Commit Graph

13654 Commits

Author SHA1 Message Date
Jacob Robles 16a48009ed Add webmin CVE 2019-03-21 11:28:45 -05:00
William Vu 4524707437 Fix rebase regressions in jenkins_metaprogramming
Ugh.
2019-03-21 11:20:21 -05:00
Jacob 00cf0a7bea Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 14:23:00 +00:00
Jacob 91758cd94b Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:11:03 +00:00
Jacob 98638b6000 Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:09:57 +00:00
Jacob 03775228fe Update and rename postgres_cmd_execution_nine_three.rb to postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:08:53 +00:00
Jacob f651836a20 final suggested fixes to module 2019-03-21 10:24:47 +00:00
Jacob 9c4b9239e5 Update postgres_cmd_execution_nine_three.rb 2019-03-21 10:08:56 +00:00
Jacob 32bf2e134f Fixes suggested by bcoles 2019-03-21 10:08:04 +00:00
bcoles 7b8f59d7bc Update modules/exploits/multi/postgres/postgres_cmd_execution_nine_three.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-21 09:33:29 +00:00
Jacob 7e91235551 Adding new Postgres_cmd_execution module
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the 'pg_read_server_files' group to execute OS commands. 

Explanation:
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5

This is my first run through of a Metasploit module so I would appreciate anyone helping me clean it up. It currently works on OSX & Linux by providing a cmd stager (like cmd/unix/reverse_perl), and on windows by first starting up a PowerShell download cradle, then putting the command in the COMMAND parameter. It feels a little hacky though 😁
2019-03-20 17:38:12 +00:00
fabiocogno be5ec3379b Update cmsms_showtime2_rce.rb 2019-03-20 15:50:30 +01:00
blightzero 9bb7f11897 Unregister SSLCert option since it is never used in thisHTTPServer module. 2019-03-20 14:21:40 +01:00
bcoles c18ab91054 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:38 +01:00
bcoles e0a3e01d26 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:25 +01:00
bcoles 365e032452 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:12 +01:00
bcoles 49bb5a1624 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:00 +01:00
bcoles 050aa7a98c Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:12:47 +01:00
bcoles fe0d5e0c97 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:12:35 +01:00
Fabio Cogno 43f74b1cf2 Add CMS Made Simple (CMSMS) Showtime2 File Upload RCE 2019-03-19 23:48:46 +01:00
Shelby Pace 794134735e Update modules/exploits/unix/webapp/wp_crop_rce.rb
Co-Authored-By: tiyeuse <39072217+tiyeuse@users.noreply.github.com>
2019-03-19 20:36:13 +01:00
wilfried b168312db1 Add exploit module for Wordpress core <=4.9.8 (CVE-2019-8942) 2019-03-19 17:51:59 +01:00
wilfried 23a86e7ad2 Add exploit module for Wordpress core <=4.9.8 (CVE-2019-8942) 2019-03-19 16:03:29 +01:00
Matteo Malvica a2d6c77fb8 indentation fixes 2019-03-19 15:28:24 +01:00
Matteo Malvica 985f3748e5 Update splunk_upload_app_exec.rb 2019-03-19 15:08:51 +01:00
Matteo Malvica c9dcdf1b66 new error logic 2019-03-19 14:58:31 +01:00
Matteo Malvica 98a7938837 Update splunk_upload_app_exec.rb 2019-03-19 14:42:56 +01:00
bcoles aff77e58bf Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:57:19 +01:00
bcoles 109b2bcf7e Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:46:57 +01:00
bcoles f98ad82583 Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:46:44 +01:00
Matteo Malvica 983442d690 Update splunk_upload_app_exec.rb 2019-03-18 19:04:45 +01:00
Matteo Malvica 3316e8c4bf fixed standard payload syntax 2019-03-18 19:00:33 +01:00
Matteo Malvica 2f1ee95073 Update splunk_upload_app_exec.rb 2019-03-18 15:11:04 +01:00
Matteo Malvica 7a31fc2d17 added splunk 7.2.4 support 2019-03-18 09:12:00 +01:00
William Vu a1e6d4d19a Update note about staging payloads over HTTPS 2019-03-16 13:36:58 -05:00
William Vu 621fa8e4db Fix issues and refactor module 2019-03-16 00:38:48 -05:00
William Vu 0fa2d985e7 Add Jenkins ACL bypass and metaprogramming RCE 2019-03-16 00:32:36 -05:00
Brent Cook f2edda207f Land #11382, Added BMC Patrol Agent Command Exec Module 2019-03-15 13:21:06 -05:00
Jacob Robles 82f0c9e9ee Land #11385, Add Webmin Upload Exec 2019-03-15 08:15:49 -05:00
Jacob Robles 5abfc2c136 Add Module Doc 2019-03-14 13:46:34 -05:00
Jacob Robles fa3e84f764 Cleanup and Add Option 2019-03-14 13:26:41 -05:00
Jacob Robles 1d586e46c0 Use MIME for form 2019-03-14 10:13:48 -05:00
blightzero 1e00c28701 Checked the functionality of module. Added ability to connect via HTTPS. 2019-03-14 15:54:02 +01:00
Jacob Robles 9a32231cb5 Change upload and add option
Change the contents of the uploaded file and
don't overwrite and existing file by default.
Add option to specify name of file.
2019-03-14 09:34:55 -05:00
Jacob Robles bd1cd7fae8 Bug and style fixes
webmin RCE
2019-03-12 10:54:43 -05:00
rwincey 59fc1ec7ab Rubocop changes 2019-03-09 12:22:04 -05:00
Brendan Coles 6d14a53c80 Update tested versions 2019-03-09 04:41:51 +00:00
Brendan Coles 9aa01c9ed2 Add elfinder_php_connector_exiftran_cmd_injection exploit 2019-03-09 03:24:18 +00:00
Brent Cook 468679f907 Land #11092, Add FreeBSD 8.3 / 9.0 Intel SYSRET Privilege Escalation module 2019-03-06 19:50:08 -06:00
Brent Cook 9ca5ac294d Land #10012, Add an Android module to run payloads with su on a rooted device 2019-03-06 19:46:33 -06:00