Fixes #4026, the HTTP options scanner now reports its vulnerability in the normal way.
git-svn-id: file:///home/svn/framework3/trunk@12133 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
5b79e6b4ec
commit
8d8696eb8c
|
@ -26,7 +26,16 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Version' => '$Revision$',
|
||||
'Description' => 'Display available HTTP options for each system',
|
||||
'Author' => ['CG'],
|
||||
'License' => MSF_LICENSE
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2005-3398'],
|
||||
[ 'CVE', '2005-3498'],
|
||||
[ 'OSVDB', '877'],
|
||||
[ 'BID', '11604'],
|
||||
[ 'BID', '9506'],
|
||||
[ 'BID', '9561']
|
||||
]
|
||||
)
|
||||
end
|
||||
|
||||
|
@ -57,17 +66,9 @@ class Metasploit3 < Msf::Auxiliary
|
|||
:port => rport,
|
||||
:proto => 'tcp',
|
||||
:sname => 'http',
|
||||
:name => 'HTTP-TRACE-ENABLED',
|
||||
:name => self.fullname,
|
||||
:info => res.headers['Allow'],
|
||||
:refs =>
|
||||
[
|
||||
[ 'CVE', '2005-3398'],
|
||||
[ 'CVE', '2005-3498'],
|
||||
[ 'OSVDB', '877'],
|
||||
[ 'BID', '11604'],
|
||||
[ 'BID', '9506'],
|
||||
[ 'BID', '9561']
|
||||
]
|
||||
:refs => self.references
|
||||
)
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue