Skip to content

Commit d3050de

Browse files
author
Tod Beardsley
committed
Remove references to Redmine in code
See rapid7#4400. This should be all of them, except for, of course, the module that targets Redmine itself. Note that this also updates the README.md with more current information as well.
1 parent 337b2d7 commit d3050de

File tree

15 files changed

+23
-33
lines changed

15 files changed

+23
-33
lines changed

.travis.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ before_install:
1414
- sudo apt-get install -qq libpcap-dev
1515
# Uncomment when we have fewer shipping msftidy warnings.
1616
# Merge committers will still be checking, just not autofailing.
17-
# See https://dev.metasploit.com/redmine/issues/8498
1817
# - ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
1918
# - ls -la ./.git/hooks
2019
# - ./.git/hooks/post-merge

README.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,23 +4,20 @@ Metasploit [![Build Status](https://travis-ci.org/rapid7/metasploit-framework.pn
44
The Metasploit Framework is released under a BSD-style license. See
55
COPYING for more details.
66

7-
The latest version of this software is available from http://metasploit.com/
7+
The latest version of this software is available from https://metasploit.com/
88

99
Bug tracking and development information can be found at:
10-
https://dev.metasploit.com/redmine/projects/framework/
11-
12-
The public GitHub source repository can be found at:
1310
https://github.com/rapid7/metasploit-framework
1411

15-
Questions and suggestions can be sent to:
16-
msfdev(at)metasploit.com
12+
API documentation for writing modules can be found at:
13+
https://rapid7.github.io/metasploit-framework/api
1714

18-
The framework mailing list is the place to discuss features and ask for help.
19-
To subscribe, visit the following web page:
20-
https://mail.metasploit.com/mailman/listinfo/framework
15+
Questions and suggestions can be sent to:
16+
https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
2117

22-
The mailing list archives are available from:
23-
https://mail.metasploit.com/pipermail/framework/
18+
An up-to-date list of useful Metasploit development resources is
19+
maintained at:
20+
https://metasploit.github.io
2421

2522
Installing
2623
--

data/meterpreter/meterpreter.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -920,7 +920,7 @@ function read($resource, $len=null) {
920920
# whole php process will block waiting for data that may never come.
921921
# Unfortunately, selecting on pipes created with proc_open on Windows
922922
# always returns immediately. Basically, shell interaction in Windows
923-
# is hosed until this gets figured out. See https://dev.metasploit.com/redmine/issues/2232
923+
# is hosed until this gets figured out.
924924
$r = Array($resource);
925925
my_print("Calling select to see if there's data on $resource");
926926
while (true) {

lib/msf/core/exploit/oracle.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ def initialize(info = {})
4545
def check_dependencies
4646
if not @oci8_loaded
4747
print_error("Failed to load the OCI library: #{@oci8_error}")
48-
print_error("See http://www.metasploit.com/redmine/projects/framework/wiki/OracleUsage for installation instructions")
48+
print_error("Try 'gem install ruby-oci8'")
4949
return false
5050
end
5151
return true

lib/msf/util/exe.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1928,7 +1928,7 @@ def self.to_executable_fmt_formats
19281928
end
19291929

19301930
#
1931-
# EICAR Canary: https://www.metasploit.com/redmine/projects/framework/wiki/EICAR
1931+
# EICAR Canary
19321932
#
19331933
def self.is_eicar_corrupted?
19341934
path = ::File.expand_path(::File.join(

lib/rex/post/meterpreter/client_core.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ def migrate( pid )
280280
# good bet that migration failed and the remote side is hung.
281281
# Since we have the comm_mutex here, we *must* release it to
282282
# keep from hanging the packet dispatcher thread, which results
283-
# in blocking the entire process. See Redmine #8794
283+
# in blocking the entire process.
284284
begin
285285
Timeout.timeout(60) do
286286
# Renegotiate SSL over this socket

modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ def initialize
2222
[
2323
[ 'CVE', '2011-3305' ],
2424
[ 'OSVDB', '76080'],
25-
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ],
26-
[ 'URL', 'http://dev.metasploit.com/redmine/issues/5673' ]
25+
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ]
2726
],
2827
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
2928
'License' => MSF_LICENSE

modules/auxiliary/scanner/http/http_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ def initialize
3232
[ 'CVE', '1999-0502'] # Weak password
3333
],
3434
'License' => MSF_LICENSE,
35-
# See https://dev.metasploit.com/redmine/issues/8814
35+
# See https://github.com/rapid7/metasploit-framework/issues/3811
3636
#'DefaultOptions' => {
3737
# 'USERPASS_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_userpass.txt"),
3838
# 'USER_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_users.txt"),

modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@ def check
8888
res = udp_sock.timed_read(8, 1)
8989
if res.blank?
9090
# To mitigate MacOSX udp sockets behavior
91-
# see https://dev.metasploit.com/redmine/issues/7480
9291
udp_sock.put(pkt)
9392
res = udp_sock.timed_read(8)
9493
end
@@ -112,7 +111,6 @@ def exploit
112111
res = udp_sock.timed_read(13964, 1)
113112
if res.blank?
114113
# To mitigate MacOSX udp sockets behavior
115-
# see https://dev.metasploit.com/redmine/issues/7480
116114
udp_sock.put(proto_tbl_pkt)
117115
res = udp_sock.timed_read(13964)
118116
end

modules/exploits/multi/http/struts_default_action_mapper.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ def on_new_session(session)
107107

108108
def start_http_service
109109
# do not use SSL for this part
110-
# XXX: See https://dev.metasploit.com/redmine/issues/8498
110+
# XXX: See https://github.com/rapid7/metasploit-framework/issues/3853
111111
# It must be possible to do this without directly editing the
112112
# datastore.
113113
if datastore['SSL']
@@ -133,7 +133,7 @@ def start_http_service
133133
})
134134

135135
# Restore SSL preference
136-
# XXX: See https://dev.metasploit.com/redmine/issues/8498
136+
# XXX: See https://github.com/rapid7/metasploit-framework/issues/3853
137137
# It must be possible to do this without directly editing the
138138
# datastore.
139139
datastore['SSL'] = true if ssl_restore

0 commit comments

Comments
 (0)