jheysel-r7
|
ae4a5ac986
|
Merge pull request #20786 from zeroSteiner/feat/lib/mod-merge-target-info
Merge target info into the module info
|
2026-01-08 18:01:14 -08:00 |
|
Xorriath
|
2030d19438
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-07 14:45:03 +02:00 |
|
Xorriath
|
2ef1b9fbae
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-07 14:44:51 +02:00 |
|
Xorriath
|
a676b05928
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-06 12:35:32 +02:00 |
|
Xorriath
|
236d94ee54
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-06 12:35:17 +02:00 |
|
Xorriath
|
b35d74b305
|
Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2026-01-06 12:35:01 +02:00 |
|
kali
|
2448429502
|
Add Prison Management System 1.0 auth RCE (CVE-2024-48594)
|
2025-12-26 08:08:49 +02:00 |
|
sfewer-r7
|
0c947d05ab
|
add in the AKB analysis
|
2025-12-19 15:38:43 +00:00 |
|
sfewer-r7
|
5c6c8a3956
|
better check result given we have the version string
|
2025-12-19 15:38:27 +00:00 |
|
sfewer-r7
|
a4dba96712
|
add in the HPE OneView exploit
|
2025-12-19 15:30:53 +00:00 |
|
Spencer McIntyre
|
602adeb4c5
|
Mass rubocop changes
|
2025-12-18 10:08:31 -05:00 |
|
Spencer McIntyre
|
8945267db6
|
Remove redundant Platform and Arch definitions
|
2025-12-17 16:12:31 -05:00 |
|
Spencer McIntyre
|
2103e1b5f6
|
Fix a bug in the platform definition
|
2025-12-17 15:57:58 -05:00 |
|
sfewer-r7
|
795c38c524
|
Combine the 7.x and 6.x targets together, as Linux payloads work on 7.x also, so this target is Unix and Linux. This leaves the 8.x target Unix only due to IMA appraisal.
|
2025-11-28 10:12:02 +00:00 |
|
sfewer-r7
|
014312873c
|
get both unix and linux payloads working on 6.x. Add a note to the docs about setting a gateway.
|
2025-11-27 20:28:44 +00:00 |
|
sfewer-r7
|
f5e8aa83be
|
add in exploit support for FortiWeb versions 6.x which are vulnerable, but no longer under support from the vendor.
|
2025-11-27 12:43:19 +00:00 |
|
Brendan
|
e998b91aee
|
Merge pull request #20717 from sfewer-r7/fortiweb-exploit-rce
Add exploit module for Fortinet FortiWeb (CVE-2025-64446 + CVE-2025-58034)
|
2025-11-25 14:14:31 -06:00 |
|
sfewer-r7
|
fa03ac8b66
|
on 7.4.8 the command nohup is not available. we must execute our payload in a new session, so we use a python stub to essentially call setsid. This has been tested to work on both 8.0.1 and 7.4.8. Teh payload cmd/unix/reverse_python isnot working as it previously was, so I am removing from the list of confirmed paylaods. The other two, cmd/unix/reverse_bash and cmd/unix/reverse_openssl work fine on both versions
|
2025-11-25 11:25:41 +00:00 |
|
sfewer-r7
|
8a054b74db
|
improve check logic to actualy parse JSON result for expected reply, tested against 8.0.1 and 7.4.8
|
2025-11-25 11:22:43 +00:00 |
|
sfewer-r7
|
b8cefb1af9
|
add nohup when bootstraping the payload to avoid the scenario when the parent dies it tears down our payload child process
|
2025-11-21 15:54:41 +00:00 |
|
sfewer-r7
|
aff76622fa
|
add in the unauth RCE exploit module for CVE-2025-64446 + CVE-2025-58034
|
2025-11-21 12:22:25 +00:00 |
|
Brendan
|
bb728c44d7
|
Merge pull request #20560 from cdelafuente-r7/feat/mitre/T1021
Add T1021 "Remote Services" MITRE technique and sub-technique references
|
2025-11-20 11:19:31 -06:00 |
|
Christophe De La Fuente
|
179a545312
|
Remove false positive references
|
2025-11-19 17:34:15 +01:00 |
|
Diego Ledda
|
110cb837aa
|
