Skip to content

Commit 0955e14

Browse files
committed
Final, really, I think
1 parent 5784235 commit 0955e14

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/auxiliary/gather/ie_uxss_injection.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,10 @@ def initialize(info={})
1414
'Name' => "Microsoft Internet Explorer 10 and 11 Cross-Domain JavaScript Injection",
1515
'Description' => %q{
1616
This module exploits a universal cross-site scripting (UXSS) vulnerability found in Internet
17-
Explorer 10 and 11. By default, you will steal the cookie of a specific website (set by the
18-
TARGET_URI datastore option), but you can use your own custom JavaScript by setting the
19-
CUSTOMJS option. You might need to configure the URIHOST option if you are behind NAT.
17+
Explorer 10 and 11. By default, you will steal the cookie from TARGET_URI (which cannot
18+
have X-Frame-Options or it will fail). You can also have your own custom JavaScript
19+
by setting the CUSTOMJS option. Lastly, you might need to configure the URIHOST option if
20+
you are behind NAT.
2021
},
2122
'License' => MSF_LICENSE,
2223
'Author' =>
@@ -28,6 +29,7 @@ def initialize(info={})
2829
],
2930
'References' =>
3031
[
32+
[ 'OSVDB', '117876' ],
3133
[ 'URL', 'http://www.deusen.co.uk/items/insider3show.3362009741042107/'],
3234
[ 'URL', 'http://innerht.ml/blog/ie-uxss.html' ],
3335
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Feb/10' ]

0 commit comments

Comments
 (0)