Jack Heysel
216ffec555
Add Linux compatibility
2024-05-13 10:11:56 -07:00
h00die
01d86b6966
spell jupyter better than the advisory
2024-04-17 16:43:05 -04:00
h00die
f6b65993ac
ipynb vscode exploit
2024-03-22 16:26:03 -04:00
Jack Heysel
2b90d33aef
Land #18618 , Add OpenNMS privesc and auth RCE
...
This module exploits built-in functionality in OpenNMS Horizon in order
to execute arbitrary commands as the opennms user. For versions 32.0.2
and higher, this module requires valid credentials for a user with
ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST.
For versions 32.0.1 and lower, credentials are required for a user with
ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges.
2024-03-20 12:54:16 -07:00
Jack Heysel
149dc15b21
Add check to see if notifications are enabled
2024-03-20 11:33:15 -07:00
Christophe De La Fuente
44c5422e07
Land #18922 , JetBrains TeamCity Unauthenticated RCE exploit module (CVE-2024-27198)
2024-03-13 20:16:27 +01:00
sfewer-r7
5c56d6a4fc
typo
2024-03-05 14:47:04 +00:00
sfewer-r7
b925f798e5
typo and clarify description
2024-03-05 14:39:17 +00:00
sfewer-r7
aac4ef09cc
add in disclosure date and blogs
2024-03-05 11:09:22 +00:00
sfewer-r7
a5fb83d0e1
add in 2023.11.2 as tested on
2024-03-01 17:03:38 +00:00
sfewer-r7
9988117cca
rename with cve number
2024-03-01 16:42:59 +00:00
Jack Heysel
a73a7531a9
Land #18827 , Add module for BoidCMS CVE-2023-38836
...
This is an authenticated RCE against BoidCMS versions 2.0.0 and earlier.
The underlying issue is that the file upload check allows a php file to
be uploaded and executes as a media file if the GIF header is present in
the PHP file.
2024-02-29 21:31:44 -08:00
bwatters
550c6f030a
Updates based on jheysel-r7's suggestions
2024-02-29 12:42:22 -06:00
sfewer-r7
b7200b52e1
typo
2024-02-27 14:58:56 +00:00
sfewer-r7
f52543b4a6
Older version of TeamCity (circa 2018) do not support access tokens, so we can fall back on creating an admin user accoutn before we upload the plugin. Creating an access token is better as we can delete the token, unlike the user account.
2024-02-27 12:01:57 +00:00
Jack Heysel
f2de6d6357
Land #18870 , Add ConnectWise ScreenConnect module.
...
This PR add an unauthenticatd RCE exploit for ConnectWise
ScreenConnect (CVE-2024-1709).
2024-02-23 11:25:33 -08:00
sfewer-r7
d7a0dee7d1
@rad10 noted the download link we gave no longer works, but has provided a second link, so adding that to the docs
2024-02-23 17:54:14 +00:00
sfewer-r7
f3af1836ce
allow a custom USERNAME and PASSWORD to be specified if needed. Will default to a random value. Also use Faker::Internet.email to gen an email address
2024-02-23 17:46:49 +00:00
sfewer-r7
47596c6a0c
add in docs
2024-02-23 14:30:53 +00:00
sfewer-r7
003d5e7006
The check routine can now display the targets platform in addition to the version number (we can determine this with a single request, so there is no major change here). This is usefull so you know what platform to set the exploits target to (so you can select an appropriate payload). Thanks @iagox86 for the idea!
2024-02-22 19:23:48 +00:00
sfewer-r7
79bfbe4310
now that Linux is a target we have to move this to the multi directory
2024-02-22 16:34:43 +00:00
sfewer-r7
65cb30b0a4
update docs
2024-02-22 14:55:02 +00:00
sfewer-r7
f6b1c9b1ce
add in docs
2024-02-21 17:44:16 +00:00
Jack Heysel
0aa20c73a4
Land #18832 , Add exploit module CVE-2023-47218
...
The PR adds a module targeting CVE-2023-47218, an
unauthenticated command injection vuln affecting QNAP
QTS and QuTH Hero.
2024-02-21 08:48:30 -08:00
bwatters
d21e4080a9
Land #18792 , Ivanti Connect Secure - Unauth RCE (CVE-2024-21893 + CVE-2024-21887) #18792
...
