Commit Graph

4544 Commits

Author SHA1 Message Date
Shelby Pace 1d6e7313ce remove ForceExploit option 2020-06-18 15:05:02 -05:00
gwillcox-r7 199d7db222 Fix up items mentioned by @space-r7 during her review 2020-06-18 09:56:20 -05:00
gwillcox-r7 275ed6429e Fix up rubocop errors in the module 2020-06-17 15:11:55 -05:00
gwillcox-r7 eebacb8fbb Make adjustments so that this module only supports Windows so that we can land this for now. Linux support may be added in the future. 2020-06-17 14:56:40 -05:00
gwillcox-r7 c29cf491ed Add idea for trying to fix up not being able to write to disk, may need further improvements 2020-06-17 12:36:00 -05:00
gwillcox-r7 25f32d68d5 Add in some RuboCop fixes 2020-06-17 11:15:10 -05:00
gwillcox-r7 c7bcd9152c Add in support to detect if the PHP payload was not uploaded successfully. 2020-06-17 11:13:24 -05:00
gwillcox-r7 3787849a6b Fix cleanup code for Windows, should now have good working Windows code 2020-06-16 14:49:09 -05:00
gwillcox-r7 cc0ab19dea Clear up release date and add more comments explaining purpose of some of the resource links 2020-06-16 12:17:13 -05:00
gwillcox-r7 b6dfbe926c Simplify the Description field of the exploit 2020-06-16 11:58:51 -05:00
RAMELLA Sébastien 876836bcce update doc and fix module syntax. 2020-06-16 10:47:51 -05:00
RAMELLA Sébastien fbffefbdb2 add. original module edb reference. 2020-06-16 10:47:50 -05:00
RAMELLA Sébastien 1ab77af898 fix. remove setup function initialization 2020-06-16 10:47:50 -05:00
RAMELLA Sébastien 624c69bebf add. authenticated exploitation 2020-06-16 10:47:50 -05:00
RAMELLA Sébastien 1a9431d965 fix. json parser and add random number into sqli 2020-06-16 10:47:49 -05:00
RAMELLA Sébastien c704dba44c add. agent tesla panel rce exploit module 2020-06-16 10:47:49 -05:00
kalba-security b5ad7a8511 Use session_created, update documentation 2020-06-15 13:37:59 -04:00
kalba-security 8bc35859ff Remove comment left from testing 2020-06-15 13:22:06 -04:00
kalba-security 546dcdbeef Add register_file_for_cleanup 2020-06-15 13:13:52 -04:00
Pedro Ribeiro dad6f0a007 Update modules/exploits/multi/scada/inductive_ignition_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-06-15 16:16:09 +07:00
Pedro Ribeiro 0688b27247 Update modules/exploits/multi/scada/inductive_ignition_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-06-15 16:16:02 +07:00
Pedro Ribeiro 6b71c1930e Update modules/exploits/multi/scada/inductive_ignition_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-06-15 16:15:54 +07:00
kalba-security e4351d37b8 Add ATutor 2.2.4 directory traversal / RCE module and docs 2020-06-12 16:02:00 -04:00
Pedro Ribeiro 815a7c8185 fix typo 2020-06-12 12:59:31 +07:00
l0ss 49eb1efd40 Base64 enc payload to bypass escaping quotes etc.
The second step (POST with payload) of this module wasn't working as-written as the server was escaping out quotes etc.

Added b64 decoding/encoding to injected code in step 1 and step 2 payload to bypass server-side escaping of quotes etc.
2020-06-12 13:44:00 +08:00
Pedro Ribeiro dc19dc96d2 Rename ignition_automation_rce.rb to inductive_ignition_rce.rb 2020-06-12 11:30:36 +07:00
Pedro Ribeiro 4ad9f5543e Create ignition_automation_rce.rb 2020-06-12 11:19:42 +07:00
Christophe De La Fuente 9f2a29d4fe Update last batch of modules 2020-06-09 14:18:52 +02:00
Christophe De La Fuente 2f873fefcd Update modules
- modules/auxiliary/scanner/smb/smb_enumshares.rb
- modules/exploits/linux/samba/setinfopolicy_heap.rb
- modules/exploits/linux/samba/trans2open.rb
- modules/exploits/multi/samba/usermap_script.rb
- modules/exploits/windows/smb/ipass_pipe_exec.rb
2020-06-09 14:18:52 +02:00
Shelby Pace 51fca24a38 Land #13545, add drag / drop file upload rce 2020-06-04 10:35:03 -05:00
Shelby Pace 329ba1091f add session_created, fix typo 2020-06-04 10:32:17 -05:00
h00die 0df1a2a502 more error handling 2020-06-04 06:45:29 -04:00
William Vu 8ad7b71829 Land #13552, WebLogic CVE-2020-2883 exploit 2020-06-03 19:52:52 -05:00
h00die 434a1f587f rubocop 2020-06-03 10:44:48 -04:00
h00die a2e385e565 more fixes 2020-06-03 10:42:25 -04:00
Zenofex 8f587e4c6f A user reported that the CVE-2020-12720 modules were not properly handling cases where a table prefix was not used, this guard clauses was redundant in that the one inside the get_table_prefix method is already checking the result of the SQL injection performed. 2020-06-02 19:16:35 -05:00
h00die ff067088fd docs 2020-06-02 16:24:04 -04:00
Shelby Pace b7dd7b3f7a remove old version, rubocop 2020-06-02 14:24:18 -05:00
Shelby Pace ffd79ff8cc add exploit for most versions 2020-06-01 09:41:56 -05:00
h00die 41b512ecda dnd multi file upload rce 2020-05-30 21:07:46 -04:00
Zenofex 7bf2a802b1 Check for existance of res in guard clauses through getindexablecontent exploit and aux module. 2020-05-28 20:00:19 -05:00
Zenofex e5dcb2e23c Switch to use res.get_json_document from JSON.parse and more cleanup. 2020-05-28 11:16:44 -05:00
Zenofex b8e8606977 Added actions to module for dumpuser/dumpall option (and removed module option) plus misc syntax formatting. 2020-05-28 10:13:18 -05:00
Zenofex 7ef7af0d30 Ran msftidy across documentation and made recommended changes to clean up module for MSF pull request. 2020-05-26 17:31:02 -05:00
Zenofex e7d7ddc213 Initial push of vbulletin_getIndexableContent auxillary and exploit modules + documentation. 2020-05-23 03:20:46 -05:00
William Vu 8473662e32 Land #13463, Oracle WebLogic CVE-2020-2555 exploit 2020-05-20 23:21:07 -05:00
Shelby Pace abff1cd731 change true to false 2020-05-19 14:59:47 -05:00
Shelby Pace 378fe767b5 randomize class name 2020-05-19 14:35:36 -05:00
Shelby Pace 8f43ffa8e3 change title 2020-05-19 13:59:27 -05:00
Shelby Pace 6657d3480e remove returns, add autocheck 2020-05-19 13:47:39 -05:00