@@ -12,9 +12,9 @@ class Metasploit3 < Msf::Auxiliary
12
12
13
13
def initialize ( info = { } )
14
14
super ( update_info ( info ,
15
- 'Name' => "Huawei Datacard, Information Disclosure Vulnerability" ,
15
+ 'Name' => "Huawei Datacard Information Disclosure Vulnerability" ,
16
16
'Description' => %q{
17
- This module exploits an un-authenticated information disclosure vulnerability (CWE-425) in Huawei
17
+ This module exploits an un-authenticated information disclosure vulnerability in Huawei
18
18
SOHO routers. The module will gather information by accessing the /api pages where
19
19
authentication is not required, allowing configuration changes
20
20
as well as information disclosure including any stored SMS.
@@ -23,12 +23,13 @@ def initialize(info={})
23
23
'Author' =>
24
24
[
25
25
'Jimson K James.' ,
26
- 'tomsmaily [at] aczire.com' , #Msf module
26
+ 'tomsmaily[at]aczire.com' , #Msf module
27
27
] ,
28
28
'References' =>
29
29
[
30
+ [ 'CWE' , '425' ] ,
30
31
[ 'CVE' , '2013-6031' ] ,
31
- [ 'URL ' , 'http://www.kb.cert.org/vuls/id/ 341526' ] ,
32
+ [ 'US-CERT-VU ' , '341526' ] ,
32
33
[ 'URL' , 'http://www.huaweidevice.co.in/Support/Downloads/' ] ,
33
34
] ,
34
35
'DisclosureDate' => "Nov 11 2013" ) )
@@ -169,13 +170,13 @@ def get_router_info
169
170
} )
170
171
171
172
#check whether we got any response from server and proceed.
172
- if not res
173
+ unless res
173
174
print_error ( "Failed to get any response from server!!!" )
174
175
return
175
176
end
176
177
177
178
#Is it a HTTP OK
178
- if ( res . code == 200 )
179
+ unless res . code == 200
179
180
print_status ( "Okay, Got an HTTP 200 (okay) code. Verifying Server header" )
180
181
else
181
182
print_error ( "Did not get HTTP 200, URL was not found. Exiting!" )
0 commit comments