mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
These exploits use :activex, so I update the usage for them
This commit is contained in:
parent
2900f57afd
commit
3248f02c2c
@ -51,8 +51,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:clsid => "{D27CDB6E-AE6D-11cf-96B8-444553540000}",
|
||||
:method => "LoadMovie",
|
||||
:activex => [
|
||||
{
|
||||
:clsid => '{D27CDB6E-AE6D-11cf-96B8-444553540000}',
|
||||
:method => 'LoadMovie'
|
||||
}
|
||||
],
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => Msf::HttpClients::IE,
|
||||
:flash => lambda { |ver| ver =~ /^11\.[7|8|9]/ && ver < '11.9.900.170' }
|
||||
|
@ -46,8 +46,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:clsid => "{#{CLASSID}}",
|
||||
:method => "LoadMovie",
|
||||
:activex => [
|
||||
{
|
||||
:clsid => "{#{CLASSID}}",
|
||||
:method => "LoadMovie"
|
||||
}
|
||||
],
|
||||
:os_name => OperatingSystems::Match::WINDOWS_7,
|
||||
:ua_name => Msf::HttpClients::IE,
|
||||
# Ohter versions are vulnerable but .235 is the one that works for me pretty well
|
||||
|
@ -55,8 +55,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:clsid => "{D27CDB6E-AE6D-11cf-96B8-444553540000}",
|
||||
:method => "LoadMovie",
|
||||
:activex => [
|
||||
{
|
||||
:clsid => "{D27CDB6E-AE6D-11cf-96B8-444553540000}",
|
||||
:method => "LoadMovie"
|
||||
}
|
||||
],
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => Msf::HttpClients::IE,
|
||||
:flash => lambda { |ver| ver =~ /^11\.5/ && ver < '11.5.502.149' }
|
||||
|
@ -43,8 +43,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => /MSIE/i,
|
||||
:ua_ver => lambda { |ver| Gem::Version.new(ver) < Gem::Version.new('10') },
|
||||
:clsid => "{5CE92A27-9F6A-11D2-9D3D-000001155641}",
|
||||
:method => "GetColor"
|
||||
:activex => [
|
||||
{
|
||||
:clsid => "{5CE92A27-9F6A-11D2-9D3D-000001155641}",
|
||||
:method => "GetColor"
|
||||
}
|
||||
]
|
||||
},
|
||||
'Payload' =>
|
||||
{
|
||||
|
@ -45,8 +45,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:clsid => "{09F68A41-2FBE-11D3-8C9D-0008C7D901B6}",
|
||||
:method => "ChooseFilePath",
|
||||
:activex => [
|
||||
{
|
||||
:clsid => "{09F68A41-2FBE-11D3-8C9D-0008C7D901B6}",
|
||||
:method => "ChooseFilePath"
|
||||
}
|
||||
],
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
},
|
||||
'Targets' =>
|
||||
|
@ -73,8 +73,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:clsid => "{19916E01-B44E-4E31-94A4-4696DF46157B}",
|
||||
:method => "requiredClaims",
|
||||
:activex => [
|
||||
{
|
||||
:clsid => "{19916E01-B44E-4E31-94A4-4696DF46157B}",
|
||||
:method => "requiredClaims"
|
||||
}
|
||||
],
|
||||
:os_name => OperatingSystems::Match::WINDOWS_XP
|
||||
},
|
||||
'Targets' =>
|
||||
|
@ -44,7 +44,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:clsid => "{4B3476C6-185A-4D19-BB09-718B565FA67B}",
|
||||
:activex => [
|
||||
{
|
||||
:clsid => "{4B3476C6-185A-4D19-BB09-718B565FA67B}",
|
||||
:method => "ConvertFile"
|
||||
}
|
||||
],
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => Msf::HttpClients::IE,
|
||||
:ua_ver => '10.0'
|
||||
|
Loading…
Reference in New Issue
Block a user