Remove references to Redmine in code
See #4400. This should be all of them, except for, of course, the module that targets Redmine itself. Note that this also updates the README.md with more current information as well.bug/bundler_fix
parent
337b2d784f
commit
d3050de862
|
@ -14,7 +14,6 @@ before_install:
|
|||
- sudo apt-get install -qq libpcap-dev
|
||||
# Uncomment when we have fewer shipping msftidy warnings.
|
||||
# Merge committers will still be checking, just not autofailing.
|
||||
# See https://dev.metasploit.com/redmine/issues/8498
|
||||
# - ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
|
||||
# - ls -la ./.git/hooks
|
||||
# - ./.git/hooks/post-merge
|
||||
|
|
19
README.md
19
README.md
|
@ -4,23 +4,20 @@ Metasploit [![Build Status](https://travis-ci.org/rapid7/metasploit-framework.pn
|
|||
The Metasploit Framework is released under a BSD-style license. See
|
||||
COPYING for more details.
|
||||
|
||||
The latest version of this software is available from http://metasploit.com/
|
||||
The latest version of this software is available from https://metasploit.com/
|
||||
|
||||
Bug tracking and development information can be found at:
|
||||
https://dev.metasploit.com/redmine/projects/framework/
|
||||
|
||||
The public GitHub source repository can be found at:
|
||||
https://github.com/rapid7/metasploit-framework
|
||||
|
||||
API documentation for writing modules can be found at:
|
||||
https://rapid7.github.io/metasploit-framework/api
|
||||
|
||||
Questions and suggestions can be sent to:
|
||||
msfdev(at)metasploit.com
|
||||
https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
|
||||
|
||||
The framework mailing list is the place to discuss features and ask for help.
|
||||
To subscribe, visit the following web page:
|
||||
https://mail.metasploit.com/mailman/listinfo/framework
|
||||
|
||||
The mailing list archives are available from:
|
||||
https://mail.metasploit.com/pipermail/framework/
|
||||
An up-to-date list of useful Metasploit development resources is
|
||||
maintained at:
|
||||
https://metasploit.github.io
|
||||
|
||||
Installing
|
||||
--
|
||||
|
|
|
@ -920,7 +920,7 @@ function read($resource, $len=null) {
|
|||
# whole php process will block waiting for data that may never come.
|
||||
# Unfortunately, selecting on pipes created with proc_open on Windows
|
||||
# always returns immediately. Basically, shell interaction in Windows
|
||||
# is hosed until this gets figured out. See https://dev.metasploit.com/redmine/issues/2232
|
||||
# is hosed until this gets figured out.
|
||||
$r = Array($resource);
|
||||
my_print("Calling select to see if there's data on $resource");
|
||||
while (true) {
|
||||
|
|
|
@ -45,7 +45,7 @@ module Exploit::ORACLE
|
|||
def check_dependencies
|
||||
if not @oci8_loaded
|
||||
print_error("Failed to load the OCI library: #{@oci8_error}")
|
||||
print_error("See http://www.metasploit.com/redmine/projects/framework/wiki/OracleUsage for installation instructions")
|
||||
print_error("Try 'gem install ruby-oci8'")
|
||||
return false
|
||||
end
|
||||
return true
|
||||
|
|
|
@ -1928,7 +1928,7 @@ to_linux_x86_elf(framework, code, exeopts)
|
|||
end
|
||||
|
||||
#
|
||||
# EICAR Canary: https://www.metasploit.com/redmine/projects/framework/wiki/EICAR
|
||||
# EICAR Canary
|
||||
#
|
||||
def self.is_eicar_corrupted?
|
||||
path = ::File.expand_path(::File.join(
|
||||
|
|
|
@ -280,7 +280,7 @@ class ClientCore < Extension
|
|||
# good bet that migration failed and the remote side is hung.
|
||||
# Since we have the comm_mutex here, we *must* release it to
|
||||
# keep from hanging the packet dispatcher thread, which results
|
||||
# in blocking the entire process. See Redmine #8794
|
||||
# in blocking the entire process.
|
||||
begin
|
||||
Timeout.timeout(60) do
|
||||
# Renegotiate SSL over this socket
|
||||
|
|
|
@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'CVE', '2011-3305' ],
|
||||
[ 'OSVDB', '76080'],
|
||||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ],
|
||||
[ 'URL', 'http://dev.metasploit.com/redmine/issues/5673' ]
|
||||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ]
|
||||
],
|
||||
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '1999-0502'] # Weak password
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
# See https://dev.metasploit.com/redmine/issues/8814
|
||||
# See https://github.com/rapid7/metasploit-framework/issues/3811
|
||||
#'DefaultOptions' => {
|
||||
# 'USERPASS_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_userpass.txt"),
|
||||
# 'USER_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_users.txt"),
|
||||
|
|
|
@ -88,7 +88,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = udp_sock.timed_read(8, 1)
|
||||
if res.blank?
