Remembering to Propset and include $Id: $ this time. Also, switching from BSD_LICENSE to MSF_LICENSE.

git-svn-id: file:///home/svn/framework3/trunk@13884 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Chao Mu 2011-10-12 00:30:25 +00:00
parent 460353fec4
commit 667c00161d
1 changed files with 10 additions and 8 deletions

View File

@ -1,3 +1,5 @@
$Id$
require 'msf/core' require 'msf/core'
class Metasploit4 < Msf::Auxiliary class Metasploit4 < Msf::Auxiliary
@ -7,7 +9,7 @@ class Metasploit4 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Reverse Proxy Bypass Scanner', 'Name' => 'Reverse Proxy Bypass Scanner',
'Version' => '$Revision: $', 'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
Scan for poorly configured reverse proxy servers. Scan for poorly configured reverse proxy servers.
By default, this module attempts to force the server to make By default, this module attempts to force the server to make
@ -19,12 +21,12 @@ class Metasploit4 < Msf::Auxiliary
"set VERBOSE true" if you are paranoid and want to catch potential "set VERBOSE true" if you are paranoid and want to catch potential
false negatives. Works best against Apache and mod_rewrite false negatives. Works best against Apache and mod_rewrite
}, },
'Author' => 'chao-mu', 'Author' => ['chao-mu'],
'License' => BSD_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
['URL', 'http://www.contextis.com/research/blog/reverseproxybypass/'], ['URL', 'http://www.contextis.com/research/blog/reverseproxybypass/'],
['CVE', 'CVE-2011-3368'], ['CVE', '2011-3368'],
] ]
) )