Commit Graph

18316 Commits

Author SHA1 Message Date
Ashley Donaldson 0435e281d9 Updated CVE-2021-3156 documentation to reflect code changes. 2021-05-03 16:45:50 +10:00
Brendan Coles 4a93f15c80 Land #15136, Set microfocus_ucmdb_unauth_deser default payload to reverse_python 2021-05-02 10:27:05 +00:00
Pedro Ribeiro e6b605369e UCMDB: remove warning from docs and change Linux target to reverse_python 2021-05-02 16:53:02 +07:00
William Vu d433c0fd12 Fix typo 2021-04-30 23:29:24 -05:00
Tim W 14e22bee37 Land #15105, CVE-2021-21220 - Chrome V8 XOR typer mismatch OOB access RCE 2021-04-30 22:56:07 +01:00
Tim W 360fee153f use 2 space indentation 2021-04-30 22:32:05 +01:00
Tim W 27a9b797b1 location.reload() on failure 2021-04-30 22:31:50 +01:00
Shelby Pace 0535489703 Land #14947, add IGEL OS RCE 2021-04-30 15:49:11 -05:00
Shelby Pace de22236902 add AutoCheck and update docs output 2021-04-30 15:38:57 -05:00
Rob V 41fe16463d switching to CmdStager
- had to switch away from python payload to appease CmdStager
- removed systemd service adjustments preferring to use sleep to avoid rate limits
- updated check function to accomodate more current vulnerable version information in vendor advisory
2021-04-30 12:53:33 -04:00
Grant Willcox f267f0866c Fix up documentation typos and improve JavaScript using comments from @timwr's review. 2021-04-30 10:54:09 -05:00
Shelby Pace 45a8e1f49f Land #15087, Operations Bridge Reporter support 2021-04-30 08:41:35 -05:00
adfoster-r7 6c6d7699ed Land #14831, Add CookieJar support to http_client 2021-04-30 14:08:04 +01:00
Ashley Donaldson 3722435a25 Tested and verified exploitability of second CVE-2021-3156 exploit on three platforms 2021-04-30 18:51:06 +10:00
Ashley Donaldson b1d2c39c98 Added second CentOS 7 exploit 2021-04-30 18:30:19 +10:00
Ashley Donaldson 124d157a1c Added CVE-2021-3156 exploits for CentOS 7 and 8 2021-04-30 17:25:59 +10:00
Alan Foster 04ff0f6bd7 Update exchange ecp dlp policy to work with new cookie jar 2021-04-29 21:26:02 +01:00
Spencer McIntyre 994825dcc9 Land #15090, Add exploit for CVE-2021-22502 2021-04-29 14:09:28 -04:00
Spencer McIntyre b2142aada7 Land #15086, Add exploit for CVE-2020-11857 2021-04-29 11:47:17 -04:00
Spencer McIntyre 4373b464ce Update the markdown module docs a bit 2021-04-29 11:46:40 -04:00
Ashley Donaldson 79152cafe6 Added support for Ubuntu 14.04.3 for CVE-2021-3156 2021-04-29 20:48:51 +10:00
Ashley Donaldson 9d9d3ce061 Added Ubuntu 16.04-specific exploit script to CVE-2021-3156 module
The generic approach used for other targets doesn't work for 16.04, as that one relies on tcache bins, which are not present in glibc 2.23.
2021-04-29 18:28:13 +10:00
Ashley Donaldson fcd17ed3b1 Port sudoedit exploit to Python
It's assumed that Python is more likely to be present on the target system
than gcc, so is better as a dependency.
2021-04-29 13:17:32 +10:00
Tim W 92a5a56d41 refactor check_useragent 2021-04-28 14:41:17 +01:00
Grant Willcox 5541988d10 Upload working exploit and documentation for CVE-2021-21220 2021-04-27 13:23:35 -05:00
Shelby Pace a4af80d3e1 Land #15005, add VMware vRealize SSRF RCE 2021-04-27 09:19:55 -05:00
Tim W bba6a230b7 add macOS gatekeeper bypass exploit 2021-04-26 22:59:14 +01:00
Shelby Pace 363db0e271 Land #14977, add Apache Druid js rce 2021-04-26 12:01:19 -05:00
Pedro Ribeiro 07d82cde93 fix timeout errors in rubocop 2021-04-23 22:10:38 +07:00
Pedro Ribeiro 02ce5a1724 Update modules/exploits/linux/http/microfocus_obr_cmd_injection.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2021-04-23 22:01:05 +07:00
Pedro Ribeiro 58e00b582e Update modules/exploits/linux/http/microfocus_obr_cmd_injection.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2021-04-23 22:00:55 +07:00
Pedro Ribeiro 651a34af53 add sploit for MF OBR cmd injection 2021-04-23 21:04:36 +07:00
Pedro Ribeiro 83329cc8de clarify it's only for winblows 2021-04-23 19:24:49 +07:00
Pedro Ribeiro 02656a2c31 add clarification - it's for linux only 2021-04-23 19:23:18 +07:00
Erran Carey dcf457f7e9 Fix a typo in Eclipse Equinox product name
The osgi_console_exec module docs had a few stray characters for the
product name and description. The product name confused me when
googling for this module.
2021-04-23 11:57:48 +01:00
Pedro Ribeiro 62ba64375c fix typos and add default rport 2021-04-23 17:38:06 +07:00
Pedro Ribeiro 092c22ab4e fix typo in URL 2021-04-23 16:47:46 +07:00
Pedro Ribeiro 8b3687b9e6 update privesc sploit 2021-04-23 16:38:25 +07:00
Pedro Ribeiro 9a779fef79 add ZDI id 2021-04-23 15:15:09 +07:00
Pedro Ribeiro 30c333b30d fix typo in shrboadmin 2021-04-23 15:03:34 +07:00
Pedro Ribeiro 71f5955b42 add OBR SSH module 2021-04-23 15:00:06 +07:00
William Vu a62d1dfbcd Add some details back in 2021-04-21 16:02:21 -05:00
William Vu 5111caf536 Address @gwillcox-r7 review
New words from @gwillcox-r7.
2021-04-21 13:10:21 -05:00
William Vu 22433d5b2c Add clarifying comment 2021-04-21 10:42:10 -05:00
William Vu 08907a5e3a Add VMware vRealize Operations Manager SSRF RCE
CVE-2021-21975 + CVE-2021-21983
2021-04-21 10:42:10 -05:00
agalway-r7 93c7727622 Land #15058, Cockpit CMS RCE 2021-04-21 13:21:55 +01:00
Grant Willcox 7b7e521d6c Fix up a wrong type field value and set it back to 1 from 2 in the send_exploit() function, since this was causing the exploit to fail 2021-04-20 17:45:51 -05:00
Spencer McIntyre 00db3767b1 Fix a bug when restoring corrupted memory 2021-04-20 18:18:42 -04:00
Grant Willcox e0f13e44d1 Land #14699, Add Nagios XI snmptrap RCE and docs (CVE-2020-5792) 2021-04-20 14:30:45 -05:00
h00die e39b065e06 vprint to print 2021-04-20 15:26:47 -04:00