Merge pull request #20672 from h00die-gr3y/centreon_auth_rce
Centreon authenticated command injection leading to RCE via broker engine "reload" parameter [CVE-2025-5946]
|
2025-11-05 16:29:29 +01:00 |
|
h00die-gr3y
|
34c424f473
|
update based on dledda-r7 comments
|
2025-11-05 09:20:13 +00:00 |
|
h00die-gr3y
|
61dfc293d9
|
update based on dledda-r7 comments
|
2025-11-03 14:37:23 +00:00 |
|
h00die-gr3y
|
85b4233345
|
updated module based on review comments and added documentation
|
2025-11-03 10:21:31 +00:00 |
|
h00die-gr3y
|
83e7fc2667
|
update attackerkb reference
|
2025-11-02 18:26:34 +00:00 |
|
h00die-gr3y
|
e01456bcf4
|
init commit module
|
2025-11-02 17:45:22 +00:00 |
|
Christophe De La Fuente
|
0a755ea03a
|
Add references to MITRE ATT&CK T1021 - Remote Services
|
2025-10-14 16:25:30 +02:00 |
|
Brendan
|
91c0adb17f
|
Merge pull request #20585 from vognik/CVE_2025_60787
Add MotionEye Authenticated RCE (CVE-2025-60787)
|
2025-10-09 13:50:25 -05:00 |
|
Vognik
|
267a26b763
|
code review changes from smcintyre-r7@
|
2025-10-09 21:51:31 +04:00 |
|
Spencer McIntyre
|
9dc5696cc4
|
Update dash characters in module references
|
2025-10-07 14:03:32 -04:00 |
|
Spencer McIntyre
|
fd21209e4d
|
Add missing CVEs from VulnCheck
|
2025-10-07 13:59:13 -04:00 |
|
Spencer McIntyre
|
cf3abc280e
|
Merge pull request #20533 from cdelafuente-r7/feat/mitre/add_ref
Add T1003 "OS credential dumping" MITRE technique reference
|
2025-09-18 11:56:33 -04:00 |
|
Diego Ledda
|
1314f5d0bb
|
Merge pull request #20455 from Chocapikk/aitemi_m300_time_rce
Add unauthenticated RCE on Shenzhen Aitemi M300 MT02 (CVE-2025-34152)
|
2025-09-10 10:12:41 +02:00 |
|
Christophe De La Fuente
|
7ce2bdc979
|
Add T1003 "OS credential dumping" MITRE technique
|
2025-09-09 10:45:46 +02:00 |
|
Brendan
|
f1dffd3ad6
|
Merge pull request #20480 from msutovsky-r7/exploit/pretalx/file-rw
Adds modules for Pretalx File Read/Limited File Write (CVE-2023-28459, CVE-2023-28458)
|
2025-08-27 15:46:39 -05:00 |
|
Martin Sutovsky
|
d49870211b
|
Adding exceptions to exploit module, bug fix for aux module, adds documentation for exploit module
|
2025-08-22 15:26:46 +02:00 |
|
Martin Sutovsky
|
4e113b1768
|
Addresses comments, adds exception for Pretalx, modifies aux module
|
2025-08-22 13:59:50 +02:00 |
|
Martin Sutovsky
|
2e9b5453ec
|
Adds description
|
2025-08-21 15:29:08 +02:00 |
|
Martin Sutovsky
|
fb062075e3
|
Adds target, adds side effects
|
2025-08-21 15:21:16 +02:00 |
|
Martin Sutovsky
|
408f7575e4
|
Fixing write primitive for exploit module, library update
|
2025-08-21 15:17:32 +02:00 |
|
Martin Sutovsky
|
01c09bcfed
|
Library fixes, refactoring exploit module
|
2025-08-21 09:22:21 +02:00 |
|
Martin Sutovsky
|
72dcc5a301
|
Library fix
|
2025-08-21 07:21:56 +02:00 |
|
Chocapikk
|
f4e71c1e93
|
Replace Rank
|
2025-08-14 16:37:13 +02:00 |
|
Chocapikk
|
3022513652
|
Add CRASH_SERVICE_DOWN and "`" badchar
|
2025-08-14 16:16:21 +02:00 |
|
Valentin Lobstein
|
46bbec2470
|
Update modules/exploits/linux/http/aitemi_m300_time_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
|
2025-08-14 16:11:27 +02:00 |
|
Valentin Lobstein
|
bd9c2bf231
|
Update modules/exploits/linux/http/aitemi_m300_time_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2025-08-14 16:01:59 +02:00 |
|
jheysel-r7
|
8251d89e92
|
Merge pull request #20400 from msutovsky-r7/exploit/pivotx-rce
Adds module for PivotX RCE (CVE-2025-52367)
|
2025-08-12 12:28:28 -07:00 |
|