Niboucha Redouane
69ed4be81d
Remove trailing comma after :auth_bypass
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-09-14 19:03:37 +02:00
Brendan Coles
485c51c88c
Add VyOS restricted-shell Escape and Privilege Escalation
2020-09-11 18:19:25 +00:00
Brendan Coles
febe38e1ce
resolve qa comments
2020-09-11 17:16:10 +00:00
Shelby Pace
d86f9427c9
change version check and add sleep
2020-09-11 11:49:14 -05:00
Shelby Pace
e5c9439974
rubocop and metadata additions
2020-09-10 18:32:30 -05:00
Shelby Pace
8474462458
add command stager usage
2020-09-10 18:02:07 -05:00
gwillcox-r7
593945ee61
Update module documentation with more detail r.e affected versions and the fact that the use of UNC paths could cause an issue if they are not typed in correctly. Also update the module documentation to use the output from recent tests to reflect recent changes. Shortern the module description and update its stability rating. Finally add in a reliability rating for the exploit module.
2020-09-10 11:32:45 -05:00
gwillcox-r7
16b27ae270
Add in version checking to ensure we only check if the target has the 'Enable insecure guest logons' enabled if their build number is greater than or equal to 10.0.16299.0, which was the build where this change first was implemented.
2020-09-10 11:32:45 -05:00
gwillcox-r7
45480373a9
Fix up the exploit module so that it will not wait for AV if a UNC path is used, as there is no chance the AV on the host can remove the file on the UNC share, and the UNC share won't be accessed until the exact moment it is needed
2020-09-10 11:32:45 -05:00
gwillcox-r7
7e1560ff26
Update documentation with the installation instructions I mentioned in the GitHub comments. Also RuboCop the exploit module code.
2020-09-10 11:32:18 -05:00
gwillcox-r7
0d493bbc54
Add in extra code to handle cases where the loops may enter a infinte loop state. New code should prevent this from happening
2020-09-10 11:32:18 -05:00
gwillcox-r7
a94d36248b
Add in the AVTIMEOUT option to allow the module to check if any AV or other processes deleted the uploaded DLL file, thereby preventing a situation where the DNS server is unable to restart. Also add in some warning's r.e when we enter the danger section and when we exit it so that users at more aware of when this is happening.
2020-09-10 11:32:18 -05:00
gwillcox-r7
78dc43efa5
Fix up incorrect regex within the check method to fix a logic bug
2020-09-10 11:32:18 -05:00
ide0x90
c4d463e921
Added option to generate standalone DLL.
2020-09-10 11:32:18 -05:00
ide0x90
53f3b70b33
Changed DLL so that it doesn't block the DNS service from stopping after the module executes.
...
Added OS check (>= Server 2003 is vulnerable so far).
Now cleans up dropped DLL and modified registry value.
2020-09-10 11:32:18 -05:00
ide0x90
7701ea1bc8
Compile DLL so that the DNS service doesn't crash when the module is run.
2020-09-10 11:32:18 -05:00
ide0x90
151fdb7ea5
Reduced exploit ranking and added check to see if session is elevated.
2020-09-10 11:32:18 -05:00
ide0x90
d1e9039af4
Initial module and documentation for Microsoft Windows DNS ServerLevelPluginDll abuse
2020-09-10 11:31:51 -05:00
bwatters
e592736833
Land #13992 , Add module for CVE-2020-9839, LPE for macOS <= 10.15.4
...
Merge branch 'land-13992' into upstream-master
2020-09-04 15:53:17 -05:00
Tim W
7b1f5c1728
add documentation
2020-09-04 17:42:30 +08:00
Tim W
be2fe15116
fix pdfpath and uripath
2020-09-04 16:09:40 +08:00
bwatters
149566b30e
Run rubocop
2020-09-02 17:14:30 -05:00
Shelby Pace
4d9f5e14e8
remove pry statement and comments
2020-09-02 13:41:33 -05:00
Shelby Pace
1e90d10531
add functionality for channel setup
2020-09-02 13:37:41 -05:00
Niboucha Redouane
314fb755c0
update comment on Author metadata
2020-09-02 19:43:06 +02:00
Niboucha Redouane
1b09ecfd04
make auth_bypass return a checkcode
2020-09-02 17:50:09 +02:00
ggkitsas
62d3d9bc9a
fix: reverts misuse of in zip_slip exploit
2020-09-01 21:49:55 +01:00
Niboucha Redouane
1d4c0bedfc
base64-encode the command in the check method
2020-09-01 20:58:37 +02:00
Niboucha Redouane
9d3981723b
use hex encoding in command injection
2020-09-01 18:26:25 +02:00
Tim W
9150f0bc3a
move int64.js and utils.js to javascript_utils folder
2020-09-01 16:14:31 +08:00
Niboucha Redouane
cd38077974
Add the non-encoded serialized object in the script, to make it more readable
2020-08-31 15:15:52 +02:00
ggkitsas
788244150c
Add support for zip generation in zip_slip exploit
2020-08-31 13:18:14 +01:00
Niboucha Redouane
82d8b92e24
add module documentation
2020-08-30 16:57:01 +02:00
Niboucha Redouane
f96ad15dfa
minor fix / refactoring
2020-08-30 16:31:04 +02:00
Brendan Coles
9d33ebd54a
Add Mida Solutions eFramework ajaxreq.php Command Injection
2020-08-30 12:46:00 +00:00
Niboucha Redouane
efdbf5716c
avoid printing on methods called from check, and remove autocheck
2020-08-30 13:53:55 +02:00
Niboucha Redouane
2fde21a621
add check method, and address feedback from bcoles
2020-08-30 12:45:40 +02:00
Niboucha Redouane
7a120ef60b
Add EDB and PACKETSTORM references
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-08-30 12:44:12 +02:00
adfoster-r7
62d45870dc
Land #14040 , Use CheckModule auxiliary/scanner/misc/java_rmi_server in exploit/multi/misc/java_rmi_server
2020-08-28 10:22:35 +01:00
Tim W
806455abbc
fix
2020-08-27 19:36:45 +08:00
Tim W
33fa4d1424
dynamic offsets
2020-08-27 19:36:45 +08:00
Tim W
a94389fb76
cleanup cvm_side
2020-08-27 19:36:45 +08:00
Tim W
0a1fb600a2
fix source versions and jscell headers
2020-08-27 19:36:45 +08:00
Tim W
27238abfdc
kill first time app launch popup
2020-08-27 19:36:45 +08:00
Tim W
8ba7e9ca62
msftidy
2020-08-27 19:36:45 +08:00
Tim W
990ecdd097
split exploit js into function
2020-08-27 19:36:45 +08:00
Tim W
8ac2a27596
fix payload targets
2020-08-27 19:36:45 +08:00
Tim W
a8b34bae67
whitespace
2020-08-27 19:36:44 +08:00
Tim W
c069d940a9
fix restoring of /etc/pam.d/login
2020-08-27 19:04:43 +08:00
C4ssandre
3336040f2d
Adding a new privilege escalation exploit for windows.
...
New files and folders:
- metasploit-framework/modules/exploits/windows/local/bits_ntlm_token_impersonation.rb
- metasploit-framework/data/exploits/drunkpotato/
- metasploit-framework/external/source/exploits/drunkpotato/
2020-08-25 14:27:41 +02:00