Jemmy Wang
|
62f3dafd91
|
Apply CheckCode message suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2023-10-31 10:45:58 +08:00 |
|
Gaurav Jain
|
9bd819e2d7
|
Add java in-memory target for manageengine servicedesk exploit
|
2023-10-30 20:12:37 +05:30 |
|
Jemmy Wang
|
cd3556dd71
|
Add Exploit for AjaxPro Deserialization RCE (CVE2021-23758)
|
2023-10-28 00:48:52 +08:00 |
|
adfoster-r7
|
3b4302d902
|
Land #18441, Add at rest encryption to Meterpreter payloads
|
2023-10-27 12:18:19 +01:00 |
|
Zach Goldman
|
d960aa522c
|
Land #18348, Splunk account take over (CVE-2023-32707) leading to RCE
|
2023-10-26 11:34:02 -04:00 |
|
Heyder Andrade
|
e5e58bc0be
|
Update modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb
Co-authored-by: Zach Goldman <106169455+zgoldman-r7@users.noreply.github.com>
|
2023-10-26 14:03:06 +02:00 |
|
Heyder Andrade
|
c0af43c10b
|
Update modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb
Co-authored-by: Zach Goldman <106169455+zgoldman-r7@users.noreply.github.com>
|
2023-10-25 11:02:30 +02:00 |
|
Christophe De La Fuente
|
ff9639e6a6
|
Land #18460, VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE
|
2023-10-24 17:32:28 +02:00 |
|
h00die-gr3y
|
50b7e0305e
|
first release module
|
2023-10-24 15:29:18 +00:00 |
|
Heyder Andrade
|
5e19c8fd88
|
Update splunk_privilege_escalation_cve_2023_32707.rb
|
2023-10-24 14:44:27 +02:00 |
|
h00die
|
fa71d8b6e2
|
set all targets to dynamically build list
|
2023-10-23 06:54:38 -04:00 |
|
h00die
|
97f9edb5f7
|
review
|
2023-10-23 06:35:23 -04:00 |
|
h00die-gr3y
|
c62f9a1c45
|
added D-Link GO-RT-AC750 target and lowered linemax to 900 bytes
|
2023-10-22 17:49:21 +00:00 |
|
h00die-gr3y
|
93d38f2d53
|
added additional CVE reference
|
2023-10-20 13:58:32 +00:00 |
|
h00die-gr3y
|
13e3d037c9
|
fifth release module
|
2023-10-19 17:42:53 +00:00 |
|
h00die-gr3y
|
3024824cc9
|
fourth release module
|
2023-10-19 17:31:48 +00:00 |
|
Christophe De La Fuente
|
da9d04d32d
|
Land #18461, CVE-2023-22515 - Atlassian Confluence unauthenticated RCE
|
2023-10-19 10:22:57 +02:00 |
|
h00die-gr3y
|
8ea82693a9
|
third release module + documentation
|
2023-10-18 19:55:13 +00:00 |
|
sfewer-r7
|
5e84f57ab3
|
set :random to true during generate_jar so we can randomize teh metasploit class path
|
2023-10-18 09:53:46 +01:00 |
|
sfewer-r7
|
fcffd36af0
|
no need to test for true, jsut return the value as we are waiting for done to be set to true
|
2023-10-18 09:37:04 +01:00 |
|
sfewer-r7
|
9fdbccb74f
|
catch a JSON ParserError exception and fail_with() if needed. Also detect if the JSON data doesnt have the expected value and fail_with() if needed
|
2023-10-18 09:36:02 +01:00 |
|
h00die-gr3y
|
3d405cda0a
|
second release module
|
2023-10-17 19:09:03 +00:00 |
|
h00die
|
00b534dbed
|
review
|
2023-10-17 13:17:10 -04:00 |
|
h00die-gr3y
|
7e29519c9c
|
initial release module
|
2023-10-17 16:59:45 +00:00 |
|
sfewer-r7
|
34107e4f3b
|
favod over for string concatenation.
