIP SLB and decode sticky cookies wich leak This module identify F5 BigIP SLB and decode sticky cookies which leak
backend IP and port. backend IP and port.
}, },
'Author' => [ 'Thanat0s <thanspam[at]trollprod[dot]org>' ], 'Author' => [ 'Thanat0s <thanspam[at]trollprod.org>' ],
'References' => 'References' =>
[ [
['URL', 'http://support.f5.com/kb/en-us/solutions/public/6000/900/sol6917.html'], ['URL', 'http://support.f5.com/kb/en-us/solutions/public/6000/900/sol6917.html'],
@ -46,7 +46,7 @@ class Metasploit3 < Msf::Auxiliary
return host,port return host,port
end end
def get_cook # request a page and exctract a F5 looking cookie. def get_cookie # request a page and extract a F5 looking cookie.
res = send_request_raw({ res = send_request_raw({
'method' => 'GET', 'method' => 'GET',
'uri' => @uri 'uri' => @uri
@ -66,9 +66,9 @@ class Metasploit3 < Msf::Auxiliary
host_port = Hash.new host_port = Hash.new
@uri = normalize_uri(target_uri.path) @uri = normalize_uri(target_uri.path)
print_status("Starting request #{@uri}") print_status("Starting request #{@uri}")
id, value = get_cook() id, value = get_cookie()
if id if id
print_status "F5 cookie \"#{id}\" found" print_status ("F5 cookie \"#{id}\" found")
host, port = cookie_decode(value) host, port = cookie_decode(value)
host_port[host+":"+port] = true host_port[host+":"+port] = true
print_status "Backend #{host}:#{port}" print_status "Backend #{host}:#{port}"