Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use relative URL to GET payload for WinXP #4988

Merged
merged 1 commit into from Mar 26, 2015

Conversation

andygoblins
Copy link

Relative URLs are simpler, and allow the exploit to work on attack machines in NAT environments.

Example: attack machine is NATed and does not have a DNS hostname. SRVHOST must be 0.0.0.0 but the victim cannot access the attacker from Rex::Socket.source_address. In this situation, a relative URL allows the victim to still GET the malicious .gif without needing the hostname at all because the victim is already knows the public hostname/IP of the attacker's machine.

Relative URLs are simpler, and allow the exploit to work on attack machines in NAT environments. Example: attack machine is NATed and does not have a DNS hostname. SRVHOST must be 0.0.0.0 but the victim cannot access the attacker from Rex::Socket.source_address
@wchen-r7
Copy link
Contributor

Works for me

@wchen-r7 wchen-r7 merged commit 89e27d9 into rapid7:master Mar 26, 2015
@andygoblins andygoblins deleted the patch-1 branch March 27, 2015 15:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants