Enhance the module and add version check

bug/bundler_fix
KINGSABRI 2016-01-21 03:19:31 +03:00
parent bb4db6b501
commit 4cb19c75a6
1 changed files with 3 additions and 2 deletions

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
'Author' =>
[
'Cenk Kalpakoglu <cenk.kalpakoglu[at]gmail.com>',
'Sabri', #@KINGSABRI
'KingSabri <King.Sabri[at]gmail.com>' ,
'William <WCoppola[at]Lares.com>'
],
'License' => MSF_LICENSE,
@ -71,6 +71,7 @@ class Metasploit3 < Msf::Auxiliary
print_error("#{peer}:#{rport}#{wordpress_url_xmlrpc} does not enable XMLRPC")
false
elsif Gem::Version.new(version) >= Gem::Version.new('4.4.1')
print_error("#{peer}:#{rport}#{wordpress_url_xmlrpc} Target's version (#{version}) is not vulnerable to this attack.")
false
else
print_status("Target #{peer} is running Wordpress")
@ -82,7 +83,7 @@ class Metasploit3 < Msf::Auxiliary
if check_setup
print_status("XMLRPC enabled, Hello message received!")
else
print_error("XMLRPC is not enabled! Aborting")
print_error("Abborting the attack.")
return
end