Spencer McIntyre
68eae1664e
Tweak the follina docs
2022-08-25 17:10:59 -04:00
bwatters
683132242c
fix up the uri_space maths
2022-08-25 16:08:26 -05:00
bwatters
115955591b
Fix up the Unicode coversions and update docs
2022-08-17 13:21:56 -05:00
bwatters
ef9f5ca463
Add rtf support to cve-2022-30190 AKA Follina
2022-06-30 17:30:06 -05:00
bwatters
c751ef46c9
Land #16635 , Add 0-day MSWord RCE #Follina CVE-2022-30190
...
Merge branch 'land-16635' into upstream-master
2022-06-06 14:41:31 -05:00
RAMELLA Sébastien
3ab06461af
fix. second review
2022-06-02 00:58:20 +04:00
RAMELLA Sébastien
dd1814903c
fix. SRVHOST default value
2022-06-02 00:07:15 +04:00
RAMELLA Sébastien
8c19a02835
fix. first review
2022-06-01 20:15:08 +04:00
RAMELLA Sébastien
7f89e92da3
add more informations about
2022-05-31 00:12:30 +04:00
RAMELLA Sébastien
97921b4ed9
fix chmod 644
2022-05-30 22:11:35 +04:00
RAMELLA Sébastien
dfc226cf5f
add. Supposed 0day MSWord RCE
2022-05-30 21:23:18 +04:00
Brendan Coles
94ed9ae28b
Modules: Prefer CVE references over cve.mitre.org URL references
2022-04-19 20:42:23 +00:00
sjanusz
bbf9e3163a
Fix file reads on Windows for binary files
2022-03-21 12:47:39 +00:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
Spencer McIntyre
2f6710e02e
Remove the Not_Hosted target
...
It's not currently working and Metasploit should just handle everything
2021-12-08 17:22:44 -05:00
bwatters
852230c739
Fix bug brought in by importing Msf::Post::File
...
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
2021-12-08 10:36:27 -06:00
bwatters
14064ff3f9
Update module description and remove extra module.
2021-11-29 15:23:02 -06:00
bwatters
2a68b9ae9f
Add targets to track http server status
2021-11-17 07:54:49 -06:00
RAMELLA Sébastien
38973510f7
update modules (auxiliary and exploit)
2021-11-09 15:18:58 +04:00
surya
2f00ccfbc8
Linted Stuff
2021-10-08 03:04:34 +05:30
surya
59ffc44dbc
Cleared a minor error
2021-10-08 02:57:13 +05:30
surya
d1e3a104db
Merged branches
2021-10-08 02:55:39 +05:30
surya
4d4b51d158
=> Added .gitignore
...
=> Added Deobfuscated HTML Payload
=> Removed Extra Author Credits
=> Made SRVHOST AND SRVPORT MANDATORY
=> generate_uri replaced with builtin get_uri
2021-10-08 02:50:27 +05:30
suryasaradhi
cbbb83073f
Added Authors
2021-10-05 21:03:45 +05:30
surya
48388133dd
Msftidy up code v2
2021-10-05 02:33:36 +05:30
surya
171f114ce2
Msftidy up code v1
2021-10-05 02:10:33 +05:30
surya
3461c7aef6
Added module for CVE-2021-40444
2021-10-05 01:44:34 +05:30
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
Brendan Coles
a1c316c679
msftidy: Fix exploit module checks for author and stack buffer overflow
2021-02-13 04:10:13 +00:00
dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
gwillcox-r7
6ed05df308
Land #13517 , Documalis Free PDF Editor and Free PDF Scanner JPEG PDF Stack Buffer Overflow
2020-08-03 14:11:50 -05:00
gwillcox-r7
b64e843d9f
Remove CVE reference for now until we can add in a proper CVE reference, fix some alignment issues for Notes section
2020-08-03 13:06:45 -05:00
gwillcox-r7
513f2dac9b
Add in Notes section to exploit
2020-08-03 11:00:17 -05:00
gwillcox-r7
b13b3b3d77
Add in a temp valid CVE number to see if that will get builds to pass or not
2020-07-31 17:49:14 -05:00
gwillcox-r7
8ad94e5484
Remove trailing new line at end of the line that was causing the last commit to fail for reasons other than the CVE being missing
2020-07-31 17:47:58 -05:00
gwillcox-r7
2d5fa912c3
Apply fixes to documentation to fix some errors and make it msftidy_docs.rb compliant. Also apply RuboCop updates to the module
2020-07-31 17:36:51 -05:00
gwillcox-r7
e355bc783c
Update the module's description and title to be more accurate, and also remove the EDB field and replace it with a temporary CVE field
2020-07-31 16:07:33 -05:00
gwillcox-r7
96859ba492
Add in the proper instructions corresponding to the gadgets that we use for the SEH handler overwrite within the exploit
2020-07-31 15:50:49 -05:00
gwillcox-r7
907bedca34
Edit up the exploit to correct the size calculation logic so it correctly calculates the maximum size of the payload and ensures we don't overrun this.
2020-07-31 15:36:37 -05:00
Adam Galway
1a2bf98222
creates standard elog & updates exisiting usages
2020-06-22 12:48:39 +01:00
metacom
cefcb6c851
new modules with both programs documalis_pdf_editor_and_scanner
2020-06-19 21:39:16 -05:00
h00die
0b4c047411
doc cleanup
2020-03-24 08:47:21 -04:00
Alan Foster
af9d2a28de
Fix msftidy warnings
2020-02-26 14:56:08 +00:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
William Vu
22a75c7bee
Revert "Fix style"
...
This reverts commit 9f81aeb4ad .
2020-02-04 10:10:46 -06:00
Dave York
7b14442ab0
replace strings with bools
2020-01-14 20:47:27 -05:00
h00die
3b2a54a599
add aka to some modules
2019-12-10 09:53:13 -05:00
William Vu
32334c2386
Update all module splats from http:// to https://
2019-08-15 18:10:44 -05:00
Jacob Robles
a0e90c0848
Remove references to doc.microsoft.com bulletin
...
MSB references point to this location
2019-05-23 07:01:21 -05:00