Commit Graph

227 Commits

Author SHA1 Message Date
jheysel-r7 c4b7954f15 Land #19596, Wordpress Plugin Post SMTP Account Takeover 2024-11-29 09:05:03 -08:00
h00die-gr3y 18c4e9c2f6 moved get_machine_info to the acronis_cyber mixin 2024-11-26 16:10:14 +00:00
h00die-gr3y b6595eeaf0 added acronis cyber mixin 2024-11-26 15:49:57 +00:00
h00die 2b593bcf54 wp_post_smtp_acct_takeover peer review 2024-11-03 13:52:55 -05:00
h00die 41ed44864f wp_post_smtp_acct_takeover 2024-10-29 16:44:20 -04:00
h00die 4feb12ab4a untested code 2024-10-29 16:44:20 -04:00
Diego Ledda d2b4175f49 Land #19497, add Wordpress SQLi Mixin
Land #19497, add Wordpress SQLi Mixin
2024-10-14 13:13:52 +02:00
Valentin Lobstein c259ce090a Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 17:22:33 +02:00
Valentin Lobstein c15f186311 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:54 +02:00
Valentin Lobstein fb35f6709a Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:44 +02:00
Valentin Lobstein 94145eafe9 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:32 +02:00
Valentin Lobstein 6c048df53f Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:23 +02:00
Valentin Lobstein de5324e160 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:13 +02:00
Valentin Lobstein 3987a761e7 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:01 +02:00
Valentin Lobstein 31a66d537b Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:52 +02:00
Valentin Lobstein c1521633f4 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:42 +02:00
Valentin Lobstein 8cbe572f49 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:32 +02:00
Valentin Lobstein d01e8d4dd5 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:23 +02:00
Chocapikk 05c579fd65 Add report_host, report_service and report_vuln 2024-10-03 16:12:37 +02:00
Chocapikk f52cd8ba57 Add coding: binary header 2024-09-30 13:01:25 +02:00
Chocapikk 1e95cba5f2 Randomize values 2024-09-25 18:55:26 +02:00
Valentin Lobstein 22443b53d6 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-25 16:39:09 +02:00
Valentin Lobstein 0409d4ec9c Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-25 16:38:36 +02:00
Chocapikk a5d9a06b9a Fix with datastore['RHOST'] 2024-09-25 04:43:27 +02:00
Chocapikk 2d6862ccd4 Add recommendations 2024-09-25 03:57:17 +02:00
Chocapikk a1b4106260 Fix wordpress_sqli_get_users_credentials and rename wordpress_sqli_initialize 2024-09-25 01:57:46 +02:00
Chocapikk fa0d54eaf2 Add Metasploit::Credential::Creation to use create_credential 2024-09-25 01:00:48 +02:00
Chocapikk 3da638e37e Using dynamic prefix in table 2024-09-25 00:58:09 +02:00
Chocapikk 14f1d6a786 Add Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-09-25 00:33:19 +02:00
jvoisin 9f4fa3ba67 Make lib/msf/core/exploit/remote/http/wordpress/admin.rb a tad more portable
- Randomize the license header, based on examples from
  https://developer.wordpress.org/plugins/plugin-basics/header-requirements/,
  as plugins developers are likely copy-pasting them in their own plugins.
- Use the php_preamble/php_system_block combo instead of hardcoding
  system/base64, as `system` might not be available on some WordPress
  deployments, and the combo has some low-hanging evasions for this case.
2024-09-17 21:53:27 +02:00
dledda-r7 6e696e24e5 Land #19457, WP Plugin LiteSpeed Cache Account Take Over Module 2024-09-17 06:30:33 -04:00
Jack Heysel 84a8eb7273 Respond to comments 2024-09-16 09:46:57 -07:00
Chocapikk 43fabb07e5 Update doc + module + (mixin see #19444) 2024-09-08 06:56:13 +02:00
Chocapikk 37042d837e Add spip_plugin_version function to retrieve plugin version from config.txt or Composed-By header 2024-09-04 22:17:06 +02:00
Chocapikk 586cf482ce Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin 2024-08-30 20:37:32 +02:00
Dean Welch d86e85aeea Remove whitespace from spip version regex 2024-08-30 11:42:55 +01:00
Dean Welch 6532107eb4 Remove whitespace from spip version regex 2024-08-30 11:33:15 +01:00
jvoisin 2c79c3d02f Add a mixin to get SPIP version and make use of it 2024-08-28 17:17:53 +02:00
adeherdt-r7 a3a24418a8 MS-9517 Jenkins Login Scanner
Jenkins does not implement Authentication challenges.

