Commit Graph

3986 Commits

Author SHA1 Message Date
Grant Willcox d83ede6306 Fix up some check method issues and some XML data validation issues identified during review 2021-08-31 18:25:01 -05:00
Your Name 5599929b6a Fixed Randomization 2021-08-31 18:25:00 -05:00
Grant Willcox 0a57641aa4 Add in documentation and module code cleanness improvements and also make the output easier for readers to understand should something fail midway through. 2021-08-31 18:24:57 -05:00
Your Name cd74e34e3c Fixed Authors 2021-08-31 18:24:51 -05:00
Your Name b5b0b3087a Fixed References and Description 2021-08-31 18:24:50 -05:00
Your Name 56cde3eaba Add Geutebruck CVE_2021_335XX command injections module 2021-08-31 18:24:14 -05:00
Grant Willcox 488f58a068 Attempt to fix RuboCop errors 2021-08-31 15:36:00 -05:00
Grant Willcox 3bca3b0bcb Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
Your Name 690af9f956 Fixed CVE Number 2021-08-30 08:18:19 +01:00
Your Name 70f3f9d731 Fixed CVE Number 2021-08-28 11:33:42 +01:00
adfoster-r7 4a9a15e638 Run Rubocop layout rules on modules 2021-08-27 17:19:43 +01:00
Your Name 8d28dece69 Added Notes 2021-08-27 16:42:54 +01:00
Your Name 6a501a37ff Add CVE-2021-33549 exploit for Geutebruck G-CAM 2021-08-27 01:28:26 +01:00
Grant Willcox 6f9b06fb4b Add in Manfred Paul's original blog post and chompie1337's original PoC to the list of links. Also add in a relatively detailed description of how to add in new targets to this exploit to the documentation in case that helps anyone down the line 2021-08-25 18:09:07 -05:00
Grant Willcox 29a230ec72 Improve error handling for module 2021-08-24 17:36:37 -05:00
Grant Willcox bd490d35ed Add support for Linux 5.11.x on Fedora 2021-08-23 15:09:10 -05:00
Grant Willcox db5ac81ecf Fix up mistakes bcoles pointed out and also add in a check to ensure we are only targetting x64 systems 2021-08-23 13:23:40 -05:00
Grant Willcox e46611cffb Add in support for exploiting Fedora 32 with Linux kernel 5.10.12 2021-08-20 18:04:59 -05:00
Grant Willcox 75ae2b76f5 Add support for Fedora 32 Linux Kernel 5.9.8-100 and also fix an error where the wrong file was being used for Fedora 32 Linux Kernel 5.8.8. 2021-08-20 16:50:20 -05:00
Grant Willcox 5abf407228 Add support for Fedora 32 with Linux Kernel 5.8.8-200 2021-08-20 15:42:34 -05:00
Grant Willcox dd806a9d61 Add in support for Fedora 32 running kernel 5.7.11-200 2021-08-20 13:37:52 -05:00
sjanusz 8e00c5a188 Add default payload option to targets 2021-08-20 16:38:22 +01:00
Grant Willcox b479cb61a4 Add in scenario for Ubuntu 20.04.02 LTS and show that its still working as expected 2021-08-19 15:05:03 -05:00
Grant Willcox 945004ed97 Fix up typo that was breaking the code and also fix RuboCop errors 2021-08-19 14:12:03 -05:00
Grant Willcox b60ad3ee26 Fix up mistakes I noticed whilst doing edits on the code as well as some mistakes identified during peer review 2021-08-19 13:55:54 -05:00
Grant Willcox d5df47692c Add in first copy of the exploit along with the supporting source code and binaries. Documentation to come 2021-08-17 18:01:14 -05:00
William Vu 521ca14773 Add Lucee Administrator CVE-2021-21307 exploit 2021-08-16 10:09:34 -05:00
Alan Foster 03400991af Update uses of open ssl 2021-08-10 15:40:23 +01:00
Jack Heysel 29b193406e Fix for file clean up in the Cisco Hyperflex file upload RCE module 2021-07-30 14:59:52 -04:00
adfoster-r7 951809e164 Land #15491, add module stability notes 2021-07-29 17:24:42 +01:00
space-r7 809081bc5f Land #15279, add Pi-Hole lpe 2021-07-29 11:15:17 -05:00
space-r7 0561ae978f fix typos, pihole version in docs 2021-07-29 11:13:58 -05:00
cgranleese-r7 56510a2e8e Updates some notes on modules that weren't passing tests due to new rubocop rule 2021-07-28 16:20:02 +01:00
William Vu 6a6c08c773 Fix edge case in method overloading 2021-07-12 20:29:56 -05:00
William Vu d29532d4c4 Add VMware vCenter Server CVE-2021-21985 exploit 2021-07-12 13:07:05 -05:00
William Vu 6fbaecf919 Backport print changes to recent modules 2021-07-08 21:26:35 -05:00
Grant Willcox 570ba091f6 Update some typos in the documentation and also update the exploit module to handle various cases whereby the dbus-send command might end up timing out due to TIMEOUT being too low and to fix some final issues found during testing 2021-07-08 16:24:01 -05:00
Grant Willcox 9f88ef0954 Fix up review comments 2021-07-08 16:22:29 -05:00
Jack Heysel 54ee8f7ae7 Added cmd_delay nil check, updated title 2021-07-08 16:20:45 -05:00
Jack Heysel 0f67dd5212 Fixed get_cmd_delay, reponded to comments 2021-07-08 16:20:38 -05:00
Jack Heysel 9a07039e7e Updated docs 2021-07-08 16:09:15 -05:00
Jack Heysel fdbf669da2 Fixed check for /bin/su 2021-07-08 16:09:12 -05:00
Jack Heysel 285a6338fa Print error instead of failwith when exploit commands unsuccessful 2021-07-08 16:09:12 -05:00
Jack Heysel f797f30651 Fixed call to write directory 2021-07-08 16:09:04 -05:00
Jack Heysel 1a73cfbe25 Updated check method 2021-07-08 16:09:03 -05:00
Jack Heysel c5a9ecd45b WritableDir as advanced opt 2021-07-08 16:09:03 -05:00
Jack Heysel f87f831aba Module updates + Docs 2021-07-08 16:09:02 -05:00
Jack Heysel 8d2d445699 Send one large command over many of smaller size 2021-07-08 16:08:36 -05:00
Jack Heysel e7608d79f6 Polkit authentication bypass 2021-07-08 16:08:33 -05:00
Spencer McIntyre dc9c0035ab Land #15371, check if apport-cli is in $PATH
Fixes #15370
2021-07-08 09:28:35 -04:00