module

MS14-052 Microsoft Internet Explorer XMLDOM Filename Disclosure

Disclosed
Sep 9, 2014
Created
May 30, 2018

Description

This module will use the Microsoft XMLDOM object to enumerate a remote machine's filenames.
It will try to do so against Internet Explorer 8 and Internet Explorer 9. To use it, you
must supply your own list of file paths. Each file path should look like this:
c:\windows\system32\calc.exe

Authors

Soroush Dalili
sinn3r [email protected]

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/ms14_052_xmldom
msf auxiliary(ms14_052_xmldom) > show actions
...actions...
msf auxiliary(ms14_052_xmldom) > set ACTION < action-name >
msf auxiliary(ms14_052_xmldom) > show options
...show and set options...
msf auxiliary(ms14_052_xmldom) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.