untested autopwn support for safari_metadata_archive just to have a safari vuln in the mix
git-svn-id: file:///home/svn/framework3/trunk@6913 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
0d8ea98cdf
commit
0b9412536c
|
@ -17,6 +17,16 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
include Msf::Exploit::Remote::HttpServer
|
||||
|
||||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
autopwn_info({
|
||||
# Untested. What versions of Safari does this work against?
|
||||
:ua_name => HttpClients::SAFARI,
|
||||
:os_name => [ OperatingSystems::MAC_OSX ],
|
||||
:javascript => true,
|
||||
:rank => ExcellentRanking, # reliable cmd execution
|
||||
:vuln_test => nil,
|
||||
})
|
||||
|
||||
#
|
||||
# This module acts as an HTTP server and exploits a command execution flaw
|
||||
#
|
||||
|
|
Loading…
Reference in New Issue