diff --git a/program/plugins/nikto_shellshock.plugin b/program/plugins/nikto_shellshock.plugin index cc2ec519..217d92fa 100644 --- a/program/plugins/nikto_shellshock.plugin +++ b/program/plugins/nikto_shellshock.plugin @@ -62,7 +62,7 @@ sub nikto_shellshock { add_vulnerability( $mark, "$parameters->{'uri'}: Site appears vulnerable to the 'shellshock' vulnerability).", 999949, "CVE-2014-6271", "GET", "$parameters->{'uri'}", $request, $response); } - if (($response->{'93e4r0-CVE-2014-6271'} eq 'true') || ($checkcontent && ($content =~ /93e4r0-CVE-2014-6278: true/))) { + if (($response->{'93e4r0-CVE-2014-6278'} eq 'true') || ($checkcontent && ($content =~ /93e4r0-CVE-2014-6278: true/))) { add_vulnerability( $mark, "$parameters->{'uri'}: Site appears vulnerable to the 'shellshock' vulnerability.", 999948, "CVE-2014-6278", "GET", "$parameters->{'uri'}", $request, $response); } @@ -78,7 +78,7 @@ sub nikto_shellshock { add_vulnerability( $mark, "$cgidir$file: Site appears vulnerable to the 'shellshock' vulnerability.", 999947, "CVE-2014-6271", "GET", "$cgidir$file", $request, $response); } - if (($response->{'93e4r0-CVE-2014-6271'} eq 'true') || ($checkcontent && ($content =~ /93e4r0-CVE-2014-6278: true/))) { + if (($response->{'93e4r0-CVE-2014-6278'} eq 'true') || ($checkcontent && ($content =~ /93e4r0-CVE-2014-6278: true/))) { add_vulnerability( $mark, "$cgidir$file: Site appears vulnerable to the 'shellshock' vulnerability.", 999946, "CVE-2014-6278", "GET", "$cgidir$file", $request, $response); }