jheysel-r7
|
08e227faca
|
Merge pull request #19934 from sfewer-r7/bugfix-cisco-iosxe-rce
Improve exploit/linux/misc/cisco_ios_xe_rce (CVE-2023-20198 + CVE-2023-20273)
|
2025-03-27 16:51:16 -07:00 |
|
Spencer McIntyre
|
bf1f919d9f
|
Merge pull request #19957 from msutovsky-r7/auxmodule-eramba-update
Auxmodule eramba update
|
2025-03-25 13:54:24 -04:00 |
|
Martin Sutovsky
|
95f9e22eff
|
Addressing comments
|
2025-03-20 20:46:38 +01:00 |
|
Martin Sutovsky
|
df027f3fdd
|
Update documentation, adding more precise check, removing unnecessary characters
|
2025-03-20 15:18:55 +01:00 |
|
msutovsky-r7
|
741a222e9a
|
Land #19961, fixing incorrect URL in the InvoiceNinja module
BUGFIX invoiceninja module - fixed invalid attackerkb reference
|
2025-03-14 11:15:23 +01:00 |
|
msutovsky-r7
|
9961bfbc58
|
Land #19950, module for InvoiceShelf unauthenticated PHP deserialization
InvoiceShelf unauthenticated PHP deserialization vulnerability [CVE-2024-55556]
|
2025-03-14 10:21:56 +01:00 |
|
h00die-gr3y
|
84012fd60c
|
fixed invalid attackerkb reference
|
2025-03-14 08:23:10 +00:00 |
|
h00die-gr3y
|
0ca2599f48
|
update based on review comments
|
2025-03-14 08:04:22 +00:00 |
|
Martin Sutovsky
|
9886f78575
|
Upgrade Eramba RCE module
|
2025-03-13 12:34:50 +01:00 |
|
sfewer-r7
|
4c5137846c
|
call fail_with upon failure rather than passing around Failure's as variables.
|
2025-03-13 09:41:58 +00:00 |
|
h00die-gr3y
|
1ca57c86fc
|
added base64 encoding in php payload execution
|
2025-03-11 21:30:32 +00:00 |
|
h00die-gr3y
|
e341398871
|
small update on module and documentation
|
2025-03-10 19:35:37 +00:00 |
|
h00die-gr3y
|
281b728000
|
initial module and documentation
|
2025-03-07 17:34:22 +00:00 |
|
msutovsky-r7
|
196d95b2bf
|
Land #19944, adding dynamic session for module CVE-2025-0655
Update dtale_rce_cve_2025_0655.rb to use dynamically generated session
|
2025-03-07 14:35:51 +01:00 |
|
Takah1ro
|
edb47d968c
|
Update function name after applied suggestion
|
2025-03-07 08:05:00 +09:00 |
|
Takahiro Yokoyama
|
233c710d82
|
Update modules/exploits/linux/http/dtale_rce_cve_2025_0655.rb
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
|
2025-03-07 07:54:50 +09:00 |
|
adfoster-r7
|
8604c72ef4
|
Merge pull request #19895 from cgranleese-r7/update-dead-module-references
Update dead module references
|
2025-03-05 16:57:05 +00:00 |
|
Takah1ro
|
bf5ae87a3d
|
Use dynamically generated session
|
2025-03-05 12:56:01 +09:00 |
|
sfewer-r7
|
2f5758b8ed
|
improve the logic here
|
2025-03-04 09:22:11 +00:00 |
|
sfewer-r7
|
efb0d5da4c
|
fix typo, C1000v should be CSR1000v. Be consistant with IOS XE and not IOS-XE.
|
2025-03-04 09:09:32 +00:00 |
|
sfewer-r7
|
94606036bd
|
typos in comments
|
2025-03-03 20:45:37 +00:00 |
|
sfewer-r7
|
9c075c7cce
|
Previously the check routine only leveraged the first vuln in the chain, CVE-2023-20198, to perform a version based check. However the second vuln in the chain, CVE-2023-20273, was not verified as to working, so a return code of CheckCode::Vulnerable may no have been acurate if the target was vulnerable to CVE-2023-20198 but not CVE-2023-20273. Now we leverage both CVE-2023-20198 and CVE-2023-20273 to ensure the target is actually vulnerable. For example, it has been observed that the C8000v series appliance version 17.6.5 is vulnerable to CVE-2023-20198, but not vulnerable to CVE-2023-20273, even though the IOS-XE version indicates they should be vulnerable to CVE-2023-20273. As this exploit chains both CVE-2023-20198 and CVE-2023-20273 together, the check routine must verify both CVEs work as expected in order to return CheckCode::Vulnerable (i.e. we cannot solely rely on a version based check via CVE-2023-20198).
