William Vu
|
b517372e4d
|
Fix sharepoint_ssi_viewstate, too
|
2021-03-26 01:32:46 -05:00 |
|
William Vu
|
a6df15c8c2
|
Fix the rest of the optional method
|
2021-03-26 01:29:47 -05:00 |
|
Spencer McIntyre
|
006faaab9a
|
Land #14924, Add auxiliary and exploit modules for CVE-2020-6207 in SAP Solution Manager
|
2021-03-25 17:48:56 -04:00 |
|
Rob V
|
748ff19ef4
|
attempt to please linting
|
2021-03-25 16:11:43 -04:00 |
|
Rob V
|
63ce27f4ca
|
adding IGEL OS RCE module
|
2021-03-25 14:39:23 -04:00 |
|
William Vu
|
0b8ac121d4
|
Fix fail_with usage in advantech_iview_unauth_rce
Brain fart. Should be print_warning so as not to fail the session.
|
2021-03-25 11:33:41 -05:00 |
|
Grant Willcox
|
784927a389
|
Land #14941, Force smb_relay module to use the Rex SMB client over ruby_smb
|
2021-03-25 10:55:07 -05:00 |
|
RAMELLA Sébastien
|
75041c5837
|
update proxylogon rce
|
2021-03-25 19:46:58 +04:00 |
|
Vladimir Ivanov
|
3b8f3620d2
|
Minor updates
Updated action_exec in auxiliary module cve_2020_6207_solman_rce.rb
Updated execute_command in exploit module cve_2020_6207_solman_rs.rb
|
2021-03-25 15:37:29 +03:00 |
|
Vladimir Ivanov
|
0487e451cf
|
Updated payload
Updated make_rce_payload, renamed get_agent_os to check_agent in lib sap_sol_man_eem_miss_auth.rb
Updated action_ssrf, action_exec in auxiliary module cve_2020_6207_solman_rce.rb
Updated execute_command, exploit in exploit module cve_2020_6207_solman_rs.rb
|
2021-03-25 14:20:54 +03:00 |
|
Vladimir Ivanov
|
391e013d89
|
Removed var lhost, lport in exploit module cve_2020_6207_solman_rs.rb
Changed fail reason if agent_name is nil in lib sap_sol_man_eem_miss_auth.rb
|
2021-03-25 11:26:14 +03:00 |
|
bwatters
|
6505f9ccbd
|
Land #14830, Adding FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload (CVE-2021-3378)
Merge branch 'land-14830' into upstream-master
|
2021-03-24 17:41:10 -05:00 |
|
bwatters
|
5394464932
|
Fix rubocop complaint
|
2021-03-24 17:38:11 -05:00 |
|
dwelch-r7
|
a69d76d7b5
|
Force smb_relay module to use the Rex SMB client over ruby_smb
|
2021-03-24 17:36:50 +00:00 |
|
Grant Willcox
|
f01b434160
|
Land #14896, Fix apache_activemq_upload_jsp exploit module for Java 8
|
2021-03-24 10:22:03 -05:00 |
|
Vladimir Ivanov
|
924f7feb76
|
Updated Arch in the exploit module cve_2020_6207_solman_rs.rb
Corrected by rubocop library sap_sol_man_eem_miss_auth.rb
|
2021-03-24 16:26:01 +03:00 |
|
Vladimir Ivanov
|
66ce45d833
|
Added support for CmdStager in the exploit module cve_2020_6207_solman_rs.rb
|
2021-03-24 16:16:43 +03:00 |
|
Vladimir Ivanov
|
567f78c532
|
Update PAYLOAD_XML, check_response in lib sap_sol_man_eem_miss_auth.rb
Delete class var agents in auxiliary and exploit modules
|
2021-03-24 11:21:57 +03:00 |
|
Vladimir Ivanov
|
8c7a483f6e
|
Delete analyze_error in exploit module cve_2020_6207_solman_rs.rb
|
2021-03-23 23:59:48 +03:00 |
|
Vladimir Ivanov
|
2c18435e6e
|
Update pretty_agents_table in lib sap_sol_man_eem_miss_auth.rb
Change output in auxiliary and exploit modules
|
2021-03-23 23:00:34 +03:00 |
|
Christophe De La Fuente
|
2dcd0fad04
|
Land #14860, Auxiliary/Exploit Scanner/Gather/RCE for Exchange ProxyLogon (CVE-2021-26855)
|
2021-03-23 13:10:15 +01:00 |
|
Vladimir Ivanov
|
d76224066f
|
Rename option URIPATH to TARGETURI
|
2021-03-23 13:33:39 +03:00 |
|
Vladimir Ivanov
|
113dce79de
|
Move lib/metasploit/framework/sap_solman/client.rb to lib/msf/core/exploit/remote/http/sap_sol_man_eem_miss_auth.rb
|
2021-03-23 13:20:27 +03:00 |
|
Christophe De La Fuente
|
a6cd7c9b30
|
Rubocop update - JSON Unnecessary symbol conversion
|
2021-03-23 10:58:03 +01:00 |
|
RAMELLA Sébastien
|
37b0552803
|
last code review before land
|
2021-03-22 23:20:40 +04:00 |
|
William Vu
|
4dc860cce3
|
Update Spencer credit
|
2021-03-22 14:14:12 -05:00 |
|
Spencer McIntyre
|
8605fe4529
|
Use POST for the check method and write the module docs
|
2021-03-22 15:04:21 -04:00 |
|
Vladimir Ivanov
|
2a48dd265d
|
Replace class var @@agents with a class instance var in auxiliary and exploit modules.
