Commit Graph

3124 Commits

Author SHA1 Message Date
bwatters 58aed837b2 Update docs and options 2022-03-01 14:48:48 -06:00
bwatters 0516badd8e Change the way we cd after new session is created 2022-03-01 14:20:07 -06:00
bwatters f311bd4fce Remove duplicate warning 2022-02-18 16:31:35 -06:00
bwatters 3ea032472d Updated exploit with better check method, added OnSessionCmd option
to run a command when a session is bootstrapped, added more
documentation.
2022-02-18 16:30:47 -06:00
Dhiraj Mishra 3f2d6b6c22 adding authors and removing C exploit reference 2022-02-12 11:52:23 +04:00
bwatters 74521c8ced Update check for supported CentOS, Ubuntu, and Debian Targets 2022-02-11 20:30:05 -06:00
bwatters 9635fde12d Add support and templates for aarch64 targets 2022-02-10 10:49:02 -06:00
bwatters d1ba43e4c8 Remove hard-coded values 2022-02-08 16:00:20 -06:00
bwatters 65ebeafacc Use the supplied directory 2022-02-08 16:00:19 -06:00
bwatters c44fb6a9d3 ugly but working no-gcc module 2022-02-08 16:00:19 -06:00
Dhiraj Mishra 30b8e2196b payload_file spaces
Thank you bcoles

Co-authored-by: bcoles <bcoles@gmail.com>
2022-02-02 21:30:13 +04:00
Dhiraj Mishra ad190fe80f Spaces at EOL 2022-01-27 12:51:36 +04:00
Dhiraj Mishra 4828bc58e6 Spaces at EOL and Date 2022-01-27 12:43:41 +04:00
Dhiraj Mishra dbca5eeb07 Some linting 2022-01-27 12:32:33 +04:00
Dhiraj Mishra 4c0340b26c cve_2021_4034_pwnkit_lpe_pkexec 2022-01-26 23:05:36 +04:00
Grant Willcox 44f040ad78 Land #16056, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-24 21:03:46 -06:00
Grant Willcox 15751a0f78 Minor langauge fix and final typo 2022-01-24 21:01:34 -06:00
Jake Baines 04d06a2df1 Switched to proper fail_with calls in exploit failure 2022-01-24 04:13:43 -08:00
Jake Baines 2c989ec714 Addressed multiple review comments (spelling, doc details, randomization, etc) 2022-01-22 14:09:58 -08:00
Grant Willcox 8bb3e39fd7 Land #16036, Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 10:58:42 -06:00
Brendan Coles ee2feb1207 Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 00:04:15 +00:00
Grant Willcox 8852eaa6b8 Land #16049 - Reference Fixes 2022-01-18 13:46:25 -06:00
Jake Baines 4ebb702405 Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-15 12:46:56 -08:00
Pedro Ribeiro 053fbe2a28 fix cisco advisory links 2022-01-13 18:55:39 +00:00
Pedro Ribeiro ea00da0a03 fix NUUO advisory links 2022-01-13 18:54:56 +00:00
Jake Baines 264f2bc03f Added the AttackerKB analysis 2022-01-11 03:17:45 -08:00
Jake Baines b0941f746f Added link to R7 blog 2022-01-10 13:24:33 -08:00
Jake Baines d4ee9a0183 Initial commit of CVE-2021-20039 exploit 2022-01-10 12:43:50 -08:00
Brendan Coles 5d010fcd25 bash_profile_persistence: Add notes and resolve rubocop violations 2021-12-24 03:06:37 +00:00
bwatters 6c3a29077f Update rm -rf string to be less fragile 2021-12-02 10:31:47 -06:00
bwatters 77812ae4c4 Update documentation for multiple binaries, add targeting data,
other bcoles improvements
2021-12-02 09:57:48 -06:00
bwatters 620b2d2b12 Update targeting selection and payloads, fix python cmd_exec 2021-12-02 08:03:03 -06:00
bwatters 47aacbdf32 Fix cmd_exec to be friendly with binary and python meterpreters
Add arch checks for payload/target
2021-12-01 16:18:49 -06:00
bwatters a3f2d5468a Add some quick debugging output 2021-12-01 14:54:48 -06:00
bwatters 18cc2ef516 Add support for aarch64 Ubuntu versions 2021-12-01 14:54:48 -06:00
bwatters c6e2be2cd7 Ensure deletion of exploit and payload even if the exploit fails. 2021-12-01 14:54:48 -06:00
bwatters b1f6937542 Updated exploit to compile on target, added control over directory creation
Added a method to get source code for the write and compile method
2021-12-01 14:54:47 -06:00
bwatters eba7803e1a Add check method 2021-12-01 14:54:47 -06:00
bwatters bf1b3b377c Add cve-2021-3493 module 2021-12-01 14:54:47 -06:00
Jeffrey Martin 21a6a18d92 trade URI.encode & URI.escape for Ruby 3
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.

Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1) this should equal.
2021-11-22 14:11:03 -06:00
Spencer McIntyre d7cb7804e6 Implement some changes from PR feedback 2021-11-18 16:35:13 -05:00
Grant Willcox a915c3ce5c Add fixes for some of the issues raised during the review process on both the documentation and module side of things 2021-11-17 17:25:50 -06:00
Spencer McIntyre 9fa65092d1 Switch to the new Rex stopwatch function 2021-11-16 10:12:57 -05:00
Spencer McIntyre 0b3f95abca Writeup the module docs and move the protocol code 2021-11-12 15:15:51 -05:00
Spencer McIntyre 1f1e0fc2cc Write and use a check method 2021-11-12 14:08:19 -05:00
Spencer McIntyre 7284f14fd8 Define custom Thrift types, improve syncing 2021-11-12 10:30:48 -05:00
Spencer McIntyre 21ff65994c Initial commit of the Storm Nimbus cmd exec 2021-11-12 10:30:15 -05:00
space-r7 1dd26bca03 Land #15802, add OMIGOD LPE 2021-11-09 10:30:50 -06:00
Spencer McIntyre 278d940fee Update the Python exploit code to fix a bug 2021-11-02 10:10:18 -04:00
dwelch-r7 73e55fcaee Land #15665, Add Meterpreter compatibility metadata 2021-10-29 12:45:26 +01:00