Matthew Dunn
|
52fa2e5be6
|
Add example for version 5.5.6 with CVE-2021-25297
|
2023-02-07 14:18:53 -06:00 |
|
Grant Willcox
|
489ab24876
|
Add in additional case documentation for the various targets and CVEs and fix a bug in the code
|
2023-02-07 14:18:45 -06:00 |
|
Grant Willcox
|
7c30889784
|
Refactor code to handle unsigned licenses in one central function
|
2023-02-07 14:18:39 -06:00 |
|
Grant Willcox
|
b14bcd40a2
|
Fix incorrect match logic grabbing the wrong entry from results for NSP
|
2023-02-07 14:18:38 -06:00 |
|
Grant Willcox
|
425da60b15
|
Add in missing case 5 check
|
2023-02-07 14:18:38 -06:00 |
|
Matthew Dunn
|
90e07ef5ed
|
Switch to match over scan and add troubleshooting steps
|
2023-02-07 14:18:37 -06:00 |
|
Matthew Dunn
|
8cddf56238
|
Verify auth_cookies before use
|
2023-02-07 14:18:37 -06:00 |
|
Matthew Dunn
|
a276659681
|
Use more encompassing single regex
|
2023-02-07 14:18:36 -06:00 |
|
Matthew Dunn
|
7554b5e4fd
|
Add failure condition for nsp's that fail to match the regex
|
2023-02-07 14:18:36 -06:00 |
|
Matthew Dunn
|
1cb06b11ac
|
Adjust exploit and docs to support versions 5.5.6-5.7.5
|
2023-02-07 14:18:09 -06:00 |
|
Matthew Dunn
|
87176f9d7f
|
Address Review Comments and add CVE-2021-25297 coverage
|
2023-02-07 14:18:06 -06:00 |
|
Matthew Dunn
|
c5914d8c99
|
Insert randomized strings to fix exploit with plugin_output_len
|
2023-02-07 14:18:05 -06:00 |
|
Matthew Dunn
|
990db5372f
|
Remove extra payload details, add config check
|
2023-02-07 14:18:05 -06:00 |
|
Matthew Dunn
|
b042e71b2a
|
Make Module work for both target url parameters
|
2023-02-07 14:18:04 -06:00 |
|
Matthew Dunn
|
b606d1ff6b
|
Add Documentation for Module
Fix CVE format
Add Documentation
|
2023-02-07 14:18:04 -06:00 |
|
Matthew Dunn
|
5846d95b25
|
Create nagios_xi_configwizards_authenticated_rce.rb
Add initial module
|
2023-02-07 14:18:03 -06:00 |
|
h00die
|
a5a7d5dd10
|
correct cleanup and stabilization
|
2023-02-05 08:15:38 -05:00 |
|
h00die
|
561b42f105
|
use exploit retry function
|
2023-02-04 18:17:42 -05:00 |
|
h00die
|
aff14e8e46
|
tocat to tomcat
|
2023-02-04 18:17:42 -05:00 |
|
h00die
|
e30cae2e40
|
uncomment needed code
|
2023-02-04 18:17:42 -05:00 |
|
h00die
|
34b1e66f90
|
tomcat 8 priv esc on ubuntu prebuilt so file
|
2023-02-04 18:17:41 -05:00 |
|
h00die
|
2b09af78e1
|
tomcat 8 priv esc on ubuntu
|
2023-02-04 18:17:41 -05:00 |
|
Jack Heysel
|
6ab7e177f4
|
Land #17392, add F5 Big-IP priv esc module
Add a privilege escalation module for F5 that uses
the unsecured MCP socket to create a new root account
|
2023-02-02 15:10:33 -05:00 |
|
adfoster-r7
|
952a4fe37a
|
Land #17581, modules: Check datastore ForceExploit before checking if session is root
|
2023-02-02 10:19:07 +00:00 |
|
bcoles
|
ef87a63bde
|
modules: Check datastore ForceExploit before checking if session is root
|
2023-02-02 18:17:02 +11:00 |
|
Grant Willcox
|
48a27ab555
|
Fix the remaining references to the old wiki site.
|
2023-02-01 21:25:06 -06:00 |
|
Ron Bowes
|
cf172d22c8
|
Get rid of #String.hash in favour of UnixCrypt
|
2023-02-01 11:02:04 -08:00 |
|
Ron Bowes
|
1094221468
|
Merge branch 'rapid7:master' into f5-createuser-privesc
|
2023-02-01 10:20:43 -08:00 |
|
Ron Bowes
|
34d93e862c
|
Update modules/exploits/linux/local/f5_create_user.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2023-02-01 10:16:03 -08:00 |
|
Ron Bowes
|
e90b47fd17
|
Update modules/exploits/linux/local/f5_create_user.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2023-02-01 10:15:00 -08:00 |
|
Ron Bowes
|
d89c193db2
|
Update modules/exploits/linux/local/f5_create_user.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2023-02-01 10:14:38 -08:00 |
|
Jack Heysel
|
690d22f759
|
Rapid7 compiled binary
|
2023-02-01 10:08:13 -05:00 |
|
h00die
|
2c72cc145a
|
updates to module
|
2023-01-31 20:05:33 -05:00 |
|
h00die
|
fa687d3614
|
argv instead of hardcoded payload path
|
2023-01-31 16:02:25 -05:00 |
|
h00die
|
5a374533af
|
cve-2022-1043
|
2023-01-31 16:02:25 -05:00 |
|
h00die
|
8d58eb6279
|
cve-2022-1043
|
2023-01-31 16:02:25 -05:00 |
|
Jack Heysel
|
022760d24a
|
Land #17300, linux LPE cve-2022-22942 module
This PR adds a linux priv esc against VMWare virtual machines
with kernel 4.14-rc1 - 5.17-rc1 due to a VMWare driver bug.
|
2023-01-31 14:07:55 -05:00 |
|
adfoster-r7
|
56728fc7c2
|
Land #17573, modules/exploits/linux/ssh Resolve Rubocop violations
|
2023-01-31 14:12:03 +00:00 |
|
adfoster-r7
|
bbf17c167c
|
Land #17511, add exploit for CVE-2022-44877 command injection in CentOS Control Web Panel
|
2023-01-31 14:05:19 +00:00 |
|
bcoles
|
11cf391da8
|
modules/exploits/linux/ssh: Resolve Rubocop violations
|
2023-01-31 23:59:22 +11:00 |
|
adfoster-r7
|
672fb9ce9f
|
Land #17460, add support for feature kerberos authentication
|
2023-01-26 17:47:27 +00:00 |
|
Spencer McIntyre
|
f81195d0cc
|
Fix a typo
|
2023-01-25 13:45:18 -05:00 |
|
space-r7
|
153af9fb68
|
Land #17407, add Cacti unauth command injection
|
2023-01-23 13:06:46 -06:00 |
|
space-r7
|
58cd5bb003
|
specify command stager flavors
|
2023-01-23 11:53:19 -06:00 |
|
Spencer McIntyre
|
6fe0933c1e
|
Add exploit for CVE-2022-44877
|
2023-01-20 09:04:24 -05:00 |
|
h00die
|
3a0b694790
|
better engrish
|
2023-01-18 20:12:49 -05:00 |
|
h00die
|
c823295915
|
cleanup better
|
2023-01-18 16:19:48 -05:00 |
|
bwatters
|
158c557d58
|
Update LICENSE file and location of source file
|
2023-01-17 17:28:22 -05:00 |
|
h00die
|
e28ff3b160
|
minor fixes
|
2023-01-17 15:30:36 -05:00 |
|
h00die
|
be7ca91a8f
|
cve-2022-22942
|
2023-01-17 15:30:36 -05:00 |
|