dwelch-r7
134765dc40
Remove targets from aux modules
2019-09-23 15:29:38 +01:00
Shelby Pace
8bfdaf6ab7
change metadata indentation
2019-09-11 15:56:46 -05:00
Will Porter
3ed9fb0383
Fix a bug caused by writing python code in a ruby file.
2019-09-11 15:39:15 +00:00
William Porter
262e574fe2
Add the .csv extension to the loot file.
2019-09-10 21:32:03 -04:00
William Porter
7a8eb76a12
Use the same gsub pattern to create the ltype as is used by store_loot to sanitize characters.
2019-09-10 21:14:15 -04:00
William Porter
832d2e4300
Remove unneccesary comment.
2019-09-10 12:29:55 -04:00
Will Porter
3fc0467484
Update modules/auxiliary/sqli/openemr/openemr_sqli_dump.rb
...
Remove unused path variable.
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-10 12:27:48 -04:00
Will Porter
f1f9597222
Update modules/auxiliary/sqli/openemr/openemr_sqli_dump.rb
...
Use `normalize_uri` to construct the vulnerable URI.
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-10 12:27:22 -04:00
Will Porter
106913f631
Correct csv string.
2019-09-04 17:43:34 +00:00
William Porter
2cd93cc097
Update documentation and actually save loot as csv file.
2019-09-04 13:08:49 -04:00
Will Porter
1b9bb964b8
Adjust loot filename.
2019-09-04 16:56:28 +00:00
William Porter
0ee3324535
Use store_loot properly, check response.nil? before consuming body.
2019-09-04 12:21:59 -04:00
Will Porter
c433cd4007
Remove erroneous ? from URI path.
2019-09-04 15:04:56 +00:00
Will Porter
74647c314a
Use Rex::Text.rand_text_alphanumeric and remove gsub as a weak excuse for encoding.
2019-09-04 07:53:36 +00:00
William Porter
5963bbd6f9
Remove broken include.
2019-09-04 03:30:13 -04:00
William Porter
d0803e49be
Make changes as suggested in the pull request reviews.
2019-09-04 03:18:58 -04:00
William Porter
2b97522b69
Fix the CVE format based on failed tests.
2019-09-04 01:36:20 -04:00
William Porter
80aee24d65
Add an auxiliary module to exploit OpenEMR CVE CVE-2018-17179.
...
Dump all tables in the OpenEMR database and save the data in .csv
format in the loot directory.
2019-09-04 01:18:54 -04:00
Shelby Pace
7698b7d7db
changed location of dolibarr module/documentation
2018-09-19 11:17:27 -05:00
Shelby Pace
aa9d0d7c6c
using uri_encode
2018-08-31 08:41:25 -05:00
Shelby Pace
b1151b9d12
modified login_uri
2018-08-31 08:08:46 -05:00
Shelby Pace
42af28a86a
printing and storing credentials
2018-08-30 14:17:37 -05:00
Shelby Pace
85c4abac99
storing credentials
2018-08-30 13:59:00 -05:00
Shelby Pace
7915c4ac6c
getting user credentials in response
2018-08-29 13:59:06 -05:00
Shelby Pace
bb4a4b8839
initial module setup
2018-08-29 10:28:10 -05:00
h00die
a40429158f
40% done
2017-08-28 20:17:58 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
g0tmi1k
4720d1a31e
OCD fixes - Spaces
2017-07-14 08:46:59 +01:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Pearce Barry
b5afac6627
Per PR #8054 , we don't need the OUTPUTPATH option here.
2017-03-03 16:20:01 -06:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216 , reversing
changes made to 7b1d9596c7 .
2016-07-15 12:00:31 -05:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
f703fa21d6
Revert "change Metasploit3 class names"
...
This reverts commit 666ae14259 .
2016-03-07 13:19:55 -06:00
Christian Mehlmauer
666ae14259
change Metasploit3 class names
2016-03-07 09:56:58 +01:00
wchen-r7
154fb585f4
Remove bad references (dead links)
...
These links are no longer available. They are dead links.
2015-10-27 12:41:32 -05:00
URI Assassin
35d3bbf74d
Fix up comment splats with the correct URI
...
See the complaint on #4039 . This doesn't fix that particular
issue (it's somewhat unrelated), but does solve around
a file parsing problem reported by @void-in
2014-10-17 11:47:33 -05:00
Tod Beardsley
23d058067a
Redo the boilerplate / splat
...
[SeeRM #8496 ]
2013-10-15 13:51:57 -05:00
Tab Assassin
41e4375e43
Retab modules
2013-08-30 16:28:54 -05:00
Christian Mehlmauer
95948b9d7c
msftidy: remove $Revision$
2013-01-03 00:58:09 +01:00
Christian Mehlmauer
ca890369b1
msftidy: remove $Id$
2013-01-03 00:54:48 +01:00
sinn3r
aeb691bbee
Massive whitespace cleanup
2012-03-18 00:07:27 -05:00
HD Moore
ceb4888772
Fix up the boilerplate comment to use a better url
2012-02-20 19:40:50 -06:00
sinn3r
a5189917da
Add CVE-2005-4832: Oracle Database Server DBMS_CDC_SUBSCRIBE SUBSCRIPTION_NAME SQL Injection (Feature #6094 )
2011-12-13 15:44:39 -06:00
James Lee
67120d4263
msftidy on aux modules, see #5749
2011-11-20 13:12:07 +11:00
Joshua Drake
62c8c6ea9f
big msftidy pass, ping me if there are issues
...
git-svn-id: file:///home/svn/framework3/trunk@14034 4d416f70-5f16-0410-b530-b9f4589650da
2011-10-23 11:56:13 +00:00
Steve Tornio
37a3ca4643
add osvdb ref
...
git-svn-id: file:///home/svn/framework3/trunk@11415 4d416f70-5f16-0410-b530-b9f4589650da
2010-12-27 13:16:15 +00:00
Joshua Drake
0d5c85b67a
Improve Oracle module Name fields
...
git-svn-id: file:///home/svn/framework3/trunk@11122 4d416f70-5f16-0410-b530-b9f4589650da
2010-11-24 06:10:13 +00:00
Joshua Drake
3992eb7ef8
Mass RE-update: fix all framework URL references
...
git-svn-id: file:///home/svn/framework3/trunk@10998 4d416f70-5f16-0410-b530-b9f4589650da
2010-11-11 22:43:22 +00:00