Skip to content

Commit 9717a8c

Browse files
author
jvazquez-r7
committed
cleanup for tplink_traversal_noauth
1 parent 543b401 commit 9717a8c

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

modules/auxiliary/scanner/http/tplink_traversal_noauth.rb

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,19 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize
1616
super(
17-
'Name' => 'TP-Link Wireless Lite N Access Point - Directory Traversal Vulnerability',
17+
'Name' => 'TP-Link Wireless Lite N Access Point Directory Traversal Vulnerability',
1818
'Description' => %q{
19-
This module tests whether a directory traversal vulnerablity is present
20-
in versions of TP-Link Access Point 3.12.16 Build 120228 Rel.37317n
21-
},
19+
This module tests whether a directory traversal vulnerability is present in
20+
versions of TP-Link Access Point 3.12.16 Build 120228 Rel.37317n.
21+
},
2222
'References' =>
2323
[
24-
[ 'URL', 'http://www.tp-link.com/en/support/download/?model=TL-WA701ND&version=V1' ],
25-
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-011' ],
24+
[ 'CVE', '2012-5687' ],
25+
[ 'OSVDB', '86881' ],
2626
[ 'BID', '57969' ],
27-
[ 'EDB', '24504' ]
27+
[ 'EDB', '24504' ],
28+
[ 'URL', 'http://www.tp-link.com/en/support/download/?model=TL-WA701ND&version=V1' ],
29+
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-011' ]
2830
],
2931
'Author' => [ 'm-1-k-3' ],
3032
'License' => MSF_LICENSE
@@ -81,7 +83,7 @@ def find_files(file)
8183
:method => "GET"
8284
})
8385

84-
loot = store_loot("lfi.data","text/plain",rhost, res.body,file)
86+
loot = store_loot("tplink.traversal.data","text/plain",rhost, res.body,file)
8587
vprint_good("#{rhost}:#{rport} - File #{file} downloaded to: #{loot}")
8688

8789
if datastore['VERBOSE'] == true
@@ -117,7 +119,7 @@ def find_files(file)
117119
def run_host(ip)
118120

119121
begin
120-
print_status("#{rhost}:#{rport} - connecting")
122+
vprint_status("#{rhost}:#{rport} - Fingerprinting...")
121123
res = send_request_cgi(
122124
{
123125
'method' => 'GET',

0 commit comments

Comments
 (0)