Steve Embling
46005eb933
Updated References
2019-08-09 14:08:47 +01:00
William Vu
f317987e02
Land #12175 , hadoop_unauth_exec NoMethodError fix
2019-08-07 22:44:55 -05:00
William Vu
b5fd9b4fed
Fix whitespace
2019-08-07 22:44:38 -05:00
Green-m
6cf0ff0678
Fix #12156 , NoMethodError in hadoop exploit.
2019-08-08 10:06:40 +08:00
Tim W
979681443c
add rudimentary check method
2019-08-06 14:48:37 +08:00
Tim W
b35b4674d0
fix forking behaviour
2019-08-06 14:17:28 +08:00
Tim W
f48d1b1231
add more links
2019-08-06 13:54:15 +08:00
LoadLow
c3b6e33f2e
Adds suggested modifications
2019-08-03 06:10:11 +02:00
Load
ce552ab88b
Removes double quotes in libreoffice_logo_exec
...
Co-Authored-By: Carter Brainerd <0xCB@protonmail.com >
2019-08-03 05:52:12 +02:00
Pedro Ribeiro
817726699c
make requested changes
2019-08-02 22:48:54 +01:00
Adam Cammack
e11de696d4
Make msftidy happy
2019-08-02 11:17:41 -05:00
Adam Cammack
cf9b94a964
Set needs_cleanup flag for exploits that need it
...
The `needs_cleanup` flag needs to be set per-module when an exploit
needs an interactive session to clean up. Some `FileDropper` exploits
need additional cleanup to what the mixin provides, but since all
`FileDropper`s already mark themselves as needing cleanup those are not
covered here. A few of these could potentially be refactored to use the
original exploitation method to clean up or to compile the list of
files/commands to clean up ahead of time, but that is out of the scope
of this fix.
2019-08-02 10:23:53 -05:00
Adam Cammack
5e64f8560a
Fix whitespace
2019-08-02 10:23:41 -05:00
Quentin Kaiser
8085ad3046
Set default payload based on chosen target.
2019-08-02 10:47:28 +02:00
Quentin Kaiser
610bed8fd9
&& is preferred over and.
2019-08-02 10:41:14 +02:00
Jacob Robles
bbf0cb4d9d
Land #11653 , Apache Tika CVE-2018-1335 RCE
2019-08-01 17:43:57 -05:00
Shelby Pace
bc3f87a950
add login and device id code
2019-07-31 16:31:22 -05:00
LoadLow
8e8e6a2cf7
Fixes indent
2019-07-31 00:14:08 +02:00
LoadLow
88f3ff9d59
Updates references
2019-07-31 00:00:30 +02:00
LoadLow
5f478b7fd6
Adds exploit module for CVE-2019-9848
...
uses on dom-loaded event (triggered just after opening the document) and still working on 6.2.5
2019-07-30 23:07:20 +02:00
h00die
060183c034
tika 1.15-1.17
2019-07-30 16:55:06 -04:00
h00die
f053768801
restrict tika versions
2019-07-30 07:32:30 -04:00
Shelby Pace
1faa1786c6
add test request
2019-07-29 10:28:07 -05:00
Wei Chen
c47caec03f
Land #12107 , Add module Redis Unauthenticated Code Execution
2019-07-28 21:40:03 -05:00
Wei Chen
63de0051f4
Cosmetic changes
2019-07-28 21:38:54 -05:00
Quentin Kaiser
34c5277e4e
Deprecate module.
2019-07-27 10:49:59 +02:00
Quentin Kaiser
413da527ab
Module renaming.
2019-07-27 10:47:58 +02:00
Quentin Kaiser
18f7ae379b
Add support for RV110W and RV215W + check method to fingerprint devices.
2019-07-27 10:45:31 +02:00
Wei Chen
f09cfade62
Land #11205 , Add support for Linux and pubprn.vbs to web_delivery
2019-07-25 09:15:40 -05:00
Wei Chen
967b2a018f
Land #12010 , Add exploit module for wp-database-backup Wordpress plugin
2019-07-23 12:21:23 -05:00
Wei Chen
ca664512ce
Minor corrections in check and a unsed return value
2019-07-23 12:20:14 -05:00
asoto-r7
6b60832988
Land #12095 , Ahsay backup v7.x - v8.1.1.50 file upload
2019-07-22 18:01:32 -05:00
Shelby Pace
030ac60fce
Land #12084 , Add Schneider Encoder Exploit
2019-07-22 12:49:44 -05:00
Shelby Pace
6a2ae1418a
format xml, change headers
2019-07-22 12:24:55 -05:00
Wietsman
3b08ed88d1
#12095 added version check if vulnerable
...
#12095 cleaned up the code
#12095 added more output
#12095 added comments
2019-07-22 16:43:24 +02:00
Green-m
e71b92aa60
We are not evil!
2019-07-21 09:33:18 +08:00
Wietsman
71da3b7903
#12095 Added cleaning up of trial account and dropper files.
2019-07-21 03:21:15 +02:00
vitorespf
d498eaceaf
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-20 01:17:55 -03:00
vitorespf
bfa17a05b4
Update schneider_electric_net55xx_encoder.rb
2019-07-20 00:44:21 -03:00
vitorespf
af7eba5828
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-20 00:07:24 -03:00
vitorespf
a70a74d480
Update schneider_electric_net55xx_encoder.rb
2019-07-19 23:41:31 -03:00
vitorespf
3c57741794
Update schneider_electric_net55xx_encoder.rb
2019-07-19 23:38:45 -03:00
vitorespf
836805b3cd
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 23:37:18 -03:00
vitorespf
c0377c97c5
Update schneider_electric_net55xx_encoder.rb
2019-07-19 23:31:10 -03:00
vitorespf
e1e89882d6
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 14:08:34 -03:00
vitorespf
f1a6c0cc45
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 14:08:09 -03:00
Green-m
07f3c074d4
Add doc and enhance the module.
2019-07-20 00:17:57 +08:00
vitorespf
68818aa4c7
Update schneider_electric_net55xx_encoder.rb
2019-07-19 10:30:05 -03:00
vitorespf
ea3932e31b
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:55:19 -03:00
Tim W
b258b8270e
fix #12104 , add CVE-2019-13272 PTRACE_TRACEME linux local exploit
2019-07-19 13:24:13 +08:00