Fixing based on msftidy.rb

Makes msftidy happy
GSoC/Meterpreter_Web_Console
Thomas Gregory 2018-10-03 17:13:24 +07:00
parent ff560ee990
commit cb5d68b641
1 changed files with 4 additions and 4 deletions

View File

@ -14,19 +14,19 @@ class MetasploitModule < Msf::Exploit::Remote
'Name' => "Zahir Enterprise Plus 6 Stack Buffer Overflow Exploit",
'Description' => %q{
This module exploits a stack buffer overflow in Zahir Enterprise Plus version 6 build 10b and below.
The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters
The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters
via Import from other File. This results in overwriting a structured exception handler record.
},
'License' => MSF_LICENSE,
'Author' =>
[
'f3ci', # found the vulnerability
'f3ci', # found the vulnerability
'modpr0be' # Metasploit Module
],
'References' =>
[
[ 'CVE', '2018-17408' ],
[ 'EDB', '38035' ]
[ 'EDB', '45505' ]
],
'Platform' => 'win',
'Targets' =>
@ -45,7 +45,7 @@ class MetasploitModule < Msf::Exploit::Remote
'BadChars' => "\x00\x0a\x0d\x22\x2c"
},
'Privileged' => false,
'DisclosureDate' => "Sept 28 2018",
'DisclosureDate' => 'Sep 28 2018',
'DefaultTarget' => 0))
register_options(