From e4e9ac9d28ce9a43c766487676ce8841dc4d1545 Mon Sep 17 00:00:00 2001 From: wchen-r7 Date: Mon, 13 Jul 2015 12:56:46 -0500 Subject: [PATCH] Remove cold_fusion_version, use coldfusion_version instead Please use auxiliary/scanner/http/coldfusion_version instead. --- .../scanner/http/cold_fusion_version.rb | 130 ------------------ 1 file changed, 130 deletions(-) delete mode 100644 modules/auxiliary/scanner/http/cold_fusion_version.rb diff --git a/modules/auxiliary/scanner/http/cold_fusion_version.rb b/modules/auxiliary/scanner/http/cold_fusion_version.rb deleted file mode 100644 index ef320c9026..0000000000 --- a/modules/auxiliary/scanner/http/cold_fusion_version.rb +++ /dev/null @@ -1,130 +0,0 @@ -## -# This module requires Metasploit: http://metasploit.com/download -# Current source: https://github.com/rapid7/metasploit-framework -## - -require 'msf/core' - -class Metasploit3 < Msf::Auxiliary - - include Msf::Exploit::Remote::HttpClient - include Msf::Auxiliary::Scanner - include Msf::Auxiliary::Report - include Msf::Module::Deprecated - - deprecated(Date.new(2015, 6, 28), 'auxiliary/scanner/http/coldfusion_version') - - def initialize - super( - 'Name' => 'ColdFusion Version Scanner', - 'Description' => %q{ - This module attempts identify various flavors of ColdFusion up to version 10 - as well as the underlying OS. - }, - 'Author' => - [ - 'nebulus', # Original - 'sinn3r' # Fingerprint() patch for Cold Fusion 10 - ], - 'License' => MSF_LICENSE - ) - end - - def fingerprint(response) - - if(response.headers.has_key?('Server') ) - if(response.headers['Server'] =~ /IIS/ or response.headers['Server'] =~ /\(Windows/) - os = "Windows (#{response.headers['Server']})" - elsif(response.headers['Server'] =~ /Apache\//) - os = "Unix (#{response.headers['Server']})" - else - os = response.headers['Server'] - end - end - - return nil if response.body.length < 100 - - title = "Not Found" - if(response.body =~ /(.+)<\/title\/?>/im) - title = $1 - title.gsub!(/\s/, '') - end - - return nil if( title == 'Not Found' or not title =~ /ColdFusionAdministrator/) - - out = nil - - if(response.body =~ />\s*Version:\s*(.*)<\/strong\>\s+ url, - 'method' => 'GET', - }) - - return if not res or not res.body or not res.code - res.body.gsub!(/[\r|\n]/, ' ') - - if (res.code.to_i == 200) - out = fingerprint(res) - return if not out - if(out =~ /^Unknown/) - print_status("#{ip} " << out) - return - else - print_good("#{ip}: " << out) - report_note( - :host => ip, - :port => datastore['RPORT'], - :proto => 'tcp', - :ntype => 'cfversion', - :data => out - ) - end - elsif(res.code.to_i == 403 and datastore['VERBOSE']) - if(res.body =~ /secured with Secure Sockets Layer/ or res.body =~ /Secure Channel Required/ or res.body =~ /requires a secure connection/) - print_status("#{ip} denied access to #{url} (SSL Required)") - elsif(res.body =~ /has a list of IP addresses that are not allowed/) - print_status("#{ip} restricted access by IP") - elsif(res.body =~ /SSL client certificate is required/) - print_status("#{ip} requires a SSL client certificate") - else - print_status("#{ip} denied access to #{url} #{res.code} #{res.message}") - end - end - - rescue OpenSSL::SSL::SSLError - rescue Errno::ENOPROTOOPT, Errno::ECONNRESET, ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::ArgumentError - rescue ::Timeout::Error, ::Errno::EPIPE - end - -end