dledda-r7
|
ec5892ff1f
|
Land #19363, Ray Modules CVE-2023-6019 CVE-2023-6020 CVE-2023-48022
|
2024-08-23 04:55:17 -04:00 |
|
Takah1ro
|
39f81e0a45
|
Update check function
|
2024-08-21 22:32:53 +09:00 |
|
Takah1ro
|
ee58313d64
|
Update check function
|
2024-08-21 22:09:56 +09:00 |
|
Takahiro Yokoyama
|
c66540ef2f
|
Update modules/exploits/linux/http/ray_agent_job_rce.rb
use MeterpreterTryToFork to avoid a meterpreter session get killed
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
|
2024-08-21 21:38:37 +09:00 |
|
Takah1ro
|
91167fc85f
|
Remove unnecessary option
|
2024-08-20 21:44:11 +09:00 |
|
Takah1ro
|
4d1782640b
|
Update sideeffects
|
2024-08-20 19:12:18 +09:00 |
|
Takah1ro
|
01b2a1c55c
|
Enable fetch payload
|
2024-08-20 13:20:42 +09:00 |
|
Takah1ro
|
45677898a8
|
Add TARGET_URI
|
2024-08-20 13:08:01 +09:00 |
|
Takah1ro
|
52852cea72
|
Add cve ref
|
2024-08-20 12:59:52 +09:00 |
|
Takah1ro
|
99c81d7821
|
Set default fetch_command to wget
|
2024-08-20 08:59:39 +09:00 |
|
Takah1ro
|
64bdf54bb0
|
Use Fetch Payload (Not tested)
|
2024-08-20 08:56:05 +09:00 |
|
Takah1ro
|
a5b9d553fa
|
Update check to use version info
|
2024-08-20 08:25:27 +09:00 |
|
Takah1ro
|
5be7e09ff0
|
Update check to use version info
|
2024-08-20 08:21:48 +09:00 |
|
Takah1ro
|
7258ca4fb1
|
Remove unnecessary option for simplicity
|
2024-08-16 08:49:34 +09:00 |
|
Takah1ro
|
eeab7ce2a2
|
Proceed when user specified cmd fails
|
2024-08-16 08:23:50 +09:00 |
|
Takah1ro
|
ea1b9e925e
|
Delete old three exploits in one module
|
2024-08-15 08:17:36 +09:00 |
|
cgranleese-r7
|
dbc51d1cd4
|
Land #19347, OpenMetadata authentication bypass and SpEL injection exploit chain[CVE-2024-28255 and CVE-2024-28254]
|
2024-08-14 16:06:10 +01:00 |
|
cgranleese-r7
|
36322ff274
|
Land #19348, Apache HugeGraph Gremlin RCE (CVE-2024-27348)
|
2024-08-14 10:06:21 +01:00 |
|
jheysel-r7
|
47e5d62ade
|
Update modules/exploits/linux/http/apache_hugegraph_gremlin_rce.rb
|
2024-08-13 08:48:33 -07:00 |
|
jheysel-r7
|
e04e22bc30
|
Apply suggestions from code review
|
2024-08-13 08:40:20 -07:00 |
|
Takah1ro
|
cf15124cc8
|
Add not null check
|
2024-08-09 15:34:14 +09:00 |
|
Takah1ro
|
c36c2eea38
|
Separate modules
|
2024-08-09 08:51:14 +09:00 |
|
Takah1ro
|
1f68919a42
|
Fail if optional but required option not set
|
2024-08-07 13:01:23 +09:00 |
|
Takah1ro
|
f168246796
|
Correct vulnerable version
<=v2.6.3 == <v2.8.1
|
2024-08-07 12:49:17 +09:00 |
|
Takah1ro
|
a57678c8d3
|
Formatting
|
2024-08-07 08:51:22 +09:00 |
|
Takah1ro
|
4e99e7dfe7
|
Use Vulnerable when lfi
|
2024-08-07 08:50:42 +09:00 |
|
Takah1ro
|
92e2694ac5
|
Use Detected instead of Appears
|
2024-08-07 08:46:44 +09:00 |
|
Takah1ro
|
b7e4247d22
|
Avoid using CVE as option
|
2024-08-07 08:43:57 +09:00 |
|
Takah1ro
|
c71894f3c4
|
Remove unnecessary DefaultOptions
|
2024-08-07 08:21:15 +09:00 |
|
h00die-gr3y
|
8b3392a756
|
changed check to Appears when vulnerable
|
2024-08-06 21:00:06 +00:00 |
|
Takah1ro
|
b487dadf8c
|
Remove explicit return
|
2024-08-05 13:01:11 +09:00 |
|
Takah1ro
|
0251f1bd8d
|
Rubocop formatting
|
2024-08-04 22:10:15 +09:00 |
|
Takah1ro
|
729ecc588a
|
Formatting lfi output
|
2024-08-04 22:07:53 +09:00 |
|
Takah1ro
|
ca0dba1844
|
Add LFI
|
2024-08-04 22:02:37 +09:00 |
|
Takah1ro
|
a5009cd5ff
|
Add RCE
|
2024-08-04 21:43:17 +09:00 |
|
Takah1ro
|
7a233f0049
|
Update CVE-2023-6019 module
|
2024-08-04 21:07:05 +09:00 |
|
Takah1ro
|
122767cc59
|
Implement CVE-2023-6019 module
|
2024-08-04 10:49:11 +09:00 |
|
h00die-gr3y
|
8f0d22ded4
|
Fourth release module and documentation
|
2024-08-02 21:04:50 +00:00 |
|
Jack Heysel
|
75c737dabe
|
Responded to comments
|
2024-08-02 10:47:53 -07:00 |
|
h00die-gr3y
|
75b3afb0ce
|
Third release module and documentation
|
2024-07-31 14:34:44 +00:00 |
|
Takah1ro
|
ca75714959
|
Change all instance of staging_key to @staging_key
|
2024-07-31 12:54:09 +09:00 |
|
Takah1ro
|
a7512f70eb
|
Change all instance of staging_key to @staging_key
|
2024-07-31 08:47:07 +09:00 |
|
Takah1ro
|
53d74f0777
|
Use a multi-line string
instead of a big number on one line
|
2024-07-31 08:27:35 +09:00 |
|
Takahiro Yokoyama
|
1c28150514
|
Update modules/exploits/linux/http/empire_skywalker.rb
add prepend Msf::Exploit::Remote::AutoCheck at the beginning of the class
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2024-07-31 08:11:44 +09:00 |
|
Takahiro Yokoyama
|
6f4ff80a38
|
Update modules/exploits/linux/http/empire_skywalker.rb
formatting issue
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2024-07-31 08:09:40 +09:00 |
|
Takahiro Yokoyama
|
a35a2c1814
|
Update modules/exploits/linux/http/empire_skywalker.rb
formatting issue
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2024-07-31 08:08:25 +09:00 |
|
Takahiro Yokoyama
|
13f5d971ed
|
Update modules/exploits/linux/http/empire_skywalker.rb
use a multi-line string instead of a big number on one line
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2024-07-31 08:04:39 +09:00 |
|
Jack Heysel
|
d7ae1b5463
|
Minor fixes
|
2024-07-30 09:19:12 -07:00 |
|
Jack Heysel
|
075ce28c5a
|
Base64 encoded ARCH_CMD payload
|
2024-07-30 08:19:08 -07:00 |
|
Jack Heysel
|
464f0b2d48
|
Apache HugeGraph Gremlin RCE (CVE-2024-27348)
|
2024-07-29 14:08:38 -07:00 |
|