Skip to content

Commit 6a7f875

Browse files
author
jvazquez-r7
committed
2 parents 8c5847a + 9c652d1 commit 6a7f875

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

modules/exploits/multi/http/rails_xml_yaml_code_exec.rb

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,18 @@ def initialize(info = {})
2323
any ruby code remotely in the context of the application.
2424
2525
This module has been tested across multiple versions of RoR 3.x and RoR 2.x
26+
27+
The technique used by this module requires the target to be running a fairly version
28+
of Ruby 1.9 (since 2011 or so). Applications using Ruby 1.8 may still be
29+
exploitable using the init_with() method, but this has not been demonstrated.
30+
2631
},
2732
'Author' =>
2833
[
2934
'charliesome', # PoC
30-
'espes', # PoC and Metasploit module
31-
'lian', # Identified the RouteSet::NamedRouteCollection vector
32-
'hdm' # Module merge/conversion/payload work
35+
'espes', # PoC and Metasploit module
36+
'lian', # Identified the RouteSet::NamedRouteCollection vector
37+
'hdm' # Module merge/conversion/payload work
3338
],
3439
'License' => MSF_LICENSE,
3540
'References' =>

0 commit comments

Comments
 (0)