Skip to content
Browse files

Reduce number of modules available on BrowserAutopwn

  • Loading branch information...
1 parent 1f1b26b commit 004c1bac78a7e2ed9948275efa2735e560e0a1b7 @jvazquez-r7 jvazquez-r7 committed Nov 12, 2013
Showing with 462 additions and 462 deletions.
  1. +10 −10 modules/exploits/multi/browser/firefox_escape_retval.rb
  2. +9 −9 modules/exploits/multi/browser/itms_overflow.rb
  3. +2 −2 modules/exploits/multi/browser/java_jre17_driver_manager.rb
  4. +2 −2 modules/exploits/multi/browser/java_jre17_exec.rb
  5. +2 −2 modules/exploits/multi/browser/java_jre17_glassfish_averagerangestatisticimpl.rb
  6. +2 −2 modules/exploits/multi/browser/java_jre17_jaxws.rb
  7. +2 −2 modules/exploits/multi/browser/java_jre17_jmxbean_2.rb
  8. +2 −2 modules/exploits/multi/browser/java_jre17_method_handle.rb
  9. +2 −2 modules/exploits/multi/browser/java_storeimagearray.rb
  10. +10 −10 modules/exploits/multi/browser/mozilla_compareto.rb
  11. +14 −14 modules/exploits/multi/browser/mozilla_navigatorjava.rb
  12. +12 −12 modules/exploits/multi/browser/opera_historysearch.rb
  13. +10 −10 modules/exploits/osx/browser/mozilla_mchannel.rb
  14. +9 −9 modules/exploits/osx/browser/safari_metadata_archive.rb
  15. +11 −11 modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb
  16. +7 −7 modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb
  17. +10 −10 modules/exploits/windows/browser/apple_quicktime_mime_type.rb
  18. +8 −8 modules/exploits/windows/browser/apple_quicktime_rtsp.rb
  19. +7 −7 modules/exploits/windows/browser/apple_quicktime_smil_debug.rb
  20. +6 −6 modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb
  21. +9 −9 modules/exploits/windows/browser/blackice_downloadimagefileurl.rb
  22. +12 −12 modules/exploits/windows/browser/cisco_playerpt_setsource.rb
  23. +12 −12 modules/exploits/windows/browser/cisco_playerpt_setsource_surl.rb
  24. +11 −11 modules/exploits/windows/browser/clear_quest_cqole.rb
  25. +12 −12 modules/exploits/windows/browser/crystal_reports_printcontrol.rb
  26. +11 −11 modules/exploits/windows/browser/hp_alm_xgo_setshapenodetype_exec.rb
  27. +12 −12 modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb
  28. +12 −12 modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb
  29. +12 −12 modules/exploits/windows/browser/ibm_spss_c1sizer.rb
  30. +12 −12 modules/exploits/windows/browser/ibm_tivoli_pme_activex_bof.rb
  31. +9 −9 modules/exploits/windows/browser/ie_cbutton_uaf.rb
  32. +12 −12 modules/exploits/windows/browser/indusoft_issymbol_internationalseparator.rb
  33. +12 −12 modules/exploits/windows/browser/inotes_dwa85w_bof.rb
  34. +2 −2 modules/exploits/windows/browser/java_cmm.rb
  35. +9 −9 modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb
  36. +10 −10 modules/exploits/windows/browser/mozilla_interleaved_write.rb
  37. +9 −9 modules/exploits/windows/browser/mozilla_mchannel.rb
  38. +9 −9 modules/exploits/windows/browser/ms10_018_ie_behaviors.rb
  39. +11 −11 modules/exploits/windows/browser/ms11_003_ie_css_import.rb
  40. +8 −8 modules/exploits/windows/browser/ms11_050_mshtml_cobjectelement.rb
  41. +8 −8 modules/exploits/windows/browser/ms12_037_ie_colspan.rb
  42. +12 −12 modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb
  43. +12 −12 modules/exploits/windows/browser/ntr_activex_check_bof.rb
  44. +12 −12 modules/exploits/windows/browser/ntr_activex_stopmodule.rb
  45. +12 −12 modules/exploits/windows/browser/oracle_autovue_setmarkupmode.rb
  46. +12 −12 modules/exploits/windows/browser/quickr_qp2_bof.rb
  47. +11 −11 modules/exploits/windows/browser/siemens_solid_edge_selistctrlx.rb
  48. +12 −12 modules/exploits/windows/browser/synactis_connecttosynactis_bof.rb
  49. +11 −11 modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb
  50. +9 −9 modules/exploits/windows/browser/winzip_fileview.rb
  51. +8 −8 modules/exploits/windows/browser/wmi_admintools.rb
View
20 modules/exploits/multi/browser/firefox_escape_retval.rb
@@ -13,16 +13,16 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::FF,
- :ua_minver => "3.5",
- :ua_maxver => "3.5",
- :os_name => OperatingSystems::WINDOWS,
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- :vuln_test => nil,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::FF,
+ # :ua_minver => "3.5",
+ # :ua_maxver => "3.5",
+ # :os_name => OperatingSystems::WINDOWS,
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ # :vuln_test => nil,
+ #})
def initialize(info = {})
super(update_info(info,
View
18 modules/exploits/multi/browser/itms_overflow.rb
@@ -12,15 +12,15 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
