Jacob Robles
8a0f5c12f2
Move setup info, remove accessors
2018-09-21 07:47:22 -05:00
Jacob Robles
981fb38d52
Remove additional unused code
2018-09-20 07:04:41 -05:00
Jacob Robles
ee604e1d23
Remove unused code
2018-09-20 07:01:58 -05:00
Jacob Robles
f99df75719
Remove uploading payload dll to disk
2018-09-19 21:24:22 -05:00
Jacob Robles
c76f095cd0
Inject Payload to Memory First
2018-09-19 21:13:49 -05:00
Jacob Robles
42ccc37bca
Added description to module
2018-09-19 10:22:51 -05:00
Jacob Robles
8a20e0e702
Specific target, add process option
2018-09-19 08:49:54 -05:00
Hubert Lin
22c57d1bf0
chmod 644
2018-09-19 18:19:12 +08:00
Hubert Lin
36fa8f2ffc
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow.
2018-09-19 15:28:46 +08:00
Hubert Lin
827219aff3
Revert "Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow"
...
This reverts commit d06587caef .
2018-09-19 15:22:12 +08:00
Hubert Lin
d06587caef
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow
2018-09-19 15:09:40 +08:00
Hubert Lin
5b6938e942
Revert "Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Buffer Overflow"
...
This reverts commit 1a9aa8ac3b .
Need to branch it.
2018-09-19 13:20:00 +08:00
William Vu
1d091408f7
Make msftidy happy
2018-09-18 20:00:08 -05:00
William Vu
6a63feced4
Merge remote-tracking branch 'upstream/master' into pr/10418
2018-09-18 19:54:44 -05:00
asoto-r7
fd8ad6f4d8
struts2_namespace_ognl: Added verbose messages for errors with Tomcat >= 7.0.88
2018-09-18 15:26:28 -05:00
asoto-r7
4933f47ac5
struts2_namespace_ognl: Remove debugging code
2018-09-18 14:46:41 -05:00
asoto-r7
a9e6257891
struts2_namespace_ognl multishot OGNL payloads for Windows Meterpreter support
2018-09-18 14:27:47 -05:00
Brendan Coles
4fb223b293
Add Solaris RSH Stack Clash Privilege Escalation module
2018-09-18 17:38:59 +00:00
Hubert Lin
1a9aa8ac3b
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Buffer Overflow
2018-09-18 16:09:05 +08:00
Brendan Coles
0108e41b04
Move AKA reference to Notes hash
2018-09-18 08:00:44 +00:00
Brendan Coles
2f5bd4b714
Add Solaris 'EXTREMEPARR' dtappgather Privilege Escalation module
2018-09-18 07:23:10 +00:00
Brent Cook
6126a627cc
Land #10570 , AKA Metadata Refactor
2018-09-17 22:29:20 -05:00
Brent Cook
a814899dc2
Land #10660 , deregister RHOSTS as well as RHOST
2018-09-17 22:26:37 -05:00
Brent Cook
1aabf8d83f
deregister RHOSTS as well
2018-09-17 22:26:16 -05:00
Jacob Robles
83af598e6a
Updated VS solution and module
2018-09-17 17:38:19 -05:00
h00die
5089c19453
Land #10620 Solaris 10 LPE for libnspr
2018-09-17 18:10:16 -04:00
Erin Bleiweiss
011c25ed59
Merge changes from master (ghostscript)
2018-09-17 13:57:28 -05:00
Brendan Coles
83039781de
Background payload execution
2018-09-17 08:42:04 +00:00
Brendan Coles
c8906f8772
Add check for Solaris system patch revision
2018-09-17 08:32:52 +00:00
William Vu
4c036e70c1
Fix http://seclists.org links to https://
...
I have no idea how this happened in my own code. I was seeing https://.
2018-09-15 18:54:45 -05:00
Brendan Coles
1f4a1a388e
Update gcc path
2018-09-15 18:16:03 +00:00
bwatters-r7
f38e6f45ce
Redo dllinjection
2018-09-14 17:47:53 -05:00
asoto-r7
4cf344dd83
WIP: Initial CVE-2018-8440 / ALPC-TaskSched-LPE
2018-09-13 18:00:20 -05:00
bwatters-r7
2fbbf88ea9
Land #10560 , ms17_010_eternalblue: use SMBDomain value when provided
...
instead of ignoring it
Merge branch 'land-10560' into upstream-master
2018-09-13 10:08:54 -05:00
Brendan Coles
a8c459db18
Update description with correct patched release
2018-09-13 08:22:13 +00:00
Brendan Coles
0db1c34c40
Add check for Solaris system patches
2018-09-12 07:36:54 +00:00
Quentin Kaiser
479b09962c
Awind stuff.
2018-09-11 15:16:23 +02:00
h00die
354803185c
fix msftidy warning
2018-09-11 05:24:01 -04:00
Brendan Coles
e75b5592f7
Add ForceExploit option
2018-09-11 09:23:50 +00:00
Brendan Coles
1582dacb0e
Check WritableDir is writable
2018-09-11 09:06:15 +00:00
Brendan Coles
d658ccf653
Add Solaris libnspr NSPR_LOG_FILE Privilege Escalation module
2018-09-11 08:11:11 +00:00
h00die
d8f2d08058
finish up docs and 10 exploit
2018-09-10 21:08:30 -04:00
h00die
589fb4bf3b
first try at ueb mix
2018-09-09 22:41:01 -04:00
Wei Chen
718aaca0f4
Land #10546 , Add Apache Struts exploit: CVE-2018-11776
2018-09-07 14:54:23 -05:00
Wei Chen
bd50e00ccc
Make some small changes:
...
Changes made:
* DisclosureDate
* Privileged to false
* Remove gsub for ';'
* Set cmd/unix/generic as the default payload for ARCH_CMD (linux)
2018-09-07 14:48:33 -05:00
William Vu
b3cd4a89ad
Move CVE ref to top as per ~standard~
2018-09-07 14:33:25 -05:00
Adam Cammack
68ca771764
Add CVE reference to ghostscript_failed_restore.rb
2018-09-07 14:24:15 -05:00
asoto-r7
99ca6cef49
Quote-block cleanup and improved error handling
2018-09-07 11:43:04 -05:00
asoto-r7
3671f8f6b0
Handling for Tomcat namespace issues, 'allowStaticMethodAccess' settings, and payload output
...
Depending on the configuration of the Tomcat server, `allowStaticMethodAccess` may already be set. We now try to detect this as part of `profile_target`. But that check might fail. If so, we'll try our best and let the user control whether we prepend OGNL to enable `allowStaticMethodAccess` via the 'ENABLE_OGNL' option.
Additionally, sometimes enabling `allowStaticMethodAccess` will cause the OGNL query to fail.
Additionally additionally, some Tomcat configurations won't provide output from the payload. We'll detect that the payload ran successfully, but tell the user there was no output.
2018-09-06 17:56:42 -05:00
asoto-r7
7eb06b4592
Address travis errors: Updated metadata and target OS logic
2018-09-06 12:43:56 -05:00