Consistent caps on SVG in batik_svg_java exploit
Also, modules should not refer to themselves as "I" or "me." It's creepy.unstable
parent
5dd866ed4a
commit
7cc905832e
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module abuses the SVG support to execute Java Code in the
|
||||
Squiggle Browser included in the Batik framework 1.7 through a
|
||||
crafted svg file referencing a jar file.
|
||||
crafted SVG file referencing a jar file.
|
||||
|
||||
In order to gain arbitrary code execution, the browser must meet
|
||||
the following conditions: (1) It must support at least SVG version
|
||||
|
@ -31,8 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Author' =>
|
||||
[
|
||||
'Nicolas Gregoire', # aka @Agarri_FR, Abuse discovery and PoC
|
||||
'sinn3r', # Metasploit
|
||||
'juan vazquez' # Metasploit
|
||||
'sinn3r', # Metasploit module
|
||||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
|
@ -119,11 +119,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
|
||||
|
||||
svg = svg.gsub(/\t\t\t/, '')
|
||||
print_status("Sending svg")
|
||||
print_status("Sending SVG")
|
||||
send_response(cli, svg, {'Content-Type'=>'image/svg+xml'})
|
||||
|
||||
else
|
||||
print_error("I don't know what the client is requesting: #{request.uri}")
|
||||
print_error("Unknown client request: #{request.uri.inspect}")
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue