adfoster-r7
672fb9ce9f
Land #17460 , add support for feature kerberos authentication
2023-01-26 17:47:27 +00:00
space-r7
153af9fb68
Land #17407 , add Cacti unauth command injection
2023-01-23 13:06:46 -06:00
Grant Willcox
7e23c34e6c
Apply fixes per code review
2023-01-17 12:44:22 -06:00
h00die-gr3y
da3ae22135
added documentation
2023-01-17 12:44:20 -06:00
h00die
0ac4d3d2e6
doc how to set permissions on service
2023-01-13 17:07:17 -05:00
Spencer McIntyre
3ddcf73c2b
Remove the QUICK option altogether
...
Use blocks to check whether each service is exploitable as they are
enumerated. With this change, it is the service and path enumeration
halts once an exploitable one is found that yields a session.
Also all files are registered for cleanup.
2023-01-13 17:06:42 -05:00
h00die
90a12cf3b0
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
h00die
c52eb09cbb
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
adfoster-r7
eddac9321c
Merge 6.2.36 master into kerberos feature branch
2023-01-13 17:31:02 +00:00
Grant Willcox
f39973de86
Fix up missing option in documentation and also add some additional validation on server response.
2023-01-04 17:02:05 -06:00
h00die-gr3y
c7b59b4815
updates based on gwillcox-r7 review comments
2023-01-04 17:02:04 -06:00
h00die-gr3y
6801cbd21e
updated Limitation section
2023-01-04 17:02:03 -06:00
h00die-gr3y
fc6acdab6a
added documentation
2023-01-04 17:01:59 -06:00
Christophe De La Fuente
868072e6c8
Land #17317 , Fix various WinRM modules
2023-01-03 19:57:07 +01:00
Christophe De La Fuente
20d70799a7
Land #17298 , Add opentsdb_yrange_cmd_injection module and docs
2022-12-23 13:38:58 +01:00
ErikWynter
8f96746551
fix typo and add credit for discovery
2022-12-23 11:11:31 +02:00
ErikWynter
4c2dfe0279
add cacti_unauthenticated_cmd_injection
2022-12-22 17:55:45 +02:00
Christophe De La Fuente
2a28af208d
Land #16992 , Syncovery For Linux - Auth. RCE (CVE-2022-36534)
2022-12-14 13:43:00 +01:00
Christophe De La Fuente
d6a5590c06
Land #17265 , Add Exploit for CVE-2020-25736
2022-12-13 18:49:56 +01:00
space-r7
6885e576ed
add note about uninstalling the helper tool
2022-12-12 16:35:44 -06:00
Tod Beardsley
97a9fb6650
Update docs for Acronis module
...
Note that uninstalling the module doesn't necessarily uninstall the vulnerable service, so call that out to people who are testing this module so they have a chance to do more thorough cleanup after testing.
2022-12-06 11:08:31 -06:00
Christophe De La Fuente
e7e2849f6d
Land #17183 , Zimbra fixes
2022-12-06 15:38:37 +01:00
bwatters
54cd055276
Land #17286 , CVE-2021-22015 vCenter priv esc
...
Merge branch 'land-17286' into upstream-master
2022-12-05 09:31:01 -06:00
whoot
04e5aa3033
apply suggestions
2022-12-02 16:05:01 +01:00
Christophe De La Fuente
d3057f15b2
Land #17275 , Add Exploit For CVE-2022-41082 (ProxyNotShell)
2022-11-30 18:16:19 +01:00
Ashley Donaldson
2d397d37db
Removed warning that I think was actually just a bug - now fixed
2022-11-30 13:14:19 +11:00
bwatters
3462dc6bf4
Land #17087 , remote control collection rce
...
Merge branch 'land-17087' into upstream-master
2022-11-28 14:29:52 -06:00
Spencer McIntyre
009c6c5350
Add the MaxBackendRetries datastore option
2022-11-28 09:45:04 -05:00
ErikWynter
78dfaa12ef
add opentsdb_yrange_cmd_injection module and docs
2022-11-24 21:37:24 +02:00
adfoster-r7
0aa0884e26
Land #17296 , add warning about external links
2022-11-24 10:30:44 +00:00
Spencer McIntyre
6350daf2d8
Land #17273 , F5 exploit module CVE-2022-41800
...
F5 exploit module CVE-2022-41800 (authenticated RCE in RPM code)
2022-11-23 17:57:18 -05:00
Ron Bowes
28a68ede8c
Merge branch 'master' into zimbra-fixes
2022-11-23 12:50:56 -08:00
Jeffrey Martin
453cfc5939
spelling change per review
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2022-11-23 13:26:19 -06:00
Jeffrey Martin
cb8e023734
add warning about external links
...
Links to external resources not controlled by the project maintainers
are subject to bitrot and malicious take over. Warnings seem appropriate.
2022-11-23 12:08:05 -06:00
Spencer McIntyre
3f58bfe11e
Check that the target is Exchange Server 2019
2022-11-23 10:47:10 -05:00
h00die
181b8e4eea
review comments
2022-11-21 15:53:37 -05:00
h00die
d4536b24a6
remote control collection rce
2022-11-21 15:53:37 -05:00
Spencer McIntyre
ed99f2f67f
Bypass EEMS M1
2022-11-21 11:13:16 -05:00
h00die
6877304bac
exploit for cve-2021-22015 vcenter priv esc
2022-11-20 11:29:49 -05:00
Grant Willcox
8ca7550062
Land #17257 , Adding exploit for ChurchInfo 1.2.13-1.3.0 RCE (CVE-2021-43258)
2022-11-18 19:27:10 -06:00
Grant Willcox
237eb904d4
Add in fixes for documentation examples and then update the code to fix some bugs
2022-11-18 18:30:07 -06:00
Grant Willcox
713323f2cb
Add in Docker setup documentation
2022-11-18 18:22:11 -06:00
Grant Willcox
85a6770973
Add additional checks, a check method, and fix up some doc errors
2022-11-18 18:22:06 -06:00
m4lwhere
b9ecdb3bc2
Use TARGETURI, registered cleanup, implment cookie_jar, and perform response checks and documentation
2022-11-18 18:21:27 -06:00
m4lwhere
a33a313544
Adding exploit for ChurchInfo 1.3.0
2022-11-18 18:21:08 -06:00
Spencer McIntyre
bc89721d7a
Add module docs, fix ProxyShell versions
2022-11-18 17:42:27 -05:00
space-r7
3d5708e3e6
Land #17271 , add f5 big-ip csrf exploit
2022-11-18 16:19:09 -06:00
space-r7
162b0daf3b
add new options and usage of pre-compiled exploit
...
also updates documentation with new option
descriptions
2022-11-17 17:20:41 -06:00
Christophe De La Fuente
d1a7170020
Land #17021 , Gitea Git fetch RCE module - CVE-2022-30781
2022-11-17 12:28:29 +01:00
Ron Bowes
d0e109b842
Check in exploit module for CVE-2022-41800
2022-11-16 12:04:18 -08:00