|
2023-10-17 11:36:07 +01:00 |
|
sfewer-r7
|
0fc35bf6d3
|
randomize the plugins version number
|
2023-10-17 10:01:02 +01:00 |
|
sfewer-r7
|
415bd49b15
|
use next semantics to return from a yielded block early (note we cannot use return for this)
|
2023-10-17 09:43:00 +01:00 |
|
sfewer-r7
|
54f334479a
|
fix another typo
|
2023-10-17 09:30:52 +01:00 |
|
sfewer-r7
|
9e6e9538e1
|
typo
|
2023-10-17 09:29:38 +01:00 |
|
sfewer-r7
|
d2438bad4e
|
add a note to explain we need to concat a trailing forward slash
|
2023-10-17 09:28:04 +01:00 |
|
sfewer-r7
|
4acdaf3087
|
typos
|
2023-10-17 09:22:09 +01:00 |
|
sfewer-r7
|
d17f065f12
|
remove 'localhost' in favor of some random chars
|
2023-10-17 09:21:28 +01:00 |
|
sfewer-r7
|
3242a7009b
|
clarify timeout is in seconds
|
2023-10-17 09:11:05 +01:00 |
|
sfewer-r7
|
b97cb9f63d
|
remove whitespace
|
2023-10-17 09:10:28 +01:00 |
|
sfewer-r7
|
1c027ac05c
|
add an RCE exploit for CVE-2023-22515
|
2023-10-16 20:50:18 +01:00 |
|
h00die
|
b3b1595ef4
|
vmware aria ssh keys exploit
|
2023-10-16 13:06:17 -04:00 |
|
sjanusz-r7
|
daa8b8ae99
|
Use Metasploit-Payloads Crypto to decrypt payloads
|
2023-10-13 14:42:10 +01:00 |
|
sjanusz-r7
|
b428736e03
|
Add support for injection of encrypted dll payloads
|
2023-10-13 14:42:10 +01:00 |
|
sjanusz-r7
|
1140efc8b4
|
Support adding encrypted files to archives & jars
|
2023-10-13 14:42:10 +01:00 |
|
Wolfgang Hotwagner
|
469d33f31c
|
Added some CMDStagerFlavors
|
2023-10-13 08:49:18 +00:00 |
|
Spencer McIntyre
|
05dd2e1473
|
Land #18351, Apache Superset RCE (CVE-2023-37941)
|
2023-10-12 17:10:10 -04:00 |
|
adfoster-r7
|
80d2fa738d
|
Land #18296, update more mysql modules to support newer authentication methods
|
2023-10-12 17:19:02 +01:00 |
|
Wolfgang Hotwagner
|
2dae0a2398
|
moved token-check outside of get_csrf_magic
|
2023-10-12 15:09:10 +00:00 |
|
Wolfgang Hotwagner
|
2c757bc85b
|
Refactoring
|
2023-10-12 14:37:58 +00:00 |
|
Spencer McIntyre
|
86b7ec4518
|
Address comments from the review
|
2023-10-12 09:50:19 -04:00 |
|
Spencer McIntyre
|
4f734379d3
|
Add module docs and print some messages
|
2023-10-12 09:27:26 -04:00 |
|
Spencer McIntyre
|
0799f9d860
|
Add a check method and populate module metadata
|
2023-10-12 09:27:26 -04:00 |
|
Spencer McIntyre
|
7a226ba285
|
Randomize components in the MAR file
|
2023-10-12 09:27:26 -04:00 |
|
Spencer McIntyre
|
5a6dc7f9a6
|
Initial commit of CVE-2023-43654
|
2023-10-12 09:27:26 -04:00 |
|
Wolfgang Hotwagner
|
58f9a39f72
|
replaced custom timer with rex::stopwatch
updated documentation
|
2023-10-12 11:46:56 +00:00 |
|