By default, Jenkins responds with a HTTP 403 FORBIDDEN response, and does not include the `WWW-Authenticate` header.
This causes problems with the underlying http client, as this one expects the challenge to come forward and resend
the request with the auth header.

By changing the code to look for the HTTP 403 response, and setting the default URL to the correct login validation endpoint
Pro will have an easier time to investigate whether Jenkins can be bruteforced or not.

The original code checks for a 401 response only.
Overwriting the behavior for Jenkins allows us to handle this use-case properly and report the correct behavior.
2024-08-13 11:16:01 +02:00
bcoles 4eecb8ee96 Moodle::Login.moodle_login: fix login success verification regex 2024-06-03 01:49:04 +10:00
Jack Heysel aea95c052e Land #18723, Improve Gitlab fingerprinting
A webpage exists that can be reached without authentication that
contains a hash that can be used to determine the approximate version of
gitlab running on the endpoint. This PR adds enhances our current GitLab
fingerprinting capabilities to include the aforementioned technique.
2024-04-24 12:13:15 -07:00
Jack Heysel bc4a532cd7 Changed format of GITLAB_CSS_MAP 2024-04-24 11:38:22 -07:00
Jack Heysel f018295509 Ensure range of Rex::Version objects are always returned 2024-04-24 10:00:16 -07:00
jvoisin 5ff05b7cec Add more fingerprints 2024-04-24 00:12:01 +02:00
Zach Goldman 26a108aadc Land #19046, Apache Solr Backup Restore RCE [CVE-2023-50386] 2024-04-23 14:08:33 -04:00
Julien Voisin 0b1a4e2a99 Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-04-23 01:05:57 +02:00
jvoisin e5bb593607 Improve how we fingerprint Gitlab versions
Since I was the one suggesting it in #18716, I kinda volunteered to implement
it. This improvement is based on [Censys's blogpost](https://censys.com/cve-2021-22205-it-was-a-gitlab-smash/)
on the topic, making use of the `/assets/application-….css` files that have
a unique name per gitlab versions.

The fingerprints were acquired with this bash script:

```bash
assetdir="/opt/gitlab/embedded/service/gitlab-rails/public/assets"
tags=$(curl "https://hub.docker.com/v2/repositories/gitlab/gitlab-ce/tags?page_size=100" | jq -r '.results[].name')

for tag in $tags; do
    filename=$(docker run --quiet --rm -it --entrypoint "" gitlab/gitlab-ce:$tag ls $assetdir|egrep '^application-.*\.css' | grep -v \.gz | cut -d' ' -f1)
    echo $tag,$filename
done
```

Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-04-23 01:05:57 +02:00
fanqiaojun 6b2bdc893b chore: remove repetitive words
Signed-off-by: fanqiaojun <fanqiaojun@yeah.net>
2024-04-15 11:06:50 +08:00
Jack Heysel 7f62dd2143 Responded to comments 2024-04-04 13:39:22 -07:00
Jack Heysel 03fced404a Apache Solr Backup Restore RCE
Writing file to disk working

working on linux

wip authentcaiton

Consolodated conf folders into one

Renamed conf1 to conf in msf data dir

Randomize the configuration name

Docs plus finishing touches

rubocop

Updated exploit file location

Removed unused external dir

Reduced conf folder
2024-04-02 11:33:52 -07:00