Skip to content

Commit c27245e

Browse files
author
Tod Beardsley
committed
Touch descriptions for module and options
1 parent b4606ba commit c27245e

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/auxiliary/gather/apple_safari_webarchive_uxss.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,9 @@ def initialize(info = {})
2424
in Safari's .webarchive file format. The format allows you to
2525
specify both domain and content, so we can run arbitrary script in the
2626
context of any domain. This allows us to steal cookies, file URLs, and saved
27-
passwords from any website we want. On sites that link to cached javascripts,
28-
we can poison the user's browser cache and install keyloggers.
27+
passwords from any website we want -- in other words, it is a universal
28+
cross-site scripting vector (UXSS). On sites that link to cached javascripts,
29+
we can additionally poison user's browser cache and install keyloggers.
2930
},
3031
'License' => MSF_LICENSE,
3132
'Author' => 'joev',
@@ -47,7 +48,8 @@ def initialize(info = {})
4748
register_options(
4849
[
4950
OptString.new('FILENAME', [ true, 'The file name.', 'msf.webarchive']),
50-
OptString.new('URLS', [ true, 'The URLs to steal cookie and form data from.', '']),
51+
OptString.new('URLS', [ true, 'A space-delimited list of URLs to UXSS (eg http//browserscan.rapid7.com/']),
52+
OptString.new('URIPATH', [false, 'The URI to receive the UXSS\'ed data', '/grab']),
5153
OptString.new('FILE_URLS', [false, 'Additional file:// URLs to steal.', '']),
5254
OptBool.new('STEAL_COOKIES', [true, "Enable cookie stealing.", true]),
5355
OptBool.new('STEAL_FILES', [true, "Enable local file stealing.", true]),

0 commit comments

Comments
 (0)