Skip to content

Commit e4e6f5d

Browse files
committed
Fix indentation
1 parent d73531c commit e4e6f5d

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

modules/auxiliary/admin/http/tomcat_utf8_traversal.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ class MetasploitModule < Msf::Auxiliary
1313

1414
def initialize
1515
super(
16-
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
17-
'Description' => %q{
16+
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
17+
'Description' => %q{
1818
This module tests whether a directory traversal vulnerablity is present
1919
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0
2020
- 6.0.16 under specific and non-default installations. The connector must have
@@ -25,15 +25,15 @@ def initialize
2525
RedHat 9 running Tomcat 6.0.16 and Sun JRE 1.5.0-05. You may wish to change
2626
FILE (hosts,sensitive files), MAXDIRS and RPORT depending on your environment.
2727
},
28-
'References' =>
28+
'References' =>
2929
[
3030
[ 'URL', 'http://tomcat.apache.org/' ],
3131
[ 'OSVDB', '47464' ],
3232
[ 'CVE', '2008-2938' ],
3333
[ 'URL', 'http://www.securityfocus.com/archive/1/499926' ],
3434
],
35-
'Author' => [ 'patrick','guerrino <ruggine> di massa' ],
36-
'License' => MSF_LICENSE,
35+
'Author' => [ 'patrick','guerrino <ruggine> di massa' ],
36+
'License' => MSF_LICENSE,
3737
'DisclosureDate' => 'Jan 9 2009'
3838
)
3939

modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ class MetasploitModule < Msf::Auxiliary
1212

1313
def initialize
1414
super(
15-
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
16-
'Description' => %q{
15+
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
16+
'Description' => %q{
1717
This module tests whether a directory traversal vulnerablity is present
1818
in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294.
1919
The vulnerability appears to be actually caused by the Tomcat UTF-8
@@ -22,7 +22,7 @@ def initialize
2222
Note that in the Trend Micro appliance, /etc/shadow is not used and therefore
2323
password hashes are stored and anonymously accessible in the passwd file.
2424
},
25-
'References' =>
25+
'References' =>
2626
[
2727
[ 'URL', 'http://tomcat.apache.org/' ],
2828
[ 'OSVDB', '47464' ],
@@ -32,8 +32,8 @@ def initialize
3232
[ 'EDB', '17388' ],
3333
[ 'BID', '48225' ],
3434
],
35-
'Author' => [ 'patrick' ],
36-
'License' => MSF_LICENSE,
35+
'Author' => [ 'patrick' ],
36+
'License' => MSF_LICENSE,
3737
'DisclosureDate' => 'Jan 9 2009'
3838
)
3939

0 commit comments

Comments
 (0)