Skip to content

Commit 3fb9eae

Browse files
committed
EOL space if a ruby devil.
1 parent b38b116 commit 3fb9eae

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/multi/fileformat/swagger_param_inject.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ def initialize(info = {})
2727
This module generates a Open API Specification 2.0 (Swagger) compliant json
2828
document that includes payload insertion points in parameters.
2929
30-
In order for the payload to be executed, an attacker must convince someone to
31-
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
32-
appliance/container/api/service, and then to execute that generated code (or include it into
33-
software which will later be executed by another victim). By doing so, an attacker can execute
30+
In order for the payload to be executed, an attacker must convince someone to
31+
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
32+
appliance/container/api/service, and then to execute that generated code (or include it into
33+
software which will later be executed by another victim). By doing so, an attacker can execute
3434
arbitrary code as the victim user. (The same vulnerability exists in the YAML format)
3535
},
3636
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)