EOL space if a ruby devil.
This commit is contained in:
@@ -27,10 +27,10 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
This module generates a Open API Specification 2.0 (Swagger) compliant json
|
||||
document that includes payload insertion points in parameters.
|
||||
|
||||
In order for the payload to be executed, an attacker must convince someone to
|
||||
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
|
||||
appliance/container/api/service, and then to execute that generated code (or include it into
|
||||
software which will later be executed by another victim). By doing so, an attacker can execute
|
||||
In order for the payload to be executed, an attacker must convince someone to
|
||||
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
|
||||
appliance/container/api/service, and then to execute that generated code (or include it into
|
||||
software which will later be executed by another victim). By doing so, an attacker can execute
|
||||
arbitrary code as the victim user. (The same vulnerability exists in the YAML format)
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
||||
Reference in New Issue
Block a user