William Vu
7dc1315dac
Update logic for ForceExploit in my modules
...
This lets the user opt out of running check completely.
2020-02-19 01:06:50 -06:00
William Vu
97545ceb9d
Clarify NOCVE reason for Wemo exploit
2019-04-24 11:39:34 -05:00
William Vu
00cebda89e
Fix typo of "reliability" - wow, I suck
2019-04-24 11:14:06 -05:00
William Vu
e164c2350c
Properly encode command input with XML entities
...
REXML would make this less ghetto.
2019-04-03 19:10:27 -05:00
William Vu
502f63c0c4
Indent SOAP requests and prefer $() over ``
2019-03-04 19:10:33 -06:00
William Vu
1dd243b8bd
Improve positive/negative prints in check method
2019-03-04 19:08:47 -06:00
William Vu
225e0549c0
Revert CheckCode::Vulnerable to CheckCode::Appears
2019-03-04 18:38:44 -06:00
William Vu
4100f1cfeb
Revert vprint_status to vprint_good
2019-03-04 18:22:12 -06:00
William Vu
40ff708306
Refactor check method and address review comments
2019-03-04 17:49:09 -06:00
Nicholas Starke
7c7a233d67
Addressing PR Comments
2019-02-23 14:41:11 -06:00
Nicholas Starke
6bd1489f62
Adding version checking to wemo module
...
Addresses Github Issue 11452 by parsing out the version
information returned in /setup.xml. New code then performs
a version check, and then alerts the user to whether or not
it is likely the remote host is vulnerable given that version
check.
2019-02-23 12:06:57 -06:00
William Vu
194881a8b2
Add NOCVE
2019-02-22 13:26:53 -06:00
William Vu
c76714ccc6
Add Reliability REPEATABLE_SESSION to Wemo exploit
...
Notes copied from auxiliary/admin/wemo/crockpot where it didn't apply.
2019-02-22 13:11:59 -06:00
William Vu
0c8b260737
Revert ARCH_CMD payload to cmd/unix/generic
...
There is no telnetd, so cmd/unix/bind_busybox_telnetd won't work.
2019-02-19 13:23:25 -06:00
William Vu
bad53aeaf1
Genericize exploit (less Crock-Pot verbiage)
2019-02-19 12:13:08 -06:00
William Vu
1be838d1fd
Add Belkin Wemo UPnP RCE (tested on Crock-Pot)
2019-02-14 12:45:36 -06:00