Modify check
parent
09e6a54886
commit
95ca288f9d
|
@ -74,10 +74,10 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
version = get_jenkins_version
|
version = get_jenkins_version
|
||||||
vprint_status("Found version: #{version}")
|
vprint_status("Found version: #{version}")
|
||||||
|
|
||||||
# According to the issue response from Jenkins, they don't think it's a vulnerability,
|
# Default version is vulnerable, but can be mitigated by refusing anonymous permission on
|
||||||
# so there is no fix. So if we find a version, let's assume it's vulnerable
|
# decryption API. So a version wouldn't be adequate to check.
|
||||||
if version
|
if version
|
||||||
return Exploit::CheckCode::Appears
|
return Exploit::CheckCode::Detected
|
||||||
end
|
end
|
||||||
|
|
||||||
Exploit::CheckCode::Safe
|
Exploit::CheckCode::Safe
|
||||||
|
|
Loading…
Reference in New Issue