Jacob
3b0f399730
Update postgres_copy_from_program_cmd_exec.rb
2019-03-24 22:44:31 +00:00
bcoles
55939a64a0
Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
...
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com >
2019-03-24 19:32:29 +00:00
Jacob
74464a2087
Update postgres_copy_from_program_cmd_exec.rb
2019-03-24 18:17:43 +00:00
Jacob
3c0a9d0748
Update postgres_copy_from_program_cmd_exec.rb
2019-03-24 15:37:10 +00:00
bcoles
f14b213725
Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
...
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com >
2019-03-24 15:36:25 +00:00
Jacob
27b3717add
Update postgres_copy_from_program_cmd_exec.rb
2019-03-24 15:35:59 +00:00
wilfried
8853d6d5b5
Adding documentation + cleaning files from the exploit
2019-03-22 17:37:04 +01:00
bcoles
567be6fa11
Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
...
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com >
2019-03-22 11:18:07 +00:00
William Vu
4524707437
Fix rebase regressions in jenkins_metaprogramming
...
Ugh.
2019-03-21 11:20:21 -05:00
Jacob
00cf0a7bea
Update postgres_copy_from_program_cmd_exec.rb
2019-03-21 14:23:00 +00:00
Jacob
91758cd94b
Update postgres_copy_from_program_cmd_exec.rb
2019-03-21 11:11:03 +00:00
Jacob
98638b6000
Update postgres_copy_from_program_cmd_exec.rb
2019-03-21 11:09:57 +00:00
Jacob
03775228fe
Update and rename postgres_cmd_execution_nine_three.rb to postgres_copy_from_program_cmd_exec.rb
2019-03-21 11:08:53 +00:00
Jacob
f651836a20
final suggested fixes to module
2019-03-21 10:24:47 +00:00
Jacob
9c4b9239e5
Update postgres_cmd_execution_nine_three.rb
2019-03-21 10:08:56 +00:00
Jacob
32bf2e134f
Fixes suggested by bcoles
2019-03-21 10:08:04 +00:00
bcoles
7b8f59d7bc
Update modules/exploits/multi/postgres/postgres_cmd_execution_nine_three.rb
...
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com >
2019-03-21 09:33:29 +00:00
Jacob
7e91235551
Adding new Postgres_cmd_execution module
...
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the 'pg_read_server_files' group to execute OS commands.
Explanation:
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
This is my first run through of a Metasploit module so I would appreciate anyone helping me clean it up. It currently works on OSX & Linux by providing a cmd stager (like cmd/unix/reverse_perl), and on windows by first starting up a PowerShell download cradle, then putting the command in the COMMAND parameter. It feels a little hacky though 😁
2019-03-20 17:38:12 +00:00
fabiocogno
be5ec3379b
Update cmsms_showtime2_rce.rb
2019-03-20 15:50:30 +01:00
bcoles
c18ab91054
Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
...
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com >
2019-03-20 14:13:38 +01:00
bcoles
e0a3e01d26
Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
...
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com >
2019-03-20 14:13:25 +01:00
bcoles
365e032452
Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
...
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com >
2019-03-20 14:13:12 +01:00
bcoles
49bb5a1624
Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
...
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com >
2019-03-20 14:13:00 +01:00
bcoles
050aa7a98c
Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
...
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com >
2019-03-20 14:12:47 +01:00
bcoles
fe0d5e0c97
Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
...
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com >
2019-03-20 14:12:35 +01:00
Fabio Cogno
43f74b1cf2
Add CMS Made Simple (CMSMS) Showtime2 File Upload RCE
2019-03-19 23:48:46 +01:00
Matteo Malvica
a2d6c77fb8
indentation fixes
2019-03-19 15:28:24 +01:00
Matteo Malvica
985f3748e5
Update splunk_upload_app_exec.rb
2019-03-19 15:08:51 +01:00
Matteo Malvica
c9dcdf1b66
new error logic
2019-03-19 14:58:31 +01:00
Matteo Malvica
98a7938837
Update splunk_upload_app_exec.rb
2019-03-19 14:42:56 +01:00
bcoles
aff77e58bf
Update modules/exploits/multi/http/splunk_upload_app_exec.rb
...
Co-Authored-By: avanzo <matteo@malvica.com >
2019-03-19 13:57:19 +01:00
bcoles
109b2bcf7e
Update modules/exploits/multi/http/splunk_upload_app_exec.rb
...
Co-Authored-By: avanzo <matteo@malvica.com >
2019-03-19 13:46:57 +01:00
bcoles
f98ad82583
Update modules/exploits/multi/http/splunk_upload_app_exec.rb
...
Co-Authored-By: avanzo <matteo@malvica.com >
2019-03-19 13:46:44 +01:00
Matteo Malvica
983442d690
Update splunk_upload_app_exec.rb
2019-03-18 19:04:45 +01:00
Matteo Malvica
3316e8c4bf
fixed standard payload syntax
2019-03-18 19:00:33 +01:00
Matteo Malvica
2f1ee95073
Update splunk_upload_app_exec.rb
2019-03-18 15:11:04 +01:00
Matteo Malvica
7a31fc2d17
added splunk 7.2.4 support
2019-03-18 09:12:00 +01:00
William Vu
a1e6d4d19a
Update note about staging payloads over HTTPS
2019-03-16 13:36:58 -05:00
William Vu
621fa8e4db
Fix issues and refactor module
2019-03-16 00:38:48 -05:00
William Vu
0fa2d985e7
Add Jenkins ACL bypass and metaprogramming RCE
2019-03-16 00:32:36 -05:00
Brent Cook
f2edda207f
Land #11382 , Added BMC Patrol Agent Command Exec Module
2019-03-15 13:21:06 -05:00
rwincey
59fc1ec7ab
Rubocop changes
2019-03-09 12:22:04 -05:00
Andres Rodriguez
ea45468639
Merge branch 'master' of github.com:rapid7/metasploit-framework into weblogic_serialize_unicastref
2019-03-02 00:49:13 -08:00
rwincey
f05d86ffae
Even Less Code
2019-02-28 21:49:29 -05:00
rwincey
b96326ec80
Less Code
2019-02-28 21:48:25 -05:00
William Vu
f35a13d795
Fix exploit/multi/http/oracle_ats_file_upload
2019-02-25 11:35:34 -06:00
William Vu
f534fd9755
Fix exploit/multi/http/apache_jetspeed_file_upload
2019-02-25 11:32:06 -06:00
William Vu
53bf15b184
Fix exploit/multi/http/struts2_rest_xstream
2019-02-25 11:18:27 -06:00
asoto-r7
efba6d2d9c
Reverse engineered JSOs
2019-02-20 16:45:47 -06:00
asoto-r7
0f9a796d2f
Reverse engineered JSOs, used new ysoserial functionality
2019-02-20 14:28:09 -06:00