William
ce4748494a
Fix whitespace issue
2021-05-17 23:07:05 +08:00
Grant Willcox
e7983c3b6f
Land #15192 , Enforce Style/RedundantBegin for new modules
2021-05-17 09:51:57 -05:00
William
69b1f4bbc7
Bug fix
...
Fix bug that prevent the module from working on SSL enabled GitLab server
2021-05-16 14:23:16 +08:00
Grant Willcox
7a9050c7ea
Fix up check method so that it will correctly warn the user that the target might not be vulnerable only cause the DLL hijacking technique doesn't work on certain targets.
2021-05-14 17:47:39 -05:00
Jack Heysel
c8b62a1ff9
Fixed check method nil check, update numberd list in docs, added wfsdelay warning when in dll mode
2021-05-14 17:47:31 -05:00
Jack Heysel
950bbad852
Removed nil script check, updated docs
2021-05-14 17:47:15 -05:00
Jack Heysel
eb4573164b
Addressed comments
2021-05-14 17:46:26 -05:00
Jack Heysel
e29dce4f08
Removed comments from powershell script
2021-05-14 17:45:42 -05:00
Jack Heysel
d23df37b62
Responded to comments, refactored to remove duplicate code
2021-05-14 17:44:08 -05:00
Jack Heysel
d5f2cfb3de
Added x86 codepath for uso trigger
2021-05-14 17:44:08 -05:00
Jack Heysel
b112aae55c
Rubocop offense
2021-05-14 17:44:08 -05:00
Jack Heysel
fab3a9afc8
Added wfsdelay, updated docs
2021-05-14 17:44:07 -05:00
Jack Heysel
addc1ad601
Replace shelled usoclient call with uso_trigger
2021-05-14 17:44:07 -05:00
Jack Heysel
5640dac24d
Fixed sc command, updated check method, moved tokenmagic.ps1
2021-05-14 17:44:07 -05:00
Jack Heysel
ca637be0c9
Fixed powershell script, updated authors
2021-05-14 17:44:06 -05:00
Jack Heysel
1eab94cc26
beta draft
2021-05-14 17:43:44 -05:00
bwatters
8792febcf8
Land #15190 , Add Exploit For CVE-2021-21551 (Dell DBUtil_2_3 IOCTL)
...
Merge branch 'land-15190' into upstream-master
2021-05-14 13:55:12 -05:00
adfoster-r7
ac2c467121
Land #15011 , Enhance analyze command API to understand modules' needs
2021-05-14 14:30:33 +01:00
Spencer McIntyre
d990e884af
Add and test even more targets
2021-05-13 17:27:58 -04:00
Spencer McIntyre
eb89550f85
Clear up some target offset discrepancies
2021-05-13 16:06:15 -04:00
Spencer McIntyre
7d841a0f79
Add a target for Windows 7 x64
2021-05-13 14:24:15 -04:00
Spencer McIntyre
4825407d21
Add a target for Windows 8.1 x64
2021-05-13 12:56:47 -04:00
Alan Foster
100da2f1b1
Enforce Style/RedundantBegin for new modules
2021-05-13 04:01:03 +01:00
Spencer McIntyre
477749f77f
Refactor the code to be reusable and add docs
2021-05-12 16:36:17 -04:00
Spencer McIntyre
d3de52da59
The exploit is now functional for Win10 v1803-20H2
2021-05-12 16:14:59 -04:00
adfoster-r7
1a321e3cc1
Land #15164 , Converts Cockpit CMS to use new CookieJar API
2021-05-12 19:25:47 +01:00
Alan Foster
5a0360228f
Update cockpit cms module
2021-05-12 17:20:31 +01:00
Grant Willcox
5290549cac
Land #15185 , Add CVE-2021-22204 ExifTool ANT perl injection
2021-05-11 16:41:44 -05:00
Grant Willcox
23bab9405a
Land #15175 , Change depreciated URI::encode call to URI::encode_www_form_component within rejetto_hfs_exec
2021-05-11 11:21:50 -05:00
Justin Steven
acd79d41b7
Appease rubocop
2021-05-11 12:11:22 +10:00
Justin Steven
fa73c0af3e
Add CVE-2021-22204 ExifTool ANT perl injection
2021-05-11 12:02:12 +10:00
Grant Willcox
b9d45af201
Land #15167 , Ensure Adobe Sandbox Collab Sync session types is an array
2021-05-10 10:52:55 -05:00
Debjeet Banerjee
54dbedf181
URI.escape is obsolete and needs to be updated
...
The current code results in the following error :
```
[*] Started reverse TCP handler on 192.168.1.105:4444
[*] Using URL: http://0.0.0.0:8080/o6wYorU
[*] Local IP: http://192.168.1.105:8080/o6wYorU
[*] Server started.
[*] Sending a malicious request to /
/usr/share/metasploit-framework/modules/exploits/windows/http/rejetto_hfs_exec.rb:110: warning: URI.escape is obsolete
/usr/share/metasploit-framework/modules/exploits/windows/http/rejetto_hfs_exec.rb:110: warning: URI.escape is obsolete
[*] Server stopped.
[!] This exploit may require manual cleanup of '%TEMP%\jsywNguEzNXZF.vbs' on the target
[*] Exploit completed, but no session was created.
```
This minor edit should fix it.
2021-05-09 12:40:48 +05:30
Alan Foster
48697625da
Ensure adobe sandbox collab sync session types is an array
2021-05-07 18:51:06 +01:00
Shelby Pace
b9525c581d
Land #15102 , add GateKeeper Bypass exploit
2021-05-07 09:10:10 -05:00
A Galway
a9859af870
prints all cookies instead of just one
2021-05-07 14:52:26 +01:00
A Galway
bf02dea70f
rubocop
2021-05-07 13:28:17 +01:00
A Galway
ba6584f761
altered login & rce requests to use cookie_jar api
2021-05-07 13:11:17 +01:00
William Vu
637e9cff48
Update vmware_vrops_mgr_ssrf_rce documentation
2021-05-06 18:30:20 -05:00
Tim W
4192e175d2
fix osx-app exe attributes
2021-05-06 18:20:32 +01:00
Ashley Donaldson
5dc8d0e684
Added automatic cleanup for exploit scripts that modify /etc/passwd
2021-05-06 21:50:03 +10:00
Ashley Donaldson
832813f057
If the exploit is completed but no session is created, tell the user if they have alternative exploits they could try.
2021-05-06 12:37:18 +10:00
Tim W
f2f631aef0
fix metadata
2021-05-04 20:55:17 +01:00
Ashley Donaldson
000546e551
Rubocop changes
2021-05-04 16:24:00 +10:00
Ashley Donaldson
fbc291bc22
Tested on various other Fedora's
2021-05-04 14:18:16 +10:00
Ashley Donaldson
7f89ac44ce
Tested module on Fedora 25
...
Also verify user does not already exist when adding a new user
2021-05-04 10:38:28 +10:00
Mehmet INCE
bf0551979f
Fix the module according to the review
2021-05-03 12:29:00 +03:00
Mehmet INCE
06157601df
Remove SCREEN_EFFECTS from sideeffects
2021-05-03 11:14:43 +03:00
Mehmet INCE
9e04805c0e
Adding check method to gravcms exec
2021-05-03 11:14:43 +03:00
Mehmet INCE
e3d05395de
Add GravCMS exec
2021-05-03 11:14:42 +03:00