Valentin Lobstein
628c5ee7af
Update Gladinet modules: fix AutoCheck in auxiliary modules and update documentation with real outputs
2026-02-04 08:38:32 +01:00
Valentin Lobstein
478345506e
Add Gladinet CentreStack/Triofox auxiliary modules and exploit
2026-02-04 08:38:31 +01:00
Diego Ledda
c007d3a89f
Merge pull request #20674 from msutovsky-r7/exploit/win/cve-2025-59287
...
Adds module for unauthenticated deserialization in WSUS (CVE-2025-59287)
2025-11-12 12:40:32 +01:00
Martin Sutovsky
6aeb81a499
Adds MITRE reference, updates docs
2025-11-10 18:32:13 +01:00
h00die
fb02ec4554
remove 4 space indents in options
2025-11-07 15:42:27 -05:00
h00die
caa2873a14
more adjustments
2025-11-07 15:42:27 -05:00
h00die
d8c73f6684
replace bold options with h3
2025-11-07 15:42:23 -05:00
Martin Sutovsky
5ad76f82d1
Adds more docs, adds description
2025-11-04 13:49:43 +01:00
Martin Sutovsky
98467f3a21
Adds msf payload to module, adds docs
2025-11-04 12:28:03 +01:00
remmons-r7
eddc81f10c
Update commvault_rce_cve_2025_57790_cve_2025_57791.md
...
Update the example usage terminal output to reflect module changes.
2025-09-15 11:37:57 -05:00
remmons-r7
b754b7027c
Merge branch 'rapid7:master' into commvault_rce_cve_2025_57790_cve_2025_57791
2025-09-15 10:47:38 -05:00
jheysel-r7
a3a1e146f0
Apply suggestions from code review
2025-09-11 09:40:34 -07:00
Martin Sutovsky
00bd70751c
Updates docs
2025-09-11 10:41:28 +02:00
remmons-r7
8ffc9a3db4
Update commvault_rce_cve_2025_57790_cve_2025_57791.md
...
Updating module type from "multi" to "windows" in documentation :)
2025-09-05 23:13:10 -05:00
remmons-r7
e661388ce6
Revise and move commvault_rce_cve_2025_57790_cve_2025_57791.md
...
New documentation for the Commvault CVE-2025-57790/CVE-2025-57791 RCE module, updated to reflect module changes.
2025-09-05 23:06:16 -05:00
Martin Sutovsky
a8e97e034c
Adds docs
2025-08-26 13:06:57 +02:00
Martin Sutovsky
b43b4c9f37
Updates library, addressing comments
2025-08-25 17:49:34 +02:00
Martin Sutovsky
da5b20faa4
Creating lib file for shared functionality, adding more reliable check method for CVE-2025-34511, docs init
2025-08-20 10:59:22 +02:00
sfewer-r7
0a923a611d
reword the language around our usage of CVE-2025-53770 to make it clear that this module is leveraging the authentication bypass for both CVE-2025-49706 and CVE-2025-53771, and the unsafe deserialization for CVE-2025-49704.
2025-08-06 15:33:57 +01:00
sfewer-r7
3237151512
add in the documentation
2025-07-25 14:40:12 +01:00
cgranleese-r7
adff497bd2
Updates msf5 as well
2025-07-17 11:51:29 +01:00
cgranleese-r7
469f102596
Updates docs to reflect new default prompt
2025-07-17 09:53:40 +01:00
Diego Ledda
ce6e0d1164
Merge pull request #20096 from h00die-gr3y/CVE-2025-30406
...
Gladinet CentreStack/Triofox ASP.NET ViewState Deserialization [CVE-2025-30406]
2025-05-28 13:46:13 +02:00
h4x-x0r
e9c88b55f2
cleanup
2025-05-09 22:39:30 +01:00
h4x-x0r
803581ab81
CVE-2024-7399
2025-05-09 17:27:22 +01:00
h00die-gr3y
908094da6b
update documentation with privileged escalation to system
2025-05-02 20:59:07 +00:00
h00die-gr3y
1c5be6154a
second release including Triofox + documentation
2025-05-02 20:42:14 +00:00
Jack Heysel
fa0c29837e
Update author, rubocop, msftidy_docs
2025-03-27 09:36:10 -07:00
Jack Heysel
74cc1d313c
Add documentation
2025-03-27 09:28:44 -07:00
adfoster-r7
aaf95f9134
Apply suggestions from code review
2024-08-28 18:46:08 +01:00
igomeow
7e9f52dd0b
Github release
2024-08-26 23:02:53 +02:00
igomeow
b3605bd951
Documentation
2024-08-26 19:59:17 +02:00
h4x-x0r
8732d7cd58
LG Simple Editor Command Injection (CVE-2023-40504) Module
...
Exploit Module and Documentation for the LG Simple Editor Command Injection (CVE-2023-40504)
2024-08-07 05:16:25 +01:00
dledda-r7
48c69b99fb
Land #19344 , FortiClient EMS FCTID SQLi to RCE fix for 7.2.x
2024-07-31 09:43:19 -04:00
Jack Heysel
c05aebe248
Formatting
2024-07-24 11:16:26 -07:00
Jack Heysel
e9cbb9287c
Add support for 7.2.x
2024-07-24 10:45:38 -07:00
bwatters
636c72965c
Land #19084 , Add CVE-2022-1373 and CVE-2022-2334 exploit chain
...
Merge branch 'land-19084' into upstream-master
2024-07-19 12:22:25 -05:00
Christophe De La Fuente
ecb628eaab
Add module and documentation
2024-06-20 15:30:54 +02:00
Jack Heysel
dc70aa0896
Land #19247 , PHP CGI Arg injection RCE
...
XAMPP installs running on Windows system configured to use Japanese or
Chinese (simplified or traditional) locales are vulnerable to a PHP CGI
argument injection vulnerability. This exploit module returns a session
running in the context of the Administrator user
2024-06-17 11:27:38 -07:00
Stephen Fewer
d7531ef74c
fix typo in documentation
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 15:09:56 +01:00
Spencer McIntyre
18fe758416
Finish up and document the deserialization RCE
2024-06-12 08:58:37 -04:00
Stephen Fewer
2d63038196
Update documentation/modules/exploit/windows/http/rejetto_hfs_rce_cve_2024_23692.md
...
fix a typo in the documentation.
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-06-11 16:23:56 +01:00
sfewer-r7
bf9b3f1d2a
add documentation
2024-06-10 17:41:55 +01:00
sfewer-r7
c8208704be
add in exploit module for CVE-2024-23692
2024-06-06 18:04:14 +01:00
h00die
a89d418725
review of northstar c2
2024-05-16 15:17:28 -04:00
h00die
19af4ae4e6
mermaid flow chart
2024-04-24 16:54:02 -04:00
h00die
9fb217fb59
northstar c2 exploit
2024-04-24 16:54:02 -04:00
Imran E. Dawoodjee
50a303a6e5
Update references and documentation
2024-04-13 18:21:05 +08:00
Imran E. Dawoodjee
6268235cd3
Add CVE-2022-1373 and CVE-2022-2334 exploit chain
2024-04-13 18:10:45 +08:00
Jack Heysel
dae9657433
FortiClient EMS Exploit Module
2024-04-12 10:00:07 -07:00