Commit Graph

18316 Commits

Author SHA1 Message Date
Graeme Robinson 2de77b6e8a Refactored code. Primarily line length increased. 2020-11-26 13:46:01 +01:00
Graeme Robinson 012b040fc1 Reformat code layout to satisfy msftidy 2020-11-26 13:46:01 +01:00
Graeme Robinson 41ff86178b Add new module exploit module
Add new module /exploits/multi/http/apache_nifi_processor_rce.rb
2020-11-26 13:46:01 +01:00
Jan Bucher 6d6c71bc2a Fix another typo in the bypassuac_comhijack module 2020-11-26 13:14:36 +01:00
Jan Bucher 9757c68f9b Fix typo in modules/exploits/windows/local/bypassuac module
Correct small typo in the output to the msfconsole.
2020-11-26 12:55:29 +01:00
Grant Willcox 63a98adff0 Land #14427, phpstudy_backdoor_rce.rb TARGETURI handling and default value modifications 2020-11-25 10:32:53 -06:00
Grant Willcox ca28f59ac4 Update the description of the TARGETURI option to reflect the recent changes 2020-11-25 10:32:17 -06:00
Spencer McIntyre 95665e916c Land #14416, wordpress plugin 'simple file list' rce 2020-11-25 09:58:26 -05:00
Spencer McIntyre 94c157bc95 Tweak the documentation and module output just a little for clarity 2020-11-25 09:58:07 -05:00
cgranleese-r7 31426576e0 Land #14264, Add exploit/multi/http/kong_gateway_admin_api_rce 2020-11-25 11:09:02 +00:00
Grant Willcox efdc7f062e Land #14241, OpenMediaVault 5.5.11 Authenticated Remote Code Execution 2020-11-24 13:42:53 -06:00
Grant Willcox e0a8aff72b Ninja edit in fix to remove support for IN_MEMORY Unix payloads since most of them don't work correctly or return multiple shells if they do work. Will potentially add this in with another PR once fixes are made to make it more reliable 2020-11-24 13:41:57 -06:00
Spencer McIntyre d4b2babae1 Report success when leveraging the registry permissions technique 2020-11-24 09:06:13 -05:00
Natto c8fc5b52cf TARGETURI Default value modification
TARGETURI Default value modification
2020-11-24 14:05:49 +08:00
kalba-security 9417266d21 replace Checkcode:Unknown with Detected in check(), skip cleanup unless required 2020-11-23 08:17:44 -05:00
Graeme Robinson 8e299de712 Update modules/exploits/multi/http/kong_gateway_admin_api_rce.rb
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2020-11-22 14:49:51 +00:00
h00die a988e85d90 remove not needed code 2020-11-22 09:07:11 -05:00
h00die 92c92f1573 simple file list rce 2020-11-21 08:51:07 -05:00
bwatters 810898e97b Rough attempt at CVE-2020-1337
Non-functional
2020-11-20 17:36:19 -06:00
Spencer McIntyre 1031b12c57 Land #14206, Rockwell FactoryTalk CVE-2020-12027 RCE 2020-11-20 08:49:39 -05:00
A Galway 5e4e52c619 convert strings to bytes and mandate python3 2020-11-20 12:57:36 +00:00
Spencer McIntyre cbc5899edf Add module docs for the Service Permissions LPE module 2020-11-19 14:17:20 -05:00
Spencer McIntyre 9368f4bdf3 Apply rubocop suggestions to the service permissions module 2020-11-19 12:54:16 -05:00
Spencer McIntyre d1faea5bb7 Add a TargetServiceName option and adjust exception handling 2020-11-19 12:54:16 -05:00
Spencer McIntyre 205a9db8cf Add the initial registry technique for the service permissions LPE 2020-11-19 12:54:10 -05:00
Spencer McIntyre a5024238d3 Tweak the check method to return detected and fix a typo 2020-11-19 09:24:27 -05:00
adfoster-r7 2eb2fad212 Land #14294, Allow adding details to CheckCodes, and update ms17_010_eternalblue to validate the target is x64 2020-11-19 14:09:55 +00:00
Pedro Ribeiro b56d2e00fe Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:59 +07:00
Pedro Ribeiro c635538e9d Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:47 +07:00
Pedro Ribeiro 4c8adcfd46 Update rockwell_factorytalk_rce.rb 2020-11-19 17:56:31 +07:00
William Vu d3f16c7061 Land #14361, COOKIE for sharepoint_ssi_viewstate 2020-11-18 15:55:19 -06:00
William Vu 72a6993408 Add patch bypass (CVE-2020-14750) to references
We were already using it... but now there's a CVE.
2020-11-18 10:57:05 -06:00
William Vu 78999bb92c Add an exploit from Exploit-DB
Written by either (Nguyen) Jang or Mohammed Althibyani. Not used by the
module.

https://www.exploit-db.com/exploits/48971
2020-11-18 10:56:03 -06:00
William Vu 83beae731f Add WebLogic Administration Console Handle RCE
CVE-2020-14882
CVE-2020-14883
2020-11-18 10:56:02 -06:00
realmatthours 4f7329d93d Remove EOL spaces from consul_service_exec.rb 2020-11-18 09:09:55 +00:00
realmatthours 6f1365b75d Add Windows support to consul_service_exec.rb
Added Windows to the 'Targets' list with CmdStagerFlavor psh_invokewebrequest. Generalised the payload delivery to allow for both Windows and the existing Linux payloads.
2020-11-17 15:37:55 +00:00
William Vu f73a88a39c Land #14396, hadoop_unauth_exec clarification 2020-11-16 12:44:13 -06:00
Tod Beardsley 06a0634828 Describe the Hadoop vuln as not-a-vuln clearly 2020-11-16 11:31:59 -06:00
A Galway 0328e3f815 Land #14359, gives preference to default target options 2020-11-13 14:44:13 +00:00
Christophe De La Fuente d6b412c58e Land #14340, Add HorizontCMS 1.0.0-beta exploit module and documentation 2020-11-13 13:03:04 +01:00
h00die 020e90543d IOS -> IOC 2020-11-11 17:43:16 -05:00
h00die 6880376c61 add reliability, stability, side effects to pulse_secure_gzip_rce 2020-11-11 17:19:10 -05:00
Alan Foster 79a3328cd3 Validate that AutoCheck is prepended 2020-11-11 22:15:40 +00:00
William Vu fcb507e412 Fix AutoCheck
I'm a big dummy.
2020-11-11 15:57:38 -06:00
William Vu 42bdae919b Add SaltStack Salt REST API RCE (CVE-2020-16846)
Leveraging CVE-2020-25592.
2020-11-11 13:09:26 -06:00
William Vu 67ae309896 Set plat/arch in saltstack_salt_unauth_rce targets
Looks like I forgot this, and it affects compatible payloads.
2020-11-11 13:09:26 -06:00
h00die d3b67069c8 add cmd stager example py exploit 2020-11-11 10:27:53 -05:00
kalba-security ce7031e263 Add suggestions from code review 2020-11-11 07:41:22 -05:00
h00die 4c39695a50 remove cwe-20 from chkrootkit 2020-11-10 12:01:08 -05:00
h00die 768fb7d3a7 remove cwe-74 from cmsms 2020-11-10 11:43:42 -05:00