File tree Expand file tree Collapse file tree 1 file changed +5
-4
lines changed
modules/exploits/multi/fileformat Expand file tree Collapse file tree 1 file changed +5
-4
lines changed Original file line number Diff line number Diff line change @@ -27,10 +27,11 @@ def initialize(info = {})
27
27
This module generates a Open API Specification 2.0 (Swagger) compliant json
28
28
document that includes payload insertion points in parameters.
29
29
30
- In order for the payload to be executed, an attacker must convince someone to
31
- open a specially modified swagger.json file with with a vulnerable swagger-codgen
32
- appliance/container/api/service. By doing so, an attacker can
33
- execute arbitrary code as the victim user.
30
+ In order for the payload to be executed, an attacker must convince someone to
31
+ generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
32
+ appliance/container/api/service, and then to execute that generated code (or include it into
33
+ software which will later be executed by another victim). By doing so, an attacker can execute
34
+ arbitrary code as the victim user. (The same vulnerability exists in the YAML format)
34
35
} ,
35
36
'License' => MSF_LICENSE ,
36
37
'Author' =>
You can’t perform that action at this time.
0 commit comments