ronin-exploits 1.0.2 → 1.0.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/ChangeLog.md +9 -0
- data/README.md +0 -1
- data/data/new/exploit.rb.erb +8 -8
- data/lib/ronin/exploits/mixins/remote_tcp.rb +2 -0
- data/lib/ronin/exploits/mixins/remote_udp.rb +2 -0
- data/lib/ronin/exploits/mixins/text.rb +2 -0
- data/lib/ronin/exploits/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4e6dbf77b0e6b4b6de88b6a1afe5484b74918b7a5e3a74007da060381d419f90
|
4
|
+
data.tar.gz: 14664066b0d2262912344e5a3c41e4f247eb60bc1d8464bd0b7ca93348cb9549
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7ed8dedb7ddb26720c0a9df41894e3c97d952c7872bb93adbb76a02d2ffb132368e8a94e3e579daa7517a9b95c7aa97713df88eb0170bc35cd3dfb80c6088828
|
7
|
+
data.tar.gz: c6674278d65300b9f4862ef98a1282d0f8a8b7def02618a1ee11df02069c255ba1d493d8ad6b85a64704d0df4f5be0ceb81ae140e3e6e426cb31dc82ac5570ad
|
data/ChangeLog.md
CHANGED
@@ -1,3 +1,12 @@
|
|
1
|
+
### 1.0.3 / 2023-09-19
|
2
|
+
|
3
|
+
#### CLI
|
4
|
+
|
5
|
+
* All newly generated exploit files using `ronin-exploit new` should have a
|
6
|
+
`summary` and a `description`.
|
7
|
+
* Fixed a bug where the `ronin-exploits new` options `--author`,
|
8
|
+
`--author-email`, or `--summary` were not properly escaping given values.
|
9
|
+
|
1
10
|
### 1.0.2 / 2023-06-12
|
2
11
|
|
3
12
|
* Corrected the `class_dir` for {Ronin::Exploits}; even though
|
data/README.md
CHANGED
@@ -8,7 +8,6 @@
|
|
8
8
|
* [Issues](https://github.com/ronin-rb/ronin-exploits/issues)
|
9
9
|
* [Documentation](https://rubydoc.info/github/ronin-rb/ronin-exploits/frames)
|
10
10
|
* [Discord](https://discord.gg/6WAb3PsVX9) |
|
11
|
-
[Twitter](https://twitter.com/ronin_rb) |
|
12
11
|
[Mastodon](https://infosec.exchange/@ronin_rb)
|
13
12
|
|
14
13
|
## Description
|
data/data/new/exploit.rb.erb
CHANGED
@@ -41,7 +41,7 @@ module Ronin
|
|
41
41
|
# disclosure_date 'YYYY-MM-DD'
|
42
42
|
<%- unless @advisories.empty? -%>
|
43
43
|
<%- @advisories.each do |advisory| -%>
|
44
|
-
advisory
|
44
|
+
advisory <%= advisory.inspect -%>
|
45
45
|
<%- end -%>
|
46
46
|
<%- else -%>
|
47
47
|
# advisory 'CVE-YYYY-NNNN'
|
@@ -49,23 +49,23 @@ module Ronin
|
|
49
49
|
<%- end -%>
|
50
50
|
|
51
51
|
<%- if @author_email -%>
|
52
|
-
author
|
52
|
+
author <%= @author_name.inspect %>, email: <%= @author_email.inspect %>
|
53
53
|
<%- else -%>
|
54
|
-
author
|
54
|
+
author <%= @author_name.inspect %>
|
55
55
|
<%- end -%>
|
56
56
|
<%- if @summary -%>
|
57
|
-
summary
|
57
|
+
summary <%= @summary.inspect %>
|
58
58
|
<%- else -%>
|
59
|
-
|
59
|
+
summary "FIX ME"
|
60
60
|
<%- end -%>
|
61
61
|
<%- if @description -%>
|
62
62
|
description <<~DESC
|
63
63
|
<%= @description %>
|
64
64
|
DESC
|
65
65
|
<%- else -%>
|
66
|
-
|
67
|
-
|
68
|
-
|
66
|
+
description <<~DESC
|
67
|
+
FIX ME
|
68
|
+
DESC
|
69
69
|
<%- end -%>
|
70
70
|
<%- unless @references.empty? -%>
|
71
71
|
references [
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: ronin-exploits
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.
|
4
|
+
version: 1.0.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Postmodern
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-09-19 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: uri-query_params
|