Skip to content

Commit 769fa37

Browse files
committed
Explain why the user cannot modify the URIPATH
1 parent 2aa5962 commit 769fa37

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/windows/browser/ntr_activex_check_bof.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,8 @@ def initialize(info = {})
3232
'Description' => %q{
3333
This module exploits a vulnerability found in NTR ActiveX 1.1.8. The
3434
vulnerability exists in the Check() method, due to the insecure usage of strcat to
35-
build a URL using the bstrParams parameter contents, which leads to code execution
35+
build a URL using the bstrParams parameter contents (note: this is also the reason
36+
why the module won't allow you to modify the URIPATH), which leads to code execution
3637
under the context of the user visiting a malicious web page. In order to bypass
3738
DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.
3839
},

0 commit comments

Comments
 (0)