Commit Graph

1775 Commits

Author SHA1 Message Date
Wei Chen 5fc5a47cd2 Update CVE references for exploit modules
These are based on cross references by EDB, OSVDB, module short
name, blog post and BID.
2018-07-08 18:46:04 -05:00
Shelby Pace b5fb970aec Land #10133, Add HID discoveryd RCE exploit 2018-07-06 14:32:29 -05:00
Brent Cook 05a0d79be7 Land #10219, Add HP VAN SDN Controller exploit 2018-07-05 14:21:44 -05:00
William Vu 53d5d82498 Rename module to match new vector 2018-07-05 13:31:16 -05:00
William Vu 762b4b5e53 Simplify creds auth by checking X-Auth-Token alone
It's a lot more direct than checking for the redirect.
2018-07-05 13:20:27 -05:00
William Vu 2b069f45ca Clarify how we're using the auth token for creds
In the service token's case, the service token *is* the auth token.
2018-07-05 13:05:23 -05:00
William Vu 41b0adad88 Use uninstall action command injection 2018-07-03 18:07:22 -05:00
William Vu a25a656d28 Add "E" to HP to make HPE for better searches
We'll stick with calling it HP everywhere else.
2018-07-03 10:29:09 -05:00
William Vu 1bf94ac448 Spruce up check method and related 2018-07-02 13:59:24 -05:00
William Vu 6e090acc76 Stop joking with timeouts 2018-07-02 13:18:31 -05:00
William Vu 78ca4d4217 Finally use Msf::Util::EXE.to_zip 8) 2018-07-02 13:04:59 -05:00
William Vu 78cefe0528 Clarify original exploit credit
It's definitely more than a PoC (exploit). It's weaponized.
2018-06-29 13:02:40 -05:00
William Vu 34f303187f Drop privesc retval, since it's obsoleted by print 2018-06-29 12:53:59 -05:00
Jacob Robles fc3199259b Land #9958, Nagios xi 2 electric 2018-06-29 12:16:18 -05:00
William Vu dbb502ae19 Refactor code and address review comments 2018-06-29 12:13:15 -05:00
Jacob Robles 675a736ab7 Update Docs 2018-06-29 11:08:31 -05:00
Jacob Robles 574c47cba6 Change Ranking
Command to change the database user
account could cause a DoS condition
if the credentials are incorrect.
2018-06-29 10:56:18 -05:00
Jacob Robles 57b89444f3 Additional style fixes 2018-06-29 10:53:57 -05:00
Jacob Robles 7532490a1e Style/Whitespace fixes 2018-06-29 07:02:45 -05:00
William Vu 36a37cf6ab Add HP VAN SDN Controller exploit 2018-06-28 02:14:04 -05:00
William Vu 0820268d8a Improve rank handling with shim logic 2018-06-19 16:46:20 -05:00
William Vu 9913606ed9 Correct rank and formatting in Haraka 2018-06-19 11:44:02 -05:00
bwatters-r7 29f4870fa0 Land #10101, Add glibc 'realpath()' Privilege Escalation exploit 2018-06-12 16:41:07 -05:00
bwatters-r7 06b3fdce49 Update reliability because of failures 2018-06-12 16:39:41 -05:00
Brendan Coles 3bcc329c07 Add HID discoveryd command_blink_on Unauthenticated RCE exploit 2018-06-03 05:41:10 +00:00
Brendan Coles 0af5d44c42 Add glibc 'realpath()' Privilege Escalation exploit 2018-05-26 21:25:59 +00:00
Brendan Coles 651fb69585 Cleanup linux/local/recvmmsg_priv_esc module 2018-05-24 17:56:07 +00:00
bwatters-r7 40d5f46277 Lad #10017, D-Link DSL-2750B Unauthenticated OS Command Injection
Merge branch 'land-10017' into upstream-master
2018-05-22 10:54:33 -05:00
lucyoa 6cc1a8dcbd Rubocop fixes 2018-05-22 10:34:05 -04:00
Tim W 88ab836e15 Land #9987, AF_PACKET chocobo_root exploit 2018-05-21 17:05:53 +08:00
Tim W 9e9dff8b6a fix file cleanup on failed exploitation 2018-05-21 16:47:09 +08:00
Tim W cd0161ada2 fix gcc for shell_reverse_tcp payloads on ubuntu 2018-05-21 16:46:42 +08:00
lucyoa 6ae55aadd4 Fixing documentation, improving exploits code 2018-05-20 12:55:46 -04:00
bwatters-r7 294b263159 Land #9966, Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit
Merge branch 'land-9966' into upstream-master
2018-05-18 17:06:04 -05:00
Brent Cook 37f1e44a12 Land #10009, Add initial check support to external modules 2018-05-18 09:31:31 -05:00
Brendan Coles eb3733ffb4 unless 2018-05-17 17:42:55 +00:00
Tim W 6594cbb5cc Land #9947, AF_PACKET packet_set_ring exploit 2018-05-17 18:43:52 +08:00
Tim W dc227153c4 fix gcc on shell_reverse_tcp session 2018-05-17 18:43:27 +08:00
Tim W ce5b24eda0 fork early and cleanup files in module 2018-05-17 00:32:01 +08:00
William Vu 436e414b93 Land #7815, CVE-2016-9299 exploit 2018-05-16 05:29:41 -05:00
William Vu 959cbde6eb Clean up module 2018-05-16 05:29:25 -05:00
Brendan Coles c5f980f633 GoodRanking 2018-05-16 02:38:19 +00:00
lucyoa 8dd7a27f7b Fixes according to code review 2018-05-14 05:46:23 -04:00
lucyoa f65361258b Adding vulnerable firmwares to description 2018-05-13 15:08:32 -04:00
lucyoa 382364a3ff Adding documentation, improving description 2018-05-13 15:04:40 -04:00
lucyoa c3ad02121c Exploit for D-Link DSL2750B OS Command Injection vulnerability 2018-05-13 13:58:35 -04:00
Tim W ed5f2bffa9 Land #9919, add libuser roothelper privilege escalation exploit 2018-05-12 17:11:21 +08:00
Tim W a8660e4042 make the PASSWORD option required 2018-05-12 17:10:21 +08:00
Adam Cammack b0e712e992 Add banner check exploit/linux/smtp/haraka 2018-05-11 12:45:32 -05:00
Adam Cammack 90f2fe545c Add PEP8 whitespace to exploit/linux/smtp/haraka 2018-05-11 12:43:30 -05:00