Add a note about ruby 1.9 requirements
parent
c89b2b2ec6
commit
9c652d1d55
|
@ -23,13 +23,18 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
any ruby code remotely in the context of the application.
|
||||
|
||||
This module has been tested across multiple versions of RoR 3.x and RoR 2.x
|
||||
|
||||
The technique used by this module requires the target to be running a fairly version
|
||||
of Ruby 1.9 (since 2011 or so). Applications using Ruby 1.8 may still be
|
||||
exploitable using the init_with() method, but this has not been demonstrated.
|
||||
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
'charliesome', # PoC
|
||||
'espes', # PoC and Metasploit module
|
||||
'lian', # Identified the RouteSet::NamedRouteCollection vector
|
||||
'hdm' # Module merge/conversion/payload work
|
||||
'espes', # PoC and Metasploit module
|
||||
'lian', # Identified the RouteSet::NamedRouteCollection vector
|
||||
'hdm' # Module merge/conversion/payload work
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
|
|
Loading…
Reference in New Issue