Commit Graph

3986 Commits

Author SHA1 Message Date
Wei Chen 63de0051f4 Cosmetic changes 2019-07-28 21:38:54 -05:00
Quentin Kaiser 34c5277e4e Deprecate module. 2019-07-27 10:49:59 +02:00
Quentin Kaiser 413da527ab Module renaming. 2019-07-27 10:47:58 +02:00
Quentin Kaiser 18f7ae379b Add support for RV110W and RV215W + check method to fingerprint devices. 2019-07-27 10:45:31 +02:00
Green-m e71b92aa60 We are not evil! 2019-07-21 09:33:18 +08:00
Green-m 07f3c074d4 Add doc and enhance the module. 2019-07-20 00:17:57 +08:00
Tim W b258b8270e fix #12104, add CVE-2019-13272 PTRACE_TRACEME linux local exploit 2019-07-19 13:24:13 +08:00
Guillaume Andre 395e4d2424 Update documentation. Register options by alphabetical order.
Change-Id: I46bb3701107a504dddbf030e0345d7adc83bafac
2019-07-18 10:45:44 +01:00
Shelby Pace 61d5be5981 add module skeleton and check 2019-07-17 15:51:11 -05:00
Green-m b6697f5016 Add redis rce module and data stuff.
To do:
1. Check env of system and compiler.
2. Add a compiled so file to be compatible with windows and mac.
3. Add doc.
2019-07-17 15:33:02 +08:00
yaumn e51138fa4b Establish a tcp connection to check for the exim version. 2019-07-13 22:45:21 +01:00
yaumn 764a4a0692 Improve check regex 2019-07-13 19:57:03 +01:00
yaumn e2a9907e99 Add SendExpectTimeout option 2019-07-13 19:55:12 +01:00
yaumn f465e43e34 Change tcp communication with meterpreter 2019-07-13 19:25:34 +01:00
Guillaume Andre 60dbbb0455 Ensure temp files are deleted in every case
Change-Id: I53401e4bcce887048f433743a965421f93d699ba
2019-07-12 12:20:37 +01:00
Guillaume Andre 642a71383d Classic shell exploit now uses a bash script
Change-Id: I770cf9bcae5c5a265c19f2dc9e4a512e30705b6c
2019-07-11 17:01:23 +01:00
Guillaume Andre 565e18cbe8 Add a few checks
Change-Id: Ieca129a54d2105bf646e6f848cb5ecec804c372f
2019-07-11 14:20:21 +01:00
yaumn 435240ed41 Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-07-10 17:24:48 +01:00
yaumn 074c73236a Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-07-10 17:24:32 +01:00
yaumn 7812e0037b Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-07-10 17:24:13 +01:00
yaumn af89433c1d Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-07-10 17:23:50 +01:00
yaumn 9ffbfe0985 Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-07-10 17:23:38 +01:00
yaumn a06dffa174 Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-07-10 17:22:52 +01:00
Guillaume Andre 5d52b0326b Add better checks at the beginning of the exploit.
Change-Id: Ib80907f03f15b6c0cf32b48f059cf042e4d6a91f
2019-07-10 11:33:09 +01:00
Guillaume Andre b68383141c Added Qualys and dhn to credits. Set suid bit of payload instead of shell launcher. Print detected exim version
Change-Id: I61805a4d2b6f7f8a268b677c3c6f1d76ada034da
2019-07-09 16:51:14 +01:00
yaumn df46faf71f Finish documentation. Exploit is stable. 2019-07-07 23:58:29 +01:00
yaumn 7b2a1b67ed Add a documentation file 2019-07-07 00:25:54 +01:00
yaumn a5843e48a9 Basic reverse shell does not disconnect anymore 2019-07-06 00:53:33 +01:00
Guillaume Andre 4c2cacd7d6 Add meterpreter support 2019-07-05 16:53:39 +01:00
yaumn 2c8ad0e357 First tests with meterpreter sockets 2019-07-05 01:04:15 +01:00
yaumn 74eb74e606 Pipe method with netcat now works 2019-07-04 23:15:23 +01:00
Guillaume Andre e4c27d3eab Clean pipe file
Change-Id: Ibc78639ad44eb56ffa26fcfb4f656b5a78dbf76a
2019-07-04 16:20:13 +01:00
Guillaume Andre 3c0b581371 Clean code
Change-Id: I83287dcd52c4ba566396a0ff7e4f3c3125d12bb0
2019-07-04 16:16:27 +01:00
Guillaume Andre 9b378ceb71 Add options. Add pipe netcat method
Change-Id: I0c401add1c2ff76e3e2c3d82a8fb7f74db405a1f
2019-07-04 15:02:03 +01:00
yaumn bddfef0cac Add options. Exploits now works with both setuid and nc methods 2019-07-04 00:16:28 +01:00
yaumn bb58160d10 Exploits now also works with netcat 2019-07-03 14:30:23 +01:00
yaumn 4f1d9af5fd Add netcat method (still buggy though) 2019-07-03 14:30:23 +01:00
Guillaume Andre a2411a1d63 First version of the exploit is now working
Change-Id: Idf6b6d773cf71c477fe68885313f5f98d74d9c11
2019-07-03 14:30:23 +01:00
Guillaume Andre bef6425d0e First commit
Change-Id: If751eb1753fc8991fe7971c7123a203734396a46
2019-07-03 14:30:23 +01:00
bcoles c7ff78c277 Remove spaces at EOL 2019-06-29 14:01:18 +10:00
Brendan Coles 203e3b74db Add Serv-U FTP Server prepareinstallation Privilege Escalation 2019-06-29 03:52:53 +00:00
William Vu 0a00f3851a Land #12007, true 0s timeout in send_request_* 2019-06-28 12:32:32 -05:00
William Vu cc3fd747aa Add Pen Test Partners reference
Did we somehow miss this?
2019-06-26 11:05:22 -05:00
Wei Chen 685fb55179 Land #11987, Add Nagios XI 5.5.6 magpie_debug Root Exploit 2019-06-25 16:17:50 -05:00
Wei Chen 23dbc4d90d Change file name 2019-06-25 16:10:44 -05:00
Wei Chen e9fc9970ba Make names more random. Also, make metadata changes 2019-06-25 16:09:15 -05:00
Quentin Kaiser 94dd2b1800 Fix disclosure date format.
Co-Authored-By: @shellfail <jrobles@rapid7.com>
2019-06-25 20:50:56 +02:00
William Vu 7739e9f43e Update my modules 2019-06-24 13:38:14 -05:00
Wei Chen a93a520c3a Land #11960, Add LPE for Cisco Prime Infrastructure's runrshell exe 2019-06-19 10:49:17 -05:00
Wei Chen c637755ebd Land #11956 - Add Cisco Prime Infrastructure Health Monitor Tar RCE 2019-06-19 10:46:35 -05:00