File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/multi/browser Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
14
14
15
15
autopwn_info ( {
16
16
:ua_name => HttpClients ::FF ,
17
- :ua_minver => "21 .0" ,
17
+ :ua_minver => "15 .0" ,
18
18
:ua_maxver => "23.0" ,
19
19
:javascript => true ,
20
20
:rank => ExcellentRanking
@@ -24,7 +24,7 @@ def initialize(info = {})
24
24
super ( update_info ( info ,
25
25
'Name' => 'Firefox toString console.time Privileged Javascript Injection' ,
26
26
'Description' => %q{
27
- This exploit gains remote code execution on Firefox 21 -23 by abusing two separate
27
+ This exploit gains remote code execution on Firefox 15 -23 by abusing two separate
28
28
Javascript-related vulnerabilities to ultimately inject malicious Javascript code
29
29
into a context running with chrome:// privileges.
30
30
} ,
@@ -55,7 +55,7 @@ def initialize(info = {})
55
55
'BrowserRequirements' => {
56
56
:source => 'script' ,
57
57
:ua_name => HttpClients ::FF ,
58
- :ua_ver => lambda { |ver | ver . to_i . between? ( 21 , 23 ) }
58
+ :ua_ver => lambda { |ver | ver . to_i . between? ( 15 , 23 ) }
59
59
}
60
60
) )
61
61
You can’t perform that action at this time.
0 commit comments