1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 12:41:29 +00:00

Fix reference in rmi-vuln-classloader.nse to point to Metasploit

Github repo as Metasploit Redmine is deprecated and requires
auth.
This commit is contained in:
tomsellers
2015-01-01 14:59:35 +00:00
parent 1371a3303e
commit d2622c0396

View File

@@ -14,7 +14,7 @@ classifies this as a design feature.
Based on original Metasploit module by mihi. Based on original Metasploit module by mihi.
References: References:
* http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb * https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb
]]; ]];
--- ---
@@ -32,7 +32,7 @@ References:
-- | Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion. -- | Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion.
-- | -- |
-- | References: -- | References:
-- |_ http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb -- |_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb
author = "Aleksandar Nikolic"; author = "Aleksandar Nikolic";
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"; license = "Same as Nmap--See http://nmap.org/book/man-legal.html";
@@ -82,7 +82,7 @@ action = function (host, port)
Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion. Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion.
]], ]],
references = { references = {
'http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb', 'https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb',
}, },
exploit_results = {}, exploit_results = {},
}; };