File tree Expand file tree Collapse file tree 1 file changed +8
-10
lines changed
modules/auxiliary/scanner/http Expand file tree Collapse file tree 1 file changed +8
-10
lines changed Original file line number Diff line number Diff line change 7
7
8
8
class Metasploit3 < Msf ::Auxiliary
9
9
10
- # Exploit mixins should be called first
11
10
include Msf ::Exploit ::Remote ::HttpClient
12
11
include Msf ::Auxiliary ::WmapScanServer
13
- # Scanner mixin should be near last
14
12
include Msf ::Auxiliary ::Scanner
15
13
16
14
def initialize ( info = { } )
@@ -49,21 +47,21 @@ def run_host(target_host)
49
47
} )
50
48
51
49
unless res
52
- vprint_error ( "#{ rhost } : #{ rport } did not reply to our request" )
50
+ vprint_error ( "#{ peer } did not reply to our request" )
53
51
return
54
52
end
55
53
56
54
if res . headers =~ /#{ p } / || res . body =~ /#{ p } /
57
- print_good ( "#{ rhost } : #{ rport } is vulnerable to HTTP Host-Header Injection" )
55
+ print_good ( "#{ peer } is vulnerable to HTTP Host-Header Injection" )
58
56
report_vuln (
59
- :host => rhost ,
60
- :port => rport ,
61
- :proto => 'tcp' ,
62
- :sname => ( ssl ? 'https' : 'http' ) ,
63
- :info => "Vulnerable to HTTP Host-Header Injection" ,
57
+ :host : rhost ,
58
+ :port : rport ,
59
+ :proto : 'tcp' ,
60
+ :sname : ( ssl ? 'https' : 'http' ) ,
61
+ :info : "Vulnerable to HTTP Host-Header Injection" ,
64
62
)
65
63
else
66
- vprint_error ( "#{ rhost } : #{ rport } returned #{ res . code } #{ res . message } " )
64
+ vprint_error ( "#{ peer } returned #{ res . code } #{ res . message } " )
67
65
end
68
66
rescue ::Rex ::ConnectionRefused , ::Rex ::HostUnreachable , ::Rex ::ConnectionTimeout
69
67
rescue ::Timeout ::Error , ::Errno ::EPIPE
You can’t perform that action at this time.
0 commit comments