Skip to content

Commit d23c9b5

Browse files
committed
Trade MS12-004 for MS13-090 against Windows XP BrowserAutoPwn
1 parent 2281125 commit d23c9b5

File tree

2 files changed

+13
-13
lines changed

2 files changed

+13
-13
lines changed

modules/exploits/windows/browser/ms12_004_midi.rb

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,6 @@ class Metasploit3 < Msf::Exploit::Remote
1010

1111
include Msf::Exploit::Remote::HttpServer::HTML
1212
include Msf::Exploit::RopDb
13-
include Msf::Exploit::Remote::BrowserAutopwn
14-
autopwn_info({
15-
:ua_name => HttpClients::IE,
16-
:ua_minver => "6.0",
17-
:ua_maxver => "8.0",
18-
:javascript => true,
19-
:os_name => OperatingSystems::Match::WINDOWS,
20-
:vuln_test => %Q|
21-
var v = window.os_detect.getVersion();
22-
var os_name = v['os_name'];
23-
if (os_name.indexOf('Windows XP') == 0) {is_vuln = true;} else { is_vuln = false; }
24-
|,
25-
})
2613

2714
def initialize(info={})
2815
super(update_info(info,

modules/exploits/windows/browser/ms13_090_cardspacesigninhelper.rb

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,19 @@ class Metasploit3 < Msf::Exploit::Remote
99
Rank = NormalRanking
1010

1111
include Msf::Exploit::Remote::BrowserExploitServer
12+
include Msf::Exploit::Remote::BrowserAutopwn
13+
autopwn_info({
14+
:ua_name => HttpClients::IE,
15+
:ua_minver => "8.0",
16+
:ua_maxver => "8.0",
17+
:javascript => true,
18+
:os_name => OperatingSystems::Match::WINDOWS_XP,
19+
# BrowserAutoPwn currently has a syntax error bug so we can't use classid and method,
20+
# so we have these commented out for now. But it's not so bad because by default
21+
# Windows XP has this ActiveX, and BrowserExploitServer's check will kick in.
22+
# :classid => "{19916E01-B44E-4E31-94A4-4696DF46157B}",
23+
# :method => "requiredClaims"
24+
})
1225

1326
def initialize(info={})
1427
super(update_info(info,

0 commit comments

Comments
 (0)