je5442804
76f89dc4d4
Update apache_druid_js_rce.rb
2021-04-04 21:36:53 +08:00
je5442804
80f96f0045
Update modules/exploits/linux/http/apache_druid_js_rce.rb
...
Co-authored-by: wvu <wvu-r7@users.noreply.github.com >
2021-04-03 23:57:22 +08:00
kalba-security
34a5f7906c
Rebase so we can use the latest mixin code,update the version range, update docs
2021-04-01 13:29:44 -04:00
kalba-security
faab100d9a
Add Nagios XI Mibs.php Authenticated RCE module and docs
2021-04-01 13:06:33 -04:00
kalba-security
f76f58eb51
Rebase, use latest mixin code in check, update version and docs
2021-04-01 12:43:44 -04:00
kalba-security
dd5c747584
Add Nagios XI snmptrap RCE and docs
2021-04-01 12:26:06 -04:00
kalba-security
02b9e5c939
rebase, use latest mixin code, correct vulnerable versions, update docs
2021-04-01 12:18:46 -04:00
kalba-security
3b7e612541
Add Nagios XI Plugins Filename Authenticate RCE module and docs
2021-04-01 11:23:52 -04:00
kalba-security
2df90d8d23
Rebase, rename module to nagios_xi_plugins_check_plugin_authenticated_rce, update check to take advantage of mixin, minor improvements
2021-04-01 11:07:49 -04:00
Shelby Pace
2cbd1a6be9
Land #14935 , add F5 iControl REST API SSRF RCE
2021-04-01 08:40:38 -05:00
kalba-security
a02f14f644
Add 'moved_from' alias
2021-04-01 09:26:24 -04:00
kalba-security
0e7c11ada3
Rename module and modify it to use the Nagios XI mixin, add autocheck, fix syntax and linting, also update docs
2021-04-01 09:26:16 -04:00
je5442804
2ac30a5c61
Update modules/exploits/linux/http/apache_druid_js_rce.rb
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2021-04-01 07:07:24 +08:00
William Vu
cb3f1238f3
Add F5 iControl REST CVE-2021-22986 exploit
2021-03-31 14:02:32 -05:00
Christophe De La Fuente
9806026ab9
Update from code review
2021-03-31 17:48:35 +02:00
je5442804
b6b7956f0f
Add Apache Druid CVE-2021-25646 RCE
2021-03-31 21:11:23 +08:00
Spencer McIntyre
d73ec7a751
Remove the CmdStager allow list and randomize the domain
2021-03-31 08:54:37 -04:00
je5442804
21ec87d8bd
Add Apache Druid CVE-2021-25646 RCE
2021-03-31 20:43:28 +08:00
Spencer McIntyre
a0a4bc079a
Add the exploit module for CVE-2021-26295
2021-03-30 18:18:16 -04:00
Christophe De La Fuente
fca8bf37e2
Update description & add Stability trait
2021-03-29 11:14:35 +02:00
Christophe De La Fuente
00698d20bf
Add waiting status message and update doc
2021-03-26 14:59:27 +01:00
Christophe De La Fuente
b069fec866
Add module and doc for Saltstack Salt API wheel_async RCE
2021-03-26 13:54:06 +01:00
bwatters
fb7a97077f
Land #14875,CVE-2021-21978 - VMWare View Planner Harness 4.6.x < 4.6 Security Patch 1 Arbitrary File Upload RCE
...
Merge branch 'land-14875' into upstream-master
2021-03-18 12:06:12 -05:00
Grant Willcox
b1c3c49eb5
Land #14757 , nagios_xi_magpie_debug: add writable paths, improvements, cleanup, fixes
2021-03-16 17:43:43 -05:00
Brendan Coles
e30d8db082
nagios_xi_magpie_debug: add writable paths, improvements, cleanup, fixes
...
