metasploit-framework/modules/auxiliary
sinn3r f3a2d6663f Fix #4616 and Fix #3798 - Correctly use OptRegexp
This patch fixes a problem with OptRegexp. The OptRegexp class is
always forcing the value to be converted to a string first, which
causes the EXCLUDE option in browser_autopwn to kick in and match
every found autopwn module, so it ignores all of them and you load
nothing (#4616).

It is important to understand that nil actually represents an option
not being set, which is a completely different behavior than having
an empty value (technically "" is still a value, and if there's a
value, it means the option is set). We need to watcher for these
scenarios.

I am restoring the #default method to avoid forcing a to_s, which should
fix the browser autopwn loading problem. And then I changed scraper.rb's
default value for datastore option PATTERN to a string, because still
fixes #3798. The way I see it, #3798 is actually a module-specific issue.

Fix #4616
Fix #3798
2015-01-23 02:38:26 -06:00
..
admin Land #3700, @ringt fix for oracle_login 2015-01-09 22:59:32 -06:00
analyze tell suer KoreLogic rules have been applied 2015-01-07 12:36:07 -06:00
bnat
client/smtp
crawler Extra commas. 2015-01-22 13:45:08 -06:00
docx
dos fix msftidy warnings 2015-01-18 23:55:57 +01:00
fuzzers
gather Land #4596, @pdeardorff-r7's memcached extractor 2015-01-22 08:00:19 -08:00
parser
pdf/foxit fix msftidy warnings 2014-12-12 13:16:21 +01:00
scanner Fix #4616 and Fix #3798 - Correctly use OptRegexp 2015-01-23 02:38:26 -06:00
server fix invalid URI scheme, closes #4362 2014-12-11 23:34:10 +01:00
sniffer
spoof fixes #4490, class.to_s should not be used for checks 2014-12-31 10:46:24 +01:00
sqli/oracle
voip Beautify descriptions 2015-01-10 01:10:08 -06:00
vsploit