diff --git a/lib/msf/core/db_manager/import/retina.rb b/lib/msf/core/db_manager/import/retina.rb
index 22bce86fcb..e83cf31a07 100644
--- a/lib/msf/core/db_manager/import/retina.rb
+++ b/lib/msf/core/db_manager/import/retina.rb
@@ -1,3 +1,5 @@
+# -*- coding: binary -*-
+
require 'rex/parser/retina_xml'
module Msf::DBManager::Import::Retina
diff --git a/lib/rex/parser/retina_xml.rb b/lib/rex/parser/retina_xml.rb
index 03061dc7f2..18a479f7cb 100644
--- a/lib/rex/parser/retina_xml.rb
+++ b/lib/rex/parser/retina_xml.rb
@@ -1,10 +1,9 @@
# -*- coding: binary -*-
+
module Rex
module Parser
-
# XXX - Retina XML does not include ANY service/port information export
class RetinaXMLStreamParser
-
attr_accessor :on_found_host
def initialize(on_found_host = nil)
@@ -87,7 +86,7 @@ end
end
end
-__END__
+=begin Old XML format
@@ -111,4 +110,39 @@ __END__
+=end Old XML format
+=begin New XML format
+
+
+
+
+ [redacted]
+ [redacted]
+ [redacted]
+
+ [redacted]
+ [redacted]
+
+ [redacted]
+ N/A
+ TLS/SSL Weak Protocol Version Supported
+ A targeted service that accepts connections for cryptographically weak SSL protocol versions (eg SSLv2, SSLv3, TLSv1.0) has been detected. Such protocols are known to have cryptographic weaknesses as well as other exploitable vulnerabilities.
+ [redacted]
+ Medium
+ Medium
+ PCI DSS 4.1 - SSL Weakness
+ Fail
+ 4.3 [AV:N/AC:M/Au:N/C:P/I:N/A:N]
+ 6.8 [AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N]
+ Ensure that applications or services are configured to reject SSLv3, SSLv2 and TLSv1.0 communications. Disabling weak protocols is a defense-in-depth measure against vulnerabilities that could allow SSL version downgrade attacks (e.g. CVE-2014-3566).
+ No
+ TCP:443 ([redacted]), SHA256[=][redacted], Serial[=][redacted]
+ Accepted SSL Method: (SSLv[23]|TLSv1(\.0)?)$
+ [redacted]
+ CWE-310
+
+
+
+
+=end New XML format