@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
16
16
autopwn_info ( {
17
17
:ua_name => HttpClients ::FF ,
18
18
:ua_minver => "15.0" ,
19
- :ua_maxver => "23 .0" ,
19
+ :ua_maxver => "22 .0" ,
20
20
:javascript => true ,
21
21
:rank => ExcellentRanking
22
22
} )
@@ -25,18 +25,20 @@ def initialize(info = {})
25
25
super ( update_info ( info ,
26
26
'Name' => 'Firefox toString console.time Privileged Javascript Injection' ,
27
27
'Description' => %q{
28
- This exploit gains remote code execution on Firefox 15-23 by abusing two separate
28
+ This exploit gains remote code execution on Firefox 15-22 by abusing two separate
29
29
Javascript-related vulnerabilities to ultimately inject malicious Javascript code
30
30
into a context running with chrome:// privileges.
31
31
} ,
32
32
'License' => MSF_LICENSE ,
33
33
'Author' => [
34
34
'moz_bug_r_a4' , # discovered CVE-2013-1710
35
+ 'Cody Crews' , # discovered CVE-2013-1670
35
36
'joev' # metasploit module
36
37
] ,
37
- 'DisclosureDate' => "Aug 6 2013" ,
38
+ 'DisclosureDate' => "May 14 2013" ,
38
39
'References' => [
39
- [ 'CVE' , '2013-1710' ] # bypass Chrome Object Wrapper to talk to chrome://
40
+ [ 'CVE' , '2013-1670' ] , # privileged access for content-level constructor
41
+ [ 'CVE' , '2013-1710' ] # further chrome injection
40
42
] ,
41
43
'Targets' => [
42
44
[
@@ -56,7 +58,7 @@ def initialize(info = {})
56
58
'BrowserRequirements' => {
57
59
:source => 'script' ,
58
60
:ua_name => HttpClients ::FF ,
59
- :ua_ver => lambda { |ver | ver . to_i . between? ( 15 , 23 ) }
61
+ :ua_ver => lambda { |ver | ver . to_i . between? ( 15 , 22 ) }
60
62
}
61
63
) )
62
64
0 commit comments