Grant Willcox
|
d83ede6306
|
Fix up some check method issues and some XML data validation issues identified during review
|
2021-08-31 18:25:01 -05:00 |
|
Your Name
|
5599929b6a
|
Fixed Randomization
|
2021-08-31 18:25:00 -05:00 |
|
Grant Willcox
|
0a57641aa4
|
Add in documentation and module code cleanness improvements and also make the output easier for readers to understand should something fail midway through.
|
2021-08-31 18:24:57 -05:00 |
|
Your Name
|
cd74e34e3c
|
Fixed Authors
|
2021-08-31 18:24:51 -05:00 |
|
Your Name
|
b5b0b3087a
|
Fixed References and Description
|
2021-08-31 18:24:50 -05:00 |
|
Your Name
|
56cde3eaba
|
Add Geutebruck CVE_2021_335XX command injections module
|
2021-08-31 18:24:14 -05:00 |
|
Grant Willcox
|
488f58a068
|
Attempt to fix RuboCop errors
|
2021-08-31 15:36:00 -05:00 |
|
Grant Willcox
|
3bca3b0bcb
|
Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match
|
2021-08-31 15:07:37 -05:00 |
|
Your Name
|
690af9f956
|
Fixed CVE Number
|
2021-08-30 08:18:19 +01:00 |
|
Your Name
|
70f3f9d731
|
Fixed CVE Number
|
2021-08-28 11:33:42 +01:00 |
|
adfoster-r7
|
4a9a15e638
|
Run Rubocop layout rules on modules
|
2021-08-27 17:19:43 +01:00 |
|
Your Name
|
8d28dece69
|
Added Notes
|
2021-08-27 16:42:54 +01:00 |
|
Your Name
|
6a501a37ff
|
Add CVE-2021-33549 exploit for Geutebruck G-CAM
|
2021-08-27 01:28:26 +01:00 |
|
Grant Willcox
|
6f9b06fb4b
|
Add in Manfred Paul's original blog post and chompie1337's original PoC to the list of links. Also add in a relatively detailed description of how to add in new targets to this exploit to the documentation in case that helps anyone down the line
|
2021-08-25 18:09:07 -05:00 |
|
Grant Willcox
|
29a230ec72
|
Improve error handling for module
|
2021-08-24 17:36:37 -05:00 |
|
Grant Willcox
|
bd490d35ed
|
Add support for Linux 5.11.x on Fedora
|
2021-08-23 15:09:10 -05:00 |
|
Grant Willcox
|
db5ac81ecf
|
Fix up mistakes bcoles pointed out and also add in a check to ensure we are only targetting x64 systems
|
2021-08-23 13:23:40 -05:00 |
|
Grant Willcox
|
e46611cffb
|
Add in support for exploiting Fedora 32 with Linux kernel 5.10.12
|
2021-08-20 18:04:59 -05:00 |
|
Grant Willcox
|
75ae2b76f5
|
Add support for Fedora 32 Linux Kernel 5.9.8-100 and also fix an error where the wrong file was being used for Fedora 32 Linux Kernel 5.8.8.
