Skip to content

Commit b38b116

Browse files
committed
@ePaul comments added to description.
1 parent 5e1b7d8 commit b38b116

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

modules/exploits/multi/fileformat/swagger_param_inject.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,11 @@ def initialize(info = {})
2727
This module generates a Open API Specification 2.0 (Swagger) compliant json
2828
document that includes payload insertion points in parameters.
2929
30-
In order for the payload to be executed, an attacker must convince someone to
31-
open a specially modified swagger.json file with with a vulnerable swagger-codgen
32-
appliance/container/api/service. By doing so, an attacker can
33-
execute arbitrary code as the victim user.
30+
In order for the payload to be executed, an attacker must convince someone to
31+
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
32+
appliance/container/api/service, and then to execute that generated code (or include it into
33+
software which will later be executed by another victim). By doing so, an attacker can execute
34+
arbitrary code as the victim user. (The same vulnerability exists in the YAML format)
3435
},
3536
'License' => MSF_LICENSE,
3637
'Author' =>

0 commit comments

Comments
 (0)