Do minor cleanup

bug/bundler_fix
jvazquez-r7 2013-08-08 14:47:46 -05:00
parent 28b36ea29b
commit 40a61ec654
1 changed files with 3 additions and 4 deletions

View File

@ -22,14 +22,14 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Author' => 'Author' =>
[ [
'Charlie Eriksen', # Discovery, initial exploit 'Charlie Eriksen' # Discovery, initial exploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'URL', 'http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/'], [ 'URL', 'http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/'],
[ 'OSVDB', '95992'], [ 'OSVDB', '95992'],
[ 'CVE', '2013-5036'], [ 'CVE', '2013-5036']
], ],
'Platform' => 'ruby', 'Platform' => 'ruby',
'Arch' => ARCH_RUBY, 'Arch' => ARCH_RUBY,
@ -40,8 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
register_options( register_options(
[ [
Opt::RPORT(80), OptString.new('TARGETURI', [ true, 'The path to a vulnerable Ruby on Rails application', "/"])
OptString.new('TARGETURI', [ true, 'The path to a vulnerable Ruby on Rails application', "/"]),
], self.class) ], self.class)
end end