Commit 5b43bccb by Marcin Bury

authors for misfortune cookie exploit

parent cc1d8665
...@@ -11,7 +11,11 @@ class Exploit(exploits.Exploit): ...@@ -11,7 +11,11 @@ class Exploit(exploits.Exploit):
__info__ = { __info__ = {
'name': 'Misfortune Cookie', 'name': 'Misfortune Cookie',
'description': 'Exploit implementation for Misfortune Cookie Authentication Bypass vulnerability.', 'description': 'Exploit implementation for Misfortune Cookie Authentication Bypass vulnerability.',
'author': 'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module 'authors': [
'Check Point <www.checkpoint.com>', # vulnerability discovery
'Jan Trencansky', # proof of concept exploit
'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module
],
'references': [ 'references': [
'http://mis.fortunecook.ie/' 'http://mis.fortunecook.ie/'
], ],
...@@ -54,7 +58,7 @@ class Exploit(exploits.Exploit): ...@@ -54,7 +58,7 @@ class Exploit(exploits.Exploit):
if re.search('omg1337hax', r.text) is not None: if re.search('omg1337hax', r.text) is not None:
return True # device is vulnerable return True # device is vulnerable
else: else:
return None # tests didnt pass but might be still vulnerable return None # might be still vulnerable but could not be verified
except: except:
return None # could not be verified return None # could not be verified
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment