Land #10527, Fix msftdiy EDB link check, enable HTTPS
commit
47ca6c6a14
|
@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
[ 'CWE', '661' ],
|
||||
[ 'URL', 'https://www.phpmyadmin.net/security/PMASA-2016-27/' ],
|
||||
[ 'URL', 'https://security.gentoo.org/glsa/201701-32' ],
|
||||
[ 'URL', 'https://www.exploit-db.com/exploits/40185/' ],
|
||||
[ 'EDB', '40185' ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => [ 'php' ],
|
||||
|
|
|
@ -27,7 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://www.exploit-db.com/exploits/37760/']
|
||||
['EDB', '37760']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -185,7 +185,7 @@ class Msftidy
|
|||
warn("Please use 'BID' for '#{value}'")
|
||||
elsif value =~ /^http:\/\/www\.microsoft\.com\/technet\/security\/bulletin\//
|
||||
warn("Please use 'MSB' for '#{value}'")
|
||||
elsif value =~ /^http:\/\/www\.exploit\-db\.com\/exploits\//
|
||||
elsif value =~ /^https?:\/\/www\.exploit\-db\.com\/exploits\//
|
||||
warn("Please use 'EDB' for '#{value}'")
|
||||
elsif value =~ /^http:\/\/www\.kb\.cert\.org\/vuls\/id\//
|
||||
warn("Please use 'US-CERT-VU' for '#{value}'")
|
||||
|
|
Loading…
Reference in New Issue