# no popup required to visit itms:// URLs in Safari, so throw it in BAP
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::SAFARI,
- :ua_maxver => "4.1",
- :ua_minver => "4.0.5",
- :javascript => false,
- :rank => NormalRanking,
- :os_name => OperatingSystems::MAC_OSX
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::SAFARI,
+ # :ua_maxver => "4.1",
+ # :ua_minver => "4.0.5",
+ # :javascript => false,
+ # :rank => NormalRanking,
+ # :os_name => OperatingSystems::MAC_OSX
+ #})
def initialize(info = {})
super(update_info(info,
View
4 modules/exploits/multi/browser/java_jre17_driver_manager.rb
@@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
View
4 modules/exploits/multi/browser/java_jre17_exec.rb
@@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
super( update_info( info,
View
4 modules/exploits/multi/browser/java_jre17_glassfish_averagerangestatisticimpl.rb
@@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
View
4 modules/exploits/multi/browser/java_jre17_jaxws.rb
@@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
super( update_info( info,
View
4 modules/exploits/multi/browser/java_jre17_jmxbean_2.rb
@@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
View
4 modules/exploits/multi/browser/java_jre17_method_handle.rb
@@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
View
4 modules/exploits/multi/browser/java_storeimagearray.rb
@@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
super( update_info( info,
View
20 modules/exploits/multi/browser/mozilla_compareto.rb
@@ -13,18 +13,18 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
+ #include Msf::Exploit::Remote::BrowserAutopwn
# The version for this vuln is tricky because it affects mozilla 1.7-1.7.10
# and firefox 1.0-1.0.4, so we set minver and maxver to the outer bounds.
- autopwn_info({
- :ua_name => HttpClients::FF,
- :ua_minver => "1.0",
- :ua_maxver => "1.7.10",
- :os_name => OperatingSystems::WINDOWS,
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
- })
+ #autopwn_info({
+ # :ua_name => HttpClients::FF,
+ # :ua_minver => "1.0",
+ # :ua_maxver => "1.7.10",
+ # :os_name => OperatingSystems::WINDOWS,
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ # :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
+ #})
def initialize(info = {})
super(update_info(info,
View
28 modules/exploits/multi/browser/mozilla_navigatorjava.rb
@@ -11,20 +11,20 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::FF,
- :ua_minver => "1.5.0",
- :ua_maxver => "1.5.1",
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- :vuln_test => %Q|
- is_vuln = false;
- if (navigator.javaEnabled()){
- is_vuln = true;
- }
- |,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::FF,
+ # :ua_minver => "1.5.0",
+ # :ua_maxver => "1.5.1",
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ # :vuln_test => %Q|
+ # is_vuln = false;
+ # if (navigator.javaEnabled()){
+ # is_vuln = true;
+ # }
+ # |,
+ #})
def initialize(info = {})
super(update_info(info,
View
24 modules/exploits/multi/browser/opera_historysearch.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::OPERA,
- :javascript => true,
- :rank => ExcellentRanking, # reliable command execution
- :vuln_test => %Q{
- v = parseFloat(opera.version());
- if (9.5 < v && 9.62 > v) {
- is_vuln = true;
- }
- },
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::OPERA,
+ # :javascript => true,
+ # :rank => ExcellentRanking, # reliable command execution
+ # :vuln_test => %Q{
+ # v = parseFloat(opera.version());
+ # if (9.5 < v && 9.62 > v) {
+ # is_vuln = true;
+ # }
+ # },
+ #})
def initialize(info = {})
super(update_info(info,
View
20 modules/exploits/osx/browser/mozilla_mchannel.rb
@@ -9,16 +9,16 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::FF,
- :ua_minver => "3.6.16",
- :ua_maxver => "3.6.16",
- :os_name => OperatingSystems::MAC_OSX,
- :javascript => true,
- :rank => NormalRanking,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::FF,
+ # :ua_minver => "3.6.16",
+ # :ua_maxver => "3.6.16",
+ # :os_name => OperatingSystems::MAC_OSX,
+ # :javascript => true,
+ # :rank => NormalRanking,
+ #})
def initialize(info = {})
super(update_info(info,
View
18 modules/exploits/osx/browser/safari_metadata_archive.rb
@@ -13,15 +13,15 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::SAFARI,
- :ua_maxver => '2.0.2',
- :os_name => [ OperatingSystems::MAC_OSX ],
- :javascript => false,
- :rank => ExcellentRanking, # reliable cmd execution
- :vuln_test => nil,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::SAFARI,
+ # :ua_maxver => '2.0.2',
+ # :os_name => [ OperatingSystems::MAC_OSX ],
+ # :javascript => false,
+ # :rank => ExcellentRanking, # reliable cmd execution
+ # :vuln_test => nil,
+ #})
def initialize(info = {})
super(update_info(info,
View
22 modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb
@@ -9,19 +9,19 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
+ #include Msf::Exploit::Remote::BrowserAutopwn
include Msf::Exploit::RopDb
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => Rank,
- :classid => "{09F68A41-2FBE-11D3-8C9D-0008C7D901B6}",
- :method => "ChooseFilePath",
- })
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => Rank,
+ # :classid => "{09F68A41-2FBE-11D3-8C9D-0008C7D901B6}",
+ # :method => "ChooseFilePath",
+ #})
def initialize(info={})
View
14 modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb
@@ -11,13 +11,13 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Seh
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::IE,
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::IE,
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ #})
def initialize(info = {})
super(update_info(info,
View
20 modules/exploits/windows/browser/apple_quicktime_mime_type.rb
@@ -12,16 +12,16 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::Egghunter
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::SAFARI,
- :ua_maxver => '5.0.1',
- :ua_maxver => '5.1.7',
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- :vuln_test => nil
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::SAFARI,
+ # :ua_maxver => '5.0.1',
+ # :ua_maxver => '5.1.7',
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ # :vuln_test => nil
+ #})
def initialize(info = {})
super(update_info(info,
View
16 modules/exploits/windows/browser/apple_quicktime_rtsp.rb
@@ -10,14 +10,14 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- # No particular browser. Works on at least IE6 and Firefox 1.5.0.3
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- :vuln_test => nil,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # # No particular browser. Works on at least IE6 and Firefox 1.5.0.3
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ # :vuln_test => nil,
+ #})
def initialize(info = {})
super(update_info(info,
View
14 modules/exploits/windows/browser/apple_quicktime_smil_debug.rb
@@ -11,13 +11,13 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Seh
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :javascript => true,
- :rank => NormalRanking, # reliable memory corruption
- :vuln_test => nil,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :javascript => true,
+ # :rank => NormalRanking, # reliable memory corruption
+ # :vuln_test => nil,
+ #})
def initialize(info = {})
super(update_info(info,
View
12 modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb
@@ -10,12 +10,12 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :javascript => true,
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :javascript => true,
+ # :rank => NormalRanking
+ #})
def initialize(info = {})
super(update_info(info,
View
18 modules/exploits/windows/browser/blackice_downloadimagefileurl.rb
@@ -12,15 +12,15 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::EXE
include Msf::Exploit::WbemExec
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::IE,
- :javascript => true,
- :rank => NormalRanking,
- :classid => "{79956462-F148-497F-B247-DF35A095F80B}",
- :method => "DownloadImageFileURL",
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::IE,
+ # :javascript => true,
+ # :rank => NormalRanking,
+ # :classid => "{79956462-F148-497F-B247-DF35A095F80B}",
+ # :method => "DownloadImageFileURL",
+ #})
def initialize(info = {})
super(update_info(info,
View
24 modules/exploits/windows/browser/cisco_playerpt_setsource.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Remote::Seh
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
- :method => "SetSource",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
+ # :method => "SetSource",
+ # :rank => NormalRanking
+ #})
def initialize(info = {})
View
24 modules/exploits/windows/browser/cisco_playerpt_setsource_surl.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Remote::Seh
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
- :method => "SetSource",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
+ # :method => "SetSource",
+ # :rank => NormalRanking
+ #})
def initialize(info = {})
View
22 modules/exploits/windows/browser/clear_quest_cqole.rb
@@ -9,17 +9,17 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "7.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{94773112-72E8-11D0-A42E-00A024DED613}",
- :method => "RegisterSchemaRepoFromFileByDbSet",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "7.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{94773112-72E8-11D0-A42E-00A024DED613}",
+ # :method => "RegisterSchemaRepoFromFileByDbSet",
+ # :rank => NormalRanking
+ #})
def initialize(info={})
super(update_info(info,
View
24 modules/exploits/windows/browser/crystal_reports_printcontrol.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => NormalRanking,
- :classid => "{88DD90B6-C770-4CFF-B7A4-3AFD16BB8824}",
- :method => "ServerResourceVersion"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => NormalRanking,
+ # :classid => "{88DD90B6-C770-4CFF-B7A4-3AFD16BB8824}",
+ # :method => "ServerResourceVersion"
+ #})
def initialize(info={})
View
22 modules/exploits/windows/browser/hp_alm_xgo_setshapenodetype_exec.rb
@@ -9,17 +9,17 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "7.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{C3B92104-B5A7-11D0-A37F-00A0248F0AF1}",
- :method => "SetShapeNodeType",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "7.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{C3B92104-B5A7-11D0-A37F-00A0248F0AF1}",
+ # :method => "SetShapeNodeType",
+ # :rank => NormalRanking
+ #})
def initialize(info={})
super(update_info(info,
View
24 modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => Rank,
- :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
- :method => "WriteFileBinary"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => Rank,
+ # :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
+ # :method => "WriteFileBinary"
+ #})
def initialize(info={})
super(update_info(info,
View
24 modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb
@@ -9,20 +9,20 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
+ #include Msf::Exploit::Remote::BrowserAutopwn
include Msf::Exploit::EXE
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :os_ver => OperatingSystems::WindowsVersions::XP,
- :rank => NormalRanking,
- :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
- :method => "WriteFileString "
- })
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :os_ver => OperatingSystems::WindowsVersions::XP,
+ # :rank => NormalRanking,
+ # :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
+ # :method => "WriteFileString "
+ #})
def initialize(info={})
super(update_info(info,
View
24 modules/exploits/windows/browser/ibm_spss_c1sizer.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => NormalRanking,
- :classid => "{24E04EBF-014D-471F-930E-7654B1193BA9}",
- :method => "TabCaption"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => NormalRanking,
+ # :classid => "{24E04EBF-014D-471F-930E-7654B1193BA9}",
+ # :method => "TabCaption"
+ #})
def initialize(info={})
View
24 modules/exploits/windows/browser/ibm_tivoli_pme_activex_bof.rb
@@ -9,18 +9,18 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :rank => NormalRanking,
- :classid => "{84B74E82-3475-420E-9949-773B4FB91771}",
- :method => "RunAndUploadFile",
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :rank => NormalRanking,
+ # :classid => "{84B74E82-3475-420E-9949-773B4FB91771}",
+ # :method => "RunAndUploadFile",
+ #})
def initialize(info={})
super(update_info(info,
View
18 modules/exploits/windows/browser/ie_cbutton_uaf.rb
@@ -10,15 +10,15 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "8.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => GoodRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "8.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => GoodRanking
+ #})
def initialize(info={})
super(update_info(info,
View
24 modules/exploits/windows/browser/indusoft_issymbol_internationalseparator.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => NormalRanking,
- :classid => "{3c9dff6f-5cb0-422e-9978-d6405d10718f}",
- :method => "InternationalSeparator"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => NormalRanking,
+ # :classid => "{3c9dff6f-5cb0-422e-9978-d6405d10718f}",
+ # :method => "InternationalSeparator"
+ #})
def initialize(info={})
View
24 modules/exploits/windows/browser/inotes_dwa85w_bof.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => Rank,
- :classid => "{0F2AAAE3-7E9E-4b64-AB5D-1CA24C6ACB9C}",
- :method => "Attachment_Times"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => Rank,
+ # :classid => "{0F2AAAE3-7E9E-4b64-AB5D-1CA24C6ACB9C}",
+ # :method => "Attachment_Times"
+ #})
def initialize(info={})
View
4 modules/exploits/windows/browser/java_cmm.rb
@@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({ :javascript => false })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({ :javascript => false })
def initialize( info = {} )
View
18 modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb
