File tree Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Original file line number Diff line number Diff line change @@ -14,9 +14,10 @@ def initialize(info={})
14
14
'Name' => "Microsoft Internet Explorer 10 and 11 Cross-Domain JavaScript Injection" ,
15
15
'Description' => %q{
16
16
This module exploits a universal cross-site scripting (UXSS) vulnerability found in Internet
17
- Explorer 10 and 11. By default, you will steal the cookie of a specific website (set by the
18
- TARGET_URI datastore option), but you can use your own custom JavaScript by setting the
19
- CUSTOMJS option. You might need to configure the URIHOST option if you are behind NAT.
17
+ Explorer 10 and 11. By default, you will steal the cookie from TARGET_URI (which cannot
18
+ have X-Frame-Options or it will fail). You can also have your own custom JavaScript
19
+ by setting the CUSTOMJS option. Lastly, you might need to configure the URIHOST option if
20
+ you are behind NAT.
20
21
} ,
21
22
'License' => MSF_LICENSE ,
22
23
'Author' =>
@@ -28,6 +29,7 @@ def initialize(info={})
28
29
] ,
29
30
'References' =>
30
31
[
32
+ [ 'OSVDB' , '117876' ] ,
31
33
[ 'URL' , 'http://www.deusen.co.uk/items/insider3show.3362009741042107/' ] ,
32
34
[ 'URL' , 'http://innerht.ml/blog/ie-uxss.html' ] ,
33
35
[ 'URL' , 'http://seclists.org/fulldisclosure/2015/Feb/10' ]
You can’t perform that action at this time.
0 commit comments