metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
MetasploitModule#test_misfortune
To test for this vulnerability, we must first find a URI known to return a 404 (not found) which we will use as a canary. This URI (for example, /foo) is then taken and used as the value for a carefully crafted cookie when making a request to the configured host+port+uri. If the response is a 404 and the body includes the canary, it is likely that the cookie overwrote RomPager's concept of the requested URI, indicating that it is vulnerable.
Edit
git clone [email protected]:rapid7/metasploit-framework.git
cd metasploit-framework
open modules/auxiliary/scanner/http/allegro_rompager_misfortune_cookie.rb
Contribute
# Make a new branchgit checkout -b -your-name--update-docs-MetasploitModule-test_misfortune-for-pr
# Commit to gitgit add modules/auxiliary/scanner/http/allegro_rompager_misfortune_cookie.rbgit commit -m "better docs for MetasploitModule#test_misfortune"
# Open pull requestgem install hub # on a mac you can `brew install hub`
hub fork
git push <your name> -your-name--update-docs-MetasploitModule-test_misfortune-for-pr
hub pull-request
# Celebrate!