From b19ecf9c74c3028cb743f9d15cbec3566f0dc103 Mon Sep 17 00:00:00 2001 From: Mario Ceballos Date: Sat, 21 Nov 2009 00:12:57 +0000 Subject: [PATCH] ruby 1.9.1 compatible for the csv issue. git-svn-id: file:///home/svn/framework3/trunk@7573 4d416f70-5f16-0410-b530-b9f4589650da --- modules/auxiliary/admin/oracle/login_brute.rb | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/modules/auxiliary/admin/oracle/login_brute.rb b/modules/auxiliary/admin/oracle/login_brute.rb index e0b556803e..0d07a97e9c 100644 --- a/modules/auxiliary/admin/oracle/login_brute.rb +++ b/modules/auxiliary/admin/oracle/login_brute.rb @@ -19,7 +19,9 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ This module uses a list of well known authentication credentials for bruteforcing the TNS service. A log file of discoverd credentials - can be found in ./data/wordlists/oracle_default_found.log. Oracle default passwords in oracle_default_passwords.csv. McKesson HCI Oracle default passwords in hci_oracle_passwords.csv. + can be found in ./data/wordlists/oracle_default_found.log. + Oracle default passwords in oracle_default_passwords.csv. + McKesson HCI Oracle default passwords in hci_oracle_passwords.csv. }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, @@ -44,7 +46,7 @@ class Metasploit3 < Msf::Auxiliary def run list = datastore['CSVFILE'] - fd = CSV::Reader.parse((File.open(list))).each do |brute| + fd = CSV.foreach.each do |brute| datastore['DBUSER'] = brute[2] datastore['DBPASS'] = brute[3]