Tim W
0b0d4c8633
add x64 option to osx/local/persistence and update removal commands
2020-01-28 17:18:23 +08:00
Francesco Soncina
06843d0ea5
update removal commands for osx/local/persistence
...
fixes #12870
2020-01-21 16:53:11 +01:00
Brent Cook
e50ab5cd13
Land #11726 , add exploit for CVE-2019-8513, macOS TimeMachine cmd injection
2019-06-29 05:36:12 -05:00
Wei Chen
efa00cd2d0
Update module description
2019-05-20 12:43:54 -05:00
Wei Chen
40bc0770f3
Update title
2019-05-20 12:37:46 -05:00
Wei Chen
eaaf1dd6c0
Update session types and platform metadata
2019-05-20 12:36:43 -05:00
Tim W
7968bd932a
improve arch selection
2019-05-07 22:54:58 +08:00
Tim W
be1d185a04
Add CVE-2019-8565 OSX Feedback Assistant local root exploit
2019-05-07 04:30:47 +08:00
Tim W
d20801cf12
add apple advisory
2019-04-26 13:25:26 +08:00
Tim W
f3f044ec59
add payload length check
2019-04-26 12:28:51 +08:00
Tim W
246fb6fa90
improve description
...
docs
2019-04-22 14:40:57 +08:00
bcoles
421e250086
Update modules/exploits/osx/local/timemachine_cmd_injection.rb
...
Co-Authored-By: timwr <timwr@users.noreply.github.com >
2019-04-21 19:59:14 +08:00
bcoles
f1f64cfbb8
Update modules/exploits/osx/local/timemachine_cmd_injection.rb
...
Co-Authored-By: timwr <timwr@users.noreply.github.com >
2019-04-21 19:59:04 +08:00
bcoles
7a431b0690
Update modules/exploits/osx/local/timemachine_cmd_injection.rb
...
Co-Authored-By: timwr <timwr@users.noreply.github.com >
2019-04-17 22:22:59 +08:00
Tim W
a7bd52cb2e
initial commit of CVE-2019-8513 (TimeMachine cmd injection)
2019-04-14 20:58:57 +08:00
Tim W
f589db6831
Land #11152 , add macOS adobe flash player type confusion RCE
2019-02-09 18:46:48 +08:00
Tim W
5c1f4a4703
fix include -> include?
2019-02-09 18:46:35 +08:00
Tim W
5fc0c66109
add version to check to safari exploit
2019-01-22 16:10:51 +08:00
Brent Cook
c959c98161
add original public research author
2018-12-21 02:54:35 -06:00
Brent Cook
a7e8afe760
update references, remove unused metadata, use more straightforward string operations
2018-12-21 02:54:35 -06:00
Brent Cook
0dab74a71f
tweak description
2018-12-21 02:54:35 -06:00
Brent Cook
46acd7a206
simplify
2018-12-21 02:54:35 -06:00
Brent Cook
2f35695327
update web link
2018-12-21 02:54:35 -06:00
Brent Cook
ac51fbd122
style fixes
2018-12-21 02:54:35 -06:00
Brent Cook
dc6ae6f058
initial import, CVE-2016-4117 OSX exploit
2018-12-21 02:54:35 -06:00
Wei Chen
cc7cb7302e
Land #10944 , Add macOS Safari exploit from pwn2own2018
2018-12-13 13:50:19 -06:00
Wei Chen
d523124faf
Land #10965 , Add the macOS LPE from pwn2own2018 (CVE-2018-4237)
2018-11-27 14:00:35 -06:00
Tim W
3829cc11bb
add DEBUG_EXPLOIT option
2018-11-20 17:58:36 +08:00
Tim W
57bad6b213
move offsets to hash
...
fix
2018-11-20 17:58:34 +08:00
Tim W
bee3c3d4d3
add documentation
2018-11-20 16:53:34 +08:00
Tim W
44b1b6fe31
fix forking
2018-11-20 15:58:55 +08:00
William Vu
90b9204703
Update DisclosureDate to ISO 8601 in my modules
...
Basic msftidy fixer:
diff --git a/tools/dev/msftidy.rb b/tools/dev/msftidy.rb
index 9a21b9e398..e9ff2b21e5 100755
--- a/tools/dev/msftidy.rb
+++ b/tools/dev/msftidy.rb
@@ -442,6 +442,8 @@ class Msftidy
# Check disclosure date format
if @source =~ /["']DisclosureDate["'].*\=\>[\x0d\x20]*['\"](.+?)['\"]/
d = $1 #Captured date
+ File.write(@full_filepath, @source.sub(d, Date.parse(d).to_s))
+ fixed('Probably updated traditional DisclosureDate to ISO 8601')
# Flag if overall format is wrong
if d =~ /^... (?:\d{1,2},? )?\d{4}$/
# Flag if month format is wrong
2018-11-16 12:18:28 -06:00
Tim W
420be60900
add CVE-2018-4237
2018-11-15 08:48:10 +08:00
Tim W
2c30459a1b
add CVE-2018-4233 and CVE-2018-4404
2018-11-15 08:44:18 +08:00
Brendan Coles
c3080d69f2
Use writable? method for local modules
2018-11-04 05:28:32 +00:00
Brent Cook
6126a627cc
Land #10570 , AKA Metadata Refactor
2018-09-17 22:29:20 -05:00
William Vu
4c036e70c1
Fix http://seclists.org links to https://
...
I have no idea how this happened in my own code. I was seeing https://.
2018-09-15 18:54:45 -05:00
Erin Bleiweiss
eb17d9b198
Refactor AKA references for modules
2018-08-31 16:56:05 -05:00
asoto-r7
1a3a4ef5e4
Revised 88 aux and exploit modules to add CVEs / references
2018-07-12 17:34:52 -05:00
Tim W
641ffca98c
use base_dir
2018-06-08 14:53:21 +08:00
Brendan Coles
9c14bddd93
Cleanup OSX local exploit modules
2018-05-31 12:26:33 +00:00
Brendan Coles
45481f26b6
Add Msf::Post::OSX::Priv mixin
2018-05-22 22:25:39 +00:00
Brendan Coles
aa033bf5c1
Fix cleanup
2018-05-20 16:19:25 +00:00
Brent Cook
b13f4e25e1
thanks for making this well-known
2017-12-04 18:32:31 -06:00
Brent Cook
a27bb38d51
add authors
2017-12-04 18:25:18 -06:00
Tim W
58897bf2fc
msftidy
2017-11-29 16:36:50 +08:00
Tim W
7f1f7281f1
add local exploit for osx root login with no password
2017-11-29 16:06:02 +08:00
h00die
00c593e0a2
55 pages of spelling done
2017-09-07 21:18:50 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00