Commit Graph

6361 Commits

Author SHA1 Message Date
jvazquez-r7 9f98fd4d87 Info leak webapp ROOT so we can cleanup 2014-12-27 08:47:51 -06:00
jvazquez-r7 5afd2d7f4b Add module for ZDI-14-410 2014-12-26 20:40:28 -06:00
jvazquez-r7 655cfdd416 Land #4321, @wchen-r7's fixes #4246 ms01_026_dbldecode undef method 2014-12-26 12:48:29 -06:00
Gabor Seljan 0b85a81b01 Use REXML to generate exploit file 2014-12-24 19:23:28 +01:00
jvazquez-r7 ebb05a64ea Land #4357, @Meatballs1 Kerberos Support for current_user_psexec 2014-12-23 20:38:31 -06:00
Matthew Hall 9af5b03105 correct disclosure date 2014-12-22 12:42:52 +00:00
Matthew Hall d1bbfae786 delete duplicate 2014-12-22 12:40:14 +00:00
Matthew Hall b09d60b589 cleanups 2014-12-22 11:08:51 +00:00
Matthew Hall 77780022dc cleanups 2014-12-22 11:07:50 +00:00
Jon Cave 44084b4ef6 Correct Microsoft security bulletin for ppr_flatten_rec 2014-12-22 10:40:23 +00:00
Gabor Seljan 9be95eacb8 Use %Q for double-quoted string 2014-12-22 07:37:32 +01:00
sgabe bb33a91110 Update description to be a little more descriptive 2014-12-21 19:31:58 +01:00
sgabe cd02e61a57 Add module for OSVDB-114279 2014-12-21 17:00:45 +01:00
sgabe 9f97b55a4b Add module for CVE-2014-2973 2014-12-20 18:38:22 +01:00
Tod Beardsley d3050de862 Remove references to Redmine in code
See #4400. This should be all of them, except for, of course, the module
that targets Redmine itself.

Note that this also updates the README.md with more current information
as well.
2014-12-19 17:27:08 -06:00
Matthew Hall e7da23e8e5 modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb 2014-12-17 15:25:13 +00:00
David Maloney f237c56a13 This oracle scheduler exploit hangs if not vuln
When this exploit gets run against a system that isn't vulnerable
it can hang for a signifigant ammount of time. This change uses the check
method on the exploit to see whether it should proceed. Don't try to exploit
the host if it's not vulnerable.
2014-12-16 09:42:42 -06:00
Sean Verity 9a0ed723d1 Adds error handling for drive letter enumeration 2014-12-14 12:56:20 -05:00
Sean Verity 0c5f4ce4ee Removed the handler-ish code 2014-12-13 22:18:41 -05:00
Sean Verity 2addd0fdc4 Fixed name, removed tabs, updated license 2014-12-13 20:37:19 -05:00
jvazquez-r7 b1453afb52 Land #4297, fixes #4293, Use OperatingSystems::Match::WINDOWS
* instead of Msf::OperatingSystems::WINDOWS
2014-12-12 18:19:58 -06:00
HD Moore 4fc4866fd8 Merge code in from #2395 2014-12-12 16:22:51 -06:00
Tod Beardsley 488f46c8a1 Land #4324, payload_exe rightening.
Fixes #4323, but /not/ #4246.
2014-12-12 15:04:57 -06:00
HD Moore 50b734f996 Add Portuguese target, lands #3961 (also reorders targets) 2014-12-12 14:23:02 -06:00
Christian Mehlmauer 0f27c63720 fix msftidy warnings 2014-12-12 13:16:21 +01:00
Jon Hart 65b316cd8c Land #4372 2014-12-11 18:48:16 -08:00
Christian Mehlmauer 544f75e7be fix invalid URI scheme, closes #4362 2014-12-11 23:34:10 +01:00
Christian Mehlmauer de88908493 code style 2014-12-11 23:30:20 +01:00
Tod Beardsley 0eea9a02a1 Land #3144, psexec refactoring 2014-12-10 17:30:39 -06:00
Meatballs c813c117db Use DNS names 2014-12-10 22:25:44 +00:00
Matthew Hall ea08fc0767 modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb 2014-12-10 10:28:38 +00:00
Matthew Hall c97a3d9e2e modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb 2014-12-10 09:14:01 +00:00
Matthew Hall 60edda4ff1 add hp data protector exploit 2014-12-09 14:12:37 +00:00
William Vu 2f98a46241 Land #4314, @todb-r7's module cleanup 2014-12-05 14:05:09 -06:00
sinn3r 7ae786a53b Add a comment as an excuse to tag the issue
Fix #4246

... so it will automatically close the ticket.
2014-12-05 11:26:26 -06:00
sinn3r f25e3ebaaf Fix #4246 - More undef 'payload_exe' in other modules
Root cause: payload_exe is an accessor in the TFPT command stager
mixin, you need stager_instance in order to retreive that info.
2014-12-05 11:19:58 -06:00
sinn3r e3f7398acd Fix #4246 - Access payload_exe information correctly
This fixes an undef method 'payload_exe' error. We broke this when
all modules started using Msf::Exploit::CmdStager as the only source
to get a command stager payload. The problem with that is "payload_exe"
is an accessor in CmdStagerTFTP, not in CmdStager, so when the module
wants to access that, we trigger the undef method error.

To be exact, this is the actual commit that broke it:
7ced5927d8

Fix #4246
2014-12-05 02:08:13 -06:00
Meatballs b634bde8a1 Lateral movement through PSRemoting 2014-12-04 22:06:28 +00:00
Jon Hart 52851d59c0 Update GATEWAY to GATEWAY_PROBE_HOST, add GATEWAY_PROBE_PORT 2014-12-04 13:26:16 -08:00
Jon Hart 6bd56ac225 Update any modules that deregistered NETMASK 2014-12-04 13:22:06 -08:00
Meatballs e471271231 Move comment 2014-12-04 20:24:37 +00:00
Meatballs c14ba11e79 If extapi dont stage payload 2014-12-04 20:17:48 +00:00
Tod Beardsley 79f2708a6e Slight fixes to grammar/desc/whitespace
Note that the format_all_drives module had a pile of CRLFs that should
have been caught by msftidy. Not sure why it didn't.
2014-12-04 13:11:33 -06:00
sinn3r 2fcbcc0c26 Resolve merge conflict for ie_setmousecapture_uaf (#4213)
Conflicts:
	modules/exploits/windows/browser/ie_setmousecapture_uaf.rb
2014-12-03 14:12:15 -06:00
sinn3r a631ee65f6 Fix #4293 - Use OperatingSystems::Match::WINDOWS
Fix #4293. Modules should use OperatingSystems::Match::WINDOWS
instead of Msf::OperatingSystems::WINDOWS, because the second
won't match anything anymore.
2014-12-02 13:46:27 -06:00
sinn3r a88ee0911a Fix os detection
See #3373
2014-12-02 01:15:55 -06:00
sinn3r a42c7a81e7 Fix os detection
See #4283
2014-12-02 01:13:51 -06:00
sinn3r 0f973fdf2b Fix #4284 - Typo "neline" causing the exploit to break
"neline" isn't supposed to be there at all.
2014-12-01 01:24:30 -06:00
sinn3r 2a7d4ed963 Touchup 2014-11-28 10:12:05 -06:00
spdfire 583494c0db use BrowserExploitServer 2014-11-24 18:49:27 +01:00