Jack Heysel
37bc4ca51f
Fixed root password resetting
2023-09-29 11:40:03 -04:00
Jack Heysel
58642c16c9
Changed WebSocket to SSH
2023-09-28 14:41:03 -04:00
Jack Heysel
3f15de3995
Responded to Christophes suggestions
2023-09-28 14:26:37 -04:00
Jack Heysel
3eaa4adcb7
rubocop
2023-09-26 18:48:33 -04:00
Jack Heysel
9a1881cbcf
jvoisin suggestions
2023-09-26 18:42:14 -04:00
Jack Heysel
09f3a98d13
Finished JAIL_BREAK addition
2023-09-26 16:45:28 -04:00
Jack Heysel
b4539f174d
Added JAIL_BREAK option and corresponding methods
2023-09-25 19:03:54 -04:00
Jack Heysel
127f0104d2
Address review comments
2023-09-21 13:36:00 -04:00
Jack Heysel
12de4dd2c7
Improved request sending and added watchtower ref
2023-09-21 09:45:59 -04:00
Jack Heysel
da8c020d14
Junos OS SRX and EX PHPRC Manipulation RCE
2023-09-20 16:47:05 -04:00
Spencer McIntyre
baa0f3d5e3
Switch the fingerprint resource for v12 compat
...
Switching to use citrix-fonts.css allows the technique to work for 12.x
and 13.x.
2023-08-08 08:57:17 -04:00
Spencer McIntyre
72092392e9
Fix check method for v12, add automatic targeting
2023-08-08 08:57:11 -04:00
Spencer McIntyre
760bc3fbfb
Add a target for 12.1-64.17
2023-08-04 16:21:21 -04:00
Spencer McIntyre
c3324ab002
Add a target for 12.1-65.25
2023-08-04 15:14:24 -04:00
Spencer McIntyre
67e1c57b7c
Fix some buffer encoding issues
2023-08-03 12:47:14 -04:00
Spencer McIntyre
930c90c3ac
Update all targets so the stack can be relocated
2023-08-02 14:49:04 -04:00
Spencer McIntyre
b365ab7d10
Add a target for 13.1-37.38
2023-08-02 13:57:53 -04:00
Spencer McIntyre
5d0b6e1fbc
Add a target for 13.0-91.12
2023-08-02 12:48:34 -04:00
Spencer McIntyre
eb5be5746c
Add a basic check method to detect Citrix
2023-08-01 12:17:30 -04:00
Spencer McIntyre
f787bcd04f
Define the space for the payload
2023-07-31 18:06:38 -04:00
Spencer McIntyre
de6508c3e3
Initial commit of CVE-2023-3519
2023-07-31 17:30:52 -04:00
William Vu
9e6f425427
Move exploit/linux/http/citrix_dir_traversal_rce
...
To exploit/freebsd/http/citrix_dir_traversal_rce. It's actually FreeBSD.
2021-04-15 19:13:25 -05:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
asoto-r7
1a3a4ef5e4
Revised 88 aux and exploit modules to add CVEs / references
2018-07-12 17:34:52 -05:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
ef826b3f2c
OCD - print_good & print_error
2017-07-19 12:48:52 +01:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
g0tmi1k
fd843f364b
Removed extra lines
2017-07-14 08:17:16 +01:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
OJ
1d617ae389
Implement first pass of architecture/platform refactor
2016-10-28 07:16:05 +10:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
44990e9721
Revert "change Metasploit4 class names"
...
This reverts commit 3da9535e22 .
2016-03-07 13:19:48 -06:00
Christian Mehlmauer
3da9535e22
change Metasploit4 class names
2016-03-07 09:57:22 +01:00
wchen-r7
11c1eb6c78
Raise Msf::NoCompatiblePayloadError if generate_payload_exe fails
...
Most exploits don't check nil for generate_payload_exe, they just
assume they will always have a payload. If the method returns nil,
it ends up making debugging more difficult. Instead of checking nil
one by one, we just raise.
2015-12-08 21:13:23 -06:00
HD Moore
d67b55d195
Fix autofilter values for aggressive modules
2015-10-13 15:56:18 -07:00
jvazquez-r7
e87d99a65f
Fixing blocking option
2015-09-25 10:45:19 -05:00
jvazquez-r7
890ac92957
Warn about incorrect payload
2015-09-25 10:10:08 -05:00
jvazquez-r7
19b577b30a
Do some code style fixes to watchguard_cmd_exec
2015-09-25 09:51:00 -05:00
jvazquez-r7
b35da0d91d
Avoid USERNAME and PASSWORD datastore options collisions
2015-09-25 09:36:47 -05:00
jvazquez-r7
52c4be7e8e
Fix description
2015-09-25 09:35:30 -05:00
Daniel Jensen
3dd917fd56
Altered the module to use the primer callback, and refactored some code to remove useless functions etc
2015-09-24 00:20:13 +12:00
Daniel Jensen
7985d0d7cb
Removed privesc functionality, this has been moved to another module. Renamed module
2015-09-16 23:29:26 +12:00
Daniel Jensen
4e22fce7ef
Switched to using Rex MD5 function
2015-09-13 16:23:23 +12:00
Daniel Jensen
3f5721f5be
Fixed identified issues.
2015-07-02 13:06:03 +12:00
Daniel Jensen
f48bb4250e
Removed some overly verbose output.
2015-07-01 22:03:42 +12:00
Daniel Jensen
1ede519b8d
Added Watchguard XCS remote root exploit module.
2015-07-01 21:11:23 +12:00