From a4e11fd3117effbead4ced4466211c059beb95f7 Mon Sep 17 00:00:00 2001 From: h00die Date: Tue, 24 Mar 2020 16:01:45 -0400 Subject: [PATCH] spaces EOL SMH --- modules/exploits/osx/local/vmware_fusion_lpe.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/osx/local/vmware_fusion_lpe.rb b/modules/exploits/osx/local/vmware_fusion_lpe.rb index d651bbb4de..38939344da 100644 --- a/modules/exploits/osx/local/vmware_fusion_lpe.rb +++ b/modules/exploits/osx/local/vmware_fusion_lpe.rb @@ -75,13 +75,13 @@ class MetasploitModule < Msf::Exploit::Local return CheckCode::Safe end - # Thanks to @ddouhine on github for this answer! + # Thanks to @ddouhine on github for this answer! version_raw = cmd_exec "plutil -p '/Applications/VMware Fusion.app/Contents/Info.plist' | grep CFBundleShortVersionString" /=> "(?\d{0,2}\.\d{0,2}\.\d{0,2})"/ =~ version_raw #supposed 11.x is also vulnerable, but everyone whos tested shows 11.5.1 or 11.5.2 version = Gem::Version.new(version) if version.between?(Gem::Version.new('11.5.0'), Gem::Version.new('11.5.2')) vprint_good "Vmware Fusion #{version} is exploitable" - else + else print_bad "VMware Fusion #{version} is NOT exploitable" return CheckCode::Safe end