Shelby Pace
1d6e7313ce
remove ForceExploit option
2020-06-18 15:05:02 -05:00
gwillcox-r7
199d7db222
Fix up items mentioned by @space-r7 during her review
2020-06-18 09:56:20 -05:00
gwillcox-r7
275ed6429e
Fix up rubocop errors in the module
2020-06-17 15:11:55 -05:00
gwillcox-r7
eebacb8fbb
Make adjustments so that this module only supports Windows so that we can land this for now. Linux support may be added in the future.
2020-06-17 14:56:40 -05:00
gwillcox-r7
c29cf491ed
Add idea for trying to fix up not being able to write to disk, may need further improvements
2020-06-17 12:36:00 -05:00
gwillcox-r7
25f32d68d5
Add in some RuboCop fixes
2020-06-17 11:15:10 -05:00
gwillcox-r7
c7bcd9152c
Add in support to detect if the PHP payload was not uploaded successfully.
2020-06-17 11:13:24 -05:00
gwillcox-r7
3787849a6b
Fix cleanup code for Windows, should now have good working Windows code
2020-06-16 14:49:09 -05:00
gwillcox-r7
cc0ab19dea
Clear up release date and add more comments explaining purpose of some of the resource links
2020-06-16 12:17:13 -05:00
gwillcox-r7
b6dfbe926c
Simplify the Description field of the exploit
2020-06-16 11:58:51 -05:00
RAMELLA Sébastien
876836bcce
update doc and fix module syntax.
2020-06-16 10:47:51 -05:00
RAMELLA Sébastien
fbffefbdb2
add. original module edb reference.
2020-06-16 10:47:50 -05:00
RAMELLA Sébastien
1ab77af898
fix. remove setup function initialization
2020-06-16 10:47:50 -05:00
RAMELLA Sébastien
624c69bebf
add. authenticated exploitation
2020-06-16 10:47:50 -05:00
RAMELLA Sébastien
1a9431d965
fix. json parser and add random number into sqli
2020-06-16 10:47:49 -05:00
RAMELLA Sébastien
c704dba44c
add. agent tesla panel rce exploit module
2020-06-16 10:47:49 -05:00
kalba-security
b5ad7a8511
Use session_created, update documentation
2020-06-15 13:37:59 -04:00
kalba-security
8bc35859ff
Remove comment left from testing
2020-06-15 13:22:06 -04:00
kalba-security
546dcdbeef
Add register_file_for_cleanup
2020-06-15 13:13:52 -04:00
Pedro Ribeiro
dad6f0a007
Update modules/exploits/multi/scada/inductive_ignition_rce.rb
...
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-06-15 16:16:09 +07:00
Pedro Ribeiro
0688b27247
Update modules/exploits/multi/scada/inductive_ignition_rce.rb
...
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-06-15 16:16:02 +07:00
Pedro Ribeiro
6b71c1930e
Update modules/exploits/multi/scada/inductive_ignition_rce.rb
...
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-06-15 16:15:54 +07:00
kalba-security
e4351d37b8
Add ATutor 2.2.4 directory traversal / RCE module and docs
2020-06-12 16:02:00 -04:00
Pedro Ribeiro
815a7c8185
fix typo
2020-06-12 12:59:31 +07:00
l0ss
49eb1efd40
Base64 enc payload to bypass escaping quotes etc.
...
The second step (POST with payload) of this module wasn't working as-written as the server was escaping out quotes etc.
Added b64 decoding/encoding to injected code in step 1 and step 2 payload to bypass server-side escaping of quotes etc.
2020-06-12 13:44:00 +08:00
Pedro Ribeiro
dc19dc96d2
Rename ignition_automation_rce.rb to inductive_ignition_rce.rb
2020-06-12 11:30:36 +07:00
Pedro Ribeiro
4ad9f5543e
Create ignition_automation_rce.rb
2020-06-12 11:19:42 +07:00
Christophe De La Fuente
9f2a29d4fe
Update last batch of modules
2020-06-09 14:18:52 +02:00
Christophe De La Fuente
2f873fefcd
Update modules
...
- modules/auxiliary/scanner/smb/smb_enumshares.rb
- modules/exploits/linux/samba/setinfopolicy_heap.rb
- modules/exploits/linux/samba/trans2open.rb
- modules/exploits/multi/samba/usermap_script.rb
- modules/exploits/windows/smb/ipass_pipe_exec.rb
2020-06-09 14:18:52 +02:00
Shelby Pace
51fca24a38
Land #13545 , add drag / drop file upload rce
2020-06-04 10:35:03 -05:00
Shelby Pace
329ba1091f
add session_created, fix typo
2020-06-04 10:32:17 -05:00
h00die
0df1a2a502
more error handling
2020-06-04 06:45:29 -04:00
William Vu
8ad7b71829
Land #13552 , WebLogic CVE-2020-2883 exploit
2020-06-03 19:52:52 -05:00
h00die
434a1f587f
rubocop
2020-06-03 10:44:48 -04:00
h00die
a2e385e565
more fixes
2020-06-03 10:42:25 -04:00
Zenofex
8f587e4c6f
A user reported that the CVE-2020-12720 modules were not properly handling cases where a table prefix was not used, this guard clauses was redundant in that the one inside the get_table_prefix method is already checking the result of the SQL injection performed.
2020-06-02 19:16:35 -05:00
h00die
ff067088fd
docs
2020-06-02 16:24:04 -04:00
Shelby Pace
b7dd7b3f7a
remove old version, rubocop
2020-06-02 14:24:18 -05:00
Shelby Pace
ffd79ff8cc
add exploit for most versions
2020-06-01 09:41:56 -05:00
h00die
41b512ecda
dnd multi file upload rce
2020-05-30 21:07:46 -04:00
Zenofex
7bf2a802b1
Check for existance of res in guard clauses through getindexablecontent exploit and aux module.
2020-05-28 20:00:19 -05:00
Zenofex
e5dcb2e23c
Switch to use res.get_json_document from JSON.parse and more cleanup.
2020-05-28 11:16:44 -05:00
Zenofex
b8e8606977
Added actions to module for dumpuser/dumpall option (and removed module option) plus misc syntax formatting.
2020-05-28 10:13:18 -05:00
Zenofex
7ef7af0d30
Ran msftidy across documentation and made recommended changes to clean up module for MSF pull request.
2020-05-26 17:31:02 -05:00
Zenofex
e7d7ddc213
Initial push of vbulletin_getIndexableContent auxillary and exploit modules + documentation.
2020-05-23 03:20:46 -05:00
William Vu
8473662e32
Land #13463 , Oracle WebLogic CVE-2020-2555 exploit
2020-05-20 23:21:07 -05:00
Shelby Pace
abff1cd731
change true to false
2020-05-19 14:59:47 -05:00
Shelby Pace
378fe767b5
randomize class name
2020-05-19 14:35:36 -05:00
Shelby Pace
8f43ffa8e3
change title
2020-05-19 13:59:27 -05:00
Shelby Pace
6657d3480e
remove returns, add autocheck
2020-05-19 13:47:39 -05:00