Skip to content

Commit 6ef87d1

Browse files
kernelsmithkernelsmith
authored andcommitted
update info to reflect use of webdav
ms10_042_helpctr_xss_cmd_exec.rb doesn't tell you that it's going to use webdav, and it's options dont' have the (Don't change) warning for SRVPORT and URIPATH. This update fixes all that
1 parent 6de50b7 commit 6ef87d1

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,9 @@ def initialize(info = {})
3838
available and will use one if possible. In the case of both IE8 and WMP11, the
3939
exploit defaults to using an iframe on IE8, but is configurable by setting the
4040
DIALOGMECH option to "none" or "player".
41+
42+
This module creates a WebDAV service from which the payload is copied to the
43+
victim machine.
4144
},
4245
'Author' =>
4346
[
@@ -72,8 +75,8 @@ def initialize(info = {})
7275

7376
register_options(
7477
[
75-
OptPort.new( 'SRVPORT', [ true, "The daemon port to listen on", 80 ]),
76-
OptString.new( 'URIPATH', [ true, "The URI to use.", "/" ]),
78+
OptPort.new( 'SRVPORT', [ true, "The daemon port to listen on (do not change)", 80 ]),
79+
OptString.new( 'URIPATH', [ true, "The URI to use (do not change).", "/" ]),
7780
OptString.new( 'DIALOGMECH', [ true, "IE8/WMP11 trigger mechanism (none, iframe, or player).", "iframe"])
7881
], self.class)
7982

0 commit comments

Comments
 (0)