Skip to content

Commit 6d95847

Browse files
committed
Oops, this doesn't work on 23, only 22.
1 parent fb1fe7c commit 6d95847

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

modules/exploits/multi/browser/firefox_tostring_console_injection.rb

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
1616
autopwn_info({
1717
:ua_name => HttpClients::FF,
1818
:ua_minver => "15.0",
19-
:ua_maxver => "23.0",
19+
:ua_maxver => "22.0",
2020
:javascript => true,
2121
:rank => ExcellentRanking
2222
})
@@ -25,18 +25,20 @@ def initialize(info = {})
2525
super(update_info(info,
2626
'Name' => 'Firefox toString console.time Privileged Javascript Injection',
2727
'Description' => %q{
28-
This exploit gains remote code execution on Firefox 15-23 by abusing two separate
28+
This exploit gains remote code execution on Firefox 15-22 by abusing two separate
2929
Javascript-related vulnerabilities to ultimately inject malicious Javascript code
3030
into a context running with chrome:// privileges.
3131
},
3232
'License' => MSF_LICENSE,
3333
'Author' => [
3434
'moz_bug_r_a4', # discovered CVE-2013-1710
35+
'Cody Crews', # discovered CVE-2013-1670
3536
'joev' # metasploit module
3637
],
37-
'DisclosureDate' => "Aug 6 2013",
38+
'DisclosureDate' => "May 14 2013",
3839
'References' => [
39-
['CVE', '2013-1710'] # bypass Chrome Object Wrapper to talk to chrome://
40+
['CVE', '2013-1670'], # privileged access for content-level constructor
41+
['CVE', '2013-1710'] # further chrome injection
4042
],
4143
'Targets' => [
4244
[
@@ -56,7 +58,7 @@ def initialize(info = {})
5658
'BrowserRequirements' => {
5759
:source => 'script',
5860
:ua_name => HttpClients::FF,
59-
:ua_ver => lambda { |ver| ver.to_i.between?(15, 23) }
61+
:ua_ver => lambda { |ver| ver.to_i.between?(15, 22) }
6062
}
6163
))
6264

0 commit comments

Comments
 (0)