From 1f6edc5852b3da659ba5bc3d7e5345cdafd8d964 Mon Sep 17 00:00:00 2001 From: ethicalhack3r Date: Mon, 2 Feb 2015 15:36:27 +0100 Subject: [PATCH] Add link to ghost msf module #763 --- wpscan.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/wpscan.rb b/wpscan.rb index ec25b32c..accf4f55 100755 --- a/wpscan.rb +++ b/wpscan.rb @@ -188,7 +188,7 @@ def main if wp_target.has_xml_rpc? puts "#{info('[+]')} XML-RPC Interface available under: #{wp_target.xml_rpc_url}" - puts "#{warning('[!]')} This may allow the GHOST vulnerability to be exploited, please see http://blog.spiderlabs.com/2015/01/ghost-gethostbyname-heap-overflow-in-glibc-cve-2015-0235.html for a PoC" + puts "#{warning('[!]')} This may allow the GHOST vulnerability to be exploited, please see: https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner" end if wp_target.upload_directory_listing_enabled?