Update description.
parent
178a43a772
commit
1a5c747bb9
|
@ -29,10 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Firefox Plug-in Privileged Javascript Code Execution',
|
||||
'Name' => 'Firefox 17.0.1 + Flash Privileged Code Injection',
|
||||
'Description' => %q{
|
||||
This exploit gains code execution on Firefox 17.0.1 and all previous versions,
|
||||
provided the user has installed Flash. No memory corruption is used.
|
||||
This exploit gains remote code execution on Firefox 17.0.1 and all previous
|
||||
versions, provided the user has installed Flash. No memory corruption is used.
|
||||
|
||||
First, a Flash object is cloned into the anonymous content of the SVG
|
||||
"use" element in the <body> (CVE-2013-0758). From there, the Flash object
|
||||
|
@ -41,6 +41,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Then a separate exploit (CVE-2013-0757) is used to bypass the security wrapper
|
||||
around the child frame's window reference and inject code into the chrome://
|
||||
context.
|
||||
|
||||
Once we have injection into the chrome execution context, we can write our
|
||||
payload to disk, chmod it (if posix), and then execute.
|
||||
|
||||
Note: Flash is used here to trigger the exploit but any Firefox plugin
|
||||
with script access should be able to trigger it.
|
||||
|
|
Loading…
Reference in New Issue