Update the title and desc to be more descriptive

See #3759
This commit is contained in:
Tod Beardsley 2014-09-11 14:06:14 -05:00
parent d627ab7628
commit fbba4b32e0
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
1 changed files with 11 additions and 5 deletions

View File

@ -12,14 +12,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Android Open Source Platform ("Stock") Browser Cookie Stealer',
'Name' => 'Android Open Source Platform (AOSP) Browser UXSS',
'Description' => %q{
This module exploits a UXSS vulnerability present in all versions of
Android's open source stock browser before Android 4.4.
This module exploits a Universal Cross-Site Scripting (UXSS) vulnerability present in
all versions of Android's open source stock browser before Android 4.4. If successful,
an attacker can leverage this bug to scrape both cookie data and page contents from a
vulnerable browser window.
If your target URLs use X-Frame-Options, you can enable the "BYPASS_XFO" option,
which will cause a popup window to be used (this requires a click from the user
and is much less stealthy).
which will cause a popup window to be used. This requires a click from the user
and is much less stealthy, but is generally harmless-looking.
By supplying a CUSTOM_JS paramter and ensuring CLOSE_POPUP is set to false, this
module also allows running aribrary javascript in the context of the targeted URL.
Some sample UXSS scripts are provided in data/exploits/uxss.
},
'Author' => [
'Rafay Baloch', # Original discovery, disclosure