@@ -12,15 +12,15 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::EXE
include Msf::Exploit::WbemExec
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::IE,
- :javascript => true,
- :rank => NormalRanking,
- :classid => "{45E66957-2932-432A-A156-31503DF0A681}",
- :method => "LaunchTriPane",
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::IE,
+ # :javascript => true,
+ # :rank => NormalRanking,
+ # :classid => "{45E66957-2932-432A-A156-31503DF0A681}",
+ # :method => "LaunchTriPane",
+ #})
def initialize(info = {})
super(update_info(info,
View
20 modules/exploits/windows/browser/mozilla_interleaved_write.rb
@@ -13,16 +13,16 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::FF,
- :ua_minver => "3.6.8",
- :ua_maxver => "3.6.11",
- :os_name => OperatingSystems::WINDOWS,
- :javascript => true,
- :rank => NormalRanking,
- :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::FF,
+ # :ua_minver => "3.6.8",
+ # :ua_maxver => "3.6.11",
+ # :os_name => OperatingSystems::WINDOWS,
+ # :javascript => true,
+ # :rank => NormalRanking,
+ # :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
+ #})
def initialize(info = {})
super(update_info(info,
View
18 modules/exploits/windows/browser/mozilla_mchannel.rb
@@ -9,15 +9,15 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::FF,
- :ua_minver => "3.6.16",
- :ua_maxver => "3.6.16",
- :os_name => OperatingSystems::WINDOWS,
- :javascript => true,
- :rank => NormalRanking,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::FF,
+ # :ua_minver => "3.6.16",
+ # :ua_maxver => "3.6.16",
+ # :os_name => OperatingSystems::WINDOWS,
+ # :javascript => true,
+ # :rank => NormalRanking,
+ #})
def initialize(info = {})
super(update_info(info,
View
18 modules/exploits/windows/browser/ms10_018_ie_behaviors.rb
@@ -30,15 +30,15 @@ class Metasploit3 < Msf::Exploit::Remote
#
# ms10_090_ie_css_clip is newer but *much* less reliable
#
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "7.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :vuln_test => nil, # no way to test without just trying it
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "7.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :vuln_test => nil, # no way to test without just trying it
+ #})
def initialize(info = {})
super(update_info(info,
View
22 modules/exploits/windows/browser/ms11_003_ie_css_import.rb
@@ -9,17 +9,17 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking # Need more love for Great
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "7.0", # Should be 6
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- # Not strictly a vuln check, but an exploitability check since a
- # specific version of .NET is required to make the ROP work.
- :vuln_test => "if (/.NET CLR 2\\.0\\.50727/.test(navigator.userAgent)) { is_vuln = true }else{ is_vuln = false }",
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "7.0", # Should be 6
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # # Not strictly a vuln check, but an exploitability check since a
+ # # specific version of .NET is required to make the ROP work.
+ # :vuln_test => "if (/.NET CLR 2\\.0\\.50727/.test(navigator.userAgent)) { is_vuln = true }else{ is_vuln = false }",
+ #})
def initialize(info = {})
super(update_info(info,
View
16 modules/exploits/windows/browser/ms11_050_mshtml_cobjectelement.rb
@@ -10,14 +10,14 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "7.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "7.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS
+ #})
def initialize(info={})
super(update_info(info,
View
16 modules/exploits/windows/browser/ms12_037_ie_colspan.rb
@@ -9,14 +9,14 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_minver => "8.0",
- :ua_maxver => "8.0",
- :rank => NormalRanking, # reliable memory corruption
- :javascript => true
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_minver => "8.0",
+ # :ua_maxver => "8.0",
+ # :rank => NormalRanking, # reliable memory corruption
+ # :javascript => true
+ #})
def initialize(info = {})
super(update_info(info,
View
24 modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => NormalRanking,
- :classid => "{601D7813-408F-11D1-98D7-444553540000}",
- :method => "SetEngine"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => NormalRanking,
+ # :classid => "{601D7813-408F-11D1-98D7-444553540000}",
+ # :method => "SetEngine"
+ #})
def initialize(info={})
View
24 modules/exploits/windows/browser/ntr_activex_check_bof.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
- :method => "Check",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
+ # :method => "Check",
+ # :rank => NormalRanking
