Skip to content
Browse files

Unpolluting SVN Revision keyword

Sometimes Revision keywords get expanded, too. Fix those.
  • Loading branch information...
1 parent 3626d48 commit 302853f5a493ff72c15ea5c2024c10bfff18c499 @todb todb committed Mar 1, 2012
Showing with 38 additions and 38 deletions.
  1. +1 −1 modules/auxiliary/admin/http/contentkeeper_fileaccess.rb
  2. +1 −1 modules/auxiliary/admin/http/tomcat_administration.rb
  3. +1 −1 modules/auxiliary/admin/http/tomcat_utf8_traversal.rb
  4. +1 −1 modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb
  5. +1 −1 modules/auxiliary/scanner/http/backup_file.rb
  6. +1 −1 modules/auxiliary/scanner/http/blind_sql_query.rb
  7. +1 −1 modules/auxiliary/scanner/http/brute_dirs.rb
  8. +1 −1 modules/auxiliary/scanner/http/cert.rb
  9. +1 −1 modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb
  10. +1 −1 modules/auxiliary/scanner/http/copy_of_file.rb
  11. +1 −1 modules/auxiliary/scanner/http/dir_listing.rb
  12. +1 −1 modules/auxiliary/scanner/http/dir_scanner.rb
  13. +1 −1 modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.rb
  14. +1 −1 modules/auxiliary/scanner/http/error_sql_injection.rb
  15. +1 −1 modules/auxiliary/scanner/http/file_same_name_dir.rb
  16. +1 −1 modules/auxiliary/scanner/http/files_dir.rb
  17. +1 −1 modules/auxiliary/scanner/http/frontpage_login.rb
  18. +1 −1 modules/auxiliary/scanner/http/http_version.rb
  19. +1 −1 modules/auxiliary/scanner/http/lucky_punch.rb
  20. +1 −1 modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass.rb
  21. +1 −1 modules/auxiliary/scanner/http/open_proxy.rb
  22. +1 −1 modules/auxiliary/scanner/http/options.rb
  23. +1 −1 modules/auxiliary/scanner/http/prev_dir_same_name_file.rb
  24. +1 −1 modules/auxiliary/scanner/http/replace_ext.rb
  25. +1 −1 modules/auxiliary/scanner/http/robots_txt.rb
  26. +1 −1 modules/auxiliary/scanner/http/soap_xml.rb
  27. +1 −1 modules/auxiliary/scanner/http/sqlmap.rb
  28. +1 −1 modules/auxiliary/scanner/http/ssl.rb
  29. +1 −1 modules/auxiliary/scanner/http/svn_scanner.rb
  30. +1 −1 modules/auxiliary/scanner/http/trace.rb
  31. +1 −1 modules/auxiliary/scanner/http/trace_axd.rb
  32. +1 −1 modules/auxiliary/scanner/http/verb_auth_bypass.rb
  33. +1 −1 modules/auxiliary/scanner/http/vhost_scanner.rb
  34. +1 −1 modules/auxiliary/scanner/http/web_vulndb.rb
  35. +1 −1 modules/auxiliary/scanner/http/webdav_internal_ip.rb
  36. +1 −1 modules/auxiliary/scanner/http/webdav_scanner.rb
  37. +1 −1 modules/auxiliary/scanner/http/webdav_website_content.rb
  38. +1 −1 modules/auxiliary/scanner/http/xpath.rb
View
2 modules/auxiliary/admin/http/contentkeeper_fileaccess.rb
@@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'ContentKeeper Web Appliance mimencode File Access',
- 'Version' => '$Revision: 14288 $',
+ 'Version' => '$Revision$',
'Description' => %q{
This module abuses the 'mimencode' binary present within
ContentKeeper Web filtering appliances to retrieve arbitrary
View
2 modules/auxiliary/admin/http/tomcat_administration.rb
@@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Tomcat Administration Tool Default Access',
- 'Version' => '$Revision: 13394 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect the Tomcat administration interface.',
'References' =>
[
View
2 modules/auxiliary/admin/http/tomcat_utf8_traversal.rb
@@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
- 'Version' => '$Revision: 14288 $',
+ 'Version' => '$Revision$',
'Description' => %q{
This module tests whether a directory traversal vulnerablity is present
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0
View
2 modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb
@@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
- 'Version' => '$Revision: 14288 $',
+ 'Version' => '$Revision$',
'Description' => %q{
This module tests whether a directory traversal vulnerablity is present
in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294.
View
2 modules/auxiliary/scanner/http/backup_file.rb
@@ -30,7 +30,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 13183 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/blind_sql_query.rb
@@ -32,7 +32,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 14735 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/brute_dirs.rb
@@ -30,7 +30,7 @@ def initialize(info = {})
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/cert.rb
@@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP SSL Certificate Checker',
- 'Version' => '$Revision: 11796 $',
+ 'Version' => '$Revision$',
'Author' => 'nebulus',
'License' => MSF_LICENSE,
'Description' => %q{
View
2 modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb
@@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability',
- 'Version' => '$Revision: 14532 $',
+ 'Version' => '$Revision$',
'Description' => %q{
This module tests whether a directory traversal vulnerablity is present
in versions of Cisco Network Access Manager 4.8.x You may wish to change
View
2 modules/auxiliary/scanner/http/copy_of_file.rb
@@ -30,7 +30,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/dir_listing.rb
@@ -29,7 +29,7 @@ def initialize(info = {})
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 13183 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/dir_scanner.rb
@@ -30,7 +30,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.rb
@@ -41,7 +41,7 @@ def initialize(info = {})
[ 'OSVDB', '54555' ],
[ 'BID', '34993' ],
],
- 'Version' => '$Revision: 14034 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/error_sql_injection.rb
@@ -32,7 +32,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/file_same_name_dir.rb
@@ -32,7 +32,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 13183 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/files_dir.rb
@@ -29,7 +29,7 @@ def initialize(info = {})
