Commit Graph

3486 Commits

Author SHA1 Message Date
William Vu c6fd9a4b08 Land #13895, SAP RECON CVE-2020-6287 improvements 2020-07-27 08:51:16 -05:00
Spencer McIntyre dc0f254c0e Update the module docs for CVE-2020-6287 2020-07-23 18:02:43 -04:00
William Vu a89c966bbc Land #13852, SAP "RECON" CVE-2020-6287 aux module 2020-07-23 10:30:36 -05:00
Spencer McIntyre d108cd0da9 Address feedback for consistency within CVE-2020-6287 2020-07-23 10:31:46 -04:00
Spencer McIntyre 593ddd8ac4 Add module docs for CVE-2020-6287 2020-07-23 09:47:22 -04:00
William Vu 2d6d2a811d Update module docs with Net::LDAP warning 2020-07-22 16:38:34 -05:00
William Vu 8528a62691 Update module docs 2020-07-22 15:45:26 -05:00
William Vu f736b0192f Add LDAPS support and update vCenter vmdir modules 2020-07-22 14:23:00 -05:00
William Vu 41457b21d9 Land #13868, vCenter vmdir CVE-2020-3952 hash dump 2020-07-22 14:00:44 -05:00
William Vu 3eb9bda8c5 Update module docs one final time
No need to show the test creds. Output is consistent now.
2020-07-22 13:24:55 -05:00
William Vu 797b22c41a Update module docs after recent changes 2020-07-22 12:47:21 -05:00
Shelby Pace bf4d0bf6ee Land #13828, add Zentao Pro rce 2020-07-22 09:42:11 -05:00
Shelby Pace 6c066a97ed add bcoles suggestions 2020-07-22 09:39:17 -05:00
William Vu da709b1ee4 Update module doc 2020-07-21 09:38:54 -05:00
William Vu 5f5a2e7508 Refactor code (untested) 2020-07-21 01:09:46 -05:00
William Vu d5d4716b1c Update TMSH escape reliability notes
What's strange is that if the stars align, like if the system has been
"used" enough, the exploit is incredibly reliable. Maybe my test
environment is bonkers.
2020-07-17 06:26:00 -05:00
William Vu c082ccd337 Make Meterpreter the default target 2020-07-17 06:10:53 -05:00
William Vu 1ae689ce5f Improve robustness by refactoring error handling
tmshCmd.jsp is extremely unreliable!
2020-07-17 05:23:42 -05:00
bwatters eb863048f0 Land #13741, CVE-2020-5741: Plex rce on Windows
Merge branch 'land-13741' into upstream-master
2020-07-16 10:20:50 -05:00
gwillcox-r7 8cfcfe36aa Land #13750, Centralize Cisco, Juniper, Brocade and Ubuiquiti auxiliary modules under networking directory 2020-07-16 10:16:52 -05:00
bwatters ceea94c368 Update docs for installation of target software 2020-07-16 10:16:48 -05:00
h00die 3d851ca668 add run 2020-07-14 21:06:33 -04:00
h00die 80770125b5 review comments 2020-07-14 21:01:28 -04:00
kalba-security 2d3588c0ad Add suggestions from code review 2020-07-13 12:51:57 -04:00
Brendan Coles 384a71b06a Land #13271, Update auxiliary/server/capture/smtp to store credentials 2020-07-11 17:30:06 +00:00
h00die 85bd740640 review comments 2020-07-11 15:19:16 -04:00
kalba-security df42399f61 Add installation instructions to docs 2020-07-09 17:20:07 -04:00
kalba-security 36397a3e8f Add cmdstager support 2020-07-09 15:21:12 -05:00
kalba-security 3eceeca911 Add Pandora FMS Events Remote Code Execution module and docs 2020-07-09 15:21:12 -05:00
Shelby Pace 895c170394 Land #13769, add FortiMail auth bypass scanner 2020-07-09 09:28:45 -05:00
kalba-security 6c4f975f97 Fix linting 2020-07-08 16:51:55 -04:00
kalba-security 470a0c9423 Add installation instructions to docs 2020-07-08 16:50:10 -04:00
kalba-security 1f631e20ad Add zentao_pro_rce Windows exploit and docs 2020-07-08 15:13:45 -04:00
Spencer McIntyre 16ff439296 Land #13807, Add F5 BIG-IP TMUI Directory Traversal and File Upload RCE (CVE-2020-5902) 2020-07-07 13:44:01 -04:00
William Vu 3ec597ce38 Update module doc 2020-07-07 12:12:38 -05:00
Patrick 361df36f33 Apply suggestions from code review by space-r7
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-07-07 10:56:27 +02:00
William Vu ac3b31a911 Add module doc 2020-07-06 18:07:52 -05:00
Shelby Pace a2309f018e Land #13740, add springcloud dir traversal 2020-07-06 09:48:40 -05:00
Brendan Coles f9a5de87f8 Land #13789, Add OpenSIS Unauthenticated PHP Code Execution module 2020-07-04 15:49:45 +00:00
h00die 89332d0056 native python for plex unpickle 2020-07-03 19:37:18 -04:00
EgiX d62b8d16c6 Update opensis_chain_exec.md 2020-07-03 17:43:10 +02:00
EgiX ab703f376b Create opensis_chain_exec.md 2020-07-01 23:51:17 +02:00
gwillcox-r7 c311ea5b5b Land #13768, Netgear R6700 Admin Password Reset (CVE-2020-10923 and CVE-2020-10924) 2020-07-01 14:58:53 -05:00
William Vu 08c1402be9 Land #13733, AnyDesk GUI CVE-2020-13160 exploit 2020-07-01 14:47:07 -05:00
Spencer McIntyre a27bf9df38 Fix some grammatical mistakes and set a default target for anydesk 2020-07-01 15:27:33 -04:00
gwillcox-r7 fdfef2729f Update documentation and modules to better list the range of versions affected now that we know which versions we can target and the CVE IDs. Also update the firmware links to archive.org links in case they ever get removed which is more common than you think 2020-07-01 13:28:46 -05:00
gwillcox-r7 ddb41d5a50 Update module and documentation with new output from the exploit 2020-07-01 13:28:32 -05:00
gwillcox-r7 3db867e5eb Futher updates to the module documentation since technically this module doesn't send the packet to UDP port 23 to enable the telnet server. 2020-07-01 13:28:15 -05:00
Radek Domanski 1e520f27e9 Updating md as per comments 2020-07-01 13:27:32 -05:00
Radek Domanski a19c50044f Fixing firmware download link 2020-07-01 13:27:30 -05:00