Commit Graph

3095 Commits

Author SHA1 Message Date
bwatters 6c3a29077f Update rm -rf string to be less fragile 2021-12-02 10:31:47 -06:00
bwatters 77812ae4c4 Update documentation for multiple binaries, add targeting data,
other bcoles improvements
2021-12-02 09:57:48 -06:00
bwatters 620b2d2b12 Update targeting selection and payloads, fix python cmd_exec 2021-12-02 08:03:03 -06:00
bwatters 47aacbdf32 Fix cmd_exec to be friendly with binary and python meterpreters
Add arch checks for payload/target
2021-12-01 16:18:49 -06:00
bwatters a3f2d5468a Add some quick debugging output 2021-12-01 14:54:48 -06:00
bwatters 18cc2ef516 Add support for aarch64 Ubuntu versions 2021-12-01 14:54:48 -06:00
bwatters c6e2be2cd7 Ensure deletion of exploit and payload even if the exploit fails. 2021-12-01 14:54:48 -06:00
bwatters b1f6937542 Updated exploit to compile on target, added control over directory creation
Added a method to get source code for the write and compile method
2021-12-01 14:54:47 -06:00
bwatters eba7803e1a Add check method 2021-12-01 14:54:47 -06:00
bwatters bf1b3b377c Add cve-2021-3493 module 2021-12-01 14:54:47 -06:00
Jeffrey Martin 21a6a18d92 trade URI.encode & URI.escape for Ruby 3
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.

Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1) this should equal.
2021-11-22 14:11:03 -06:00
Spencer McIntyre d7cb7804e6 Implement some changes from PR feedback 2021-11-18 16:35:13 -05:00
Grant Willcox a915c3ce5c Add fixes for some of the issues raised during the review process on both the documentation and module side of things 2021-11-17 17:25:50 -06:00
Spencer McIntyre 9fa65092d1 Switch to the new Rex stopwatch function 2021-11-16 10:12:57 -05:00
Spencer McIntyre 0b3f95abca Writeup the module docs and move the protocol code 2021-11-12 15:15:51 -05:00
Spencer McIntyre 1f1e0fc2cc Write and use a check method 2021-11-12 14:08:19 -05:00
Spencer McIntyre 7284f14fd8 Define custom Thrift types, improve syncing 2021-11-12 10:30:48 -05:00
Spencer McIntyre 21ff65994c Initial commit of the Storm Nimbus cmd exec 2021-11-12 10:30:15 -05:00
space-r7 1dd26bca03 Land #15802, add OMIGOD LPE 2021-11-09 10:30:50 -06:00
Spencer McIntyre 278d940fee Update the Python exploit code to fix a bug 2021-11-02 10:10:18 -04:00
dwelch-r7 73e55fcaee Land #15665, Add Meterpreter compatibility metadata 2021-10-29 12:45:26 +01:00
Spencer McIntyre 98528c8ba6 Fail over to default paths 2021-10-28 15:01:12 -04:00
Spencer McIntyre 1ca9f48266 Land #15783, Add Sophos UTM CVE-2020-25223 exploit 2021-10-28 09:00:08 -04:00
William Vu 78ebc89106 Improve sleep timeout using science 2021-10-27 22:49:41 -05:00
William Vu 3c4bc600f7 Link to open() in perldoc 2021-10-27 19:31:03 -05:00
William Vu c419ca04bd Warn when LPORT isn't 443 2021-10-27 19:31:03 -05:00
William Vu 14421ed5f5 Refactor elapsed time calculation 2021-10-27 19:31:03 -05:00
William Vu 7bbf0305c0 Fix elapsed time calculation using monotonic clock
Hat tip @adfoster-r7.
2021-10-27 19:31:03 -05:00
William Vu 3f9b22dbb7 Add Sophos UTM CVE-2020-25223 exploit 2021-10-27 19:31:03 -05:00
Spencer McIntyre ae56ffa934 Initial exploit for CVE-2021-38648 2021-10-27 12:05:56 -04:00
Spencer McIntyre 21c45b3733 Update module metadata 2021-10-27 11:58:53 -04:00
Spencer McIntyre 60b17b5c6f Add the module docs for OMIGOD 2021-10-26 12:08:48 -04:00
Spencer McIntyre 33bacd2b20 Update references and add a check method 2021-10-26 10:35:13 -04:00
Spencer McIntyre e9582d1ddb Initial commit for CVE-2021-38647 2021-10-25 17:36:55 -04:00
wvu 64654a3134 Merge branch 'master' into suitecrm_log_file_rce 2021-10-22 22:11:51 -05:00
M. Cory Billington e90a2a9274 Added CVE 2021-10-22 18:55:37 -05:00
William Vu f270d3ef7a Comment path traversals 2021-10-20 14:16:46 -05:00
William Vu 83500a17d4 Update vmware_vcenter_analytics_file_upload 2021-10-14 16:58:04 -05:00
William Vu 42ed1b6eef Add Windows support to CVE-2021-26084 exploit 2021-10-14 16:58:04 -05:00
William Vu 262b5e09f0 Add VMware vCenter Server CVE-2021-22005 exploit 2021-10-06 16:43:57 -05:00
adfoster-r7 28eab4d871 Add Meterpreter compatibility metadata 2021-10-06 13:54:51 +01:00
sjanusz 2c7aa022d4 Add PoC for CVE-2021-22555 Netfilter Priv Escalation 2021-10-04 16:48:23 +01:00
Jeffrey Martin 731b3d5ffe OptRegExp default value as string representation
OptRegExp default should be string to utilize in a Regex.
This allows for the object to serialize in metadata and via
rpc bridge when transimiteed using msgpack.
2021-09-17 16:34:46 -05:00
space-r7 12af64c4d8 Land #15604, add buffer overflow G-Cam module 2021-09-16 13:02:57 -05:00
Your Name a2f83c22ba Add Pattern Create 2021-09-16 08:22:57 +01:00
Spencer McIntyre 480dec9a1e Land #15658, Add module for CVE-2021-32682 2021-09-14 14:09:27 -04:00
space-r7 278807be98 check contents of json after attempted upload 2021-09-14 11:36:28 -05:00
adfoster-r7 1499b1988e Land #15609, Add Meterpreter compatibility commands 2021-09-13 15:21:03 +01:00
adfoster-r7 46718e3390 Run Rubocop layout rules on modules 2021-09-10 12:53:39 +01:00
space-r7 91ae50eb27 escapeshellcmd -> escapeshellarg 2021-09-09 17:28:05 -05:00