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 14288 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/frontpage_login.rb
@@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'FrontPage Server Extensions Login Utility',
- 'Version' => '$Revision: 12623 $',
+ 'Version' => '$Revision$',
'Description' => 'This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed.',
'References' =>
[
View
2 modules/auxiliary/scanner/http/http_version.rb
@@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Version Detection',
- 'Version' => '$Revision: 14597 $',
+ 'Version' => '$Revision$',
'Description' => 'Display version information about each system',
'Author' => 'hdm',
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/lucky_punch.rb
@@ -30,7 +30,7 @@ def initialize(info = {})
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 10394 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass.rb
@@ -31,7 +31,7 @@ def initialize(info = {})
requires either Basic, Digest or NTLM authentication.
},
'Author' => [ 'et', 'patrick' ],
- 'Version' => '$Revision: 14034 $',
+ 'Version' => '$Revision$',
'License' => MSF_LICENSE,
'References' =>
[
View
2 modules/auxiliary/scanner/http/open_proxy.rb
@@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'HTTP Open Proxy Detection',
- 'Version' => '$Revision: 14316 $',
+ 'Version' => '$Revision$',
'Description' => %q{
Checks if an HTTP proxy is open. False positive are avoided
verifing the HTTP return code and matching a pattern.
View
2 modules/auxiliary/scanner/http/options.rb
@@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Options Detection',
- 'Version' => '$Revision: 12623 $',
+ 'Version' => '$Revision$',
'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'],
'License' => MSF_LICENSE,
View
2 modules/auxiliary/scanner/http/prev_dir_same_name_file.rb
@@ -30,7 +30,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 13183 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/replace_ext.rb
@@ -32,7 +32,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/robots_txt.rb
@@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Robots.txt Content Scanner',
- 'Version' => '$Revision: 13183 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect robots.txt files and analize its content',
'Author' => ['et'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/soap_xml.rb
@@ -31,7 +31,7 @@ def initialize(info = {})
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision: 14560 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/sqlmap.rb
@@ -36,7 +36,7 @@ def initialize(info = {})
},
'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 14252 $',
+ 'Version' => '$Revision$',
'References' =>
[
['URL', 'http://sqlmap.sourceforge.net'],
View
2 modules/auxiliary/scanner/http/ssl.rb
@@ -23,7 +23,7 @@ class Metasploit4 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP SSL Certificate Information',
- 'Version' => '$Revision: 14319 $',
+ 'Version' => '$Revision$',
'Description' => 'Parse the server SSL certificate to obtain the common name and signature algorithm',
'Author' =>
[
View
2 modules/auxiliary/scanner/http/svn_scanner.rb
@@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Subversion Scanner',
- 'Version' => '$Revision: 11796 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect subversion directories and files and analize its content. Only SVN Version > 7 supported',
'Author' => ['et'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/trace.rb
@@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP TRACE Detection',
- 'Version' => '$Revision: $',
+ 'Version' => '$Revision$',
'Description' => 'Test if TRACE is actually enabled. 405 (Apache) 501(IIS) if its disabled, 200 if it is',
'Author' => ['CG'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/trace_axd.rb
@@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP trace.axd Content Scanner',
- 'Version' => '$Revision: 11796 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect trace.axd files and analize its content',
'Author' => ['c4an'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/verb_auth_bypass.rb
@@ -32,7 +32,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/vhost_scanner.rb
@@ -37,7 +37,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 13183 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/web_vulndb.rb
@@ -27,7 +27,7 @@ def initialize(info = {})
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 11796 $'))
+ 'Version' => '$Revision$'))
register_options(
[
View
2 modules/auxiliary/scanner/http/webdav_internal_ip.rb
@@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP WebDAV Internal IP Scanner',
- 'Version' => '$Revision: 14137 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect webservers internal IPs though WebDAV',
'Author' => ['et'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/webdav_scanner.rb
@@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP WebDAV Scanner',
- 'Version' => '$Revision: 14527 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect webservers with WebDAV enabled',
'Author' => ['et'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/webdav_website_content.rb
@@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP WebDAV Website Content Scanner',
- 'Version' => '$Revision: 14067 $',
+ 'Version' => '$Revision$',
'Description' => 'Detect webservers disclosing its content though WebDAV',
'Author' => ['et'],
'License' => MSF_LICENSE
View
2 modules/auxiliary/scanner/http/xpath.rb
@@ -27,7 +27,7 @@ def initialize(info = {})
},
'Author' => [ 'et [at] metasploit . com' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision: 13983 $'))
+ 'Version' => '$Revision$'))
register_options(
[

0 comments on commit 302853f

Please sign in to comment.
Something went wrong with that request. Please try again.