|
||||
# To mitigate MacOSX udp sockets behavior
|
||||
# see https://dev.metasploit.com/redmine/issues/7480
|
||||
udp_sock.put(pkt)
|
||||
res = udp_sock.timed_read(8)
|
||||
end
|
||||
|
@ -112,7 +111,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res = udp_sock.timed_read(13964, 1)
|
||||
if res.blank?
|
||||
# To mitigate MacOSX udp sockets behavior
|
||||
# see https://dev.metasploit.com/redmine/issues/7480
|
||||
udp_sock.put(proto_tbl_pkt)
|
||||
res = udp_sock.timed_read(13964)
|
||||
end
|
||||
|
|
|
@ -107,7 +107,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def start_http_service
|
||||
# do not use SSL for this part
|
||||
# XXX: See https://dev.metasploit.com/redmine/issues/8498
|
||||
# XXX: See https://github.com/rapid7/metasploit-framework/issues/3853
|
||||
# It must be possible to do this without directly editing the
|
||||
# datastore.
|
||||
if datastore['SSL']
|
||||
|
@ -133,7 +133,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
})
|
||||
|
||||
# Restore SSL preference
|
||||
# XXX: See https://dev.metasploit.com/redmine/issues/8498
|
||||
# XXX: See https://github.com/rapid7/metasploit-framework/issues/3853
|
||||
# It must be possible to do this without directly editing the
|
||||
# datastore.
|
||||
datastore['SSL'] = true if ssl_restore
|
||||
|
|
|
@ -20,7 +20,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Author' => [ 'savant42' ], #with module help from kos
|
||||
'License' => MSF_LICENSE,
|
||||
'References' => [
|
||||
['URL', 'http://dev.metasploit.com/redmine/issues/5610']
|
||||
['CVE', '2011-5010'],
|
||||
['OSVDB', '77497']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -170,8 +170,7 @@ Processor-Speed=#{processor_speed}
|
|||
#parent process ID, Kill the parent.
|
||||
#This module doesn't use FileDropper because of timing issues when
|
||||
#using migrate -f and FileDropper. On the other hand PrependMigrate
|
||||
#has been avoided because of issues with reverse_https payload
|
||||
#SeeRM#8365 https://http://dev.metasploit.com/redmine/issues/8365
|
||||
#has been avoided because of older issues with reverse_https payload
|
||||
|
||||
unless client.type == "meterpreter"
|
||||
print_error("Automatic cleanup only available with meterpreter, please delete #{stager_instance.payload_exe} manually")
|
||||
|
|
|
@ -106,8 +106,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
sploit << rand_text_alpha_upper(finaloffset-egg.length)
|
||||
|
||||
# The use of rand_text_alpha_upper() ensures we always get the same length for the
|
||||
# first IP address. See the following for more details:
|
||||
# http://dev.metasploit.com/redmine/issues/5453
|
||||
# first IP address.
|
||||
sploit[12,4] = rand_text_alpha_upper(4)
|
||||
|
||||
udp_sock.put(sploit)
|
||||
|
|
|
@ -270,7 +270,7 @@ describe Msf::Ui::Console::CommandDispatcher::Db do
|
|||
FactoryGirl.create(:mdm_service, :host => host, :port => 1026)
|
||||
end
|
||||
it "should list services that are not on a given port" do
|
||||
skip("refs redmine ticket #4821") {
|
||||
skip {
|
||||
db.cmd_services "-np", "1024"
|
||||
|
||||
@output.should =~ [
|
||||
|
|
|
@ -532,10 +532,8 @@ class Msftidy
|
|||
error("Writes to stdout", idx)
|
||||
end
|
||||
|
||||
# You should not change datastore in code. For reasons. See
|
||||
# RM#8498 for discussion, starting at comment #16:
|
||||
#
|
||||
# https://dev.metasploit.com/redmine/issues/8498#note-16
|
||||
# You should not change datastore in code. See
|
||||
# https://github.com/rapid7/metasploit-framework/issues/3853
|
||||
if ln =~ /(?<!\.)datastore\[["'][^"']+["']\]\s*(=|<<)(?![=~>])/
|
||||
info("datastore is modified in code with '#{Regexp.last_match(1)}': #{ln}", idx)
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue