Shelby Pace
65e1ef4cb8
Land #14253 , add wp-file-manager rce for wordpress
2020-11-10 08:48:33 -06:00
Shelby Pace
4382f6ff55
add filedropper usage
2020-11-10 08:47:53 -06:00
Tim W
e14813485a
Land #14331 , add msfvenom apk template cmd injection exploit
2020-11-10 17:33:10 +08:00
h00die
b0b9ace606
Revert "remove ruby pulse_secure_cmd_exec"
...
This reverts commit efb8557e43 .
2020-11-09 20:09:12 -05:00
Grant Willcox
34697ecc11
Apply further fixes from the review process
2020-11-09 12:11:25 -06:00
stasinopoulos
2d81187b3c
Update regarding OMV version identification
2020-11-09 08:58:05 +02:00
h00die
da70b74954
fix version numbers
2020-11-08 22:38:53 -05:00
h00die
3c4962e9b0
working and clean
2020-11-08 22:31:26 -05:00
h00die
9f936038e5
cleanup rnd1
2020-11-08 08:42:19 -05:00
h00die
0e62e7793d
working session on linux/x86/shell/reverse_tcp
2020-11-08 08:27:55 -05:00
stasinopoulos
fc2e9f7c89
Minor update after rubocop run
2020-11-08 10:27:59 +02:00
stasinopoulos
ad5b0af9c6
Fixes n' updates
2020-11-08 10:26:31 +02:00
chmod750
5ec0556abd
Update modules/exploits/windows/http/sharepoint_ssi_viewstate.rb
...
CamelCase update
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-11-06 23:26:40 +01:00
chmod750
7a968fcd39
Update modules/exploits/windows/http/sharepoint_ssi_viewstate.rb
...
CamelCase update
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-11-06 23:20:12 +01:00
chmod750
22b0fae73c
Update sharepoint_ssi_viewstate.rb
2020-11-06 16:40:16 +01:00
chmod750
8356b44892
Add cookie header functionnality
2020-11-06 16:16:59 +01:00
Alan Foster
5b438fd933
Preference target values when registering options
2020-11-05 23:16:37 +00:00
kalba-security
31237258e5
Add Rubocop changes
2020-11-05 07:27:51 -05:00
kalba-security
e7a20ec47c
Add CVE ID to module and docs
2020-11-05 07:05:32 -05:00
kalba-security
0a9589166f
Add CVE ID
2020-11-05 06:55:37 -05:00
h00die
f39e4d62e2
working but needs cleanup
2020-11-04 17:59:04 -05:00
Grant Willcox
a0087842fb
Fix an earlier merge mistake, was meant to replace URI.escape with Rex::Text.uri_encode() but instead replaced it with CGI.escape. Fix it to be Rex::Text.uri_encode()
2020-11-04 14:39:16 -06:00
Grant Willcox
d50ac2972d
Land #14222 , Update php_fpm_rce.rb to replace depreciated URI.encode calls with Rex::Text::uri_encode
2020-11-04 14:04:28 -06:00
h00die
bacc0f78ed
permissions solved
2020-11-04 14:17:16 -05:00
Shelby Pace
79e83cdceb
add rubocop change
2020-11-04 10:09:00 -06:00
Shelby Pace
e49d99a80d
add AutoCheck usage, minor changes
2020-11-04 10:04:14 -06:00
kalba-security
ea70c15b56
Implement suggestions from code review
2020-11-04 09:49:27 -05:00
h00die
8a936a07f0
stuck in read only mode
2020-11-03 18:33:40 -05:00
h00die
1e0ea16173
runs, needs cleanup
2020-11-03 15:25:49 -05:00
kalba-security
8aceea1872
Add flexdotnetcms_upload_exec module and docs
2020-11-03 09:50:28 -05:00
kalba-security
cf954888da
Add horizontcms_upload_exec module and documentation
2020-11-02 13:01:13 -05:00
Spencer McIntyre
659137da94
Remove the DRuby remote code execution module
2020-11-02 08:32:52 -05:00
h00die
efb8557e43
remove ruby pulse_secure_cmd_exec
2020-11-01 14:46:46 -05:00
Justin Steven
61f7f01f37
Nicer certificate expiration
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-10-31 12:14:18 +10:00
Justin Steven
cb14287cb2
Add metasploit_msfvenom_apk_template_cmd_injection
2020-10-31 11:28:28 +10:00
C4ssandre
33fa947c72
Improving syntax and code style.
2020-10-28 22:48:01 +00:00
C4ssandre
7364758017
Implementing AutoCheck mixin.
2020-10-28 22:43:08 +00:00
C4ssandre
ad74428f6b
Change in order to make sure we get the right notepad executed. Change in response to https://github.com/rapid7/metasploit-framework/pull/14046#pullrequestreview-481887070
2020-10-28 21:55:12 +00:00
C4ssandre
b36f06178a
Fixing some syntax errors.
2020-10-28 18:50:00 +00:00
Che5hireC4t
e4272e3c88
Adding metadata to ruby module.
2020-10-28 19:02:15 +01:00
Graeme Robinson
bb9464801e
Make changes suggested in review
...
* Add better explanation of public-api-port option in documentation
* Add example in scenarios where admin API is on different host to
public API (therefore public-api-port option must be used)
* Add targeturi option
* Add version number that has been tested in 2 places in documentation
2020-10-27 21:13:45 +00:00
Alan Foster
902297d199
Add service stub encoder validation
2020-10-27 15:27:24 +00:00
C4ssandre
7ec20cfb0e
Integration of powershell module into exploit. Now, metasploit is in charge of creating the powershell payload and transmit it to running exploit (instead of raw shellcode transformed into powershell previously).
2020-10-25 19:50:45 +00:00
h00die
79384e85f3
remove old .keep files in non-empty directories
2020-10-24 09:41:55 -04:00
bwatters
294269bd4e
Land #14300 , Fixes and updates for the DRuby RCE module
...
Merge branch 'land-14300' into upstream-master
2020-10-23 14:36:04 -05:00
Spencer McIntyre
ba17a5d67f
Apply rubocop fixes for the DRuby RCE module
2020-10-22 12:35:35 -04:00
Spencer McIntyre
8aca08f80b
Add the DRuby RCE check method
2020-10-22 12:34:51 -04:00
Spencer McIntyre
34e41e66ec
Fix the syscall DRuby target by adding a small delay before execve
2020-10-22 12:18:12 -04:00
Spencer McIntyre
49145bfd31
Don't start the DRuby service, it appears unnecessary
2020-10-22 12:15:39 -04:00
Brendan Coles
6258d5b561
Land #14296 , Move mercury_login module docs to documentation directory
2020-10-22 13:24:54 +00:00