Commit Graph

3242 Commits

Author SHA1 Message Date
Jacob 3b0f399730 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 22:44:31 +00:00
bcoles 55939a64a0 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-24 19:32:29 +00:00
Jacob 74464a2087 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 18:17:43 +00:00
Jacob 3c0a9d0748 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 15:37:10 +00:00
bcoles f14b213725 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-24 15:36:25 +00:00
Jacob 27b3717add Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 15:35:59 +00:00
wilfried 8853d6d5b5 Adding documentation + cleaning files from the exploit 2019-03-22 17:37:04 +01:00
bcoles 567be6fa11 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-22 11:18:07 +00:00
William Vu 4524707437 Fix rebase regressions in jenkins_metaprogramming
Ugh.
2019-03-21 11:20:21 -05:00
Jacob 00cf0a7bea Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 14:23:00 +00:00
Jacob 91758cd94b Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:11:03 +00:00
Jacob 98638b6000 Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:09:57 +00:00
Jacob 03775228fe Update and rename postgres_cmd_execution_nine_three.rb to postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:08:53 +00:00
Jacob f651836a20 final suggested fixes to module 2019-03-21 10:24:47 +00:00
Jacob 9c4b9239e5 Update postgres_cmd_execution_nine_three.rb 2019-03-21 10:08:56 +00:00
Jacob 32bf2e134f Fixes suggested by bcoles 2019-03-21 10:08:04 +00:00
bcoles 7b8f59d7bc Update modules/exploits/multi/postgres/postgres_cmd_execution_nine_three.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-21 09:33:29 +00:00
Jacob 7e91235551 Adding new Postgres_cmd_execution module
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the 'pg_read_server_files' group to execute OS commands. 

Explanation:
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5

This is my first run through of a Metasploit module so I would appreciate anyone helping me clean it up. It currently works on OSX & Linux by providing a cmd stager (like cmd/unix/reverse_perl), and on windows by first starting up a PowerShell download cradle, then putting the command in the COMMAND parameter. It feels a little hacky though 😁
2019-03-20 17:38:12 +00:00
fabiocogno be5ec3379b Update cmsms_showtime2_rce.rb 2019-03-20 15:50:30 +01:00
bcoles c18ab91054 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:38 +01:00
bcoles e0a3e01d26 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:25 +01:00
bcoles 365e032452 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:12 +01:00
bcoles 49bb5a1624 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:00 +01:00
bcoles 050aa7a98c Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:12:47 +01:00
bcoles fe0d5e0c97 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:12:35 +01:00
Fabio Cogno 43f74b1cf2 Add CMS Made Simple (CMSMS) Showtime2 File Upload RCE 2019-03-19 23:48:46 +01:00
Matteo Malvica a2d6c77fb8 indentation fixes 2019-03-19 15:28:24 +01:00
Matteo Malvica 985f3748e5 Update splunk_upload_app_exec.rb 2019-03-19 15:08:51 +01:00
Matteo Malvica c9dcdf1b66 new error logic 2019-03-19 14:58:31 +01:00
Matteo Malvica 98a7938837 Update splunk_upload_app_exec.rb 2019-03-19 14:42:56 +01:00
bcoles aff77e58bf Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:57:19 +01:00
bcoles 109b2bcf7e Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:46:57 +01:00
bcoles f98ad82583 Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:46:44 +01:00
Matteo Malvica 983442d690 Update splunk_upload_app_exec.rb 2019-03-18 19:04:45 +01:00
Matteo Malvica 3316e8c4bf fixed standard payload syntax 2019-03-18 19:00:33 +01:00
Matteo Malvica 2f1ee95073 Update splunk_upload_app_exec.rb 2019-03-18 15:11:04 +01:00
Matteo Malvica 7a31fc2d17 added splunk 7.2.4 support 2019-03-18 09:12:00 +01:00
William Vu a1e6d4d19a Update note about staging payloads over HTTPS 2019-03-16 13:36:58 -05:00
William Vu 621fa8e4db Fix issues and refactor module 2019-03-16 00:38:48 -05:00
William Vu 0fa2d985e7 Add Jenkins ACL bypass and metaprogramming RCE 2019-03-16 00:32:36 -05:00
Brent Cook f2edda207f Land #11382, Added BMC Patrol Agent Command Exec Module 2019-03-15 13:21:06 -05:00
rwincey 59fc1ec7ab Rubocop changes 2019-03-09 12:22:04 -05:00
Andres Rodriguez ea45468639 Merge branch 'master' of github.com:rapid7/metasploit-framework into weblogic_serialize_unicastref 2019-03-02 00:49:13 -08:00
rwincey f05d86ffae Even Less Code 2019-02-28 21:49:29 -05:00
rwincey b96326ec80 Less Code 2019-02-28 21:48:25 -05:00
William Vu f35a13d795 Fix exploit/multi/http/oracle_ats_file_upload 2019-02-25 11:35:34 -06:00
William Vu f534fd9755 Fix exploit/multi/http/apache_jetspeed_file_upload 2019-02-25 11:32:06 -06:00
William Vu 53bf15b184 Fix exploit/multi/http/struts2_rest_xstream 2019-02-25 11:18:27 -06:00
asoto-r7 efba6d2d9c Reverse engineered JSOs 2019-02-20 16:45:47 -06:00
asoto-r7 0f9a796d2f Reverse engineered JSOs, used new ysoserial functionality 2019-02-20 14:28:09 -06:00