Commit Graph

18316 Commits

Author SHA1 Message Date
William ce4748494a Fix whitespace issue 2021-05-17 23:07:05 +08:00
Grant Willcox e7983c3b6f Land #15192, Enforce Style/RedundantBegin for new modules 2021-05-17 09:51:57 -05:00
William 69b1f4bbc7 Bug fix
Fix bug that prevent the module from working on SSL enabled GitLab server
2021-05-16 14:23:16 +08:00
Grant Willcox 7a9050c7ea Fix up check method so that it will correctly warn the user that the target might not be vulnerable only cause the DLL hijacking technique doesn't work on certain targets. 2021-05-14 17:47:39 -05:00
Jack Heysel c8b62a1ff9 Fixed check method nil check, update numberd list in docs, added wfsdelay warning when in dll mode 2021-05-14 17:47:31 -05:00
Jack Heysel 950bbad852 Removed nil script check, updated docs 2021-05-14 17:47:15 -05:00
Jack Heysel eb4573164b Addressed comments 2021-05-14 17:46:26 -05:00
Jack Heysel e29dce4f08 Removed comments from powershell script 2021-05-14 17:45:42 -05:00
Jack Heysel d23df37b62 Responded to comments, refactored to remove duplicate code 2021-05-14 17:44:08 -05:00
Jack Heysel d5f2cfb3de Added x86 codepath for uso trigger 2021-05-14 17:44:08 -05:00
Jack Heysel b112aae55c Rubocop offense 2021-05-14 17:44:08 -05:00
Jack Heysel fab3a9afc8 Added wfsdelay, updated docs 2021-05-14 17:44:07 -05:00
Jack Heysel addc1ad601 Replace shelled usoclient call with uso_trigger 2021-05-14 17:44:07 -05:00
Jack Heysel 5640dac24d Fixed sc command, updated check method, moved tokenmagic.ps1 2021-05-14 17:44:07 -05:00
Jack Heysel ca637be0c9 Fixed powershell script, updated authors 2021-05-14 17:44:06 -05:00
Jack Heysel 1eab94cc26 beta draft 2021-05-14 17:43:44 -05:00
bwatters 8792febcf8 Land #15190, Add Exploit For CVE-2021-21551 (Dell DBUtil_2_3 IOCTL)
Merge branch 'land-15190' into upstream-master
2021-05-14 13:55:12 -05:00
adfoster-r7 ac2c467121 Land #15011, Enhance analyze command API to understand modules' needs 2021-05-14 14:30:33 +01:00
Spencer McIntyre d990e884af Add and test even more targets 2021-05-13 17:27:58 -04:00
Spencer McIntyre eb89550f85 Clear up some target offset discrepancies 2021-05-13 16:06:15 -04:00
Spencer McIntyre 7d841a0f79 Add a target for Windows 7 x64 2021-05-13 14:24:15 -04:00
Spencer McIntyre 4825407d21 Add a target for Windows 8.1 x64 2021-05-13 12:56:47 -04:00
Alan Foster 100da2f1b1 Enforce Style/RedundantBegin for new modules 2021-05-13 04:01:03 +01:00
Spencer McIntyre 477749f77f Refactor the code to be reusable and add docs 2021-05-12 16:36:17 -04:00
Spencer McIntyre d3de52da59 The exploit is now functional for Win10 v1803-20H2 2021-05-12 16:14:59 -04:00
adfoster-r7 1a321e3cc1 Land #15164, Converts Cockpit CMS to use new CookieJar API 2021-05-12 19:25:47 +01:00
Alan Foster 5a0360228f Update cockpit cms module 2021-05-12 17:20:31 +01:00
Grant Willcox 5290549cac Land #15185, Add CVE-2021-22204 ExifTool ANT perl injection 2021-05-11 16:41:44 -05:00
Grant Willcox 23bab9405a Land #15175, Change depreciated URI::encode call to URI::encode_www_form_component within rejetto_hfs_exec 2021-05-11 11:21:50 -05:00
Justin Steven acd79d41b7 Appease rubocop 2021-05-11 12:11:22 +10:00
Justin Steven fa73c0af3e Add CVE-2021-22204 ExifTool ANT perl injection 2021-05-11 12:02:12 +10:00
Grant Willcox b9d45af201 Land #15167, Ensure Adobe Sandbox Collab Sync session types is an array 2021-05-10 10:52:55 -05:00
Debjeet Banerjee 54dbedf181 URI.escape is obsolete and needs to be updated
The current code results in the following error :
```
[*] Started reverse TCP handler on 192.168.1.105:4444 
[*] Using URL: http://0.0.0.0:8080/o6wYorU
[*] Local IP: http://192.168.1.105:8080/o6wYorU
[*] Server started.
[*] Sending a malicious request to /
/usr/share/metasploit-framework/modules/exploits/windows/http/rejetto_hfs_exec.rb:110: warning: URI.escape is obsolete
/usr/share/metasploit-framework/modules/exploits/windows/http/rejetto_hfs_exec.rb:110: warning: URI.escape is obsolete
[*] Server stopped.
[!] This exploit may require manual cleanup of '%TEMP%\jsywNguEzNXZF.vbs' on the target
[*] Exploit completed, but no session was created.
```

This minor edit should fix it.
2021-05-09 12:40:48 +05:30
Alan Foster 48697625da Ensure adobe sandbox collab sync session types is an array 2021-05-07 18:51:06 +01:00
Shelby Pace b9525c581d Land #15102, add GateKeeper Bypass exploit 2021-05-07 09:10:10 -05:00
A Galway a9859af870 prints all cookies instead of just one 2021-05-07 14:52:26 +01:00
A Galway bf02dea70f rubocop 2021-05-07 13:28:17 +01:00
A Galway ba6584f761 altered login & rce requests to use cookie_jar api 2021-05-07 13:11:17 +01:00
William Vu 637e9cff48 Update vmware_vrops_mgr_ssrf_rce documentation 2021-05-06 18:30:20 -05:00
Tim W 4192e175d2 fix osx-app exe attributes 2021-05-06 18:20:32 +01:00
Ashley Donaldson 5dc8d0e684 Added automatic cleanup for exploit scripts that modify /etc/passwd 2021-05-06 21:50:03 +10:00
Ashley Donaldson 832813f057 If the exploit is completed but no session is created, tell the user if they have alternative exploits they could try. 2021-05-06 12:37:18 +10:00
Tim W f2f631aef0 fix metadata 2021-05-04 20:55:17 +01:00
Ashley Donaldson 000546e551 Rubocop changes 2021-05-04 16:24:00 +10:00
Ashley Donaldson fbc291bc22 Tested on various other Fedora's 2021-05-04 14:18:16 +10:00
Ashley Donaldson 7f89ac44ce Tested module on Fedora 25
Also verify user does not already exist when adding a new user
2021-05-04 10:38:28 +10:00
Mehmet INCE bf0551979f Fix the module according to the review 2021-05-03 12:29:00 +03:00
Mehmet INCE 06157601df Remove SCREEN_EFFECTS from sideeffects 2021-05-03 11:14:43 +03:00
Mehmet INCE 9e04805c0e Adding check method to gravcms exec 2021-05-03 11:14:43 +03:00
Mehmet INCE e3d05395de Add GravCMS exec 2021-05-03 11:14:42 +03:00