Unbreak the URL refs add nmonkee as ref and author

While @nmonkee didn't actually contribute to #2942, he did publish a
python exploit that leverages WebView, so given our policy of being
loose with author credit, I added him.

Also added a ref to @nmonkee's thing.

@jduck @jvennix-r7 if you have a problem with this, please do say so, I
don't think adding @nmonkee in any way diminishes your work, and I don't
want to appear like we're secretly ripping off people's work. I know you
aren't on this or any other module, and I know @nmonkee doesn't think
that either.
bug/bundler_fix
Tod Beardsley 2014-02-13 14:19:59 -06:00
parent a4035252d6
commit 371f23b265
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
1 changed files with 5 additions and 5 deletions

View File

@ -49,15 +49,15 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Author' => [
'jduck', # original msf module 'jduck', # original msf module
'joev' # static server 'joev', # static server
'nmonkee' # a python exploit written well ahead of this, see https://twitter.com/HenryHoggard/status/431412814687645696
], ],
'References' => [ 'References' => [
['URL', 'http://blog.trustlook.com/2013/09/04/alert-android-webview-'+ ['URL', 'http://blog.trustlook.com/2013/09/04/alert-android-webview-addjavascriptinterface-code-execution-vulnerability/'],
'addjavascriptinterface-code-execution-vulnerability/'],
['URL', 'https://labs.mwrinfosecurity.com/blog/2012/04/23/adventures-with-android-webviews/'], ['URL', 'https://labs.mwrinfosecurity.com/blog/2012/04/23/adventures-with-android-webviews/'],
['URL', 'http://50.56.33.56/blog/?p=314'], ['URL', 'http://50.56.33.56/blog/?p=314'],
['URL', 'https://labs.mwrinfosecurity.com/advisories/2013/09/24/webview-'+ ['URL', 'https://labs.mwrinfosecurity.com/advisories/2013/09/24/webview-addjavascriptinterface-remote-code-execution/'],
'addjavascriptinterface-remote-code-execution/'] ['URL', 'https://github.com/mwrlabs/drozer/blob/bcadf5c3fd08c4becf84ed34302a41d7b5e9db63/src/drozer/modules/exploit/mitm/addJavaScriptInterface.py']
], ],
'Platform' => 'linux', 'Platform' => 'linux',
'Arch' => ARCH_ARMLE, 'Arch' => ARCH_ARMLE,