|
2025-03-03 20:29:20 +00:00 |
|
sfewer-r7
|
4a38605576
|
bugfix the check routine, to get a suitable response from a targets webui path, we must have the trailing slash (seen in a C8000v target, verified to work in both C8000v and C1000v targets)
|
2025-03-03 20:25:31 +00:00 |
|
sfewer-r7
|
e71a851e3f
|
mention that the C8000v series appliance version 17.6.5 was observed to not be vulnerable to CVE-2023-20273. Inspecting the Lua code shows this appliance has additional command injection filtering in place (see pexec_setsid in /usr/binos/openresty/nginx/conf/pexec.lua) which prevents the injection from working
|
2025-03-03 20:22:46 +00:00 |
|
msutovsky-r7
|
3c4d0aae2f
|
Land #19899, D-Tale remote code execution module
Add D-Tale RCE module (CVE-2024-3408, CVE-2025-0655)
|
2025-03-03 13:04:45 +01:00 |
|
Takah1ro
|
47351e4959
|
Use FETCH_DELETE as default
|
2025-03-03 20:52:55 +09:00 |
|
Takah1ro
|
65d2b6380b
|
Update vulnerable version
|
2025-03-02 12:14:25 +09:00 |
|
Takah1ro
|
77c3ce52e0
|
Improve:
* Support the prior to 3.13.0 versions
* CVE-2024-3408 bypass for authentication
|
2025-03-01 11:58:28 +09:00 |
|
Takah1ro
|
316ecd4d04
|
Use FETCH_FILELESS as default
|
2025-03-01 11:55:43 +09:00 |
|
cgranleese-r7
|
df8b0de0c8
|
Fixes some invalid links
|
2025-02-28 11:29:59 +00:00 |
|
cgranleese-r7
|
0017fbdf56
|
Updates more dead links
|
2025-02-28 10:30:14 +00:00 |
|
cgranleese-r7
|
810e7c4518
|
Adds scripts to find and replace dead module reference links
|
2025-02-28 09:20:48 +00:00 |
|
Spencer McIntyre
|
c49b49bdcd
|
Merge pull request #19893 from bwatters-r7/fix/loadmaster_priv_esc_cve
Remove errant CVE reference.
|
2025-02-26 14:24:09 -05:00 |
|
Takah1ro
|
40726d1859
|
Remove unnecessary & guard operator
|
2025-02-26 21:13:55 +09:00 |
|
Diego Ledda
|
8dd032e529
|
Land #19897, Invoice Ninja unauthenticated RCE (CVE-2024-55555) and Laravel Crypto Killer mixin
Land #19897, Invoice Ninja unauthenticated RCE (CVE-2024-55555) and Laravel Crypto Killer mixin
|
2025-02-25 13:14:18 +01:00 |
|
h00die-gr3y
|
79411eace8
|
added code sugesstions from dledda-r7
|
2025-02-24 15:51:32 +00:00 |
|
h00die-gr3y
|
41e690445e
|
simplified some code sections
|
2025-02-23 12:59:52 +00:00 |
|
Takah1ro
|
4d4b88c94e
|
Add D-Tale unauth RCE module (CVE-2025-0655)
|
2025-02-23 09:33:42 +09:00 |
|
H00die.Gr3y
|
b3a5da976b
|
Apply suggestions from code review
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2025-02-22 10:35:45 +01:00 |
|
h00die-gr3y
|
47a2079d19
|
initial module and laravel crypto killer mixin
|
2025-02-21 18:09:28 +00:00 |
|
h00die-gr3y
|
215957465c
|
added default options and updated documentation
|
2025-02-20 13:19:41 -06:00 |
|
h00die-gr3y
|
15c20272ea
|
removed linux dropper code and tested with PR 19850
|
2025-02-20 13:19:41 -06:00 |
|
h00die-gr3y
|
f857e5fe67
|
fixed code review and updated documentation
|
2025-02-20 13:19:41 -06:00 |
|
H00die.Gr3y
|
38b3741a15
|
Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2025-02-20 13:19:41 -06:00 |
|
h00die-gr3y
|
682be79920
|
first release module and documentation
|
2025-02-20 13:19:41 -06:00 |
|
h00die-gr3y
|
baac1fc9d0
|
init commit module
|
2025-02-20 13:19:40 -06:00 |
|
bwatters-r7
|
c8aea65c7a
|
Remove errant CVE reference.
|
2025-02-20 08:19:23 -06:00 |
|
Brendan
|
66d657f385
|
Merge pull request #19810 from h00die/fix_loadmaster_2024
Fix loadmaster privesc check method and refs
|
2025-02-18 19:34:00 -06:00 |
|
Martin Sutovsky
|
bd42b23ef0
|
Land #19883, module for unauthenticated RCE in InvokeAI
|
2025-02-18 14:01:11 +01:00 |
|
Takahiro Yokoyama
|
6eaae79dc2
|
Update modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2025-02-18 21:21:19 +09:00 |
|