|
2021-03-22 12:13:04 +03:00 |
|
RAMELLA Sébastien
|
09b844653b
|
remove DisablePayloadHandler and add x86 support
|
2021-03-22 00:30:01 +04:00 |
|
RAMELLA Sébastien
|
c543b44fc2
|
fix: CmdStagerFlavor, add: Powershell target, ...
|
2021-03-21 22:47:27 +04:00 |
|
Vladimir Ivanov
|
42726a70c0
|
client.rb - library for auxiliary and exploit modules
cve_2020_6207_solman_rce.rb - auxiliary module
cve_2020_6207_solman_rce.md - documentation for auxiliary module
cve_2020_6207_solman_rs.rb - exploit module
cve_2020_6207_solman_rs.md - documentation for exploit module
|
2021-03-21 16:51:21 +03:00 |
|
alanfoster
|
308a42e95b
|
Fix apache_activemq_upload_jsp exploit module for Java 8
|
2021-03-20 15:26:34 +00:00 |
|
William Vu
|
30629c2405
|
Remove JSP stub to-do
Spencer looked into this more thoroughly. The JSP stub is good.
|
2021-03-19 17:17:01 -05:00 |
|
William Vu
|
66d9cab44d
|
Fix some things
|
2021-03-19 16:52:24 -05:00 |
|
William Vu
|
ba58f41558
|
Sneak Spencer into credits
|
2021-03-19 16:52:15 -05:00 |
|
RAMELLA Sébastien
|
f5c807590c
|
a last round of review + rubocop
|
2021-03-20 01:23:43 +04:00 |
|
Spencer McIntyre
|
69a2eb4e43
|
Add a check method that relies on the version number
|
2021-03-19 16:48:33 -04:00 |
|
William Vu
|
a012eddd1f
|
Add Advantech iView CVE-2021-22652 exploit
|
2021-03-19 13:51:14 -05:00 |
|
RAMELLA Sébastien
|
a81a9617fa
|
add. aspnet_client as altenate write path
|
2021-03-19 22:01:41 +04:00 |
|
RAMELLA Sébastien
|
ac573d0957
|
all modules code review.
|
2021-03-19 17:35:55 +04:00 |
|
RAMELLA Sébastien
|
fa2fdc9b8a
|
add. X-vDirObjectId header
|
2021-03-19 12:35:29 +04:00 |
|
RAMELLA Sébastien
|
6e34a80693
|
fix. OAB + code review
|
2021-03-19 10:19:57 +04:00 |
|
bwatters
|
2c1869f9df
|
Land #14907, Add exploit for CVE-2021-1732
Merge branch 'land-14907' into upstream-master
|
2021-03-18 14:29:59 -05:00 |
|
bwatters
|
fb7a97077f
|
Land #14875,CVE-2021-21978 - VMWare View Planner Harness 4.6.x < 4.6 Security Patch 1 Arbitrary File Upload RCE
Merge branch 'land-14875' into upstream-master
|
2021-03-18 12:06:12 -05:00 |
|
RAMELLA Sébastien
|
c76e04e92b
|
adjust SID
|
2021-03-18 15:23:21 +04:00 |
|
Wes
|
42df4495a7
|
abb_wserver_exec - add CVE reference
add the cve for this
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5620
https://nvd.nist.gov/vuln/detail/CVE-2019-5620
cve was assigned years after public exploit code
|
2021-03-17 15:58:21 -04:00 |
|
RAMELLA Sébastien
|
7f80422272
|
replace module into a good dir
|
2021-03-17 23:45:13 +04:00 |
|
Wes
|
34674ce174
|
Update abb_wserver_exec.rb
update advisory link
#2708
|
2021-03-17 09:59:15 -04:00 |
|
Spencer McIntyre
|
2ce0a90965
|
Land #14856, Fix method check for linux/ftp/proftp_telnet_iac module
|
2021-03-17 09:26:31 -04:00 |
|
capme
|
b99114787a
|
re-adding first check, but not including [^ ]
|
2021-03-17 06:51:08 +07:00 |
|