File tree Expand file tree Collapse file tree 1 file changed +6
-3
lines changed
modules/exploits/multi/browser Expand file tree Collapse file tree 1 file changed +6
-3
lines changed Original file line number Diff line number Diff line change @@ -29,10 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
29
29
30
30
def initialize ( info = { } )
31
31
super ( update_info ( info ,
32
- 'Name' => 'Firefox Plug-in Privileged Javascript Code Execution ' ,
32
+ 'Name' => 'Firefox 17.0.1 + Flash Privileged Code Injection ' ,
33
33
'Description' => %q{
34
- This exploit gains code execution on Firefox 17.0.1 and all previous versions,
35
- provided the user has installed Flash. No memory corruption is used.
34
+ This exploit gains remote code execution on Firefox 17.0.1 and all previous
35
+ versions, provided the user has installed Flash. No memory corruption is used.
36
36
37
37
First, a Flash object is cloned into the anonymous content of the SVG
38
38
"use" element in the <body> (CVE-2013-0758). From there, the Flash object
@@ -41,6 +41,9 @@ def initialize(info = {})
41
41
Then a separate exploit (CVE-2013-0757) is used to bypass the security wrapper
42
42
around the child frame's window reference and inject code into the chrome://
43
43
context.
44
+
45
+ Once we have injection into the chrome execution context, we can write our
46
+ payload to disk, chmod it (if posix), and then execute.
44
47
45
48
Note: Flash is used here to trigger the exploit but any Firefox plugin
46
49
with script access should be able to trigger it.
You can’t perform that action at this time.
0 commit comments