Skip to content

Commit 62a3f73

Browse files
committed
Update rubocop target ruby version
1 parent c4fd2fa commit 62a3f73

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+58
-62
lines changed

.rubocop.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
# inherit_from: .rubocop_todo.yml
1010

1111
AllCops:
12-
TargetRubyVersion: 2.6
12+
TargetRubyVersion: 2.7
1313
SuggestExtensions: false
1414
NewCops: disable
1515

modules/auxiliary/admin/http/netgear_pnpx_getsharefolderlist_auth_bypass.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ def initialize(info = {})
4040
'Stability' => [CRASH_SAFE],
4141
'Reliability' => [REPEATABLE_SESSION],
4242
'SideEffects' => [CONFIG_CHANGES, IOC_IN_LOGS],
43-
'RelatedModules' => [ 'exploit/linux/telnet/netgear_telnetenable' ], # This module relies on users also running exploit/linux/telnet/netgear_telnetenable to get the shell.
43+
'RelatedModules' => [ 'exploit/linux/telnet/netgear_telnetenable' ] # This module relies on users also running exploit/linux/telnet/netgear_telnetenable to get the shell.
4444
},
4545
'DisclosureDate' => '2021-09-06',
4646
'DefaultTarget' => 0

modules/auxiliary/admin/http/netgear_r6700_pass_reset.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ def initialize(info = {})
5353
# resetting the router to the default factory password.
5454
'Stability' => [ CRASH_SERVICE_DOWN ], # This module will crash the target service after it is run.
5555
'Reliability' => [],
56-
'RelatedModules' => [ 'exploit/linux/telnet/netgear_telnetenable' ], # This module relies on users also running exploit/linux/telnet/netgear_telnetenable to get the shell.
56+
'RelatedModules' => [ 'exploit/linux/telnet/netgear_telnetenable' ] # This module relies on users also running exploit/linux/telnet/netgear_telnetenable to get the shell.
5757
},
5858
'DisclosureDate' => '2020-06-15',
5959
'DefaultTarget' => 0

modules/auxiliary/admin/networking/cisco_vpn_3000_ftp_bypass.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ def initialize(info = {})
4848
def run
4949
connect
5050
res = sock.get_once
51-
if (res && res =~ /220 Session will be terminated after/)
51+
if res && res =~ /220 Session will be terminated after/
5252
print_status('Target appears to be a Cisco VPN Concentrator 3000 series.')
5353

5454
test = Rex::Text.rand_text_alphanumeric(8)

modules/auxiliary/gather/grandstream_ucm62xx_sql_account_guess.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,6 @@ def run
117117

118118
wsock.put_wstext(create_injection_request(payload))
119119
recv_wsframe_status(wsock) == 0
120-
121120
rescue Rex::Proto::Http::WebSocket::ConnectionError => e
122121
res = e.http_response
123122
fail_with(Failure::Unreachable, e.message) if res.nil?

modules/auxiliary/gather/prometheus_node_exporter_gather.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,10 @@ def run
5757

5858
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
5959
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response from server (response code #{res.code})") unless res.code == 200
60-
fail_with(Failure::UnexpectedReply, "#{peer} - Prometheus Node Exporter not found") unless (
60+
fail_with(Failure::UnexpectedReply, "#{peer} - Prometheus Node Exporter not found") unless
6161
res.body.include?('<h2>Prometheus Node Exporter</h2>') ||
6262
res.body.include?('<title>Node Exporter</title>') || # version 0.15.2
6363
res.body.include?('<h2>Prometheus Exporter for Windows servers</h2>')
64-
)
6564

6665
vprint_good("#{peer} - Prometheus Node Exporter version: #{Regexp.last_match(1)}") if res.body =~ /version=([\d.]+)/
6766

modules/auxiliary/scanner/http/emby_ssrf_scanner.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ def initialize
1818
'Author' => 'Btnz',
1919
'License' => MSF_LICENSE,
2020
'Disclosure Date' => '2020-10-01',
21-
'Notes' => {
22-
'Stability' => [],
23-
'SideEffects' => [],
24-
'Reliability' => [],
25-
'RelatedModules' => ['auxiliary/scanner/http/emby_version_ssrf'],
21+
'Notes' => {
22+
'Stability' => [],
23+
'SideEffects' => [],
24+
'Reliability' => [],
25+
'RelatedModules' => ['auxiliary/scanner/http/emby_version_ssrf']
2626
},
2727
'References' => [
2828
['CVE', '2020-26948'],

modules/auxiliary/scanner/http/fortimail_login_bypass_detection.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ def run_host(ip)
7070

7171
version_raw = res.body[/fml-admin-login-(\d+).js/, 1]
7272
version = version_raw.to_i
73-
unless (res.body.include?('newpassword') && (version.between?(140, 160) || version.between?(730, 745) || version.between?(250, 263)))
73+
unless res.body.include?('newpassword') && (version.between?(140, 160) || version.between?(730, 745) || version.between?(250, 263))
7474
print_bad("#{ip} - Not vulnerable version (Build: #{version_raw}) of FortiMail detected")
7575
return :abort
7676
end

modules/auxiliary/scanner/scada/bacnet_l3.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ def broadcast_who_is
156156
loop do
157157
data, host, port = lsocket.recvfrom(65535, datastore['TIMEOUT'])
158158
data2, host2, port2 = ssocket.recvfrom(65535, datastore['TIMEOUT'])
159-
break if (host.nil? && host2.nil?)
159+
break if host.nil? && host2.nil?
160160

161161
cap << [data, host, port] if host
162162
cap << [data2, host2, port2] if host2

modules/exploits/freebsd/http/citrix_formssso_target_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ def exploit
208208

209209
send_request_cgi({
210210
'uri' => normalize_uri(datastore['TARGETURI'], 'gwtest', 'formssso'),
211-
'encode_params' => false, # we'll encode them ourselves
211+
'encode_params' => false, # we'll encode them ourselves
212212
'vars_get' => {
213213
'event' => 'start',
214214
'target' => buffer

0 commit comments

Comments
 (0)