Commit Graph

4432 Commits

Author SHA1 Message Date
Martin Sutovsky 34f3957aea Land #19772, adding module for CraftCMS FTP template exploit 2025-01-23 20:21:17 +01:00
Takah1ro 393b2167cd Fix after applied suggestion 2025-01-20 21:24:16 +09:00
Takahiro Yokoyama 39351486e9 Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-01-20 21:07:34 +09:00
Takah1ro b0d5cf1f6a Stage the command to a file if failed to limit 2025-01-19 10:43:20 +09:00
Takah1ro 22523badab Update login check 2025-01-19 08:11:44 +09:00
Takah1ro 54bd55b186 Update vulnerable version 2025-01-18 10:18:10 +09:00
Takah1ro c93609eaa7 Lint formatting and make payload shorter 2025-01-18 08:56:15 +09:00
Takahiro Yokoyama fc005f5624 Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-01-18 08:49:13 +09:00
Takah1ro 70146e52d9 Make payload shorter 2025-01-17 22:11:08 +09:00
Takah1ro ca304ae5c4 Avoid to split payload 2025-01-17 21:21:48 +09:00
Takah1ro 61b10a44a3 Update default wait time 2025-01-17 12:43:34 +09:00
Takah1ro 8978486895 Use retry_until_truthy 2025-01-17 08:59:06 +09:00
Takah1ro 4f4a0f9cd5 Add nil check 2025-01-17 08:48:33 +09:00
Takah1ro 9540837b37 Use keep_cookies 2025-01-17 08:46:30 +09:00
Takah1ro f9204fe691 Update message about delete devices for clarity 2025-01-17 08:21:33 +09:00
Takahiro Yokoyama 23a9695ea5 Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com>
2025-01-17 08:17:49 +09:00
Takah1ro 99bfc21d5f Revert 2025-01-16 22:06:40 +09:00
Takah1ro 5087e460b0 Split long line 2025-01-16 21:57:54 +09:00
Takah1ro 8b127d3afa Add warning when all RETRY will ran out 2025-01-16 21:19:19 +09:00
Takah1ro 4e53c967c2 Update message 2025-01-16 12:59:18 +09:00
Jack Heysel 2254a1f213 Responded to comments 2025-01-15 09:22:44 -08:00
Takah1ro 01ea602675 Update version check message 2025-01-15 21:41:25 +09:00
Takah1ro 3298880c21 Add version check 2025-01-15 21:39:54 +09:00
Takah1ro 12a2cdf3bf Remove store_valid_credential 2025-01-15 21:08:08 +09:00
Takah1ro d21be52b71 Lint formatting 2025-01-15 21:07:10 +09:00
Takahiro Yokoyama 0bdee81bcc Apply suggestions from code review
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-01-15 21:04:14 +09:00
Takah1ro 10be7a80cf Update document 2025-01-13 10:56:16 +09:00
Takah1ro 2de30c3a0f Minor fix 2025-01-12 21:35:33 +09:00
Takah1ro 0e1a22aa3b Update Description and print more info 2025-01-12 13:06:46 +09:00
Takah1ro 93bb7fa6c5 Add LibreNMS Authenticated RCE (CVE-2024-51092) 2025-01-12 12:28:07 +09:00
Jack Heysel d52593f231 Rubocop fix 2025-01-10 10:42:50 -08:00
Jack Heysel 928634b9fe Minor fixes and improvements 2025-01-10 10:26:17 -08:00
Chocapikk b7d922f471 Fix and enhance CraftCMS FTP exploit module 2025-01-10 18:16:11 +01:00
jheysel-r7 5374c7b362 Merge pull request #19676 from h00die/needrestart
Ubuntu needrestart LPE (CVE-2024-48990)
2025-01-09 17:02:54 -08:00
jheysel-r7 a6ba7bf9c2 Merge pull request #19734 from h00die/runc_arch
arch linux compatibility for runc priv esc
2025-01-09 16:45:02 -08:00
h00die 437c9fc99e review of ubuntu_needrestart_lpe 2025-01-09 16:23:09 -05:00
Jack Heysel 23db148aa9 Add check for nosuid 2025-01-09 09:59:09 -08:00
Diego Ledda 5cfaf4871d Land #19738, Pandora FMS auth RCE (CVE-2024-11320)
Land #19738, Pandora FMS auth RCE (CVE-2024-11320)
2025-01-09 17:16:58 +01:00
Diego Ledda fea171357a Land #19771, Add Selenium Firefox RCE module (CVE-2022-28108)
Land #19771, Add Selenium Firefox RCE module (CVE-2022-28108)
2025-01-08 13:44:33 +01:00
Takah1ro 296d3c92fc chore: removing PAYLOAD from DefaultOptions 2025-01-08 13:04:08 +09:00
jheysel-r7 0ff2835bb7 Merge pull request #19770 from h00die-gr3y/netis-unauth-rce
Netis Router Exploit Chain Reactor [CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457]
2025-01-07 17:24:37 -08:00
h00die-gr3y 0c723b858f Added attackerkb references 2025-01-07 20:33:41 +00:00
Diego Ledda 7ead96a740 Land #19769, Add Selenium Chrome RCE module (CVE-2022-28108)
Land #19769, Add Selenium Chrome RCE module (CVE-2022-28108)
2025-01-07 11:10:37 +01:00
Diego Ledda 0f71c896e5 chore: removing PAYLOAD from DefaultOptions 2025-01-07 10:47:04 +01:00
H00die.Gr3y 9a6d074463 Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-07 09:25:41 +01:00
Takah1ro 2be1781aa7 Remove unnecessary version check 2025-01-07 08:44:53 +09:00
Takah1ro d788a3baf7 Update check 2025-01-06 19:37:31 +09:00
Takah1ro 474f5426b5 Update check 2025-01-06 19:11:27 +09:00
Takah1ro 43294df0dd Add a message about what is failing 2025-01-04 10:21:43 +09:00
Takah1ro 710ae1198a Apply suggestions from #19769 2025-01-04 10:12:57 +09:00