Resolve Rubocop violations
Fix off-by-one in array index triggered when no file upload succeeds
Fix cleanup: ensure files are removed when upload succeeds but execution fails
Add AutoCheck
Add module notes
Add error handling and associated operator feedback
Add additional writable paths required for some old Nagios versions
Add fallback to session as `apache` if privlege escalation fails
Update documentation in line with above changes and fix software download links
2021-03-16 07:13:55 +00:00
Grant Willcox
57931956d9
Fix bad style again
2021-03-15 01:33:32 -05:00
Grant Willcox
ecae6eb91a
Update response check to explicitly check if the response body is empty and to remove unneeded safe navigation operator
2021-03-14 13:14:52 -05:00
Grant Willcox
6616112b59
Correct exploit ranking, wrap file restoration in ensure clause, fix typos, and address other review comments
2021-03-14 00:00:18 -06:00
Grant Willcox
89ce1c5229
Quick update to make the backdoor a bit stealthier by removing the extra Payload Success! message that wasn't needed
2021-03-14 00:00:17 -06:00
Grant Willcox
a6c92a12a1
Add link to wvu's PoC and fix typo
2021-03-14 00:00:17 -06:00
Grant Willcox
4f2e299d8f
Update the exploit to use Python as its payload since this is a lot more flexible, allows Meterpreter, returns a shell faster, and we are already injecting into and executing a Python file
2021-03-14 00:00:06 -06:00
Grant Willcox
c2c5db95d8
Add in documentation and fix some mistakes in the description of the module
2021-03-14 00:00:05 -06:00
Grant Willcox
7d6e636114
Initial upload of exploit code for CVE-2021-21978
2021-03-13 23:59:47 -06:00
Spencer McIntyre
d580e7d122
Fix some documentation, remove unnecessary code and fix a filename typo
2021-03-11 12:09:29 -06:00
Spencer McIntyre
8d2e644f4f
Add a new Java Deserialization mixin and use it to set the shell
2021-03-11 12:09:29 -06:00
dwelch-r7
319f15d938
Handle nil versions for rubygems 4
2021-02-25 16:47:49 +00:00
Alan Foster
b06c5c12aa
Rubocop recently landed modules continued
2021-02-25 14:13:40 +00:00
agalway-r7
8a339f54c1
Land #14734 , updates and runs rubocop against recent modules
...
Rubocop recently landed modules
2021-02-19 13:48:47 +00:00
agalway-r7
275e9c5454
Land #14696 , Further Zeitwerk lands to improve boot speed
...
Zeitwerk rex folder
2021-02-19 10:33:37 +00:00
Alan Foster
5b3fde7735
Rubocop recently landed modules
2021-02-16 15:08:08 +00:00
Brendan Coles
a1c316c679
msftidy: Fix exploit module checks for author and stack buffer overflow
2021-02-13 04:10:13 +00:00
Shelby Pace
c1e2cfd9e7
Land #14744 , add Klog Server unauth cmd injection
2021-02-12 11:40:57 -06:00
Brendan Coles
bdc2041c83
Add Klog Server authenticate.php user Unauthenticated Command Injection
2021-02-12 17:07:52 +00:00
Alan Foster
bed7ae2c78
Add latest rubocop rules
2021-02-12 13:31:51 +00:00
dwelch-r7
b95be3ed10
Zeitwerk rex folder
2021-02-08 12:24:12 +00:00
cgranleese-r7
3a2932b798
Migrate old uses of manual autocheck to use the new prepend autocheck
2021-02-02 10:15:46 +00:00
William Vu
39b7ba584e
Randomize strings
...
Spencer tells me not to signature-bait, at least not so obviously. ;)
2021-01-22 16:15:16 -06:00
William Vu
0d410f32c3
Add MobileIron CVE-2020-15505 exploit
2021-01-22 00:37:07 -06:00
Spencer McIntyre
9b8b4621df
Land #14368 , Pulse Connect Secure gzip RCE: cve-2020-8260
2020-12-17 17:43:55 -05:00
Spencer McIntyre
43b1497cf6
Remove some debug info and mark bind payloads as being incompatible
2020-12-17 16:36:20 -05:00