From cb5d68b641873fce966dc8e18a751a6df59ac17b Mon Sep 17 00:00:00 2001 From: Thomas Gregory Date: Wed, 3 Oct 2018 17:13:24 +0700 Subject: [PATCH] Fixing based on msftidy.rb Makes msftidy happy --- .../windows/fileformat/zahir_enterprise_plus_csv.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/exploits/windows/fileformat/zahir_enterprise_plus_csv.rb b/modules/exploits/windows/fileformat/zahir_enterprise_plus_csv.rb index 3f95007619..4c9590d60b 100644 --- a/modules/exploits/windows/fileformat/zahir_enterprise_plus_csv.rb +++ b/modules/exploits/windows/fileformat/zahir_enterprise_plus_csv.rb @@ -14,19 +14,19 @@ class MetasploitModule < Msf::Exploit::Remote 'Name' => "Zahir Enterprise Plus 6 Stack Buffer Overflow Exploit", 'Description' => %q{ This module exploits a stack buffer overflow in Zahir Enterprise Plus version 6 build 10b and below. - The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters + The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters via Import from other File. This results in overwriting a structured exception handler record. }, 'License' => MSF_LICENSE, 'Author' => [ - 'f3ci', # found the vulnerability + 'f3ci', # found the vulnerability 'modpr0be' # Metasploit Module ], 'References' => [ [ 'CVE', '2018-17408' ], - [ 'EDB', '38035' ] + [ 'EDB', '45505' ] ], 'Platform' => 'win', 'Targets' => @@ -45,7 +45,7 @@ class MetasploitModule < Msf::Exploit::Remote 'BadChars' => "\x00\x0a\x0d\x22\x2c" }, 'Privileged' => false, - 'DisclosureDate' => "Sept 28 2018", + 'DisclosureDate' => 'Sep 28 2018', 'DefaultTarget' => 0)) register_options(