Skip to content

Commit 19bcef0

Browse files
committed
Land rapid7#7623, Prefer DefaultOptions to reregistering SSL option
2 parents 8c54b0e + c39c53b commit 19bcef0

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,25 +12,27 @@ class MetasploitModule < Msf::Auxiliary
1212

1313
def initialize
1414
super(
15-
'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability',
16-
'Description' => %q{
15+
'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability',
16+
'Description' => %q{
1717
This module tests whether a directory traversal vulnerablity is present
1818
in versions of Cisco Network Access Manager 4.8.x You may wish to change
1919
FILE (e.g. passwd or hosts), MAXDIRS and RPORT depending on your environment.
2020
},
21-
'References' =>
21+
'References' =>
2222
[
2323
[ 'CVE', '2011-3305' ],
2424
[ 'OSVDB', '76080']
2525
],
26-
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
27-
'License' => MSF_LICENSE
26+
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
27+
'License' => MSF_LICENSE,
28+
'DefaultOptions' => {
29+
'SSL' => true
30+
}
2831
)
2932

3033
register_options(
3134
[
3235
Opt::RPORT(443),
33-
OptBool.new('SSL', [ false, 'Negotiate SSL/TLS for outgoing connections', true]),
3436
OptString.new('FILE', [ true, 'The file to traverse for', '/etc/passwd']),
3537
OptInt.new('MAXDIRS', [ true, 'The maximum directory depth to search', 7]),
3638
], self.class)

0 commit comments

Comments
 (0)