data/new/exploit.rb.erb in ronin-exploits-1.0.4 vs data/new/exploit.rb.erb in ronin-exploits-1.0.5
- old
+ new
@@ -42,11 +42,11 @@
<%- unless @advisories.empty? -%>
<%- @advisories.each do |advisory| -%>
advisory <%= advisory.inspect -%>
<%- end -%>
<%- else -%>
- # advisory 'CVE-YYYY-NNNN'
+ # advisory 'CVE-YYYY-XXXX'
# advisory 'GHSA-XXXXXX'
<%- end -%>
<%- if @author_email -%>
author <%= @author_name.inspect %>, email: <%= @author_email.inspect %>
@@ -79,18 +79,20 @@
# "https://..."
# ]
<%- end -%>
<%- if web_vuln_exploit? -%>
+ base_path '/FIXME'
+ query_param 'FIXME'
<%- if @exploit_type[:class] == 'LFI' -%>
# depth 7
<%- elsif @exploit_type[:class] == 'SQLI' -%>
# escape_quote true
# escape_parens true
# terminate true
<%- elsif @exploit_type[:class] == 'SSTI' -%>
- # escape_expr ->(expr) { "{{${expr}}}" }
+ # escape_expr ->(expr) { "{{#{expr}}}" }
<%- end -%>
<%- else -%>
<%- if @has_payload -%>
payload_class Payloads::<%= @has_payload[:class] %>
@@ -104,10 +106,10 @@
# t.var2 = 0x1234
# end
<%- end -%>
# #
- # # Test whether the target systme is vulnerable.
+ # # Test whether the target system is vulnerable.
# #
# def test
# # return Vulnerable('host is vulnerable')
# # return NotVulnerable('host is patched')
# # return Unknown('host may or may not be vulnerable')