Skip to content

Commit 9909579

Browse files
committed
Merge branch 'FireFart-msftidy_1'
2 parents 7d1752d + 6654faf commit 9909579

File tree

8 files changed

+12
-13
lines changed

8 files changed

+12
-13
lines changed

modules/auxiliary/scanner/upnp/ssdp_msearch.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ def scanner_postscan(batch)
7171
:name => 'upnp',
7272
:info => res[:info][:location].to_s
7373
) if datastore['REPORT_LOCATION']
74-
end
74+
end
7575
end
7676
end
7777

modules/exploits/linux/browser/adobe_flashplayer_aslaunch.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@ def initialize(info = {})
3434
[
3535
['CVE', '2008-5499'],
3636
['OSVDB', '50796'],
37-
['URL', 'http://www.adobe.com/support/security/bulletins/apsb08-24.html'],
38-
['URL', 'http://www.securityfocus.com/bid/32896/exploit']
37+
['BID', '32896'],
38+
['URL', 'http://www.adobe.com/support/security/bulletins/apsb08-24.html']
3939
],
4040
'DefaultOptions' =>
4141
{

modules/exploits/multi/svn/svnserve_date.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,7 @@ def initialize(info = {})
3232
['CVE', '2004-0397'],
3333
['OSVDB', '6301'],
3434
['BID', '10386'],
35-
['URL', 'http://lists.netsys.com/pipermail/full-disclosure/2004-May/021737.html'],
36-
['MIL', '68'],
35+
['URL', 'http://lists.netsys.com/pipermail/full-disclosure/2004-May/021737.html']
3736
],
3837
'Payload' =>
3938
{

modules/exploits/windows/browser/ms05_054_onload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ def initialize(info = {})
3939
['MSB', 'MS05-054'],
4040
['CVE', '2005-1790'],
4141
['OSVDB', '17094'],
42-
['URL', 'http://www.securityfocus.com/bid/13799/info'],
42+
['BID', '13799'],
4343
['URL', 'http://www.cvedetails.com/cve/CVE-2005-1790'],
4444
],
4545
'DefaultOptions' =>

modules/exploits/windows/ftp/easyftp_cwd_fixret.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,12 +36,12 @@ def initialize(info = {})
3636
'References' =>
3737
[
3838
[ 'OSVDB', '62134' ],
39+
[ 'BID', '38262' ],
3940
[ 'URL', 'http://paulmakowski.wordpress.com/2010/02/28/increasing-payload-size-w-return-address-overwrite/' ],
4041
[ 'URL', 'http://paulmakowski.wordpress.com/2010/04/19/metasploit-plugin-for-easyftp-server-exploit' ],
4142
[ 'URL', 'http://seclists.org/bugtraq/2010/Feb/202' ],
4243
[ 'URL', 'http://code.google.com/p/easyftpsvr/'],
43-
[ 'URL', 'https://tegosecurity.com/etc/return_overwrite/RCE_easy_ftp_server_1.7.0.2.zip' ],
44-
[ 'URL', 'http://www.securityfocus.com/bid/38262/exploit']
44+
[ 'URL', 'https://tegosecurity.com/etc/return_overwrite/RCE_easy_ftp_server_1.7.0.2.zip' ]
4545
],
4646
'Privileged' => false,
4747
'Payload' =>

modules/post/windows/gather/credentials/filezilla_server.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ def get_filezilla_creds(paths)
206206
:target_port => config['admin_port']
207207
)
208208
end
209-
209+
210210
p = store_loot("filezilla.server.creds", "text/csv", session, credentials.to_csv,
211211
"filezilla_server_credentials.csv", "FileZilla FTP Server Credentials")
212212

modules/post/windows/gather/smart_hashdump.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ def read_hashdump
285285
host,port = session.session_host, session.session_port
286286
collected_hashes = ""
287287
tries = 1
288-
288+
289289
begin
290290

291291
print_status("\tObtaining the boot key...")
@@ -330,7 +330,7 @@ def read_hashdump
330330

331331
rescue ::Interrupt
332332
raise $!
333-
rescue ::Rex::Post::Meterpreter::RequestError => e
333+
rescue ::Rex::Post::Meterpreter::RequestError => e
334334
# Sometimes we get this invalid handle race condition.
335335
# So let's retry a couple of times before giving up.
336336
# See bug #6815
@@ -343,7 +343,7 @@ def read_hashdump
343343
print_error("Meterpreter Exception: #{e.class} #{e}")
344344
print_error("This script requires the use of a SYSTEM user context (hint: migrate into service process)")
345345
end
346-
346+
347347
rescue ::Exception => e
348348
print_error("Error: #{e.class} #{e} #{e.backtrace}")
349349
end

modules/post/windows/manage/migrate.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ def run
3939
print_status("Current server process: #{server.name} (#{server.pid})")
4040

4141
target_pid = nil
42-
42+
4343
if datastore['SPAWN']
4444
print_status("Spawning notepad.exe process to migrate to")
4545
target_pid = create_temp_proc

0 commit comments

Comments
 (0)