Merge branch 'land-18792' into upstream-master
2024-02-20 17:40:12 -06:00
bwatters
c298540bea
Add documentation and fix default payloads
2024-02-16 16:49:49 -06:00
Jack Heysel
8cddffa3d1
Land #18700 , Add Kafka-ui Unauth RCE module
...
This PR adds an exploit module for CVE-2023-52251 which
is an unauthenticated rce vulnerability in Kafka's UI.
2024-02-16 15:38:52 -05:00
Jack Heysel
a1b0ff0fcf
Land #18681 , Update Apache Ofbiz w. Auth-Bypass
...
This PR updates the pre-existing apache_ofbiz_deserialization
module to include functionality that will bypass authentication by
using the newly discovered CVE-2023-51467.
2024-02-16 15:02:34 -05:00
Jack Heysel
6c252de974
Docs plus minor edits
2024-02-15 17:12:11 -05:00
h00die-gr3y
d716e60cf2
added base64 encoder module of zerosteiner
2024-02-14 21:33:50 +00:00
H00die.Gr3y
996ca8a7c9
Update documentation/modules/exploit/linux/http/kafka_ui_unauth_rce_cve_2023_52251.md
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-02-14 20:57:46 +00:00
h00die-gr3y
f75722ecf2
Small updates to module and documentation
2024-02-14 20:57:46 +00:00
h00die-gr3y
eafdb8495b
Added documentation
2024-02-14 20:57:46 +00:00
Christophe De La Fuente
747d328bcb
Land #18786 , Fix option collision in service_persistence
2024-02-14 17:25:15 +01:00
sfewer-r7
1f292c8a73
remove the linux and unix targets in favor of a single automatic target
2024-02-09 09:26:08 +00:00
h00die
84278b8e0e
fix ofbiz auto detection
2024-02-06 16:45:02 -05:00
sfewer-r7
367783bcb5
add in RCE exploit for CVE-2024-21893
2024-02-06 11:49:04 +00:00
Christophe De La Fuente
d546db6055
Land #18780 , runc cwd priv esc (docker) (cve-2024-21626)
2024-02-05 13:12:02 +01:00
lihe07
29524fa7f8
Fix option collision in service_persistence
...
The option `SHELLPATH` collide with `cmd/unix/reverse_netcat`,
resulting in abnormal backdoors. This commit rename it to BACKDOOR_PATH
2024-02-03 23:18:45 +08:00
h00die
cf2f76e6a2
cve-2024-21626 review
2024-02-02 16:27:02 -05:00
Jack Heysel
85974d16c2
Land #18769 , Add Cacti RCE via SQLi Module
...
This exploit module leverages a SQLi (CVE-2023-49085) and
a LFI (CVE-2023-49084) vulnerability in Cacti versions prior
to 1.2.26 to achieve RCE
2024-02-02 11:46:10 -05:00
Christophe De La Fuente
b91648f065
Fix typos
2024-02-02 11:45:51 +01:00
Jack Heysel
be2d2d61ca
Land #18762 , Add exploit module for CVE-2024-0204
...
This pull request adds an exploit module for CVE-2024-0204
in Fortra GoAnywhere MFT. GoAnywhere MFT versions 6.x from
6.0.1, and 7.x before 7.4.1 are vulnerable.
2024-02-01 22:36:32 -05:00
h00die
1c73cf938f
cve-2024-21626
2024-02-01 15:28:04 -05:00
Christophe De La Fuente
f10619d870
Add module and documentation
2024-01-30 12:52:02 +01:00
Spencer McIntyre
577898d91b
Check the response when exploiting
2024-01-29 14:38:49 -05:00
sfewer-r7
c70092a2c7
bugfix a copy pasta whereby a path seperator was not being added as expected
2024-01-29 17:52:37 +00:00
sfewer-r7
08a19959fe
add an RCE exploit module for CVE-2024-0204 in Fortra GoAnywhere MFT
2024-01-29 17:17:45 +00:00
Spencer McIntyre
8a793dd1b0
Use the correct exploit and use sh instead of bash
2024-01-29 09:03:25 -05:00
ErikWynter
26e2b2e319
Add docs for opennms authenticated rce
2024-01-27 01:13:22 +02:00