sfewer-r7
|
37276446a6
|
improve the description for this option
|
2025-02-12 17:22:43 +00:00 |
|
sfewer-r7
|
c9be9b65ec
|
fix typos in docs
|
2025-02-12 17:22:17 +00:00 |
|
sfewer-r7
|
c6d03069a9
|
add in the documentation
|
2025-01-31 11:02:01 +00:00 |
|
Martin Sutovsky
|
34f3957aea
|
Land #19772, adding module for CraftCMS FTP template exploit
|
2025-01-23 20:21:17 +01:00 |
|
Takah1ro
|
54bd55b186
|
Update vulnerable version
|
2025-01-18 10:18:10 +09:00 |
|
Takah1ro
|
ca304ae5c4
|
Avoid to split payload
|
2025-01-17 21:21:48 +09:00 |
|
Takah1ro
|
4e53c967c2
|
Update message
|
2025-01-16 12:59:18 +09:00 |
|
Jack Heysel
|
2254a1f213
|
Responded to comments
|
2025-01-15 09:22:44 -08:00 |
|
Takah1ro
|
10be7a80cf
|
Update document
|
2025-01-13 10:56:16 +09:00 |
|
Takah1ro
|
93bb7fa6c5
|
Add LibreNMS Authenticated RCE (CVE-2024-51092)
|
2025-01-12 12:28:07 +09:00 |
|
Jack Heysel
|
18be9fc101
|
Added suggestions from jvoisin
|
2025-01-10 11:45:40 -08:00 |
|
Chocapikk
|
b7d922f471
|
Fix and enhance CraftCMS FTP exploit module
|
2025-01-10 18:16:11 +01:00 |
|
Diego Ledda
|
5cfaf4871d
|
Land #19738, Pandora FMS auth RCE (CVE-2024-11320)
Land #19738, Pandora FMS auth RCE (CVE-2024-11320)
|
2025-01-09 17:16:58 +01:00 |
|
Diego Ledda
|
fea171357a
|
Land #19771, Add Selenium Firefox RCE module (CVE-2022-28108)
Land #19771, Add Selenium Firefox RCE module (CVE-2022-28108)
|
2025-01-08 13:44:33 +01:00 |
|
jheysel-r7
|
0ff2835bb7
|
Merge pull request #19770 from h00die-gr3y/netis-unauth-rce
Netis Router Exploit Chain Reactor [CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457]
|
2025-01-07 17:24:37 -08:00 |
|
Diego Ledda
|
7ead96a740
|
Land #19769, Add Selenium Chrome RCE module (CVE-2022-28108)
Land #19769, Add Selenium Chrome RCE module (CVE-2022-28108)
|
2025-01-07 11:10:37 +01:00 |
|
H00die.Gr3y
|
9a6d074463
|
Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2025-01-07 09:25:41 +01:00 |
|
Takah1ro
|
710ae1198a
|
Apply suggestions from #19769
|
2025-01-04 10:12:57 +09:00 |
|
Takah1ro
|
3b947cf1c5
|
Update vulnerable version
|
2025-01-02 09:57:00 +09:00 |
|
jheysel-r7
|
e70b6c777f
|
Merge pull request #19663 from sfewer-r7/CVE-2024-0012
Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474)
|
2024-12-30 10:29:10 -08:00 |
|
Takah1ro
|
38d8d35dc5
|
Update doc
|
2024-12-30 13:50:13 +09:00 |
|
Takah1ro
|
bbc282e90c
|
Improve check
|
2024-12-30 13:36:15 +09:00 |
|
Takah1ro
|
6e0c945a42
|
Improve check for version 4
|
2024-12-30 13:00:25 +09:00 |
|
h00die-gr3y
|
862f2ee6c6
|
Added documentation and some small module updates
|
2024-12-29 20:05:05 +00:00 |
|
Takah1ro
|
68ae0d40ea
|
Add timeout option
|
2024-12-29 13:02:32 +09:00 |
|
Takah1ro
|
e4111cdc97
|
Update to use FETCH_DELETE
|
2024-12-29 12:33:39 +09:00 |
|
Takah1ro
|
86bd1c2938
|
Minor improve
* enable fetch_delete
* avoid using single quotes
* update doc
|
2024-12-29 12:19:19 +09:00 |
|
Takah1ro
|
