Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15982 PoC — Adobe Flash Player 安全漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player 安全漏洞 (CVE-2018-15982)
Description:Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。 Adobe Flash Player中存在释放后重用漏洞。攻击者可利用该漏洞执行任意代码。以下产品和版本受到影响:基于Windows、macOS和Linux平台的Adobe Flash Player Desktop Runtime 31.0.0.153及之前版本,基于Windows、macOS、Linux和Chrome OS平台的Adobe Fl
Description
Aggressor Script to launch IE driveby for CVE-2018-15982.
Readme
Credits
=========
- @Ridter https://github.com/Ridter/CVE-2018-15982_EXP
- @prsecurity https://github.com/prsecurity/CVE-2018-15982

Description
===========

Aggressor Script to launch an Internet Explorer driveby attack using CVE-2018-15982 exploit for Flash player.


Affected Product Versions
================

- Adobe Flash Player <= 31.0.0.153
- Adobe Flash Player Installer<= 31.0.0.108


Usage:
======

* Click Host > Host CVE-2018-15982 Payload > Host
* Send link to victim or embed as part of other pages or a redirect
* Victim hits link with IE and outdated flash, you get a shell back in IE sandbox.


Demo
===========

![Alt text](./demo.gif)



CobaltStrike
============

* Load CVE-2018-15982.cna


File Snapshot

[4.0K] /data/pocs/890f0deec73643e9f6a475a59f09fa8372268f45 ├── [ 36K] CVE-2018-15982.cna ├── [ 13M] demo.gif └── [ 713] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.