|
2021-08-20 16:50:20 -05:00 |
|
Grant Willcox
|
5abf407228
|
Add support for Fedora 32 with Linux Kernel 5.8.8-200
|
2021-08-20 15:42:34 -05:00 |
|
Grant Willcox
|
dd806a9d61
|
Add in support for Fedora 32 running kernel 5.7.11-200
|
2021-08-20 13:37:52 -05:00 |
|
sjanusz
|
8e00c5a188
|
Add default payload option to targets
|
2021-08-20 16:38:22 +01:00 |
|
Grant Willcox
|
b479cb61a4
|
Add in scenario for Ubuntu 20.04.02 LTS and show that its still working as expected
|
2021-08-19 15:05:03 -05:00 |
|
Grant Willcox
|
945004ed97
|
Fix up typo that was breaking the code and also fix RuboCop errors
|
2021-08-19 14:12:03 -05:00 |
|
Grant Willcox
|
b60ad3ee26
|
Fix up mistakes I noticed whilst doing edits on the code as well as some mistakes identified during peer review
|
2021-08-19 13:55:54 -05:00 |
|
Grant Willcox
|
d5df47692c
|
Add in first copy of the exploit along with the supporting source code and binaries. Documentation to come
|
2021-08-17 18:01:14 -05:00 |
|
William Vu
|
521ca14773
|
Add Lucee Administrator CVE-2021-21307 exploit
|
2021-08-16 10:09:34 -05:00 |
|
Alan Foster
|
03400991af
|
Update uses of open ssl
|
2021-08-10 15:40:23 +01:00 |
|
Jack Heysel
|
29b193406e
|
Fix for file clean up in the Cisco Hyperflex file upload RCE module
|
2021-07-30 14:59:52 -04:00 |
|
adfoster-r7
|
951809e164
|
Land #15491, add module stability notes
|
2021-07-29 17:24:42 +01:00 |
|
space-r7
|
809081bc5f
|
Land #15279, add Pi-Hole lpe
|
2021-07-29 11:15:17 -05:00 |
|
space-r7
|
0561ae978f
|
fix typos, pihole version in docs
|
2021-07-29 11:13:58 -05:00 |
|
cgranleese-r7
|
56510a2e8e
|
Updates some notes on modules that weren't passing tests due to new rubocop rule
|
2021-07-28 16:20:02 +01:00 |
|
William Vu
|
6a6c08c773
|
Fix edge case in method overloading
|
2021-07-12 20:29:56 -05:00 |
|
William Vu
|
d29532d4c4
|
Add VMware vCenter Server CVE-2021-21985 exploit
|
2021-07-12 13:07:05 -05:00 |
|
William Vu
|
6fbaecf919
|
Backport print changes to recent modules
|
2021-07-08 21:26:35 -05:00 |
|
Grant Willcox
|
570ba091f6
|
Update some typos in the documentation and also update the exploit module to handle various cases whereby the dbus-send command might end up timing out due to TIMEOUT being too low and to fix some final issues found during testing
|
2021-07-08 16:24:01 -05:00 |
|
Grant Willcox
|
9f88ef0954
|
Fix up review comments
|
2021-07-08 16:22:29 -05:00 |
|
Jack Heysel
|
54ee8f7ae7
|
Added cmd_delay nil check, updated title
|
2021-07-08 16:20:45 -05:00 |
|
Jack Heysel
|
0f67dd5212
|
Fixed get_cmd_delay, reponded to comments
|
2021-07-08 16:20:38 -05:00 |
|
Jack Heysel
|
9a07039e7e
|
Updated docs
|
2021-07-08 16:09:15 -05:00 |
|
Jack Heysel
|
fdbf669da2
|
Fixed check for /bin/su
|
2021-07-08 16:09:12 -05:00 |
|
Jack Heysel
|
285a6338fa
|
Print error instead of failwith when exploit commands unsuccessful
|
2021-07-08 16:09:12 -05:00 |
|
Jack Heysel
|
f797f30651
|
Fixed call to write directory
|
2021-07-08 16:09:04 -05:00 |
|
Jack Heysel
|
1a73cfbe25
|
Updated check method
|
2021-07-08 16:09:03 -05:00 |
|
Jack Heysel
|
c5a9ecd45b
|
WritableDir as advanced opt
|
2021-07-08 16:09:03 -05:00 |
|
Jack Heysel
|
f87f831aba
|
Module updates + Docs
|
2021-07-08 16:09:02 -05:00 |
|
Jack Heysel
|
8d2d445699
|
Send one large command over many of smaller size
|
2021-07-08 16:08:36 -05:00 |
|
Jack Heysel
|
e7608d79f6
|
Polkit authentication bypass
|
2021-07-08 16:08:33 -05:00 |
|
Spencer McIntyre
|
dc9c0035ab
|
Land #15371, check if apport-cli is in $PATH
Fixes #15370
|
2021-07-08 09:28:35 -04:00 |
|