Christophe De La Fuente
f07578b4b4
Land #18209 , Fix bypassuac_comhijack module crash
2023-08-01 14:52:41 +02:00
Jack Heysel
416124705f
Working in metasploit
2023-07-28 03:43:37 -04:00
adfoster-r7
c26d44a177
Fix bypassuac_comhijack module crash
2023-07-21 16:46:43 +01:00
cgranleese-r7
8e0a909b18
Fixes incorrect usage of pack/unpack directives
2023-07-19 11:39:00 +01:00
adfoster-r7
5cb5c18550
Land #18170 , Add module for SmarterMail Build 6985 - dotNET Deserialization Remote Code Execution (CVE-2019-7214)
2023-07-10 23:56:09 +01:00
Jeffrey Martin
3635ce9c03
update reference format for entry in rapid7.com
2023-07-10 16:54:42 -05:00
ismaildawoodjee
e61342afac
Proper error handling for closing TCP socket and used Rex exceptions
2023-07-09 07:25:09 -04:00
ismaildawoodjee
1706812099
Implemented requested changes
...
* Small fixes in Description - removed backticks
* Implemented Windows Command target
* Removed PowerShell Stager, in Targets and in exploit method
* Implemented Rex::Socket::Tcp in place of TCPSocket
* Updated TARGET section in documentation
* Added TARGET 0 - Windows Command scenario
* Removed PowerShell Stager scenario
* Replaced 'Using configured payload' lines to use Windows Command payload
for the 2nd, 3rd, and 4th scenarios. Did not rerun the scenarios, however
2023-07-07 04:14:20 -04:00
Ismail Dawoodjee
f959dee046
Change module name
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2023-07-06 18:50:44 +03:00
ismaildawoodjee
591fee1850
Fix msftidy complaining about https:// URL scheme in Line 2
2023-07-06 11:01:54 -04:00
ismaildawoodjee
ad0d3e79a9
SmarterMail RCE module and documentation
2023-07-06 08:00:28 -04:00
Grant Willcox
3ab7b3ddc7
Add in autocheck and expand check logic for Windows 11 targets
2023-06-30 16:41:03 -05:00
Grant Willcox
17ffd4e0f6
Add in description about why versions after 22000.194 aren't affected
2023-06-30 16:40:53 -05:00
Wrathdemon
7870bfe94e
fix #15890 : Support Windows 11 in Capcom.sys LPE Module
2023-06-30 16:40:43 -05:00
adfoster-r7
085943bd78
Add Ruby 3.3.0-preview1 to test suite
2023-06-29 22:53:17 +01:00
Spencer McIntyre
b5e028b47c
Land #18100 , Add MOVEit CVE-2023-34362
2023-06-22 14:23:44 -04:00
Spencer McIntyre
dfd450561e
Tweak some messages and cleanup markdown table
2023-06-22 14:23:25 -04:00
bwatters
a05bde217c
Ensure any users we create are deleted
2023-06-22 12:18:07 -05:00
bwatters
5f667e1d79
Address code review
2023-06-22 10:22:43 -05:00
bwatters
a2c2a9193f
Update error catching logic
2023-06-22 08:27:44 -05:00
bwatters
2adea08f67
Add documentation & code cleanup
2023-06-21 15:41:50 -05:00
bwatters
52907ac794
Add space limitation
2023-06-21 12:56:59 -05:00
bwatters
10c6e6328f
Add user cleanup and update error handling
2023-06-21 12:00:34 -05:00
bwatters
9d16b0043b
Add check method
2023-06-21 11:26:04 -05:00
bwatters
957339b3c0
Simplify output
2023-06-21 08:34:02 -05:00
bwatters
d63c14dc17
Ugly, but working
2023-06-20 20:06:57 -05:00
Ashley Donaldson
381d291da9
Use revision in MSF modules
2023-06-16 10:07:35 +10:00
bwatters
d5a986a4bc
Fix copy/pasta
2023-06-15 08:34:30 -05:00
bwatters
f5f61ca508
Start of MOVEit port
2023-06-14 10:04:07 -05:00
bwatters
38f542174d
Land #17336 , A more robust implementation for Windows version comparisons
...
Merge branch 'land-17336' into upstream-master
2023-06-13 15:38:56 -05:00
Grant Willcox
a1e930397a
Land #18072 , Add CVE-2023-1133 - .NET Deserialization exploit for Delta Electronics InfraSuite Device Master
2023-06-08 08:42:07 -05:00
Shelby Pace
3bc145c02c
Update modules/exploits/windows/misc/delta_electronics_infrasuite_deserialization.rb
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com >
2023-06-07 16:42:01 -05:00
space-r7
8f6b421dc1
add non-capture group
2023-06-07 10:52:58 -05:00
space-r7
2fcd97f5ef
close socket
2023-06-06 14:37:58 -05:00
space-r7
102a32c87b
add SCREEN_EFFECTS and akb assessment
2023-06-06 14:12:21 -05:00
space-r7
a12b58df22
add cmdstager usage, description, and metadata
2023-06-05 17:38:27 -05:00
space-r7
1c5f8e09c8
add check method and new options
2023-06-02 17:59:04 -05:00
Grant Willcox
617aff5a43
Fix up supported payloads and remove nonused parameter
2023-06-02 09:48:03 -05:00
Grant Willcox
f7d2cdae56
Add in ability to restore settings n documentation changes.
...
Previously there was not the ability to restore the server proxy setting.
This updates the code to do so. Additionally this also updates the documentation
to note that Fetch payloads are incompatible with this module since they
use HTTP connections that will be impacted by this module changing the server's
HTTP proxy settings. There is no way around this.
2023-06-02 09:48:03 -05:00
Grant Willcox
965311d09e
Fix documentation and fix bug in creating PARMS value
2023-06-02 09:48:02 -05:00
Grant Willcox
6e89f9b275
Address review comments
2023-06-02 09:48:02 -05:00
Grant Willcox
8577f21e52
Add in documentation and updated code
2023-06-02 09:48:01 -05:00
Grant Willcox
05bb3cd182
Update again
2023-06-02 09:48:01 -05:00
Grant Willcox
c78a9bac1d
Remove dropper target and try expand potential BadChars and limit payload size???
2023-06-02 09:48:01 -05:00
Grant Willcox
6d066dc649
Add in initial copy of exploit
2023-06-02 09:47:49 -05:00
space-r7
a66641da55
add delta electronics infrasuite deserialization
2023-06-01 17:57:57 -05:00
Ashley Donaldson
75ba9110e2
Added module for Windows version comparisons
...
Utilised it in various existing modules - this should fix some subtle bugs in specific modules' version detection.
2023-05-25 14:36:46 +10:00
Grant Willcox
459cf871cb
Land #17979 , Add exploit for Ivanti Avalanche file upload - CVE-2023-28128
2023-05-16 09:19:33 -05:00
Grant Willcox
560fc9000b
Fix up checks on responses to make sure they are more robust checks
2023-05-12 16:08:47 -05:00
Grant Willcox
3b2d23eeae
Fix up check method, unduplicate fail_with messages to make them unique, and add @cleanup_needed so we can check if cleanup is needed to avoid unnecessary messages when just checking if the target is vulnerable or not
2023-05-12 14:14:40 -05:00