msutovsky-r7
|
7b092aeedb
|
Land #20806, adds module for unauthenticated command injection in Control Web Panel API (CVE-2025-67888)
Adds module for Control Web Panel API Command Injection (CVE-2025-67888)
|
2026-01-14 15:44:25 +01:00 |
|
Martin Sutovsky
|
2809ff8235
|
Fix archs
|
2026-01-13 14:24:04 +01:00 |
|
JohannesLks
|
4678d82c6d
|
fix: architecture specification
|
2026-01-12 17:03:08 +01:00 |
|
jheysel-r7
|
ae4a5ac986
|
Merge pull request #20786 from zeroSteiner/feat/lib/mod-merge-target-info
Merge target info into the module info
|
2026-01-08 18:01:14 -08:00 |
|
JohannesLks
|
8bd24f4ecf
|
Fix:n- Use Rex::Stopwatch for time-based checkn- Change CheckCode::Appears to CheckCode::Vulnerable - Add cmd/base64 encoder in Payload hash for Unix Command target - Simplify execute_command by removing manual base64 encoding
|
2026-01-08 12:38:20 -05:00 |
|
JohannesLks
|
c859f18557
|
fix: - Hardcode endpoint path in send_request_cgi - Use idiomatic Ruby single-line conditional - Remove unnecessary return keyword
|
2026-01-08 15:34:11 +01:00 |
|
Xorriath
|
2030d19438
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-07 14:45:03 +02:00 |
|
Xorriath
|
2ef1b9fbae
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-07 14:44:51 +02:00 |
|
Xorriath
|
a676b05928
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-06 12:35:32 +02:00 |
|
Xorriath
|
236d94ee54
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-06 12:35:17 +02:00 |
|
Xorriath
|
b35d74b305
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-06 12:35:01 +02:00 |
|
Lukas Johannes Möller
|
982f5e0e28
|
control_web_panel_api_cmd_exec.rb aktualisieren
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2025-12-26 16:04:42 +01:00 |
|
Lukas Johannes Möller
|
0bfb77d74f
|
control_web_panel_api_cmd_exec.rb aktualisieren
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2025-12-26 16:04:12 +01:00 |
|
kali
|
2448429502
|
Add Prison Management System 1.0 auth RCE (CVE-2024-48594)
|
2025-12-26 08:08:49 +02:00 |
|
JohannesLks
|
5329e1472e
|
fix: PR and Lint
|
2025-12-24 06:39:13 -05:00 |
|
JohannesLks
|
455275d087
|
add module for CVE-2025-67888
|
2025-12-23 19:21:34 -05:00 |
|
sfewer-r7
|
0c947d05ab
|
add in the AKB analysis
|
2025-12-19 15:38:43 +00:00 |
|
sfewer-r7
|
5c6c8a3956
|
better check result given we have the version string
|
2025-12-19 15:38:27 +00:00 |
|
sfewer-r7
|
a4dba96712
|
add in the HPE OneView exploit
|
2025-12-19 15:30:53 +00:00 |
|
Spencer McIntyre
|
602adeb4c5
|
Mass rubocop changes
|
2025-12-18 10:08:31 -05:00 |
|
Spencer McIntyre
|
8945267db6
|
Remove redundant Platform and Arch definitions
|
2025-12-17 16:12:31 -05:00 |
|
Spencer McIntyre
|
2103e1b5f6
|
Fix a bug in the platform definition
|
2025-12-17 15:57:58 -05:00 |
|
sfewer-r7
|
795c38c524
|
Combine the 7.x and 6.x targets together, as Linux payloads work on 7.x also, so this target is Unix and Linux. This leaves the 8.x target Unix only due to IMA appraisal.
|
2025-11-28 10:12:02 +00:00 |
|
sfewer-r7
|
014312873c
|
get both unix and linux payloads working on 6.x. Add a note to the docs about setting a gateway.
|
2025-11-27 20:28:44 +00:00 |
|
sfewer-r7
|
f5e8aa83be
|
add in exploit support for FortiWeb versions 6.x which are vulnerable, but no longer under support from the vendor.
