Skip to content

Commit

Permalink
Land #2634 - Opt browser autopwn load list
Browse files Browse the repository at this point in the history
  • Loading branch information
wchen-r7 committed Nov 19, 2013
2 parents 13ad48f + fe2cd93 commit a9de5e2
Show file tree
Hide file tree
Showing 51 changed files with 461 additions and 461 deletions.
20 changes: 10 additions & 10 deletions modules/exploits/multi/browser/firefox_escape_retval.rb
Original file line number Diff line number Diff line change
Expand Up @@ -13,16 +13,16 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name => HttpClients::FF,
:ua_minver => "3.5",
:ua_maxver => "3.5",
:os_name => OperatingSystems::WINDOWS,
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => nil,
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :ua_name => HttpClients::FF,
# :ua_minver => "3.5",
# :ua_maxver => "3.5",
# :os_name => OperatingSystems::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil,
#})

def initialize(info = {})
super(update_info(info,
Expand Down
18 changes: 9 additions & 9 deletions modules/exploits/multi/browser/itms_overflow.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,15 +12,15 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML

# no popup required to visit itms:// URLs in Safari, so throw it in BAP
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name => HttpClients::SAFARI,
:ua_maxver => "4.1",
:ua_minver => "4.0.5",
:javascript => false,
:rank => NormalRanking,
:os_name => OperatingSystems::MAC_OSX
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :ua_name => HttpClients::SAFARI,
# :ua_maxver => "4.1",
# :ua_minver => "4.0.5",
# :javascript => false,
# :rank => NormalRanking,
# :os_name => OperatingSystems::MAC_OSX
#})

def initialize(info = {})
super(update_info(info,
Expand Down
4 changes: 2 additions & 2 deletions modules/exploits/multi/browser/java_jre17_driver_manager.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )

Expand Down
4 changes: 2 additions & 2 deletions modules/exploits/multi/browser/java_jre17_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )
super( update_info( info,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )

Expand Down
4 changes: 2 additions & 2 deletions modules/exploits/multi/browser/java_jre17_jaxws.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )
super( update_info( info,
Expand Down
4 changes: 2 additions & 2 deletions modules/exploits/multi/browser/java_jre17_jmxbean_2.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )

Expand Down
4 changes: 2 additions & 2 deletions modules/exploits/multi/browser/java_jre17_method_handle.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,8 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )

Expand Down
4 changes: 2 additions & 2 deletions modules/exploits/multi/browser/java_storeimagearray.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({ :javascript => false })
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })

def initialize( info = {} )
super( update_info( info,
Expand Down
20 changes: 10 additions & 10 deletions modules/exploits/multi/browser/mozilla_compareto.rb
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
#include Msf::Exploit::Remote::BrowserAutopwn
# The version for this vuln is tricky because it affects mozilla 1.7-1.7.10
# and firefox 1.0-1.0.4, so we set minver and maxver to the outer bounds.
autopwn_info({
:ua_name => HttpClients::FF,
:ua_minver => "1.0",
:ua_maxver => "1.7.10",
:os_name => OperatingSystems::WINDOWS,
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
})
#autopwn_info({
# :ua_name => HttpClients::FF,
# :ua_minver => "1.0",
# :ua_maxver => "1.7.10",
# :os_name => OperatingSystems::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
#})

def initialize(info = {})
super(update_info(info,
Expand Down
28 changes: 14 additions & 14 deletions modules/exploits/multi/browser/mozilla_navigatorjava.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,20 +11,20 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name => HttpClients::FF,
:ua_minver => "1.5.0",
:ua_maxver => "1.5.1",
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => %Q|
is_vuln = false;
if (navigator.javaEnabled()){
is_vuln = true;
}
|,
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :ua_name => HttpClients::FF,
# :ua_minver => "1.5.0",
# :ua_maxver => "1.5.1",
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => %Q|
# is_vuln = false;
# if (navigator.javaEnabled()){
# is_vuln = true;
# }
# |,
#})

