Also pull the Allow headers (previous behavior)

bug/bundler_fix
Jon Hart 2014-07-18 14:13:20 -07:00
parent 637f86f37d
commit b760815c86
1 changed files with 1 additions and 1 deletions

View File

@ -7,7 +7,7 @@ module Msf
module Exploit::Remote::SIP
# Parses +response+, extracts useful metdata and then reports on it.
# Returns true iff the response was a valid SIP response
def parse_response(response, rhost, proto, desired_headers = %w(User-Agent Server))
def parse_response(response, rhost, proto, desired_headers = %w(User-Agent Server Allow))
endpoint = "#{rhost}:#{rport}/#{proto}"
begin
options_response = Rex::Proto::SIP::Response.parse(response)