sfewer-r7
|
1a8e88c054
|
fix a typo with the use of CVE-2025-55102, it should be CVE-2025-55182
|
2025-12-09 09:05:59 +00:00 |
|
Brendan
|
caa672231b
|
Merge pull request #20736 from sfewer-r7/fortiweb-exploit-rce-v6-support
Update the FortiWeb exploit module (CVE-2025-64446 + CVE-2025-58034) to target older unsupported versions 6.x
|
2025-12-08 17:43:49 -06:00 |
|
jheysel-r7
|
66279422d1
|
Merge pull request #20747 from vognik/2025-55182
Add CVE-2025-55182 / CVE-2025-66478
|
2025-12-08 13:41:49 -08:00 |
|
vognik
|
bdd7cb5365
|
upgraded payload
|
2025-12-08 01:32:43 -08:00 |
|
vognik
|
1dde12b483
|
fix naming errors
|
2025-12-06 02:53:38 -08:00 |
|
vognik
|
38682b5ed6
|
refactoring
|
2025-12-05 14:58:59 -08:00 |
|
vognik
|
88309b5a4a
|
add suggestions from @Chocapikk
|
2025-12-05 08:02:56 -08:00 |
|
vognik
|
baa0a11492
|
small fixes
|
2025-12-05 00:11:44 -08:00 |
|
vognik
|
770e63b0d1
|
add windows documentation
|
2025-12-05 00:06:58 -08:00 |
|
vognik
|
e51ea0ae23
|
improve documentation
|
2025-12-04 23:03:13 -08:00 |
|
vognik
|
f71a71ab18
|
add exploit mvp
|
2025-12-04 22:16:27 -08:00 |
|
vognik
|
eb33e08efa
|
Add Documentation
|
2025-12-04 05:48:26 -08:00 |
|
Diego Ledda
|
4d52e22480
|
Merge pull request #20720 from Chocapikk/wp-ai-engine
Add WordPress AI Engine MCP RCE exploit (CVE-2025-11749)
|
2025-12-04 12:56:04 +01:00 |
|
Valentin Lobstein
|
296e931b7d
|
Fix WordPress lab permissions in documentation
|
2025-12-04 01:39:25 +01:00 |
|
SaiSakthidar
|
98dd33a3cd
|
Remove CAIN
|
2025-12-03 15:42:57 -05:00 |
|
sfewer-r7
|
795c38c524
|
Combine the 7.x and 6.x targets together, as Linux payloads work on 7.x also, so this target is Unix and Linux. This leaves the 8.x target Unix only due to IMA appraisal.
|
2025-11-28 10:12:02 +00:00 |
|
msutovsky-r7
|
d7c307bb69
|
Land #20709, adds module for Twonky Server Authentication Bypass (CVE-2025-13315,CVE-2025-13316)
Auxiliary module for CVE-2025-13315/CVE-2025-13316 - Twonky Server Log Leak Authentication Bypass
|
2025-11-28 07:35:30 +01:00 |
|
sfewer-r7
|
014312873c
|
get both unix and linux payloads working on 6.x. Add a note to the docs about setting a gateway.
|
2025-11-27 20:28:44 +00:00 |
|
msutovsky-r7
|
b6330acb12
|
Land #20718, adds module for Monsta FTP RCE (CVE-2025-34299)
Add Monsta FTP downloadFile RCE (CVE-2025-34299)
|
2025-11-27 15:16:58 +01:00 |
|
sfewer-r7
|
f5e8aa83be
|
add in exploit support for FortiWeb versions 6.x which are vulnerable, but no longer under support from the vendor.