|
2025-11-27 12:43:19 +00:00 |
|
Brendan
|
e998b91aee
|
Merge pull request #20717 from sfewer-r7/fortiweb-exploit-rce
Add exploit module for Fortinet FortiWeb (CVE-2025-64446 + CVE-2025-58034)
|
2025-11-25 14:14:31 -06:00 |
|
sfewer-r7
|
fa03ac8b66
|
on 7.4.8 the command nohup is not available. we must execute our payload in a new session, so we use a python stub to essentially call setsid. This has been tested to work on both 8.0.1 and 7.4.8. Teh payload cmd/unix/reverse_python isnot working as it previously was, so I am removing from the list of confirmed paylaods. The other two, cmd/unix/reverse_bash and cmd/unix/reverse_openssl work fine on both versions
|
2025-11-25 11:25:41 +00:00 |
|
sfewer-r7
|
8a054b74db
|
improve check logic to actualy parse JSON result for expected reply, tested against 8.0.1 and 7.4.8
|
2025-11-25 11:22:43 +00:00 |
|
sfewer-r7
|
b8cefb1af9
|
add nohup when bootstraping the payload to avoid the scenario when the parent dies it tears down our payload child process
|
2025-11-21 15:54:41 +00:00 |
|
sfewer-r7
|
aff76622fa
|
add in the unauth RCE exploit module for CVE-2025-64446 + CVE-2025-58034
|
2025-11-21 12:22:25 +00:00 |
|
Brendan
|
bb728c44d7
|
Merge pull request #20560 from cdelafuente-r7/feat/mitre/T1021
Add T1021 "Remote Services" MITRE technique and sub-technique references
|
2025-11-20 11:19:31 -06:00 |
|
Christophe De La Fuente
|
179a545312
|
Remove false positive references
|
2025-11-19 17:34:15 +01:00 |
|
Diego Ledda
|
110cb837aa
|
Merge pull request #20672 from h00die-gr3y/centreon_auth_rce
Centreon authenticated command injection leading to RCE via broker engine "reload" parameter [CVE-2025-5946]
|
2025-11-05 16:29:29 +01:00 |
|
h00die-gr3y
|
34c424f473
|
update based on dledda-r7 comments
|
2025-11-05 09:20:13 +00:00 |
|
h00die-gr3y
|
61dfc293d9
|
update based on dledda-r7 comments
|
2025-11-03 14:37:23 +00:00 |
|
h00die-gr3y
|
85b4233345
|
updated module based on review comments and added documentation
|
2025-11-03 10:21:31 +00:00 |
|
h00die-gr3y
|
83e7fc2667
|
update attackerkb reference
|
2025-11-02 18:26:34 +00:00 |
|
h00die-gr3y
|
e01456bcf4
|
init commit module
|
2025-11-02 17:45:22 +00:00 |
|
Christophe De La Fuente
|
0a755ea03a
|
Add references to MITRE ATT&CK T1021 - Remote Services
|
2025-10-14 16:25:30 +02:00 |
|
Brendan
|
91c0adb17f
|
Merge pull request #20585 from vognik/CVE_2025_60787
Add MotionEye Authenticated RCE (CVE-2025-60787)
|
2025-10-09 13:50:25 -05:00 |
|
Vognik
|
267a26b763
|
code review changes from smcintyre-r7@
|
2025-10-09 21:51:31 +04:00 |
|
Spencer McIntyre
|
9dc5696cc4
|
Update dash characters in module references
|
2025-10-07 14:03:32 -04:00 |
|
Spencer McIntyre
|
fd21209e4d
|
Add missing CVEs from VulnCheck
|
2025-10-07 13:59:13 -04:00 |
|
Spencer McIntyre
|
cf3abc280e
|
Merge pull request #20533 from cdelafuente-r7/feat/mitre/add_ref
Add T1003 "OS credential dumping" MITRE technique reference
|
2025-09-18 11:56:33 -04:00 |
|
Diego Ledda
|
1314f5d0bb
|
Merge pull request #20455 from Chocapikk/aitemi_m300_time_rce
Add unauthenticated RCE on Shenzhen Aitemi M300 MT02 (CVE-2025-34152)
|
2025-09-10 10:12:41 +02:00 |
|
Christophe De La Fuente
|
7ce2bdc979
|
Add T1003 "OS credential dumping" MITRE technique
|
2025-09-09 10:45:46 +02:00 |
|
Brendan
|
f1dffd3ad6
|
Merge pull request #20480 from msutovsky-r7/exploit/pretalx/file-rw
Adds modules for Pretalx File Read/Limited File Write (CVE-2023-28459, CVE-2023-28458)
|
2025-08-27 15:46:39 -05:00 |
|
Martin Sutovsky
|
d49870211b
|
Adding exceptions to exploit module, bug fix for aux module, adds documentation for exploit module
|
2025-08-22 15:26:46 +02:00 |
|
Martin Sutovsky
|
4e113b1768
|
Addresses comments, adds exception for Pretalx, modifies aux module
|
2025-08-22 13:59:50 +02:00 |
|
Martin Sutovsky
|
2e9b5453ec
|
Adds description
|
2025-08-21 15:29:08 +02:00 |
|