Commit 5b43bccb by Marcin Bury

authors for misfortune cookie exploit

parent cc1d8665
......@@ -11,7 +11,11 @@ class Exploit(exploits.Exploit):
__info__ = {
'name': 'Misfortune Cookie',
'description': 'Exploit implementation for Misfortune Cookie Authentication Bypass vulnerability.',
'author': 'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module
'authors': [
'Check Point <www.checkpoint.com>', # vulnerability discovery
'Jan Trencansky', # proof of concept exploit
'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module
],
'references': [
'http://mis.fortunecook.ie/'
],
......@@ -54,7 +58,7 @@ class Exploit(exploits.Exploit):
if re.search('omg1337hax', r.text) is not None:
return True # device is vulnerable
else:
return None # tests didnt pass but might be still vulnerable
return None # might be still vulnerable but could not be verified
except:
return None # could not be verified
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment