Modify check

bug/bundler_fix
wchen-r7 2015-11-23 20:33:14 -06:00
parent 09e6a54886
commit 95ca288f9d
1 changed files with 3 additions and 3 deletions

View File

@ -74,10 +74,10 @@ class Metasploit3 < Msf::Auxiliary
version = get_jenkins_version version = get_jenkins_version
vprint_status("Found version: #{version}") vprint_status("Found version: #{version}")
# According to the issue response from Jenkins, they don't think it's a vulnerability, # Default version is vulnerable, but can be mitigated by refusing anonymous permission on
# so there is no fix. So if we find a version, let's assume it's vulnerable # decryption API. So a version wouldn't be adequate to check.
if version if version
return Exploit::CheckCode::Appears return Exploit::CheckCode::Detected
end end
Exploit::CheckCode::Safe Exploit::CheckCode::Safe