h00die-gr3y
bf0ed5b513
fixed some typos in documentation
2022-11-05 15:36:42 +00:00
h00die-gr3y
642a83bd0d
Updated module and added documentation
2022-11-05 15:14:31 +00:00
h00die-gr3y
71d1c971a7
init commit module
2022-11-04 13:31:27 +00:00
space-r7
197b37751b
Land #17174 , add FLIR AX8 command injection module
2022-11-01 12:41:01 -05:00
Jack Heysel
45ddcf02c9
Remove unused mix in, add low bound to check
2022-11-01 10:42:43 -05:00
Jack Heysel
2ed8dbc08d
Rubocop
2022-11-01 10:42:43 -05:00
Jack Heysel
4587691d64
Fixed module to work over SSL
2022-11-01 10:42:42 -05:00
Jack Heysel
3b645ad9f4
Moved get variables from uri to vars_get
2022-11-01 10:42:42 -05:00
jheysel-r7
c810a1f5aa
Update modules/exploits/linux/http/webmin_file_manager_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2022-11-01 10:42:42 -05:00
jheysel-r7
ebf7496ee2
Update modules/exploits/linux/http/webmin_file_manager_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2022-11-01 10:42:41 -05:00
jheysel-r7
0ede1ca94f
Update modules/exploits/linux/http/webmin_file_manager_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2022-11-01 10:40:01 -05:00
Jack Heysel
d79515c3fe
Fix file cleanup
2022-11-01 10:40:00 -05:00
Jack Heysel
d1e1350ef9
Updated author
2022-11-01 10:40:00 -05:00
Jack Heysel
ad5b03ed96
Finished TODOs and added docs
2022-11-01 10:40:00 -05:00
Jack Heysel
9af689e130
draft module no docs
2022-11-01 10:40:00 -05:00
Jack Heysel
c400a97b63
beta commit
2022-11-01 10:39:59 -05:00
Ron Bowes
4624031aec
Remove errant puts
2022-10-25 10:21:47 -07:00
Ron Bowes
4979c0b74f
Add a check to the cve-2022-30333 module for Zimbra that aborts before generating artifacts if the server cannot be reached
2022-10-25 10:05:16 -07:00
h00die-gr3y
3d8e18c1cb
updated module with code suggestions space-r7
2022-10-25 16:38:15 +00:00
h00die-gr3y
3e78229fc0
updated module and documentation
2022-10-25 13:33:52 +00:00
Jack Heysel
3bf4bd7d7d
Land #17162 , add RCE module for CVE-2022-35914
...
This PR adds an RCE module for the php code injection
present in GLPI versions 10.0.2 and below
2022-10-24 12:18:34 -04:00
jheysel-r7
3bbd05a11a
Update modules/exploits/linux/http/glpi_htmlawed_php_injection.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2022-10-24 11:48:33 -04:00
h00die-gr3y
1c393dc596
init commit module and documentation
2022-10-21 12:50:46 +00:00
Christophe De La Fuente
4cfbae63ac
Land #17114 , Add exploit for CVE-2022-41352 (zimbra cpio)
2022-10-20 15:10:42 +02:00
bwatters
6039e54b75
For real, this time
2022-10-19 17:23:16 -05:00
bwatters
78e8de826b
Sure; I can spell
2022-10-19 17:22:29 -05:00
bwatters
238aa9058f
Fix Cmdstager flavor, complete info hash
2022-10-19 17:18:20 -05:00
bwatters
56b8bf6302
Working draft for CVE-2022-35914
2022-10-19 14:33:33 -05:00
Ron Bowes
56d6f7747b
Remove some old code and update documentation with version info
2022-10-19 10:02:29 -07:00
Ron Bowes
9a35a5c8dd
Post patch info
2022-10-18 10:12:54 -07:00
Ron Bowes
6bdf0da994
Add a sanity check before generating the payload - prevents a confusing error if the server is down
2022-10-18 10:09:51 -07:00
Heyder Andrade
1804e5ab60
Update modules/exploits/linux/http/fortinet_authentication_bypass_cve_2022_40684.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2022-10-18 00:51:28 +02:00
Heyder Andrade
67bd118dd5
Update modules/exploits/linux/http/fortinet_authentication_bypass_cve_2022_40684.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2022-10-17 22:49:48 +02:00
Heyder Andrade
7cdf8e181f
Update modules/exploits/linux/http/fortinet_authentication_bypass_cve_2022_40684.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2022-10-17 22:49:34 +02:00
Heyder Andrade
b3a0d70688
Added prefer admin
...
- One can now say whether the auto-detect user method should prefer to return the admin or other random one.
2022-10-17 15:16:16 +02:00
Heyder Andrade
5d99428c1d
Changed SSH key algorithm and fix bug on cleanup
...
- Prefer to use EC over RSA, only because it is smaller
- When there was no previous ssh key for such user the cleanup method was trying to overwrite the one on the index 0
2022-10-17 14:40:51 +02:00
Heyder Andrade
71a1c60d49
Sticking to the striced needed
...
The port in the Forwarded HTTP header can be random.
2022-10-17 13:01:13 +02:00
Heyder Andrade
422675a0c0
Fixed code-style offenses
2022-10-17 01:08:57 +02:00
Heyder Andrade
6140f0bc4d
Added method to auto-detect target user
2022-10-17 00:44:46 +02:00
Heyder Andrade
9241c515d7
Try to cleanup only if there was ssh connection
2022-10-16 18:50:39 +02:00
Heyder Andrade
6cfb277c90
Added cleanup method
2022-10-16 15:09:45 +02:00
Heyder Andrade
45149c144c
Code cleanup and ssh key password
...
- cleaned up some unecessary code
- add option to the user set an encrypted custom ssh key
2022-10-16 13:32:25 +02:00
Heyder Andrade
95b1bffdea
Do not overwrite the first two keys
2022-10-15 19:04:53 +02:00
Heyder Andrade
47f6971651
It is working but need some improvements
2022-10-15 04:10:12 +02:00
Heyder Andrade
31404116a5
Rename module
2022-10-14 22:19:43 +02:00
Heyder Andrade
f643bba09a
Added module for CVE-2022-40684
2022-10-14 18:36:18 +02:00
Grant Willcox
487a26ee0f
Add in some missing info to examples, set default port, and update IOCs to note we include some IOCs in the logs
2022-10-12 11:19:47 -05:00
Ayantaker
e75438d0b2
Documentation fix and minor fixes
...
Fixed the documentation according to msftidy's suggestion and removed a few unessary parts of code
2022-10-11 18:17:52 -04:00
Grant Willcox
45aa09411e
First round of edits from review
2022-10-11 15:46:04 -05:00
Ayan Saha
f67a7f395f
Modified unix_cmd payload as per suggestion
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2022-10-08 02:26:11 +05:30