Commit Graph

1871 Commits

Author SHA1 Message Date
h00die d5ba1afbec fix URLs not resolving
fix URLs not resolving

add csv export to references

fix URLs not resolving

pdf not pd

missed a url change

remove extra recirectedfrom fields

remove extra file

fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
space-r7 db00991f26 Land #16150, add nagios xi web shell upload 2022-02-11 11:45:06 -06:00
Jake Baines e1da95243f Always clean up the created job 2022-02-10 17:39:07 -08:00
Jake Baines e18492a88a Update modules/exploits/linux/http/nagios_xi_autodiscovery_webshell.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-02-09 15:35:38 -05:00
Jake Baines 0a78dd78ec Used suggested method for defining user webshell, used suggested depth configuration, and used vars_get in a couple of places 2022-02-08 18:20:03 -08:00
space-r7 bed067dda0 Land #16125, add ARCH_CMD for GXV3140 support 2022-02-08 12:24:42 -06:00
Jake Baines 0fcc7e7733 Fixed spelling errors in descriptions 2022-02-06 02:55:17 -08:00
Jake Baines 2e0915fbd4 Fix the Claroty team name 2022-02-06 02:47:43 -08:00
Jake Baines 9758251278 Initial commit of CVE-2021-37343 2022-02-05 18:21:18 -08:00
Spencer McIntyre 274b954c58 Land #16123, fix reference URL in cisco_ucs_rce 2022-02-01 17:06:59 -05:00
Spencer McIntyre 06fb748402 Add the missing full disclosure URL reference 2022-02-01 17:06:37 -05:00
space-r7 837fdf7c5e Land #16128, add cisco rv unauth rce 2022-02-01 10:34:57 -06:00
Jake Baines ccedcfefab Added exploit for CVE-2021-1472/CVE-2021-1473 2022-01-29 18:56:53 -08:00
Brendan Coles feebf25ad4 Add support for GXV3140 models and ARCH_CMD busybox telnetd payload 2022-01-29 19:38:57 +00:00
Brendan Coles a4fcddca8e Rename to grandstream_gxv31xx_settimezone_unauth_cmd_exec 2022-01-29 19:24:09 +00:00
swapnil shinde 70d4013610 fix faulty URL ref #16078 removed faulty url
fix faulty URL ref #16078 , i searched for FULL_DISC tool in Cisco but i cant find anything related to this so i removed it. if that is meant by the issue.
2022-01-29 22:33:33 +05:30
Grant Willcox 44f040ad78 Land #16056, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-24 21:03:46 -06:00
Grant Willcox 15751a0f78 Minor langauge fix and final typo 2022-01-24 21:01:34 -06:00
Jake Baines 04d06a2df1 Switched to proper fail_with calls in exploit failure 2022-01-24 04:13:43 -08:00
Jake Baines 2c989ec714 Addressed multiple review comments (spelling, doc details, randomization, etc) 2022-01-22 14:09:58 -08:00
Grant Willcox 8bb3e39fd7 Land #16036, Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 10:58:42 -06:00
Brendan Coles ee2feb1207 Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 00:04:15 +00:00
Grant Willcox 8852eaa6b8 Land #16049 - Reference Fixes 2022-01-18 13:46:25 -06:00
Jake Baines 4ebb702405 Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-15 12:46:56 -08:00
Pedro Ribeiro 053fbe2a28 fix cisco advisory links 2022-01-13 18:55:39 +00:00
Pedro Ribeiro ea00da0a03 fix NUUO advisory links 2022-01-13 18:54:56 +00:00
Jake Baines 264f2bc03f Added the AttackerKB analysis 2022-01-11 03:17:45 -08:00
Jake Baines b0941f746f Added link to R7 blog 2022-01-10 13:24:33 -08:00
Jake Baines d4ee9a0183 Initial commit of CVE-2021-20039 exploit 2022-01-10 12:43:50 -08:00
Jeffrey Martin 21a6a18d92 trade URI.encode & URI.escape for Ruby 3
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.

Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1) this should equal.
2021-11-22 14:11:03 -06:00
Spencer McIntyre 9fa65092d1 Switch to the new Rex stopwatch function 2021-11-16 10:12:57 -05:00
dwelch-r7 73e55fcaee Land #15665, Add Meterpreter compatibility metadata 2021-10-29 12:45:26 +01:00
William Vu 78ebc89106 Improve sleep timeout using science 2021-10-27 22:49:41 -05:00
William Vu 3c4bc600f7 Link to open() in perldoc 2021-10-27 19:31:03 -05:00
William Vu c419ca04bd Warn when LPORT isn't 443 2021-10-27 19:31:03 -05:00
William Vu 14421ed5f5 Refactor elapsed time calculation 2021-10-27 19:31:03 -05:00
William Vu 7bbf0305c0 Fix elapsed time calculation using monotonic clock
Hat tip @adfoster-r7.
2021-10-27 19:31:03 -05:00
William Vu 3f9b22dbb7 Add Sophos UTM CVE-2020-25223 exploit 2021-10-27 19:31:03 -05:00
wvu 64654a3134 Merge branch 'master' into suitecrm_log_file_rce 2021-10-22 22:11:51 -05:00
M. Cory Billington e90a2a9274 Added CVE 2021-10-22 18:55:37 -05:00
William Vu f270d3ef7a Comment path traversals 2021-10-20 14:16:46 -05:00
William Vu 83500a17d4 Update vmware_vcenter_analytics_file_upload 2021-10-14 16:58:04 -05:00
William Vu 42ed1b6eef Add Windows support to CVE-2021-26084 exploit 2021-10-14 16:58:04 -05:00
William Vu 262b5e09f0 Add VMware vCenter Server CVE-2021-22005 exploit 2021-10-06 16:43:57 -05:00
adfoster-r7 28eab4d871 Add Meterpreter compatibility metadata 2021-10-06 13:54:51 +01:00
space-r7 12af64c4d8 Land #15604, add buffer overflow G-Cam module 2021-09-16 13:02:57 -05:00
Your Name a2f83c22ba Add Pattern Create 2021-09-16 08:22:57 +01:00
Spencer McIntyre 480dec9a1e Land #15658, Add module for CVE-2021-32682 2021-09-14 14:09:27 -04:00
space-r7 278807be98 check contents of json after attempted upload 2021-09-14 11:36:28 -05:00
adfoster-r7 1499b1988e Land #15609, Add Meterpreter compatibility commands 2021-09-13 15:21:03 +01:00