File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
modules/exploits/multi/fileformat Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -27,10 +27,10 @@ def initialize(info = {})
27
27
This module generates a Open API Specification 2.0 (Swagger) compliant json
28
28
document that includes payload insertion points in parameters.
29
29
30
- In order for the payload to be executed, an attacker must convince someone to
31
- generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
32
- appliance/container/api/service, and then to execute that generated code (or include it into
33
- software which will later be executed by another victim). By doing so, an attacker can execute
30
+ In order for the payload to be executed, an attacker must convince someone to
31
+ generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
32
+ appliance/container/api/service, and then to execute that generated code (or include it into
33
+ software which will later be executed by another victim). By doing so, an attacker can execute
34
34
arbitrary code as the victim user. (The same vulnerability exists in the YAML format)
35
35
} ,
36
36
'License' => MSF_LICENSE ,
You can’t perform that action at this time.
0 commit comments