Fix #443. This module should not be use as a directory scanner as there are more suitable modules for such task. This specific module is only made to test a specific vulnerability and will be mode to a per directory check instead of trying to identify directories requiring authentication to be bypassed

git-svn-id: file:///home/svn/framework3/trunk@7312 4d416f70-5f16-0410-b530-b9f4589650da
unstable
et 2009-11-01 00:59:41 +00:00
parent e5e89906d0
commit fbbbde55f2
1 changed files with 0 additions and 10 deletions

View File

@ -170,16 +170,6 @@ class Metasploit3 < Msf::Auxiliary
vul_id = wmap_report(rep_id,'DIRECTORY','NAME',"#{tpath}#{testfdir}","Directory #{tpath}#{testfdir} found.")
wmap_report(vul_id,'DIRECTORY','RESP_CODE',"#{res.code}",nil)
end
else
print_status("Found #{wmap_base_url}#{tpath}#{testfdir} #{res.code} (#{wmap_target_host})")
rep_id = wmap_base_report_id(
wmap_target_host,
wmap_target_port,
wmap_target_ssl
)
vul_id = wmap_report(rep_id,'DIRECTORY','NAME',"#{tpath}#{testfdir}","Directory #{tpath}#{testfdir} found.")
wmap_report(vul_id,'DIRECTORY','RESP_CODE',"#{res.code}",nil)
end
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout