Skip to content

Instantly share code, notes, and snippets.

@wchen-r7
Created March 24, 2015 05:23
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save wchen-r7/c01e18127b39b476811d to your computer and use it in GitHub Desktop.
Save wchen-r7/c01e18127b39b476811d to your computer and use it in GitHub Desktop.
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::BrowserExploitServer
def initialize(info={})
super(update_info(info,
'Name' => "BES Activex Test",
'Description' => %q{
Test
},
'License' => MSF_LICENSE,
'Author' =>
[
'Unknown', # vulnerability discovery and exploit in the wild
'juan vazquez' # msf module
],
'References' =>
[
[ 'CVE', '2014-0497' ]
],
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true
},
'Platform' => 'win',
'BrowserRequirements' =>
{
:source => /script|headers/i,
:activex => [
{
:clsid => '{D27CDB6E-AE6D-11cf-96B8-444553540000}',
:method => 'LoadMovie'
}
],
:os_name => OperatingSystems::Match::WINDOWS,
:ua_name => Msf::HttpClients::IE
},
'Targets' =>
[
[ 'Automatic', {} ]
],
'Privileged' => false,
'DisclosureDate' => "Feb 5 2014",
'DefaultTarget' => 0))
end
def on_request_exploit(cli, request, target_info)
send_exploit_html(cli, 'OK')
end
end
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment