Skip to content

Commit c3f5f5f

Browse files
author
jvazquez-r7
committed
Land rapid7#1756, @wchen-r7's cleanup of spaces
2 parents 93bddd9 + cae30be commit c3f5f5f

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ def initialize
3030
work against ColdFusion 9. Adobe did not release patches for ColdFusion 6.1 or
3131
ColdFusion 7.
3232
33-
It is not recommended to set FILE when doing scans across a group of servers where the OS
33+
It is not recommended to set FILE when doing scans across a group of servers where the OS
3434
may vary; otherwise, the file requested may not make sense for the OS
35-
35+
3636
},
3737
'Author' => [ 'CG', 'nebulus' ],
3838
'License' => MSF_LICENSE,
@@ -121,7 +121,7 @@ def run_host(ip)
121121

122122
if (res.code.to_i == 200)
123123
out = fingerprint(res)
124-
print_status("#{ip} #{out}") if out
124+
print_status("#{ip} #{out}") if out
125125
return if (datastore['FINGERPRINT'])
126126

127127
if(out =~ /Windows/ and out =~ /MX6/)

modules/auxiliary/server/browser_autopwn.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ def start_exploit_modules()
446446
end
447447

448448
# Now that we've got all of our exploit tests put together,
449-
# organize them into an all tests (JS and no-JS), organized by rank,
449+
# organize them into an all tests (JS and no-JS), organized by rank,
450450
# and doesnt-require-scripting (no-JS), organized by browser name.
451451
if apo[:javascript] && apo[:ua_name]
452452
@all_tests[apo[:rank]] ||= []
@@ -507,7 +507,7 @@ def start_exploit_modules()
507507
# Sort the tests by reliability, descending.
508508
# I don't like doing this directly (wihout a !), but any other sort wasn't sticking - NE
509509
@all_tests = @all_tests.sort.reverse
510-
510+
511511
# This matters a lot less for noscript exploits since they basically
512512
# get thrown into a big pile of iframes that the browser will load
513513
# semi-concurrently. Still, might as well.
@@ -748,12 +748,12 @@ def build_script_response(cli, request)
748748
# if we have no client_info, this will add all tests. Otherwise tries
749749
# to only send tests for exploits that target the client's detected
750750
# browser.
751-
751+
752752
@all_tests.each { |rank, sploits|
753753
sploits.each { |s|
754754
browser = s[:ua_name] || "generic"
755755
next unless client_matches_browser(client_info, browser)
756-
756+
757757
# Send all the generics regardless of what the client is. If the
758758
# client is nil, then we don't know what it really is, so just err
759759
# on the side of shells and send everything. Otherwise, send only
@@ -769,7 +769,7 @@ def build_script_response(cli, request)
769769
end
770770
# shouldn't be any in the resource, but just in case...
771771
res = exploit_resource(s[:name]).gsub("\n",'').gsub("'", "\\\\'")
772-
772+
773773
# Skip exploits that don't match the client's OS.
774774
if (host_info and host_info[:os_name] and s[:os_name])
775775
# Reject exploits whose OS doesn't match that of the

modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ def exploit
176176

177177
#
178178
# "/test.mp4" is currently hard-coded in the swf file, so we need to add to resource
179-
#
179+
#
180180
proc = Proc.new do |cli, req|
181181
self.add_resource({'Path' => "/test.mp4", 'Proc' => proc}) rescue nil
182182
on_request_uri(cli, req)

0 commit comments

Comments
 (0)