6
6
require 'msf/core'
7
7
8
8
class Metasploit3 < Msf ::Exploit ::Remote
9
- Rank = GoodRanking
9
+ Rank = GreatRanking
10
10
11
11
include Msf ::Exploit ::Remote ::BrowserExploitServer
12
12
@@ -19,7 +19,6 @@ def initialize(info={})
19
19
described as an Use After Free while handling ByteArray objects. This module has
20
20
been tested successfully on:
21
21
22
- Windows XP, Chrome 43 and Flash 18.0.0.194,
23
22
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.194,
24
23
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.194,
25
24
Windows 8.1 (32-bit), Firefox and Adobe Flash 18.0.0.194,
@@ -35,9 +34,10 @@ def initialize(info={})
35
34
] ,
36
35
'References' =>
37
36
[
37
+ [ 'CVE' , '2015-5119' ] ,
38
+ [ 'URL' , 'https://helpx.adobe.com/security/products/flash-player/apsa15-03.html' ] ,
38
39
[ 'URL' , 'http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/' ] ,
39
- [ 'URL' , 'https://twitter.com/w3bd3vil/status/618168863708962816' ] ,
40
- [ 'CVE' , '2015-5119' ]
40
+ [ 'URL' , 'https://twitter.com/w3bd3vil/status/618168863708962816' ]
41
41
] ,
42
42
'Payload' =>
43
43
{
@@ -59,7 +59,7 @@ def initialize(info={})
59
59
:ua_name => lambda do |ua |
60
60
case target . name
61
61
when 'Windows'
62
- return true if ua == Msf ::HttpClients ::IE || ua == Msf ::HttpClients ::FF || ua == Msf :: HttpClients :: CHROME
62
+ return true if ua == Msf ::HttpClients ::IE || ua == Msf ::HttpClients ::FF
63
63
when 'Linux'
64
64
return true if ua == Msf ::HttpClients ::FF
65
65
end
0 commit comments