diff --git a/modules/exploits/android/browser/webview_addjavascriptinterface.rb b/modules/exploits/android/browser/webview_addjavascriptinterface.rb index c5ffe5cfde..ae8892f6db 100644 --- a/modules/exploits/android/browser/webview_addjavascriptinterface.rb +++ b/modules/exploits/android/browser/webview_addjavascriptinterface.rb @@ -49,15 +49,15 @@ class Metasploit3 < Msf::Exploit::Remote 'License' => MSF_LICENSE, 'Author' => [ 'jduck', # original msf module - 'joev' # static server + 'joev', # static server + 'nmonkee' # a python exploit written well ahead of this, see https://twitter.com/HenryHoggard/status/431412814687645696 ], 'References' => [ - ['URL', 'http://blog.trustlook.com/2013/09/04/alert-android-webview-'+ - 'addjavascriptinterface-code-execution-vulnerability/'], + ['URL', 'http://blog.trustlook.com/2013/09/04/alert-android-webview-addjavascriptinterface-code-execution-vulnerability/'], ['URL', 'https://labs.mwrinfosecurity.com/blog/2012/04/23/adventures-with-android-webviews/'], ['URL', 'http://50.56.33.56/blog/?p=314'], - ['URL', 'https://labs.mwrinfosecurity.com/advisories/2013/09/24/webview-'+ - 'addjavascriptinterface-remote-code-execution/'] + ['URL', 'https://labs.mwrinfosecurity.com/advisories/2013/09/24/webview-addjavascriptinterface-remote-code-execution/'], + ['URL', 'https://github.com/mwrlabs/drozer/blob/bcadf5c3fd08c4becf84ed34302a41d7b5e9db63/src/drozer/modules/exploit/mitm/addJavaScriptInterface.py'] ], 'Platform' => 'linux', 'Arch' => ARCH_ARMLE,