Spencer McIntyre
06dcc82ced
Land #18630 , Add CVE-2023-50917: MajorDoMo RCE
...
Add CVE-2023-50917: MajorDoMo Command Injection Module
2024-01-19 17:10:40 -05:00
bwatters
fadb0f45dd
Land #18708 , Ivanti Connect Secure RCE exploit module (CVE-2023-46805 and CVE-2024-21887)
...
Merge branch 'land-18708' into upstream-master
2024-01-19 15:47:43 -06:00
sfewer-r7
de6ed9e1d6
use get_json_document instead of JSON.parse
2024-01-18 15:35:43 +00:00
sfewer-r7
4ff399844f
By replacing the trailing ';' with a '#' we comment out the remaining portion of the command string (Thank you @jvoisin). We must also include a space character for this to work as expected, doing so also removes the need to bootstrap the Linux payloads with a separate file.
2024-01-18 10:04:38 +00:00
Stephen Fewer
c74fd86961
Update modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2023_46805.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-18 09:18:46 +00:00
Stephen Fewer
3bb1d2bc02
Update modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2023_46805.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-18 09:18:35 +00:00
Christophe De La Fuente
a8d46b3e7a
Land #18627 , Ansible: post gather module, payload deployer, and file reader
2024-01-17 15:26:25 +01:00
sfewer-r7
70ef0dcb0d
improve the check logic to fall through when the json doesnt have the key we expect it to have
2024-01-17 10:02:59 +00:00
sfewer-r7
518c1e5d3c
mention Pull Connect as well as the CVEs in the description
2024-01-17 10:02:11 +00:00
sfewer-r7
ad7e348eaa
remove a copy pasta link
2024-01-17 09:16:18 +00:00
sfewer-r7
f9419c4839
seperate commands into an array instead of one bog long string
2024-01-16 17:19:13 +00:00
sfewer-r7
ea1dafa353
this is a slightly nicer way to write this
2024-01-16 17:08:09 +00:00
sfewer-r7
4060e069ed
first commit of the ICS exploit
2024-01-16 14:32:48 +00:00
h00die
56a9beb39d
ansible review
2024-01-15 17:18:49 -05:00
h00die
e711c9ea43
ansible review
2024-01-10 17:16:57 -05:00
Jack Heysel
11d58ef2e8
Land #18631 , Improve vScalation Priv Esc Check
...
This PR adds an improvement to the check method of the
vcenter_java_wrapper_vmon_priv_esc module. Before the module
would attempt to run stat on a file before checking if the file
existed on the system. This fixes that issue.
2023-12-28 13:16:11 -05:00
Jack Heysel
63eb5f2a35
Land #18632 , Add improvements to glibc tunables
...
This PR adds improvements to the glibc tunables module. In the
event the file command is not present on the target the module
will try to use the readelf command in order to get the ld.so
BuildID to determine whether or not the target is compatible with
exploit.
2023-12-28 12:41:52 -05:00
h00die
357bdc8c10
ansible post library
2023-12-24 11:49:27 -05:00
h00die
11c12fcb6d
review comments
2023-12-23 13:23:34 -05:00
Christophe De La Fuente
3182cb4000
Land #18612 , Craft CMS unauthenticed RCE [CVE-2023-41892]
2023-12-22 10:59:39 +01:00
Balgogan
0a2dea523f
Add suggested changes
2023-12-22 00:04:54 +01:00
h00die-gr3y
4c404765a4
Final update to the module based on cdelafuente-r7 comments
2023-12-21 12:06:21 +00:00
jvoisin
fc66cd1522
Improve a bit glibc_tunables_priv_esc
...
- Fix some typos
- Add a check via `readelf` should `file` not be available
- Add a message before launching the exploit, since it might take some time to finish.
2023-12-20 20:59:47 +01:00
Christophe De La Fuente
fb26c93291
Land #18541 , Glibc Tunables Privilege Escalation CVE-2023-4911 (Looney Tunables)
2023-12-20 20:04:21 +01:00
Jack Heysel
77fb5d02b2
Fixed up indentation and rubocop complaints
2023-12-20 13:16:32 -05:00
jheysel-r7
342492557d
Apply suggestions from code review
2023-12-20 13:09:13 -05:00
jheysel-r7
6a16602a08
Apply suggestions from code review
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2023-12-20 13:08:33 -05:00
Christophe De La Fuente
7ca256560d
Land #18542 , Vinchin Backup & Recovery Command Injection
2023-12-20 18:56:50 +01:00
Balgogan
9c9af0dca1
Fix statement
2023-12-20 01:51:19 +01:00
h00die
1e374403ec
better check for vmon
2023-12-19 19:01:45 -05:00
Balgogan
22a05c8bf5
Add CVE-2023-50917
2023-12-20 00:43:00 +01:00
Jack Heysel
d65ceb9abc
Rubocop
2023-12-19 13:54:23 -05:00
Jack Heysel
b86df4820c
Responded to comments from jvoisin
2023-12-19 13:50:09 -05:00
jheysel-r7
96241f509a
Apply suggestions from code review
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2023-12-19 13:18:45 -05:00
Jack Heysel
065abf6b92
Rubocop, doc scenario update
2023-12-19 12:30:02 -05:00
Jack Heysel
44b4b3b5bc
Update version parsing
2023-12-19 12:16:17 -05:00
Jack Heysel
4e61596e7a
Check Build ID before running exploit
2023-12-19 12:15:35 -05:00
Jack Heysel
e858628292
Execute python payload in memory
2023-12-19 00:46:11 -05:00
Jack Heysel
549ee43df9
Update docs description minor comments
2023-12-19 00:32:21 -05:00
Jack Heysel
c6a6809700
Updated attribution
2023-12-18 19:41:49 -05:00
h00die-gr3y
5d7cf90521
Some minor changes to the module and documentation
2023-12-18 08:23:16 +00:00
h00die
6b376b9156
move options
2023-12-17 15:24:16 -05:00
h00die-gr3y
0641839e69
Added documentation and removed debug info
2023-12-17 13:10:18 +00:00
h00die-gr3y
db099f8f4c
Third release of module
2023-12-16 16:06:05 +00:00
h00die
c911ec1413
ansible collection
2023-12-16 07:16:26 -05:00
Jack Heysel
df111afb06
Glibc Tunables Exploit
2023-12-14 18:28:43 -05:00
h00die-gr3y
d00249f083
Second release with manual cleanup of php* files
2023-12-14 12:57:07 +00:00
h00die-gr3y
ff44932113
first draft release of module
2023-12-10 21:09:40 +00:00
cgranleese-r7
f794268020
Land #18578 , Docker cgroup escape (CVE-2022-0492)
2023-12-06 16:07:08 +00:00
Christophe De La Fuente
10d4b9233b
Land #18463 , D-Link Router UPnP unauthenticed LAN RCE via a crafted M-SEARCH packet
2023-12-05 10:58:15 +01:00