Jacob Robles
c93c65cef5
Update date format
2019-06-04 12:24:00 -05:00
Shelby Pace
c2786eb87c
made suggested changes
2019-05-30 14:09:40 -05:00
Shelby Pace
74812ffe4d
Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-05-30 10:52:34 -05:00
Shelby Pace
8c11a1c95a
Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-05-30 10:51:57 -05:00
Shelby Pace
590b9748c1
changed file name and documentation
2019-05-29 18:30:39 -05:00
Shelby Pace
6606e1fed4
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 18:00:59 -05:00
Shelby Pace
5253d34dd3
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 18:00:07 -05:00
Shelby Pace
34528b1512
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 17:59:55 -05:00
Shelby Pace
fa1ce20e74
add note
2019-05-29 15:50:31 -05:00
Shelby Pace
de081a08cd
add working exploit
2019-05-29 15:09:23 -05:00
William Vu
6326aa5dda
Clean up module and randomize username
2019-04-12 14:23:57 -05:00
William Vu
2ebee1226f
Land #11613 , Cisco RV130 stack BOF exploit
2019-04-12 14:06:51 -05:00
Quentin Kaiser
5e189196de
Target consolidation.
2019-04-12 10:58:56 +02:00
Quentin Kaiser
dfb1ebb2e2
Remove Stance value as it is already defined by core/exploit/cmdstager/http.
2019-04-12 10:57:50 +02:00
William Vu
d72672feed
Land #11672 , Zimbra XXE and SSRF exploit
2019-04-10 09:58:45 -05:00
Quentin Kaiser
3517a4e237
Adapt ranking and mention potential stability issue.
2019-04-09 11:31:15 +02:00
todb-r7
9e3984ea51
Remove duplicate CVE for Mailcleaner module
...
See #11304
2019-04-02 12:51:09 -05:00
Jacob Robles
3d662bd962
Fix words because words...
2019-04-01 17:21:23 -05:00
Jacob Robles
69062bb220
Syntax fixes
2019-04-01 17:05:42 -05:00
Jacob Robles
c07b015734
File cleanup
2019-04-01 11:39:40 -05:00
Jacob Robles
51d1216953
Update module name
2019-04-01 07:48:26 -05:00
Jacob Robles
0873ba7ac1
Add Zimbra XXE to RCE module
2019-04-01 07:32:57 -05:00
Brent Cook
0a24266029
Land #11482 , RV320 Unauthenticated RCE
2019-03-28 17:53:05 -05:00
Quentin Kaiser
9baaedce4e
Indicate potential DoS in description. Define exploit stance explicitly.
2019-03-24 22:29:07 +01:00
Quentin Kaiser
5c048e7cd6
CISCO-SA not supported.
2019-03-24 22:20:31 +01:00
Quentin Kaiser
be73f56610
Only got researchers name, no email.
2019-03-24 17:50:31 +01:00
Quentin Kaiser
4451225da7
Add httpd service reloading.
2019-03-24 17:49:55 +01:00
bcoles
5e470a538d
return unless res
2019-03-23 19:38:14 +11:00
Brendan Coles
ccc8d9cdab
return unless res
2019-03-23 08:51:25 +00:00
Quentin Kaiser
5562af39d3
Use CmdStager instead of hardcoded wget command.
2019-03-22 20:10:29 +01:00
Quentin Kaiser
ef2c4310a4
Exploit for CVE-2019-1663 on Cisco RV130(W).
2019-03-22 17:34:12 +01:00
blightzero
9bb7f11897
Unregister SSLCert option since it is never used in thisHTTPServer module.
2019-03-20 14:21:40 +01:00
blightzero
1e00c28701
Checked the functionality of module. Added ability to connect via HTTPS.
2019-03-14 15:54:02 +01:00
William Vu
715409496e
Fix #11210 , imperva_securesphere_exec options
2019-03-05 22:01:24 -06:00
William Vu
4e31f53ca2
Fix required USERNAME and PASSWORD
...
Somehow I forgot to commit this? Strange.
2019-03-05 21:57:42 -06:00
William Vu
c48dec7331
Land #11210 , imperva_securesphere_exec exploit
2019-03-05 21:52:13 -06:00
William Vu
4e76eeceb7
Clean up module
2019-03-05 21:37:55 -06:00
blightzero
0551f3df3c
Refactored code to return early. Untested.
2019-03-05 17:55:34 +01:00
rsp3ar
b5587b926c
Add ForceExploit and fix code ident
2019-02-26 19:59:31 -08:00
blightzero
5f8f49ebcb
Removed all Warnings and Fixed Date Format.
2019-02-26 09:20:04 +01:00
blightzero
f64e517b73
Cisco RV32x RCE added reference IDs, some beautifications.
2019-02-25 15:51:14 +01:00
blightzero
de5a5ea805
Cisco RV32x RCE added reference IDs, some beautifications.
2019-02-25 15:51:14 +01:00
Benjamin
9d0b434f35
Initial commit Cisco RV320 and RV325 remote code execution
2019-02-25 15:51:05 +01:00
Wei Chen
18a4af1d1d
Land #11279 , improve imap_open exploit to be more robust
2019-02-08 18:28:08 -06:00
Tod Beardsley
daa3076d42
Add CVE-2018-1000999 to MailCleaner module
...
See PR #11148
This adds the new CVE assigned by DWF for this vulnerability.
Note that [CVE-2018-10933](https://www.cvedetails.com/cve/CVE-2018-10933/ )
describes a vulnerability in libssh, but this one describes the issue as
it pertains to MailCleaner specifically.
2019-01-23 09:27:12 -06:00
h00die
f47060870a
horde imp h3 imap_open
2019-01-18 19:43:45 -05:00
h00die
2585e4b708
horde imp h3 imap_open
2019-01-18 19:38:30 -05:00
h00die
5d49f04948
not working horde imp imap_open
2019-01-17 19:55:42 -05:00
rsp3ar
2577160449
update print_error, add PrependFork and adjust timeout
2019-01-16 23:20:06 -08:00
Wei Chen
47f8738f74
Add Imran Rashid to CVE-2018-11770 credit
2019-01-14 15:28:08 -06:00