jheysel-r7
470ceda467
Update modules/exploits/linux/http/panos_auth_rce.rb
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com >
2022-08-17 14:02:39 -04:00
jheysel-r7
aacf676cd1
Update modules/exploits/linux/http/panos_auth_rce.rb
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com >
2022-08-17 13:32:14 -04:00
Ron Bowes
5fd211acd6
End the session when an HTTP/200 is received
2022-08-17 10:19:36 -07:00
Jack Heysel
57109f2966
Add PAN-OS auth command injection module
2022-08-16 09:44:05 -04:00
Jack Heysel
06f0fffc20
Land #16856 , Webmin package updates RCE module
...
This module exploits an arbitrary command injection
in Webmin versions prior to 1.997.
2022-08-09 16:13:19 -04:00
Christophe De La Fuente
38b845f247
Fix from code review
...
- Documentation typos
- Adding ARM64 support
2022-08-09 15:09:25 +02:00
Christophe De La Fuente
9c6a198453
Land #16796 , Path traversal vulnerability in RARLAB UnRAR < 6.12 with Zimbra RCE module
2022-08-04 19:44:57 +02:00
Ron Bowes
d8faa4dd37
Fix a blank line that I thought I'd fixed
2022-08-04 08:24:32 -07:00
Ron Bowes
26eee72512
Only print_status once, so it doesn't make a mess in the background
2022-08-04 08:02:28 -07:00
Ron Bowes
a314423e81
Some changes requested by @cdelafuente-r7
2022-08-03 14:51:51 -07:00
Christophe De La Fuente
449a7b71d5
Add module exploit and docs for the Webmin package updates RCE
2022-08-03 12:01:41 +02:00
bwatters
d71350dfe6
Remove superfluous code and add extra check
2022-08-02 11:04:13 -05:00
Ron Bowes
c66f98bae6
Make lint happy
2022-08-01 10:03:35 -07:00
Ron Bowes
7ee0a78ffc
Change to using monotonic clock
2022-08-01 10:02:00 -07:00
Ron Bowes
e7edafbcfb
Throw errors in the rar-generator library rather than returning nil
2022-08-01 09:54:31 -07:00
Ron Bowes
110e9ddeee
Set stance
2022-08-01 09:47:58 -07:00
Jake Baines
b00cadfbeb
Initial commit of MobileIron Core Log4Shell exploitation (CVE-2021-44228)
2022-07-29 10:31:15 -07:00
Ron Bowes
e76ef61452
Move a warning into the exploit function
2022-07-27 12:48:56 -07:00
Ron Bowes
f279e8d6ca
Split the CVE-2022-30333 unrar module into two different modules with a shared mixin to generate the file
2022-07-27 12:45:47 -07:00
Grant Willcox
72b1dbfeee
Remove code that could cause check method to fail, fix up some documentation errors and add in scenario, and generally address some review comments
2022-07-25 13:05:04 -05:00
Nuri Çilengir
8b42e893b1
Update roxy_wi_exec.rb
2022-07-25 16:45:44 +00:00
Nuri Çilengir
eca8af4e2a
Update roxy_wi_exec.rb
2022-07-25 16:13:14 +00:00
Nuri Çilengir
b16da0fe92
Update roxy_wi_exec.rb
2022-07-25 16:05:20 +00:00
Nuri Çilengir
bc0b27e1e2
Apply suggestions from code review
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com >
2022-07-22 12:58:46 +00:00
Nuri Çilengir
fc3b08fb8b
Apply suggestions from code review
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com >
2022-07-22 12:51:40 +00:00
Grant Willcox
e91beedc4a
Rubocop fixes
2022-07-21 17:01:56 -05:00
Nuri Çilengir
ebe61b50a7
Fixed parameter quotes
2022-07-21 12:25:29 +00:00
Nuri Çilengir
d23c175f28
Added AutoCheck and CmdStager
2022-07-21 11:39:58 +00:00
Grant Willcox
a7b379f292
Fix up check code segment that would never be reached due to if/else statement above
2022-07-19 16:03:44 -05:00
Grant Willcox
59ea337c6b
Fix up CVE format, add in Notes section
2022-07-19 15:58:11 -05:00
Grant Willcox
336a1feaf7
Fix up naming of module and documentation and fix most of the RuboCop and formatting errors
2022-07-19 15:44:52 -05:00
Nuri Çilengir
d2769ef82b
Add Roxy-WI exec
2022-07-19 21:08:45 +03:00
Spencer McIntyre
439606b2ac
Use a more reliable check method
...
The check method will not work regardless of whether or not there is a
cloned repository. The response can be analyzed using a random,
non-existant repo.
2022-07-11 09:48:08 -04:00
Spencer McIntyre
48cefee585
Cleanup the module based on feedback
2022-07-11 09:09:25 -04:00
Spencer McIntyre
9d979fdf4f
Finish up the sourcegraph RCE module
2022-07-08 17:27:22 -04:00
Spencer McIntyre
27ad62c964
Add a decent check method
2022-07-08 16:40:42 -04:00
Spencer McIntyre
a8c2b3bdff
Initial exploit for CVE-2022-23642
2022-07-05 16:58:22 -04:00
Grant Willcox
133b9e307a
Land #16563 , Zyxel Firewall Unauthenticated Command Injection (CVE-2022-30525)
2022-05-13 18:55:30 -05:00
Grant Willcox
2eb31cf765
Add in edits from review
2022-05-13 15:32:12 -05:00
adfoster-r7
6a1fe27406
Land #16442 , add vars_form_data to the HTTP client
2022-05-13 10:53:16 +01:00
Jake Baines
23f8a0b915
Added Zyxel advisory. Added AKB reference. Used xpath as requested.
2022-05-12 07:17:37 -07:00
Jake Baines
f3b23c072f
Added a reference to Rapid7 disclosure
2022-05-12 06:33:27 -07:00
Jake Baines
24fa9aabe0
Fixed privilege flag. Swapped 'exploit' for 'command' in a couple of places
2022-05-12 06:24:33 -07:00
Jake Baines
4af93ecfe2
Updated affected
2022-05-12 03:22:21 -07:00
Jake Baines
617b4ae044
Initial commit of Zyxel unauth command injection (CVE=2022-30525)
2022-05-12 01:43:59 -07:00
Grant Willcox
8dbd6f3334
Change default target to 1 so we get benefit of avoiding some timeout issues since Unix Command may still cause server's REST API to time out at times.
2022-05-11 16:43:37 -05:00
Grant Willcox
196aac6b42
Add in PrependFork and MeterpreterTryToFork options as default to fix timeout issues and potential failure cases due to server not responding
2022-05-11 16:43:36 -05:00
Grant Willcox
27169c4ae1
Add in missing CmdStager library, add some more attribution, and add in PoC link
2022-05-11 16:43:36 -05:00
Grant Willcox
6354d7a055
Redo explanation of exploit in documentation to appropriately account for various nuances. Also update exploit title and description accordingly.
2022-05-11 16:43:36 -05:00
Heyder Andrade
1bc2616c19
Update modules/exploits/linux/http/f5_icontrol_rce.rb
...
Co-authored-by: wvu <4551878+wvu@users.noreply.github.com >
2022-05-11 16:43:13 -05:00