William Vu
04bcbd0253
Update module doc
2020-11-11 15:57:29 -06:00
William Vu
42bdae919b
Add SaltStack Salt REST API RCE (CVE-2020-16846)
...
Leveraging CVE-2020-25592.
2020-11-11 13:09:26 -06:00
Christophe De La Fuente
2d1b378a18
Land #14122 , Jenkins Deserialization RCE (CVE-2017-1000353)
2020-09-22 12:32:09 +02:00
Shelby Pace
2ae50e9304
Land #14025 , add Artica Proxy auth bypass / rce
2020-09-21 15:27:53 -05:00
Shelby Pace
74669f4052
Land #14135 , add tp-link command injection
2020-09-18 09:47:02 -05:00
Shelby Pace
f4bfad0439
msftidy_docs changes
2020-09-18 09:42:14 -05:00
Pietro Oliva
5f204257a5
Remove unnecessary comma, fix docs
2020-09-18 10:15:23 -04:00
Pietro Oliva
d3f68d0fe4
Fix double shell issue
2020-09-18 09:23:02 -04:00
Shelby Pace
510d119579
add steps for producing serialized object
2020-09-17 13:58:48 -05:00
Shelby Pace
f5f010a1b0
Update documentation/modules/exploit/linux/http/jenkins_cli_deserialization.md
...
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-09-17 09:11:43 -05:00
Pietro Oliva
072f35c270
-Updated module to work using CmdStager
...
-Updated documentation accordingly
-Removed unnecessary includes and simplified code
2020-09-16 19:51:15 -04:00
Shelby Pace
0f0d6a233b
Land #14074 , add Mida eFramework command injection
2020-09-16 10:24:51 -05:00
0xsysenter
b0f329a238
Update documentation/modules/exploit/linux/http/tp_link_ncxxx_bonjour_command_injection.md
...
improved documentation
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-09-15 21:00:06 +02:00
0xsysenter
a987065eae
Update documentation/modules/exploit/linux/http/tp_link_ncxxx_bonjour_command_injection.md
...
improved documentation
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-09-15 20:59:31 +02:00
William Vu
5ba3301d16
Fix nexus_repo_manager_el_injection.md scenario
...
Missed in 966194d2b7 .
2020-09-15 13:14:36 -05:00
Pietro Oliva
19d8527275
Added module documentation
2020-09-15 12:32:27 -04:00
Niboucha Redouane
3a09337935
Remove AUTH_BYPASS target
2020-09-15 01:51:34 +02:00
Brendan Coles
febe38e1ce
resolve qa comments
2020-09-11 17:16:10 +00:00
Shelby Pace
d86f9427c9
change version check and add sleep
2020-09-11 11:49:14 -05:00
Shelby Pace
926398dd6f
add remaining docs info
2020-09-10 18:25:34 -05:00
Shelby Pace
89d07c472a
add documentation
2020-09-09 18:55:23 -05:00
Brendan Coles
f5717e2a17
Add software URL
2020-08-31 15:50:37 +00:00
Niboucha Redouane
82d8b92e24
add module documentation
2020-08-30 16:57:01 +02:00
Brendan Coles
9d33ebd54a
Add Mida Solutions eFramework ajaxreq.php Command Injection
2020-08-30 12:46:00 +00:00
gwillcox-r7
27ae6c4edd
Land #13986 , Add CVE-2020-16205 exploit for Geutebruck G-CAM
2020-08-17 09:24:32 -05:00
gwillcox-r7
8f80d9b8b6
Minor updates to the documentation to reflect the fact that the username and password could be something other than root/admin
2020-08-17 09:12:02 -05:00
Spencer McIntyre
ea1f3d60f1
Adjust XML whitespace and add commands to the setup docs
2020-08-17 10:03:44 -04:00
William Vu
eda222434f
Execute commands in a shell
2020-08-14 21:46:34 -05:00
William Vu
d3febe3284
Set SSL as a DefaultOption and update RPORT
2020-08-14 21:46:34 -05:00
William Vu
46b6368597
Add Apache OFBiz XML-RPC Java deserialization
2020-08-14 21:46:34 -05:00
ddouhine
5e7c821d6d
Update geutebruck_testaction_exec.md
2020-08-14 23:15:12 +02:00
gwillcox-r7
dc21773f10
Apply updates to make the English a bit neater r.e affected versions. Also applied updates to make the markdown have bullet points so it displays better. Finally modified up the module description to explain the actual issue a bit more, but it might still need work
2020-08-13 15:13:55 -05:00
ddouhine
42a2a77a7e
Update geutebruck_testaction_exec.md
...
or now... (forgot the msftidy_docs just before)
2020-08-13 14:29:29 -05:00
ddouhine
e4f760691e
Update geutebruck_testaction_exec.md
...
it should be better now :)
2020-08-13 14:29:29 -05:00
ddouhine
a14a2fe8d2
Add documentation for Geutebruck G-CAM exploit
2020-08-13 14:29:28 -05:00
William Vu
d5d4716b1c
Update TMSH escape reliability notes
...
What's strange is that if the stars align, like if the system has been
"used" enough, the exploit is incredibly reliable. Maybe my test
environment is bonkers.
2020-07-17 06:26:00 -05:00
William Vu
c082ccd337
Make Meterpreter the default target
2020-07-17 06:10:53 -05:00
William Vu
1ae689ce5f
Improve robustness by refactoring error handling
...
tmshCmd.jsp is extremely unreliable!
2020-07-17 05:23:42 -05:00
kalba-security
df42399f61
Add installation instructions to docs
2020-07-09 17:20:07 -04:00
kalba-security
36397a3e8f
Add cmdstager support
2020-07-09 15:21:12 -05:00
kalba-security
3eceeca911
Add Pandora FMS Events Remote Code Execution module and docs
2020-07-09 15:21:12 -05:00
William Vu
3ec597ce38
Update module doc
2020-07-07 12:12:38 -05:00
William Vu
ac3b31a911
Add module doc
2020-07-06 18:07:52 -05:00
Pedro Ribeiro
9995d13316
Update IBM DRM RCE docs
2020-06-26 11:29:59 +07:00
h00die
6e93dcf8c2
Land #13645 , Trend Micro WebSecurity RCE
2020-06-22 06:51:26 -04:00
h00die
6a3633c2c0
fixing up some styles and such
2020-06-20 12:05:48 -04:00
mdisec
229760a826
Fixing document file and module improvements
2020-06-18 20:11:55 +03:00
Shelby Pace
db4006e9f6
Land #13607 , add Cayin exploit modules
2020-06-18 10:33:49 -05:00
mdisec
ff3e797246
Fixing grammers and adding additional sections
2020-06-18 12:49:53 +03:00
mdisec
a0740f4698
Add trend micro websecurity rce
2020-06-14 20:33:46 +03:00