af432a3b72
|
Improve stability
|
2024-12-29 12:00:09 +09:00 |
|
Takah1ro
|
90d9bb769d
|
Update vulnerable version
|
2024-12-28 15:53:31 +09:00 |
|
Takah1ro
|
7ecc1cb87b
|
Update vulnerable version
|
2024-12-28 14:39:24 +09:00 |
|
Takah1ro
|
340d4bcd58
|
Add selenium firefox rce module
|
2024-12-28 12:27:18 +09:00 |
|
Takah1ro
|
e3d68d4164
|
Update author and fix version detection
|
2024-12-28 11:18:41 +09:00 |
|
Takah1ro
|
64b1832567
|
Update not to use selenium-webdriver
|
2024-12-27 13:00:20 +09:00 |
|
Takah1ro
|
82ebdf1f9d
|
Improve docs
|
2024-12-26 23:54:47 +09:00 |
|
Takah1ro
|
acbcd9f3b1
|
Fix ubuntu version
|
2024-12-26 23:51:40 +09:00 |
|
Takah1ro
|
06af9b0b3d
|
Add selenium chrome rce module
|
2024-12-26 23:44:11 +09:00 |
|
h00die-gr3y
|
7c8116a2cb
|
Third release of module + Documentation
|
2024-12-22 11:41:05 +00:00 |
|
Stephen Fewer
|
65bb3cc990
|
typo 2
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2024-12-17 17:26:20 +00:00 |
|
Stephen Fewer
|
3ed2b5916a
|
fix typo
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2024-12-17 17:26:00 +00:00 |
|
Diego Ledda
|
be30a06af4
|
Land #19430, Moodle RCE (CVE-2024-43425) Module
Land #19430, Moodle RCE (CVE-2024-43425) Module
|
2024-12-06 12:15:35 +01:00 |
|
jheysel-r7
|
21cf475cbb
|
Land #19595 Ivanti Connect Secure auth RCE via OpenSSL (CVE-2024-37404)
|
2024-12-04 08:26:07 -08:00 |
|
Diego Ledda
|
ab2ca41eb8
|
Land #19629, Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
Land #19629, Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
|
2024-12-04 16:49:56 +01:00 |
|
Christophe De La Fuente
|
3dcb9d58ab
|
Code review
|
2024-12-02 14:02:07 +01:00 |
|
Christophe De La Fuente
|
c943cc6378
|
Add module and documentation
|
2024-12-02 14:02:07 +01:00 |
|
jheysel-r7
|
d95d549992
|
Land #19531 ProjectSend r1335 - r1605 RCE module
|
2024-11-21 09:53:36 -08:00 |
|
sfewer-r7
|
41bcf4629f
|
The payload we essentially being encoded twice (thanks for calling this out Brendan), we now supply a suitable BadChars and let the framewrk encode the framework paylaod. We rename the variable payload to bootstrap_payload as this was colliding with the frameworks payload variable which was not the intent.
|
2024-11-21 17:37:34 +00:00 |
|
ostrichgolf
|
68eb6599fd
|
Create projectsend_unauth_rce
|
2024-11-21 09:34:58 -08:00 |
|
sfewer-r7
|
d2f6e0e10f
|
As the payload option FETCH_WRITABLE_DIR may not be available if a non fetch based payload is used, we add a new option WRITABLE_DIR to account for this. Update the documentation to reflect the change.
|
2024-11-21 16:38:09 +00:00 |
|
sfewer-r7
|
f9b099a46d
|
remove the DefaultOption PAYLOAD value, and let the framework pick one for us. Mention I tested the exploit with cmd/linux/http/x64/meterpreter_reverse_tcp
|
2024-11-21 16:22:02 +00:00 |
|
jheysel-r7
|
afbbba09e8
|
Land #19584 Judge0 sandbox escape CVE-2024-28185, CVE-2024-28189
|
2024-11-20 14:35:38 -08:00 |
|