Commit Graph

18 Commits

Author SHA1 Message Date
bcoles 6597a6c5fc modules/exploits/linux/redis: Resolve RuboCop violations 2025-05-21 02:07:54 +10:00
cgranleese-r7 0017fbdf56 Updates more dead links 2025-02-28 10:30:14 +00:00
adfoster-r7 25ee41df68 Run rubocop on exploit modules 2023-02-08 15:20:32 +00:00
Jake Baines 1b119a845c Fixed handling of victim response 2022-04-26 12:34:45 -07:00
Jake Baines ec37ebc617 Update modules/exploits/linux/redis/redis_debian_sandbox_escape.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-04-26 14:43:03 -04:00
Jake Baines d20fd996bd Fix spelling mistakes 2022-04-26 03:38:23 -07:00
Jake Baines 71a4023c0d Initial commit of Redis sandbox escape CVE-2022-0543 2022-04-26 03:32:11 -07:00
dwelch-r7 319f15d938 Handle nil versions for rubygems 4 2021-02-25 16:47:49 +00:00
Alan Foster 30809787c4 Convert disclosure dates to iso8601 2020-10-02 21:00:37 +01:00
Green-m 92fb321f9f Satify the msftidy_docs. 2020-03-28 11:46:55 +08:00
Green-m 4b1762081f Renane module to redis_extension_cmd_exec.
Fix #12143
2020-03-28 11:37:18 +08:00
Adam Cammack 5ce4929834 Fix has_check? conflict in redis_unauth_exec
Importing `Msf::Auxiliary::Scanner` at all will override the default
`has_check?` check and add a its own `check` method. This redefines
`has_check?` to allow usage of the Redis mixin while using an
exploit-style `check` method.

Fixes #13095
2020-03-25 10:07:08 -05:00
William Vu 42c8420f5a Fix style 2019-12-09 20:09:52 -06:00
Green-m 22412d4570 Fix bind error bug, and enhance check method. 2019-11-15 09:52:58 +08:00
Wei Chen 63de0051f4 Cosmetic changes 2019-07-28 21:38:54 -05:00
Green-m e71b92aa60 We are not evil! 2019-07-21 09:33:18 +08:00
Green-m 07f3c074d4 Add doc and enhance the module. 2019-07-20 00:17:57 +08:00
Green-m b6697f5016 Add redis rce module and data stuff.
To do:
1. Check env of system and compiler.
2. Add a compiled so file to be compatible with windows and mac.
3. Add doc.
2019-07-17 15:33:02 +08:00