Commit Graph

18316 Commits

Author SHA1 Message Date
Spencer McIntyre 289605f532 Require that the user know the CVE since the check is questionable 2020-12-15 19:17:35 -05:00
Spencer McIntyre 9bdf591a98 Add a working command stager for CVE-2020-17530 2020-12-15 09:13:06 -05:00
Spencer McIntyre 7826cbb8de Initial addition of the Struts2 Double Eval exploit 2020-12-15 09:13:06 -05:00
Tim W 9c47803609 increase wfsdelay 2020-12-14 14:54:54 +00:00
Tim W 7af996ae4c add offsets 2020-12-14 14:54:54 +00:00
Tim W a30cdfc892 Fix #14254, Add CVE-2020-1054, win32k DrawIconEx OOB Write LPE 2020-12-14 14:54:54 +00:00
Christophe De La Fuente 98d6364248 Land #14482, Use CVE-2020-5752 path traversal bypass for CVE-2019-3999 2020-12-14 15:10:09 +01:00
James Lee f255724e01 Changes to support older Solr (tested 5.3.0)
Use a new parameter instead of a header because older versions don't
have access to the request object.

There was an issue where the exploit would fail if the exec returned -1
despite the payload otherwise working, fixed by not trying to return
output in that case.

Also updates the documentation to reflect that we have a Java target now
and quoting is no longer a concern.
2020-12-13 19:05:47 -06:00
William Vu ba125c1c64 Merge remote-tracking branch 'upstream/master' into feature/solaris 2020-12-11 14:25:05 -06:00
C4ssandre 1fec224bae Adding a new check raised by an unforeseen usecase. I tested the usecase of a webserver on which a malicious user succeeded to upload a meterpreter .exe and execute it by calling its url. The meterpreter sessions belongs to IUSRS, which is not allowed to enumerate services. Thus the exploit fails, but checks pass. So added new checks for filtering this usecase. 2020-12-11 05:22:37 -05:00
C4ssandre d1956199aa Updating a warning message. 2020-12-11 03:58:14 -05:00
C4ssandre 53a12a7984 Updating doc. 2020-12-11 03:53:25 -05:00
Shelby Pace 83943adf8b Land #14466, add Aerospike UDF rce 2020-12-10 11:07:56 -06:00
Brendan Coles a9e231ad0a Use CVE-2020-5752 path traversal bypass for CVE-2019-3999 2020-12-10 12:14:47 +00:00
C4ssandre 38cd5817d7 Updating authors. 2020-12-10 02:09:24 -05:00
William Vu c8f1dfa642 Land #14479, enhanced CVE-2020-25592 check 2020-12-10 00:56:52 -06:00
C4ssandre c005492ee9 Updating doc. 2020-12-10 00:58:53 -05:00
C4ssandre b7bf7fcc86 Updating functions comments. 2020-12-10 04:08:49 -05:00
C4ssandre 4883050f7f Adding new options to module. Now it is possible to choose which process to launch as SYSTEM, as well as the port the exploit will listen (because on some Windows configuration, WinRM should listen on port 47001). 2020-12-10 03:53:06 -05:00
William Vu 9696e709ae Remove unused vprint_status conditional 2020-12-09 22:48:16 -06:00
William Vu e52084242f Remove unused vprint_status conditional 2020-12-09 22:45:41 -06:00
William Vu 399c8dbb79 Don't be lazy about sending the request
Don't telegraph our command injection _quite_ so much. We still
"complete" the initial command line to minimize disruption.

I am now backgrounding ssh-keygen to improve the speed of the exploit.
2020-12-09 22:07:08 -06:00
William Vu a33a6e6c55 Don't be lazy about checking the redirect
And don't be lazy about sending the request.

To trigger UnexpectedExceptionPage, we can send bogus data instead of
telegraphing our payload-less gadget chain.

God, I'm so lazy. This took like five extra minutes. :|
2020-12-09 21:09:49 -06:00
William Vu 9452c1dcfa Fix merge conflict from #14202, in linear history 2020-12-09 17:24:29 -06:00
Spencer McIntyre 367c5e747f Land #14470, Fix ssi template for some sharepoint versions 2020-12-09 16:23:34 -05:00
Shelby Pace d337d832b8 Land #14422, add GitLab file read/rce 2020-12-09 11:34:14 -06:00
Shelby Pace 941762b3c5 remove trailing commas 2020-12-09 11:29:00 -06:00
Tim W fb9b1c5de4 Land #14409, add weak services technique to the service permissions LPE 2020-12-09 17:16:53 +00:00
C4ssandre f8a7517633 Improving description of SHUTDOWN_SERVICES option. 2020-12-09 08:01:56 +00:00
C4ssandre 7a358cf577 Giving to the user the choice for if the module should attempt or not to shutdown WinRM and BITS services. 2020-12-09 07:43:32 +00:00
C4ssandre d2db1fba4a Updating exploit metatdata. 2020-12-09 07:06:31 +00:00
C4ssandre 8f72102116 Updating exploit description (got by "info" command). 2020-12-09 06:55:17 +00:00
C4ssandre d43fba1ae1 Adding new check functionalities. Now, ruby module check through the previous meterpreter session if BITS and WinRM are currently running, and tries to shutdown them if they are. It is not necessary anymore to deal with windows versions to know if target is vulnerable: the module can guess it reliably by its own. 2020-12-09 06:47:29 +00:00
Spencer McIntyre 175d4a5c43 Add a check to see if the session is already running as SYSTEM 2020-12-08 18:05:28 -05:00
Spencer McIntyre 6d7c6c054a Update the module docs with more details for the registry technique 2020-12-08 17:39:34 -05:00
Spencer McIntyre dcb1637ac2 Land #14463, web_delivery: Add SyncAppvPublishingServer target 2020-12-08 17:28:15 -05:00
Spencer McIntyre e7f8d00717 Note technique compatibility and fix the reference URL 2020-12-08 17:26:39 -05:00
adfoster-r7 85a9accbee Land #14202, Add initial zeitwerk autoloader approach for lib/msf/core 2020-12-08 12:53:02 +00:00
C4ssandre 748d11dfe4 Removing a useless batch of code remaining from outdated powershell functions. 2020-12-07 22:43:15 -05:00
C4ssandre 134c0fdc73 Fixing an issue in getting notepad path. 2020-12-08 03:13:39 +00:00
C4ssandre ff8981c4ee Various little corrections. 2020-12-07 21:38:55 -05:00
C4ssandre c86f93b9c0 Updating list of tested machines. 2020-12-07 21:38:42 -05:00
C4ssandre 8a3790f265 Adding process informations to hide notepad.exe when launching. 2020-12-07 21:38:30 -05:00
C4ssandre 46f59a76f0 Removing powershell payload serving method, and replacing it by just writing and executing in remote SYSTEM process. 2020-12-07 21:37:35 -05:00
Shelby Pace 30bf917075 Land #14401, add Windows support for consul rce 2020-12-07 16:21:36 -06:00
Shelby Pace 45ce738af7 add default payload for targets, run rubocop 2020-12-07 16:17:12 -06:00
Shelby Pace 8e1cab0131 Land #14339, add flexdotnetcms rce 2020-12-07 14:28:01 -06:00
Shelby Pace cd900a0507 fix comment 2020-12-07 14:27:07 -06:00
Spencer McIntyre 2a2694ef16 Apply rubocop changes and precompute the encryption key 2020-12-07 14:59:40 -05:00
Spencer McIntyre d208e441ba Update the documentation 2020-12-07 10:54:20 -05:00