catatonicprime
20109932fd
Command injection PoC working.
2023-04-23 15:30:23 +00:00
catatonicprime
253f4e54bc
rough pseudo-coding
2023-04-21 03:53:03 +00:00
sfewer-r7
e54774fd20
ensure SRVHOST is a routable IP
2023-04-17 13:01:30 +01:00
sfewer-r7
5d05754d9b
update the AKB URL to reference the changed CVE
2023-04-14 17:44:38 +01:00
sfewer-r7
e6211175b3
rename the files to the correct CVE
2023-04-14 15:52:13 +01:00
sfewer-r7
b5ea420760
On April 12 Adobe reclassified CVE-2023-26360 from an Improper Access Controll vuln to a Deserialization of Untrusted Data vuln. A private report has confirmed that CVE-2023-26359 is a similar yet seperate vuln, so I am changing the CVE associated with these two modules from CVE-2023-26359 to CVE-2023-26360 as we now beliee this is the correct CVE.
2023-04-14 15:49:10 +01:00
dwelch-r7
f9d5459a9c
Land #17872 , Ensure identify hashes helper is accessible to modules
2023-04-13 16:20:20 +01:00
sfewer-r7
90dacd00ab
favor a staged meterpreter payload over the non staged payload as a default
2023-04-13 16:11:19 +01:00
adfoster-r7
aef2b8d314
Land #17804 , Fix incorrect module metadata CI and add validation automation
2023-04-13 15:11:46 +01:00
adfoster-r7
8e2169ed47
Ensure identify hashes helper is accessible to modules
2023-04-12 13:28:56 +01:00
sfewer-r7
375d9b34f1
make on_request_uri compatible with both command staget and teh generic java target
2023-04-11 14:25:07 +01:00
sfewer-r7
0022d0b8c3
Merge branch 'CVE-2023-26359-java-payload' into CVE-2023-26359
2023-04-11 13:59:37 +01:00
sfewer-r7
1dc8eb2802
remove linemax option from execute_cmdstager as it was artifact from testing and is not needed here
2023-04-11 12:14:28 +01:00
sfewer-r7
296fd6fec7
add in bourne and printf command stager flavors for Linux target
2023-04-11 12:07:49 +01:00
sfewer-r7
70018f7543
add psh_invokewebrequest as a command stager flavor for Windows
2023-04-11 11:57:39 +01:00
sfewer-r7
657c1446c4
dont check these datastore options for empty? as the default values will either be set or an empty value will be detected during configuration validation
2023-04-11 11:41:55 +01:00
sfewer-r7
fa1e7ae016
close all CMFL tags and chain the getRuntime and exec calls for berevity
2023-04-11 11:22:13 +01:00
sfewer-r7
b05c9c6303
add a generic java target
2023-04-06 17:29:50 +01:00
sfewer-r7
43fe41bea5
RCE exploit for CVE-2023-26359 and an auxiliary module for arbitrary file read via the same vuln.
2023-04-06 14:02:01 +01:00
Christophe De La Fuente
5d63175b56
Land #17823 , php_cgi_arg_injection: Fix check regex match to detect code html tag
2023-04-05 16:44:52 +02:00
cgranleese-r7
c3a7da54d5
reduces code duplication
2023-04-04 10:27:11 +01:00
cgranleese-r7
40e6917b7f
tests passing
2023-04-04 10:24:09 +01:00
SubcomandanteMeowcos
a54f3d4707
fix broken module references
...
doing these "by domain" now, piecemeal.
this PR fixes all broken references to the "insecurety" website, which is long dead.
2023-04-01 05:17:02 -07:00
adfoster-r7
0a559bfded
Land #17704 , Apache Solr RCE via Velocity Template: Attempt fix for NoMethodError when exploiting
2023-03-29 15:12:04 +01:00
Jack Heysel
f3c12ba176
Land #17808 , Update broken secunia references
...
The Secunia links in the framework were dead. They have
now been restored using the wayback machine to grab
replacement links from the earliest date possible.
2023-03-27 17:20:13 -04:00
bcoles
abe5570902
php_cgi_arg_injection: Fix check regex match to detect code html tag
2023-03-27 15:21:04 +11:00
bcoles
8572053f0c
php_cgi_arg_injection: Add notes and resolve Rubocop violations
2023-03-27 15:16:51 +11:00
adfoster-r7
d04c8e1bce
Update broken secunia references
2023-03-23 10:43:57 +00:00
space-r7
67ac2dc584
Land #17771 , add monitorr file upload rce
2023-03-22 13:00:38 -05:00
space-r7
3fe0801d92
use target_uri.path in requests
2023-03-22 12:50:11 -05:00
h00die-gr3y
e3df74ee5b
Updates addressing review points of space-r7
2023-03-20 21:04:58 +00:00
H00die.Gr3y
871a251c94
Apply suggestions from code review
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-03-20 21:44:11 +01:00
h00die-gr3y
5903addbd6
Updates adressing majority of review points
2023-03-19 15:13:09 +00:00
Christophe De La Fuente
0df12fd694
Land #17754 , Open web analytics 1.7.3 remote code execution
2023-03-17 10:15:33 +01:00
H00die.Gr3y
04e0fc70bf
Apply suggestions from code review
...
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com >
2023-03-16 19:25:03 +01:00
Pflegusch
3baa894840
Add DefangedMode to warn the user
2023-03-16 18:07:28 +01:00
Christophe De La Fuente
daadb4f523
Land #17775 - Add exploit for Bitbucket env var RCE (CVE-2022-43781)
2023-03-16 11:01:07 +01:00
Pflegusch
027793cce6
Remove unused variable res in check_connection
2023-03-15 19:00:26 +01:00
Pflegusch
ac72c12734
Set timeout of 1s to make session available much quicker
2023-03-15 18:59:22 +01:00
Pflegusch
d06e2d9e3d
Remove nvd url
2023-03-15 18:56:23 +01:00
space-r7
22c05105d3
address review comments
...
reduces some code duplication, sets privileged to true,
and modifies documentation to reflect lhost / rhost opts
2023-03-15 11:18:03 -05:00
Pflegusch
ee0334dd40
since file got deleted, one can not trigger the payload anymore by opening the php url
2023-03-15 01:05:10 +01:00
space-r7
fddcae3d93
don't always create repo
2023-03-14 19:03:58 -05:00
Pflegusch
0cbebc8a4c
Remove malicious .php file at the end of the exploit
2023-03-15 01:03:20 +01:00
Pflegusch
103def70e4
More detailed error message for failed regex match
2023-03-15 00:07:20 +01:00
Pflegusch
d72d47e502
Update Failure Codes and check for nil in the helper functions
2023-03-14 23:59:57 +01:00
Pflegusch
897aaf9572
Use Failure::UnexpectedReply when password cant be changed
2023-03-14 23:41:48 +01:00
Pflegusch
2310b0d942
Use Failure::NotFound when no valid cache file is found
2023-03-14 23:40:29 +01:00
Pflegusch
86f4a16cff
Check if cache_request is not nil
2023-03-14 23:38:57 +01:00
Pflegusch
e160e51711
Fix typos, update docs with advanced option SearchLimit, implement SearchLimit into module
2023-03-14 23:29:55 +01:00