data/new/exploit.rb.erb in ronin-exploits-1.0.4 vs data/new/exploit.rb.erb in ronin-exploits-1.0.5

- old
+ new

@@ -42,11 +42,11 @@ <%- unless @advisories.empty? -%> <%- @advisories.each do |advisory| -%> advisory <%= advisory.inspect -%> <%- end -%> <%- else -%> - # advisory 'CVE-YYYY-NNNN' + # advisory 'CVE-YYYY-XXXX' # advisory 'GHSA-XXXXXX' <%- end -%> <%- if @author_email -%> author <%= @author_name.inspect %>, email: <%= @author_email.inspect %> @@ -79,18 +79,20 @@ # "https://..." # ] <%- end -%> <%- if web_vuln_exploit? -%> + base_path '/FIXME' + query_param 'FIXME' <%- if @exploit_type[:class] == 'LFI' -%> # depth 7 <%- elsif @exploit_type[:class] == 'SQLI' -%> # escape_quote true # escape_parens true # terminate true <%- elsif @exploit_type[:class] == 'SSTI' -%> - # escape_expr ->(expr) { "{{${expr}}}" } + # escape_expr ->(expr) { "{{#{expr}}}" } <%- end -%> <%- else -%> <%- if @has_payload -%> payload_class Payloads::<%= @has_payload[:class] %> @@ -104,10 +106,10 @@ # t.var2 = 0x1234 # end <%- end -%> # # - # # Test whether the target systme is vulnerable. + # # Test whether the target system is vulnerable. # # # def test # # return Vulnerable('host is vulnerable') # # return NotVulnerable('host is patched') # # return Unknown('host may or may not be vulnerable')