Pflegusch
94e9504727
Use metasploit payload instead of hardcoded one
2023-03-11 14:47:32 +01:00
Pflegusch
3f7f28dd4f
make use of full_uri and change regex
2023-03-11 14:25:04 +01:00
Jack Heysel
2a9ddae531
Updated description
2023-03-09 17:43:14 -05:00
Jack Heysel
06e7c3d702
Responded to comments updated docs
2023-03-09 17:39:53 -05:00
space-r7
2fbc80a44f
add base cmdstager support for windows target
2023-03-09 16:24:12 -06:00
jheysel-r7
63e2376f64
Apply suggestions from code review
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2023-03-09 12:31:30 -05:00
Pflegusch
38511f4d89
Rename establish_connection function
2023-03-09 17:06:07 +01:00
Pflegusch
e66fd8f5ae
Use rand_text_alphanumeric function
2023-03-09 17:03:48 +01:00
Pflegusch
69839d1924
Remove get_proxy_protocol function
2023-03-09 17:02:10 +01:00
Pflegusch
614f4b6d89
Make installation path of owa configurable
2023-03-09 16:32:28 +01:00
h00die-gr3y
fc711131a2
added MIME, added break in mixin and added link with installation instructions
2023-03-09 09:28:46 -06:00
Grant Willcox
deafceed00
Update documentation, library, and Gemspec from review
2023-03-09 09:28:27 -06:00
h00die-gr3y
d3f84af790
Included mixin for PHP code injection at PNGs
2023-03-09 09:28:14 -06:00
h00die-gr3y
dc8ebb722a
Added support for native PHP payloads and reengineered webshells
2023-03-09 09:28:03 -06:00
h00die-gr3y
c844d4d714
removed check and fix up some code
2023-03-09 09:27:29 -06:00
h00die-gr3y
771f32bd8a
Add documentation and apply code updates
2023-03-09 09:27:03 -06:00
h00die-gr3y
378a667f76
init commit module
2023-03-09 09:26:55 -06:00
Pflegusch
2de53712bd
Use Rex::Version for version comparison
2023-03-09 15:59:42 +01:00
Pflegusch
94ceeb075a
Redirect is not necessary - replace with simple send_request_cgi request
2023-03-09 15:41:15 +01:00
Pflegusch
ee95eb2883
fix typo: establish_connection
2023-03-09 15:09:32 +01:00
Pflegusch
14b5c08a62
Fix the double slash in the shell url
2023-03-09 14:28:15 +01:00
Pflegusch
d59175a463
make it work for https and http and remove the tmp self signed cert bypass
2023-03-09 13:58:56 +01:00
Pflegusch
f0dbf54c69
use fail_with in get_cache_content function
2023-03-09 11:04:00 +01:00
Pflegusch
7068d4c3f1
remove LPORT, RPORT and SSL from DefaultOptions
2023-03-09 11:03:24 +01:00
space-r7
c69b5c9363
add creation of projects and multiple commits
2023-03-08 17:46:25 -06:00
Grant Willcox
100cfbccf9
Fix up some more slight things in documentation. Also tidy up some things in the module
2023-03-08 17:25:56 -06:00
Pflegusch
76b05a7092
Change DisclosureDate according to nvd.nist.gov
2023-03-08 21:52:13 +01:00
Pflegusch
b37be28191
Working module open web analytics 1.7.3 rce
2023-03-08 21:30:52 +01:00
Jack Heysel
d31220ef1e
Updated references
2023-03-08 14:17:34 -05:00
Jack Heysel
263223b783
Last second file reorganization fix
2023-03-08 14:08:46 -05:00
Jack Heysel
dfae7e2fc4
FortiNAC keyUploap.jsp arbitrary file write CVE-2022-39952
2023-03-08 14:06:28 -05:00
Grant Willcox
5c4d730cd3
Add in missing EDB reference
2023-03-06 14:32:01 -06:00
bcoles
9dcaf93b29
Replace deprecated File.exists? with File.exist?
2023-03-05 14:30:47 +11:00
space-r7
99fb35fe84
refs/heads instead of refs/head
2023-03-03 17:24:39 -06:00
Spencer McIntyre
a418bd9c65
Land #17638 , Lucee Scheduled Job RCE
2023-03-02 08:57:19 -05:00
Spencer McIntyre
3fabcc3421
Use coldfusion to decode base64 data
...
This means we don't need to rely on base64 being in the path. Also
invoke ARCH_CMD payloads on Windows through cmd.exe and not
powershell.exe.
2023-02-28 17:32:56 -05:00
Spencer McIntyre
c8aa491378
Fail with Unreachable when res is nil
2023-02-28 17:05:59 -05:00
Jack Heysel
3abd62076c
Land #17624 , Oracle E-Business Suite Module
...
This pull request adds an exploit module for CVE-2022-21587
an arbitrary file upload vulnerability in Oracle Web Applications
Desktop Integrator as shipped with 12.2.3 through to 12.2.11
which results in RCE
2023-02-28 17:04:20 -05:00
Spencer McIntyre
a916163b49
Cleanup files and fixup messages
2023-02-28 16:41:57 -05:00
JBince
8b03f2fda8
Reworked payload execution logic
2023-02-27 11:09:34 -06:00
Imran E. Dawoodjee
3f1119c69e
Attempt fix for NoMethodError when exploiting
2023-02-26 22:02:08 +08:00
Jack Heysel
ca6faed172
Check method enhancement
2023-02-24 13:33:10 -05:00
Jack Heysel
5311a491e9
Froxlor 2.0.7 is actually vulnerable too
2023-02-24 13:18:34 -05:00
space-r7
9621f77bac
Land #17640 , add Froxlor RCE
2023-02-22 12:11:38 -06:00
Jack Heysel
bf7884b2dc
Removed need to auth twice when AutoCheck enabled
2023-02-22 12:28:28 -05:00
Jack Heysel
0c8df1a67b
Updated docs and module suggetsions
2023-02-22 00:33:40 -05:00
jheysel-r7
42146fc4ec
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 23:02:49 -05:00
jheysel-r7
80cec400bf
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 22:59:23 -05:00
jheysel-r7
fc5f4983f6
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 22:58:49 -05:00
jheysel-r7
647418745f
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 22:58:41 -05:00