EOL space if a ruby devil.

This commit is contained in:
Scott Davis
2016-06-23 15:40:16 -07:00
parent b38b116c9a
commit 3fb9eae687
@@ -27,10 +27,10 @@ class MetasploitModule < Msf::Exploit::Remote
This module generates a Open API Specification 2.0 (Swagger) compliant json
document that includes payload insertion points in parameters.
In order for the payload to be executed, an attacker must convince someone to
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
appliance/container/api/service, and then to execute that generated code (or include it into
software which will later be executed by another victim). By doing so, an attacker can execute
In order for the payload to be executed, an attacker must convince someone to
generate code from a specially modified swagger.json file within a vulnerable swagger-codgen
appliance/container/api/service, and then to execute that generated code (or include it into
software which will later be executed by another victim). By doing so, an attacker can execute
arbitrary code as the victim user. (The same vulnerability exists in the YAML format)
},
'License' => MSF_LICENSE,