Skip to content

Commit adfb663

Browse files
committed
Land rapid7#5682, Update Flash CVE-2015-5119 ranking
2 parents 6a50b15 + 6a33807 commit adfb663

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/exploits/multi/browser/adobe_flash_hacking_team_uaf.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9-
Rank = GoodRanking
9+
Rank = GreatRanking
1010

1111
include Msf::Exploit::Remote::BrowserExploitServer
1212

@@ -19,7 +19,6 @@ def initialize(info={})
1919
described as an Use After Free while handling ByteArray objects. This module has
2020
been tested successfully on:
2121
22-
Windows XP, Chrome 43 and Flash 18.0.0.194,
2322
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.194,
2423
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.194,
2524
Windows 8.1 (32-bit), Firefox and Adobe Flash 18.0.0.194,
@@ -35,9 +34,10 @@ def initialize(info={})
3534
],
3635
'References' =>
3736
[
37+
['CVE', '2015-5119'],
38+
['URL', 'https://helpx.adobe.com/security/products/flash-player/apsa15-03.html'],
3839
['URL', 'http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/'],
39-
['URL', 'https://twitter.com/w3bd3vil/status/618168863708962816'],
40-
['CVE', '2015-5119']
40+
['URL', 'https://twitter.com/w3bd3vil/status/618168863708962816']
4141
],
4242
'Payload' =>
4343
{
@@ -59,7 +59,7 @@ def initialize(info={})
5959
:ua_name => lambda do |ua|
6060
case target.name
6161
when 'Windows'
62-
return true if ua == Msf::HttpClients::IE || ua == Msf::HttpClients::FF || ua == Msf::HttpClients::CHROME
62+
return true if ua == Msf::HttpClients::IE || ua == Msf::HttpClients::FF
6363
when 'Linux'
6464
return true if ua == Msf::HttpClients::FF
6565
end

0 commit comments

Comments
 (0)