Skip to content

Commit 2a7d4ed

Browse files
committed
Touchup
1 parent 583494c commit 2a7d4ed

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

modules/exploits/windows/browser/ms14_064_ole_code_execution.rb

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
##
2+
# This module requires Metasploit: http://metasploit.com/download
23
# Current source: https://github.com/rapid7/metasploit-framework
34
##
45

6+
57
require 'msf/core'
68
require 'msf/core/exploit/powershell'
79

@@ -12,7 +14,6 @@ class Metasploit4 < Msf::Exploit::Remote
1214
include Msf::Exploit::Remote::BrowserAutopwn
1315
include Msf::Exploit::Powershell
1416

15-
1617
autopwn_info({
1718
:ua_name => HttpClients::IE,
1819
:ua_minver => "3.0",
@@ -24,20 +25,22 @@ class Metasploit4 < Msf::Exploit::Remote
2425

2526
def initialize(info={})
2627
super(update_info(info,
27-
'Name' => "Windows OLE Automation Array Remote Code Execution",
28+
'Name' => "Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution",
2829
'Description' => %q{
2930
This module exploits Windows OLE Automation Array Vulnerability known as CVE-2014-6332.
30-
The vulnerability exists in Internet Explorer 3.0 until version 11 within Windows95 up to Windows 10.
31+
The vulnerability affects Internet Explorer 3.0 until version 11 within Windows95 up to Windows 10.
32+
Powershell is required on the target machine. On Internet Explorer versions using Protected Mode,
33+
the user has to manually allow powershell.exe to execute in order to be compromised.
3134
},
3235
'License' => MSF_LICENSE,
3336
'Author' =>
3437
[
35-
'Robert Freeman of IBM X-Force',
36-
'yuange <twitter.com/yuange75>',
37-
'Rik van Duijn <twitter.com/rikvduijn>',
38-
'Wesley Neelen <security[at]forsec.nl>',
39-
'GradiusX <francescomifsud@gmail.com>',
40-
'b33f @FuzzySec',
38+
'Robert Freeman', # IBM X-Force
39+
'yuange', # twitter.com/yuange75
40+
'Rik van Duijn', # twitter.com/rikvduijn
41+
'Wesley Neelen', # security[at]forsec.nl
42+
'GradiusX <francescomifsud[at]gmail.com>',
43+
'b33f', # @FuzzySec
4144
],
4245
'References' =>
4346
[
@@ -54,7 +57,7 @@ def initialize(info={})
5457
[
5558
[ 'Windows x86', { 'Arch' => ARCH_X86 } ],
5659
],
57-
'BrowserRequirements' =>
60+
'BrowserRequirements' =>
5861
{
5962
:source => /script|headers/i,
6063
:ua_name => HttpClients::IE,

0 commit comments

Comments
 (0)