Path: blob/master/modules/auxiliary/scanner/etcd/version.rb
19813 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::HttpClient7include Msf::Auxiliary::Report8include Msf::Auxiliary::Etcd9include Msf::Auxiliary::Scanner1011def initialize12super(13'Name' => 'Etcd Version Scanner',14'Description' => %q(15This module connections to etcd API endpoints, typically on 2379/TCP, and attempts16to obtain the version of etcd.17),18'References' => [19['URL', 'https://gcollazo.com/the-security-footgun-in-etcd/']20],21'Author' => [22'Giovanni Collazo <[email protected]>', # discovery23'Jon Hart <[email protected]>' # msf module24],25'License' => MSF_LICENSE,26'DisclosureDate' => "Mar 16 2018"27)28end2930def run_host(_target_host)31if (banner = fingerprint_service(target_uri.to_s))32print_good("#{peer}: #{banner}")33end34end35end363738