Rapid7 Vulnerability & Exploit Database

Adobe Flash Player DeleteRangeTimelineOperation Type-Confusion

Back to Search

Adobe Flash Player DeleteRangeTimelineOperation Type-Confusion

Disclosed
04/27/2016
Created
03/19/2019

Description

This module exploits a type confusion on Adobe Flash Player, which was originally found being successfully exploited in the wild. This module has been tested successfully on: macOS Sierra 10.12.3, Safari and Adobe Flash Player 21.0.0.182, Firefox and Adobe Flash Player 21.0.0.182.

Author(s)

  • Genwei Jiang
  • bcook-r7

Platform

OSX

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/osx/browser/adobe_flash_delete_range_tl_op
msf exploit(adobe_flash_delete_range_tl_op) > show targets
    ...targets...
msf exploit(adobe_flash_delete_range_tl_op) > set TARGET < target-id >
msf exploit(adobe_flash_delete_range_tl_op) > show options
    ...show and set options...
msf exploit(adobe_flash_delete_range_tl_op) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;