From 8f0242344dcae9a3d3bda0b2c4bab76abfb7abce Mon Sep 17 00:00:00 2001 From: Kevin Kirsche Date: Fri, 18 May 2018 13:06:38 -0400 Subject: [PATCH] Fix style to use curly braces instead of pipes --- .../exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb b/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb index 0ba8ed7263..238d42134d 100644 --- a/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb +++ b/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb @@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, 'Name' => 'DHCP Client Command Injection (DynoRoot)', - 'Description' => %q| + 'Description' => %q{ This module exploits the DynoRoot vulnerability, a flaw in how the NetworkManager integration script included in the DHCP client in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier @@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol. - |, + }, 'Author' => [ 'Felix Wilhelm', # Vulnerability discovery