Fixes #4026, the HTTP options scanner now reports its vulnerability in the normal way.

git-svn-id: file:///home/svn/framework3/trunk@12133 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Tod Beardsley 2011-03-25 17:03:16 +00:00
parent 5b79e6b4ec
commit 8d8696eb8c
1 changed files with 12 additions and 11 deletions

View File

@ -26,7 +26,16 @@ class Metasploit3 < Msf::Auxiliary
'Version' => '$Revision$',
'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'],
'License' => MSF_LICENSE
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2005-3398'],
[ 'CVE', '2005-3498'],
[ 'OSVDB', '877'],
[ 'BID', '11604'],
[ 'BID', '9506'],
[ 'BID', '9561']
]
)
end
@ -57,17 +66,9 @@ class Metasploit3 < Msf::Auxiliary
:port => rport,
:proto => 'tcp',
:sname => 'http',
:name => 'HTTP-TRACE-ENABLED',
:name => self.fullname,
:info => res.headers['Allow'],
:refs =>
[
[ 'CVE', '2005-3398'],
[ 'CVE', '2005-3498'],
[ 'OSVDB', '877'],
[ 'BID', '11604'],
[ 'BID', '9506'],
[ 'BID', '9561']
]
:refs => self.references
)
end
end