Skip to content

Commit 40991ae

Browse files
committed
Fix Rubocop offenses in word_mshtml_rce.rb
1 parent d7712d8 commit 40991ae

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/windows/fileformat/word_mshtml_rce.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,8 @@ def initialize(info = {})
2929
['URL', 'https://github.com/klezVirus/CVE-2021-40444']
3030
],
3131
'Author' => [
32-
'lockedbyte ', # Vulnerability discovery.
33-
'klezVirus ', # References and PoC.
32+
'lockedbyte', # Vulnerability discovery.
33+
'klezVirus', # References and PoC.
3434
'thesunRider', # Official Metasploit module.
3535
'mekhalleh (RAMELLA Sébastien)' # Zeop-CyberSecurity - code base contribution and refactoring.
3636
],
@@ -68,7 +68,7 @@ def initialize(info = {})
6868
end
6969

7070
def bin_to_hex(bstr)
71-
return(bstr.each_byte.map { |b| b.to_s(16).rjust(2, '0') }.join)
71+
return (bstr.each_byte.map { |b| b.to_s(16).rjust(2, '0') }.join)
7272
end
7373

7474
def cab_checksum(data, seed = "\x00\x00\x00\x00")
@@ -321,7 +321,7 @@ def unpack_docx(template_path)
321321
def primer
322322
print_status('CVE-2021-40444: Generate a malicious docx file')
323323

324-
@proto = (datastore['SSL'] ? 'https' : 'http')
324+
@proto = (datastore['SRVSSL'] ? 'https' : 'http')
325325
if datastore['SRVHOST'] == '0.0.0.0'
326326
datastore['SRVHOST'] = Rex::Socket.source_address
327327
end

0 commit comments

Comments
 (0)