Consistent caps on SVG in batik_svg_java exploit

Also, modules should not refer to themselves as "I" or "me." It's
creepy.
unstable
Tod Beardsley 2012-05-21 11:14:03 -05:00
parent 5dd866ed4a
commit 7cc905832e
1 changed files with 5 additions and 5 deletions

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module abuses the SVG support to execute Java Code in the
Squiggle Browser included in the Batik framework 1.7 through a
crafted svg file referencing a jar file.
crafted SVG file referencing a jar file.
In order to gain arbitrary code execution, the browser must meet
the following conditions: (1) It must support at least SVG version
@ -31,8 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'Nicolas Gregoire', # aka @Agarri_FR, Abuse discovery and PoC
'sinn3r', # Metasploit
'juan vazquez' # Metasploit
'sinn3r', # Metasploit module
'juan vazquez' # Metasploit module
],
'References' =>
[
@ -119,11 +119,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
svg = svg.gsub(/\t\t\t/, '')
print_status("Sending svg")
print_status("Sending SVG")
send_response(cli, svg, {'Content-Type'=>'image/svg+xml'})
else
print_error("I don't know what the client is requesting: #{request.uri}")
print_error("Unknown client request: #{request.uri.inspect}")
end
end
end