Remove references to Redmine in code

See #4400. This should be all of them, except for, of course, the module
that targets Redmine itself.

Note that this also updates the README.md with more current information
as well.
bug/bundler_fix
Tod Beardsley 2014-12-19 17:25:56 -06:00
parent 337b2d784f
commit d3050de862
No known key found for this signature in database
GPG Key ID: BD63D0A3EA19CAAC
15 changed files with 23 additions and 33 deletions

View File

@ -14,7 +14,6 @@ before_install:
- sudo apt-get install -qq libpcap-dev
# Uncomment when we have fewer shipping msftidy warnings.
# Merge committers will still be checking, just not autofailing.
# See https://dev.metasploit.com/redmine/issues/8498
# - ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
# - ls -la ./.git/hooks
# - ./.git/hooks/post-merge

View File

@ -4,23 +4,20 @@ Metasploit [![Build Status](https://travis-ci.org/rapid7/metasploit-framework.pn
The Metasploit Framework is released under a BSD-style license. See
COPYING for more details.
The latest version of this software is available from http://metasploit.com/
The latest version of this software is available from https://metasploit.com/
Bug tracking and development information can be found at:
https://dev.metasploit.com/redmine/projects/framework/
The public GitHub source repository can be found at:
https://github.com/rapid7/metasploit-framework
API documentation for writing modules can be found at:
https://rapid7.github.io/metasploit-framework/api
Questions and suggestions can be sent to:
msfdev(at)metasploit.com
https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
The framework mailing list is the place to discuss features and ask for help.
To subscribe, visit the following web page:
https://mail.metasploit.com/mailman/listinfo/framework
The mailing list archives are available from:
https://mail.metasploit.com/pipermail/framework/
An up-to-date list of useful Metasploit development resources is
maintained at:
https://metasploit.github.io
Installing
--

View File

@ -920,7 +920,7 @@ function read($resource, $len=null) {
# whole php process will block waiting for data that may never come.
# Unfortunately, selecting on pipes created with proc_open on Windows
# always returns immediately. Basically, shell interaction in Windows
# is hosed until this gets figured out. See https://dev.metasploit.com/redmine/issues/2232
# is hosed until this gets figured out.
$r = Array($resource);
my_print("Calling select to see if there's data on $resource");
while (true) {

View File

@ -45,7 +45,7 @@ module Exploit::ORACLE
def check_dependencies
if not @oci8_loaded
print_error("Failed to load the OCI library: #{@oci8_error}")
print_error("See http://www.metasploit.com/redmine/projects/framework/wiki/OracleUsage for installation instructions")
print_error("Try 'gem install ruby-oci8'")
return false
end
return true

View File

@ -1928,7 +1928,7 @@ to_linux_x86_elf(framework, code, exeopts)
end
#
# EICAR Canary: https://www.metasploit.com/redmine/projects/framework/wiki/EICAR
# EICAR Canary
#
def self.is_eicar_corrupted?
path = ::File.expand_path(::File.join(

View File

@ -280,7 +280,7 @@ class ClientCore < Extension
# good bet that migration failed and the remote side is hung.
# Since we have the comm_mutex here, we *must* release it to
# keep from hanging the packet dispatcher thread, which results
# in blocking the entire process. See Redmine #8794
# in blocking the entire process.
begin
Timeout.timeout(60) do
# Renegotiate SSL over this socket

View File

@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'CVE', '2011-3305' ],
[ 'OSVDB', '76080'],
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ],
[ 'URL', 'http://dev.metasploit.com/redmine/issues/5673' ]
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ]
],
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
'License' => MSF_LICENSE

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '1999-0502'] # Weak password
],
'License' => MSF_LICENSE,
# See https://dev.metasploit.com/redmine/issues/8814
# See https://github.com/rapid7/metasploit-framework/issues/3811
#'DefaultOptions' => {
# 'USERPASS_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_userpass.txt"),
# 'USER_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_users.txt"),

View File

@ -88,7 +88,6 @@ class Metasploit3 < Msf::Exploit::Remote
res = udp_sock.timed_read(8, 1)
if res.blank?
# To mitigate MacOSX udp sockets behavior
# see https://dev.metasploit.com/redmine/issues/7480
udp_sock.put(pkt)
res = udp_sock.timed_read(8)
end
@ -112,7 +111,6 @@ class Metasploit3 < Msf::Exploit::Remote
res = udp_sock.timed_read(13964, 1)
if res.blank?
# To mitigate MacOSX udp sockets behavior
# see https://dev.metasploit.com/redmine/issues/7480
udp_sock.put(proto_tbl_pkt)
res = udp_sock.timed_read(13964)
end

View File

@ -107,7 +107,7 @@ class Metasploit3 < Msf::Exploit::Remote
def start_http_service
# do not use SSL for this part
# XXX: See https://dev.metasploit.com/redmine/issues/8498
# XXX: See https://github.com/rapid7/metasploit-framework/issues/3853
# It must be possible to do this without directly editing the
# datastore.
if datastore['SSL']
@ -133,7 +133,7 @@ class Metasploit3 < Msf::Exploit::Remote
})
# Restore SSL preference
# XXX: See https://dev.metasploit.com/redmine/issues/8498
# XXX: See https://github.com/rapid7/metasploit-framework/issues/3853
# It must be possible to do this without directly editing the
# datastore.
datastore['SSL'] = true if ssl_restore

View File

@ -20,7 +20,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => [ 'savant42' ], #with module help from kos
'License' => MSF_LICENSE,
'References' => [
['URL', 'http://dev.metasploit.com/redmine/issues/5610']
['CVE', '2011-5010'],
['OSVDB', '77497']
],
'Privileged' => false,
'Payload' =>

View File

@ -170,8 +170,7 @@ Processor-Speed=#{processor_speed}
#parent process ID, Kill the parent.
#This module doesn't use FileDropper because of timing issues when
#using migrate -f and FileDropper. On the other hand PrependMigrate
#has been avoided because of issues with reverse_https payload
#SeeRM#8365 https://http://dev.metasploit.com/redmine/issues/8365
#has been avoided because of older issues with reverse_https payload
unless client.type == "meterpreter"
print_error("Automatic cleanup only available with meterpreter, please delete #{stager_instance.payload_exe} manually")

View File

@ -106,8 +106,7 @@ class Metasploit3 < Msf::Exploit::Remote
sploit << rand_text_alpha_upper(finaloffset-egg.length)
# The use of rand_text_alpha_upper() ensures we always get the same length for the
# first IP address. See the following for more details:
# http://dev.metasploit.com/redmine/issues/5453
# first IP address.
sploit[12,4] = rand_text_alpha_upper(4)
udp_sock.put(sploit)

View File

@ -270,7 +270,7 @@ describe Msf::Ui::Console::CommandDispatcher::Db do
FactoryGirl.create(:mdm_service, :host => host, :port => 1026)
end
it "should list services that are not on a given port" do
skip("refs redmine ticket #4821") {
skip {
db.cmd_services "-np", "1024"
@output.should =~ [

View File

@ -532,10 +532,8 @@ class Msftidy
error("Writes to stdout", idx)
end
# You should not change datastore in code. For reasons. See
# RM#8498 for discussion, starting at comment #16:
#
# https://dev.metasploit.com/redmine/issues/8498#note-16
# You should not change datastore in code. See
# https://github.com/rapid7/metasploit-framework/issues/3853
if ln =~ /(?<!\.)datastore\[["'][^"']+["']\]\s*(=|<<)(?![=~>])/
info("datastore is modified in code with '#{Regexp.last_match(1)}': #{ln}", idx)
end