|
2025-11-27 12:43:19 +00:00 |
|
Brendan
|
e998b91aee
|
Merge pull request #20717 from sfewer-r7/fortiweb-exploit-rce
Add exploit module for Fortinet FortiWeb (CVE-2025-64446 + CVE-2025-58034)
|
2025-11-25 14:14:31 -06:00 |
|
Brendan
|
1912fe2a95
|
Merge pull request #20702 from Zedeldi/igel-os-modules
IGEL OS modules
|
2025-11-25 13:59:44 -06:00 |
|
sfewer-r7
|
fa03ac8b66
|
on 7.4.8 the command nohup is not available. we must execute our payload in a new session, so we use a python stub to essentially call setsid. This has been tested to work on both 8.0.1 and 7.4.8. Teh payload cmd/unix/reverse_python isnot working as it previously was, so I am removing from the list of confirmed paylaods. The other two, cmd/unix/reverse_bash and cmd/unix/reverse_openssl work fine on both versions
|
2025-11-25 11:25:41 +00:00 |
|
jheysel-r7
|
4a012dd06a
|
Merge pull request #20637 from zeroSteiner/feat/mod/smb-to-mssql
Add an SMB to MSSQL NTLM Relay module
|
2025-11-24 09:17:45 -08:00 |
|
Zedeldi
|
4b2798f357
|
Correct vulnerable version information
|
2025-11-24 17:10:51 +00:00 |
|
Zedeldi
|
ce926fd3d1
|
Update vulnerable IGEL OS version to < 11.09.310
|
2025-11-24 11:57:18 +00:00 |
|
Zedeldi
|
933fb7bdf1
|
Add clean-up information
|
2025-11-24 11:43:46 +00:00 |
|
Zedeldi
|
002795c5be
|
Update module information in documentation
|
2025-11-24 11:24:23 +00:00 |
|
Valentin Lobstein
|
080230edd0
|
Add WordPress AI Engine MCP RCE exploit (CVE-2025-11749)
|
2025-11-23 03:56:11 +01:00 |
|
Brendan
|
21777b8969
|
Merge pull request #20685 from msutovsky-r7/persistence/windows/notepad++_persistence
Adds notepad++ persistence module for Windows
|
2025-11-21 14:28:28 -06:00 |
|
msutovsky-r7
|
8f2525aba7
|
Land #20705, adds modules for Flowise RCEs (CVE-2025-59528, CVE-2025-8943)
Add Flowise RCE exploits (CVE-2025-59528, CVE-2025-8943)
|
2025-11-21 21:20:22 +01:00 |
|
Valentin Lobstein
|
8cffe50470
|
Add Monsta FTP downloadFile RCE (CVE-2025-34299)
|
2025-11-21 20:43:37 +01:00 |
|
Zedeldi
|
b13137886a
|
Add IGEL OS and vulnerability summary to documentation
|
2025-11-21 13:09:28 +00:00 |
|
sfewer-r7
|
aff76622fa
|
add in the unauth RCE exploit module for CVE-2025-64446 + CVE-2025-58034
|
2025-11-21 12:22:25 +00:00 |
|
msutovsky-r7
|
e2097ee1bc
|
Land #20701, adds windows WSL registry persistence module
Windows WSL registry persistence
|
2025-11-20 15:15:22 +01:00 |
|
Valentin Lobstein
|
6ab2452153
|
Fix documentation inconsistency: update ports for Flowise 3.0.1 (3005) and add Basic Auth service example
|
2025-11-19 22:58:27 +01:00 |
|
Valentin Lobstein
|
8fbbc3e043
|
Update flowise_custommcp_rce documentation: add Basic Auth testing scenario
|
2025-11-19 22:24:28 +01:00 |
|
Valentin Lobstein
|
44cf2e309f
|
Add Flowise RCE exploits (CVE-2025-59528, CVE-2025-8943) with shared mixin, documentation, and Docker Compose setup
|
2025-11-19 22:12:49 +01:00 |
|
remmons-r7
|
7aff5f333b
|
Delete an accidental documentation commit
|
2025-11-19 14:18:25 -05:00 |
|
Valentin Lobstein
|
df1c157471
|
Improve Flowise CustomMCP RCE exploit stability with Basic Auth support and HTTP response validation
|
2025-11-19 20:12:31 +01:00 |
|
remmons-r7
|
252023222b
|
Create twonky_authbypass_logleak.md
|
2025-11-19 14:06:52 -05:00 |
|
remmons-r7
|
5b55bdaaaf
|
Merge branch 'rapid7:master' into master
|
2025-11-19 13:56:13 -05:00 |
|
Valentin Lobstein
|
b26c4f5c7b
|
Add Flowise Custom MCP RCE exploit (CVE-2025-8943)
|
2025-11-18 22:25:39 +01:00 |
|
Valentin Lobstein
|
88aadcc856
|
Add Flowise Custom MCP RCE exploit (CVE-2025-8943)
|
2025-11-18 22:03:59 +01:00 |
|
h00die
|
a0222d0783
|
rework windows service persistence
|
2025-11-17 19:02:53 -05:00 |
|
h00die
|
92e1720ad5
|
fix docs
|
2025-11-17 19:02:53 -05:00 |
|
h00die
|
450e1df340
|
windows service now with persistence mixin
|
2025-11-17 19:02:50 -05:00 |
|
Zedeldi
|
c6db0d4285
|
Move IGEL OS persistence module to linux/persistence
|
2025-11-17 18:42:28 +00:00 |
|
Zedeldi
|
c37f7872a3
|
Add documentation for IGEL OS modules
|
2025-11-17 16:33:15 +00:00 |
|
h00die
|
e3560e43cf
|
windows wsl registry persistence
|
2025-11-16 08:35:44 -05:00 |
|