From d2622c0396f5fbac6edb42df6b49f23ded21d8e2 Mon Sep 17 00:00:00 2001 From: tomsellers Date: Thu, 1 Jan 2015 14:59:35 +0000 Subject: [PATCH] Fix reference in rmi-vuln-classloader.nse to point to Metasploit Github repo as Metasploit Redmine is deprecated and requires auth. --- scripts/rmi-vuln-classloader.nse | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/scripts/rmi-vuln-classloader.nse b/scripts/rmi-vuln-classloader.nse index ce66bcb0c..1c1d942db 100644 --- a/scripts/rmi-vuln-classloader.nse +++ b/scripts/rmi-vuln-classloader.nse @@ -14,7 +14,7 @@ classifies this as a design feature. Based on original Metasploit module by mihi. References: -* http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb +* https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb ]]; --- @@ -32,7 +32,7 @@ References: -- | Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion. -- | -- | References: --- |_ http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb +-- |_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb author = "Aleksandar Nikolic"; license = "Same as Nmap--See http://nmap.org/book/man-legal.html"; @@ -82,7 +82,7 @@ action = function (host, port) Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion. ]], references = { - 'http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb', + 'https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb', }, exploit_results = {}, };