@@ -46,9 +46,9 @@ def initialize(info = {})
46
46
'References' =>
47
47
[
48
48
[ 'CVE' , '2014-9390' ] ,
49
+ [ 'URL' , 'https://community.rapid7.com/community/metasploit/blog/2015/01/01/12-days-of-haxmas-exploiting-cve-2014-9390-in-git-and-mercurial' ] ,
49
50
[ 'URL' , 'http://git-blame.blogspot.com.es/2014/12/git-1856-195-205-214-and-221-and.html' ] ,
50
51
[ 'URL' , 'http://article.gmane.org/gmane.linux.kernel/1853266' ] ,
51
- [ 'URL' , 'https://community.rapid7.com/community/metasploit/blog/2014/12/30/12-days-of-haxmas-exploiting-cve-2014-9390-in-git-and-mercurial' ] ,
52
52
[ 'URL' , 'https://github.com/blog/1938-vulnerability-announced-update-your-git-clients' ] ,
53
53
[ 'URL' , 'https://www.mehmetince.net/one-git-command-may-cause-you-hacked-cve-2014-9390-exploitation-for-shell/' ] ,
54
54
[ 'URL' , 'http://mercurial.selenic.com/wiki/WhatsNew#Mercurial_3.2.3_.282014-12-18.29' ] ,
@@ -86,8 +86,7 @@ def initialize(info = {})
86
86
87
87
register_options (
88
88
[
89
- OptBool . new ( 'GIT' , [ true , 'Exploit Git clients' , true ] ) ,
90
- OptBool . new ( 'MERCURIAL' , [ true , 'Exploit Mercurial clients' , false ] )
89
+ OptBool . new ( 'GIT' , [ true , 'Exploit Git clients' , true ] )
91
90
]
92
91
)
93
92
@@ -96,7 +95,8 @@ def initialize(info = {})
96
95
OptString . new ( 'GIT_URI' , [ false , 'The URI to use as the malicious Git instance (empty for random)' , '' ] ) ,
97
96
OptString . new ( 'MERCURIAL_URI' , [ false , 'The URI to use as the malicious Mercurial instance (empty for random)' , '' ] ) ,
98
97
OptString . new ( 'GIT_HOOK' , [ false , 'The Git hook to use for exploitation' , 'post-checkout' ] ) ,
99
- OptString . new ( 'MERCURIAL_HOOK' , [ false , 'The Mercurial hook to use for exploitation' , 'update' ] )
98
+ OptString . new ( 'MERCURIAL_HOOK' , [ false , 'The Mercurial hook to use for exploitation' , 'update' ] ) ,
99
+ OptBool . new ( 'MERCURIAL' , [ false , 'Enable experimental Mercurial support' , false ] )
100
100
]
101
101
)
102
102
end
0 commit comments