terrorbyte
f6a402c999
Fix tabs in the previous commit and fix style issues.
2019-02-25 21:24:13 -06:00
blightzero
f64e517b73
Cisco RV32x RCE added reference IDs, some beautifications.
2019-02-25 15:51:14 +01:00
blightzero
de5a5ea805
Cisco RV32x RCE added reference IDs, some beautifications.
2019-02-25 15:51:14 +01:00
Benjamin
9d0b434f35
Initial commit Cisco RV320 and RV325 remote code execution
2019-02-25 15:51:05 +01:00
Nicholas Starke
7c7a233d67
Addressing PR Comments
2019-02-23 14:41:11 -06:00
Nicholas Starke
6bd1489f62
Adding version checking to wemo module
...
Addresses Github Issue 11452 by parsing out the version
information returned in /setup.xml. New code then performs
a version check, and then alerts the user to whether or not
it is likely the remote host is vulnerable given that version
check.
2019-02-23 12:06:57 -06:00
William Vu
fc9245fa66
Fix author names in a couple modules
...
It me.
2019-02-22 17:02:15 -06:00
William Vu
194881a8b2
Add NOCVE
2019-02-22 13:26:53 -06:00
William Vu
c76714ccc6
Add Reliability REPEATABLE_SESSION to Wemo exploit
...
Notes copied from auxiliary/admin/wemo/crockpot where it didn't apply.
2019-02-22 13:11:59 -06:00
terrorbyte
449307c7df
Additional style fixes
2019-02-20 15:33:33 -06:00
terrorbyte
364460a787
Fixed heredoc and advanced options casing.
2019-02-20 14:42:56 -06:00
William Vu
0c8b260737
Revert ARCH_CMD payload to cmd/unix/generic
...
There is no telnetd, so cmd/unix/bind_busybox_telnetd won't work.
2019-02-19 13:23:25 -06:00
William Vu
bad53aeaf1
Genericize exploit (less Crock-Pot verbiage)
2019-02-19 12:13:08 -06:00
terrorbyte
99ae0d125f
Added systemd lower privlege service persistence
...
Update the module to support systemd --user as a target for the
service_persistence module. This creates a file in a set of "supported"
local directories and triggers the systemctl calls with --user. The unit
files in question can be seen documented in systemd.unit(5)
2019-02-15 15:04:03 -06:00
William Vu
1be838d1fd
Add Belkin Wemo UPnP RCE (tested on Crock-Pot)
2019-02-14 12:45:36 -06:00
Wei Chen
a380bb6df1
Land #11239 , Add check for writable and nosuid WritableDir
2019-02-08 19:14:54 -06:00
Wei Chen
18a4af1d1d
Land #11279 , improve imap_open exploit to be more robust
2019-02-08 18:28:08 -06:00
Tod Beardsley
daa3076d42
Add CVE-2018-1000999 to MailCleaner module
...
See PR #11148
This adds the new CVE assigned by DWF for this vulnerability.
Note that [CVE-2018-10933](https://www.cvedetails.com/cve/CVE-2018-10933/ )
describes a vulnerability in libssh, but this one describes the issue as
it pertains to MailCleaner specifically.
2019-01-23 09:27:12 -06:00
Shelby Pace
2ae6142de7
Land #11243 , Add ASan SUID Privesc
2019-01-22 15:50:53 -06:00
Brendan Coles
060d20694d
Attribution
2019-01-20 09:18:43 +00:00
h00die
f47060870a
horde imp h3 imap_open
2019-01-18 19:43:45 -05:00
h00die
2585e4b708
horde imp h3 imap_open
2019-01-18 19:38:30 -05:00
Steve Embling
8585dacbb4
Updated to relevant references
...
Updated references to blog post and mailing list of commit proposal
Updated disclosure date to commit proposal
2019-01-18 17:01:17 +00:00
h00die
5d49f04948
not working horde imp imap_open
2019-01-17 19:55:42 -05:00
rsp3ar
2577160449
update print_error, add PrependFork and adjust timeout
2019-01-16 23:20:06 -08:00
h00die
a73fe9433b
land #11169 blueman priv esc on linux
2019-01-15 10:32:46 -05:00
bcoles
8c636f27d5
Update check method to confirm vulnerability
2019-01-15 11:31:31 +11:00
Wei Chen
47f8738f74
Add Imran Rashid to CVE-2018-11770 credit
2019-01-14 15:28:08 -06:00
Wei Chen
52ff0a8b75
Update exploits/linux/http/spark_unauth_rce as CVE-2018-11770
2019-01-14 15:10:29 -06:00
Brendan Coles
c6f4eda7f9
Add ASan SUID Executable Privilege Escalation module
2019-01-12 09:14:20 +00:00
Brendan Coles
fe6956d7f7
Use mixins
2019-01-11 22:46:58 +00:00
Brendan Coles
20fd6b6134
Add check for writable and nosuid WritableDir
2019-01-11 22:41:14 +00:00
Brendan Coles
24f807490f
revisionism
2019-01-10 19:19:14 +00:00
rsp3ar
71aa4c8d9e
Adding respond code/body check for successful command execution
2019-01-10 00:01:19 -08:00
rsp3ar
3aabeee959
Update SSL, timeout and uid regex
2019-01-09 23:20:37 -08:00
Brendan Coles
5a956bb27b
Apply suggestions from code review
...
Co-Authored-By: rsp3ar <rsp3ar@users.noreply.github.com >
2019-01-09 21:07:01 -08:00
h00die
799a79b715
ueb priv esc suggestion
2019-01-09 20:28:53 -05:00
rsp3ar
24de5d6ee3
Update to use CmdStager
2019-01-08 20:07:35 -08:00
Jacob Robles
16b8cf7059
Land #11148 , Adding Module MailCleaner RCE
2019-01-08 14:10:31 -06:00
Jacob Robles
a0acfa79d7
Target payloads
2019-01-08 13:27:26 -06:00
rsp3ar
bab651e94d
Add Imperva SecureSphere module
2019-01-07 22:18:04 -08:00
Mehmet İnce
4e8ad22a7a
Adding CVE number
2018-12-26 13:15:36 +03:00
Mehmet İnce
fa542b9691
Adding platform and arch to top level
2018-12-25 15:56:25 +03:00
Brendan Coles
98dc59728e
Add blueman set_dhcp_handler D-Bus Privilege Escalation
2018-12-24 08:03:55 +00:00
Brent Cook
b9742802aa
Land #11137 , Clean up linux/local/vmware_alsa_config exploit module
2018-12-21 17:04:11 -06:00
Mehmet İnce
9481ad04f2
Adding support for ARCH_CMD and updating docs
2018-12-20 12:12:01 +03:00
Mehmet İnce
68ceb08957
Fixing minor issues such as err codes
2018-12-19 22:17:34 +03:00
Mehmet İnce
e5c8c18ded
Adding Mailcleaner exec
2018-12-19 17:35:40 +03:00
Brent Cook
fc2d217c0a
Land #11135 , strip comments from source code before uploading it to the target
2018-12-17 21:23:29 -06:00
Shelby Pace
2fc501d260
Land #11112 , Fix bpf_priv_esc exploit module
2018-12-17 10:00:50 -06:00