Land #16353, respect ssl_version in crawler

This commit is contained in:
Grant Willcox 2022-03-21 12:24:38 -05:00
commit 024da204d1
No known key found for this signature in database
GPG Key ID: D35E05C0F2B81E83
4 changed files with 9 additions and 2 deletions

View File

@ -189,7 +189,7 @@ module Anemone
url.port.to_i, url.port.to_i,
context, context,
url.scheme == "https", url.scheme == "https",
'SSLv23', @opts[:ssl_version],
@opts[:proxies], @opts[:proxies],
@opts[:username], @opts[:username],
@opts[:password] @opts[:password]

View File

@ -294,6 +294,9 @@ module Auxiliary::HttpCrawler
opts[:password] = t[:password] || '' opts[:password] = t[:password] || ''
opts[:domain] = t[:domain] || 'WORKSTATION' opts[:domain] = t[:domain] || 'WORKSTATION'
if ssl
opts[:ssl_version] = ssl_version
end
opts opts
end end

View File

@ -110,7 +110,7 @@ class Auxiliary::Web::HTTP
opts[:target].port, opts[:target].port,
{}, {},
opts[:target].ssl, opts[:target].ssl,
'SSLv23', 'Auto',
nil, nil,
username, username,
password password

View File

@ -64,6 +64,10 @@ class MetasploitModule < Msf::Auxiliary
# #
def crawler_process_page(t, page, cnt) def crawler_process_page(t, page, cnt)
msg = "[#{"%.5d" % cnt}/#{"%.5d" % max_page_count}] #{page.code || "ERR"} - #{t[:vhost]} - #{page.url}" msg = "[#{"%.5d" % cnt}/#{"%.5d" % max_page_count}] #{page.code || "ERR"} - #{t[:vhost]} - #{page.url}"
if page.error
print_error("Error accessing page #{page.error.to_s}")
elog(page.error)
end
case page.code case page.code
when 301,302 when 301,302
if page.headers and page.headers["location"] if page.headers and page.headers["location"]