+ #})
def initialize(info = {})
View
24 modules/exploits/windows/browser/ntr_activex_stopmodule.rb
@@ -9,18 +9,18 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "7.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
- :method => "StopModule",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "7.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
+ # :method => "StopModule",
+ # :rank => NormalRanking
+ #})
def initialize(info = {})
View
24 modules/exploits/windows/browser/oracle_autovue_setmarkupmode.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Remote::Seh
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => "{B6FCC215-D303-11D1-BC6C-0000C078797F}",
- :method => "SetMarkupMode",
- :rank => NormalRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => "{B6FCC215-D303-11D1-BC6C-0000C078797F}",
+ # :method => "SetMarkupMode",
+ # :rank => NormalRanking
+ #})
def initialize(info = {})
View
24 modules/exploits/windows/browser/quickr_qp2_bof.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => Rank,
- :classid => "{05D96F71-87C6-11D3-9BE4-00902742D6E0}",
- :method => "Attachment_Times"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => Rank,
+ # :classid => "{05D96F71-87C6-11D3-9BE4-00902742D6E0}",
+ # :method => "Attachment_Times"
+ #})
def initialize(info={})
View
22 modules/exploits/windows/browser/siemens_solid_edge_selistctrlx.rb
@@ -10,17 +10,17 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "9.0",
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :rank => Rank,
- :classid => "{5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D}"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "9.0",
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => Rank,
+ # :classid => "{5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D}"
+ #})
def initialize(info={})
super(update_info(info,
View
24 modules/exploits/windows/browser/synactis_connecttosynactis_bof.rb
@@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :ua_name => HttpClients::IE,
- :ua_minver => "7.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :classid => "{C80CAF1F-C58E-11D5-A093-006097ED77E6}",
- :method => "ConnectToSynactis",
- :os_name => OperatingSystems::WINDOWS,
- :rank => AverageRanking
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "7.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :classid => "{C80CAF1F-C58E-11D5-A093-006097ED77E6}",
+ # :method => "ConnectToSynactis",
+ # :os_name => OperatingSystems::WINDOWS,
+ # :rank => AverageRanking
+ #})
def initialize(info={})
super(update_info(info,
View
22 modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb
@@ -9,17 +9,17 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::IE,
- :ua_minver => "6.0",
- :ua_maxver => "8.0",
- :javascript => true,
- :rank => NormalRanking,
- :classid => "{658ED6E7-0DA1-4ADD-B2FB-095F08091118}"
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::IE,
+ # :ua_minver => "6.0",
+ # :ua_maxver => "8.0",
+ # :javascript => true,
+ # :rank => NormalRanking,
+ # :classid => "{658ED6E7-0DA1-4ADD-B2FB-095F08091118}"
+ #})
def initialize(info={})
super(update_info(info,
View
18 modules/exploits/windows/browser/winzip_fileview.rb
@@ -10,15 +10,15 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
- autopwn_info({
- :ua_name => HttpClients::IE,
- :javascript => true,
- :os_name => OperatingSystems::WINDOWS,
- :classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}',
- :method => 'CreateNewFolderFromName',
- :rank => NormalRanking # reliable memory corruption
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #autopwn_info({
+ # :ua_name => HttpClients::IE,
+ # :javascript => true,
+ # :os_name => OperatingSystems::WINDOWS,
+ # :classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}',
+ # :method => 'CreateNewFolderFromName',
+ # :rank => NormalRanking # reliable memory corruption
+ #})
def initialize(info = {})
super(update_info(info,
View
16 modules/exploits/windows/browser/wmi_admintools.rb
@@ -9,14 +9,14 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
include Msf::Exploit::Remote::HttpServer::HTML
- include Msf::Exploit::Remote::BrowserAutopwn
-
- autopwn_info({
- :os_name => OperatingSystems::WINDOWS,
- :ua_name => HttpClients::IE,
- :rank => NormalRanking,
- :vuln_test => nil,
- })
+ #include Msf::Exploit::Remote::BrowserAutopwn
+ #
+ #autopwn_info({
+ # :os_name => OperatingSystems::WINDOWS,
+ # :ua_name => HttpClients::IE,
+ # :rank => NormalRanking,
+ # :vuln_test => nil,
+ #})
def initialize(info = {})
super(update_info(info,

0 comments on commit 004c1ba

Please sign in to comment.
Something went wrong with that request. Please try again.