1
1
##
2
+ # This module requires Metasploit: http://metasploit.com/download
2
3
# Current source: https://github.com/rapid7/metasploit-framework
3
4
##
4
5
6
+
5
7
require 'msf/core'
6
8
require 'msf/core/exploit/powershell'
7
9
@@ -12,7 +14,6 @@ class Metasploit4 < Msf::Exploit::Remote
12
14
include Msf ::Exploit ::Remote ::BrowserAutopwn
13
15
include Msf ::Exploit ::Powershell
14
16
15
-
16
17
autopwn_info ( {
17
18
:ua_name => HttpClients ::IE ,
18
19
:ua_minver => "3.0" ,
@@ -24,20 +25,22 @@ class Metasploit4 < Msf::Exploit::Remote
24
25
25
26
def initialize ( info = { } )
26
27
super ( update_info ( info ,
27
- 'Name' => "Windows OLE Automation Array Remote Code Execution" ,
28
+ 'Name' => "Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution" ,
28
29
'Description' => %q{
29
30
This module exploits Windows OLE Automation Array Vulnerability known as CVE-2014-6332.
30
- The vulnerability exists in Internet Explorer 3.0 until version 11 within Windows95 up to Windows 10.
31
+ The vulnerability affects Internet Explorer 3.0 until version 11 within Windows95 up to Windows 10.
32
+ Powershell is required on the target machine. On Internet Explorer versions using Protected Mode,
33
+ the user has to manually allow powershell.exe to execute in order to be compromised.
31
34
} ,
32
35
'License' => MSF_LICENSE ,
33
36
'Author' =>
34
37
[
35
- 'Robert Freeman of IBM X-Force' ,
36
- 'yuange < twitter.com/yuange75>' ,
37
- 'Rik van Duijn < twitter.com/rikvduijn>' ,
38
- 'Wesley Neelen < security[at]forsec.nl>' ,
39
- 'GradiusX <francescomifsud@ gmail.com>' ,
40
- 'b33f @FuzzySec' ,
38
+ 'Robert Freeman' , # IBM X-Force
39
+ 'yuange' , # twitter.com/yuange75
40
+ 'Rik van Duijn' , # twitter.com/rikvduijn
41
+ 'Wesley Neelen' , # security[at]forsec.nl
42
+ 'GradiusX <francescomifsud[at] gmail.com>' ,
43
+ 'b33f' , # @FuzzySec
41
44
] ,
42
45
'References' =>
43
46
[
@@ -54,7 +57,7 @@ def initialize(info={})
54
57
[
55
58
[ 'Windows x86' , { 'Arch' => ARCH_X86 } ] ,
56
59
] ,
57
- 'BrowserRequirements' =>
60
+ 'BrowserRequirements' =>
58
61
{
59
62
:source => /script|headers/i ,
60
63
:ua_name => HttpClients ::IE ,
0 commit comments