def initialize(info = {})
super(update_info(info,
Expand Down
24 changes: 12 additions & 12 deletions modules/exploits/multi/browser/opera_historysearch.rb
Original file line number Diff line number Diff line change
Expand Up @@ -10,18 +10,18 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name => HttpClients::OPERA,
:javascript => true,
:rank => ExcellentRanking, # reliable command execution
:vuln_test => %Q{
v = parseFloat(opera.version());
if (9.5 < v && 9.62 > v) {
is_vuln = true;
}
},
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :ua_name => HttpClients::OPERA,
# :javascript => true,
# :rank => ExcellentRanking, # reliable command execution
# :vuln_test => %Q{
# v = parseFloat(opera.version());
# if (9.5 < v && 9.62 > v) {
# is_vuln = true;
# }
# },
#})

def initialize(info = {})
super(update_info(info,
Expand Down
20 changes: 10 additions & 10 deletions modules/exploits/osx/browser/mozilla_mchannel.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,16 +9,16 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking

include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Remote::BrowserAutopwn

autopwn_info({
:ua_name => HttpClients::FF,
:ua_minver => "3.6.16",
:ua_maxver => "3.6.16",
:os_name => OperatingSystems::MAC_OSX,
:javascript => true,
:rank => NormalRanking,
})
#include Msf::Exploit::Remote::BrowserAutopwn
#
#autopwn_info({
# :ua_name => HttpClients::FF,
# :ua_minver => "3.6.16",
# :ua_maxver => "3.6.16",
# :os_name => OperatingSystems::MAC_OSX,
# :javascript => true,
# :rank => NormalRanking,
#})

def initialize(info = {})
super(update_info(info,
Expand Down
18 changes: 9 additions & 9 deletions modules/exploits/osx/browser/safari_metadata_archive.rb
Original file line number Diff line number Diff line change
Expand Up @@ -13,15 +13,15 @@ class Metasploit3 < Msf::Exploit::Remote
#
include Msf::Exploit::Remote::HttpServer

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name => HttpClients::SAFARI,
:ua_maxver => '2.0.2',
:os_name => [ OperatingSystems::MAC_OSX ],
:javascript => false,
:rank => ExcellentRanking, # reliable cmd execution
:vuln_test => nil,
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :ua_name => HttpClients::SAFARI,
# :ua_maxver => '2.0.2',
# :os_name => [ OperatingSystems::MAC_OSX ],
# :javascript => false,
# :rank => ExcellentRanking, # reliable cmd execution
# :vuln_test => nil,
#})

def initialize(info = {})
super(update_info(info,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,13 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Seh

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
:ua_name => HttpClients::IE,
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => OperatingSystems::WINDOWS,
# :ua_name => HttpClients::IE,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
#})

def initialize(info = {})
super(update_info(info,
Expand Down
20 changes: 10 additions & 10 deletions modules/exploits/windows/browser/apple_quicktime_mime_type.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,16 +12,16 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::Egghunter
include Msf::Exploit::RopDb

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
:ua_name => HttpClients::SAFARI,
:ua_maxver => '5.0.1',
:ua_maxver => '5.1.7',
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => nil
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => OperatingSystems::WINDOWS,
# :ua_name => HttpClients::SAFARI,
# :ua_maxver => '5.0.1',
# :ua_maxver => '5.1.7',
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil
#})

def initialize(info = {})
super(update_info(info,
Expand Down
16 changes: 8 additions & 8 deletions modules/exploits/windows/browser/apple_quicktime_rtsp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -10,14 +10,14 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
# No particular browser. Works on at least IE6 and Firefox 1.5.0.3
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => nil,
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => OperatingSystems::WINDOWS,
# # No particular browser. Works on at least IE6 and Firefox 1.5.0.3
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil,
#})

def initialize(info = {})
super(update_info(info,
Expand Down
14 changes: 7 additions & 7 deletions modules/exploits/windows/browser/apple_quicktime_smil_debug.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,13 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Seh

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => nil,
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => OperatingSystems::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil,
#})

def initialize(info = {})
super(update_info(info,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,12 +10,12 @@ class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
:javascript => true,
:rank => NormalRanking
})
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => OperatingSystems::WINDOWS,
# :javascript => true,
# :rank => NormalRanking
#})

def initialize(info = {})
super(update_info(info,
Expand Down

0 comments on commit a9de5e2

Please sign in to comment.