asoto-r7
cb16f812ec
struts2_namespace_ognl updates from code review
...
Thanks to @wvu, @firefart, and @wchen!
2018-09-06 11:50:57 -05:00
Wei Chen
d23b252393
Land #10592 , support ERB for foxit_reader_uaf.rb
2018-09-05 21:48:52 -05:00
Wei Chen
254e8b9fd0
Cleanup for foxit_reader_uaf
2018-09-05 21:47:57 -05:00
William Vu
243267b2f5
Add Linux dropper target
2018-09-05 19:57:12 -05:00
William Vu
61044e8bca
Refactor targets to align with current style
2018-09-05 19:56:32 -05:00
William Vu
692ddc8b8b
Eschew updating imagemagick_delegate
...
The hype is over, and the target was provided as a bonus. Now update the
module language to reflect that.
2018-09-05 19:56:32 -05:00
William Vu
1491f13bd5
Add Ghostscript failed restore exploit
2018-09-05 19:56:32 -05:00
William Vu
13ff71b879
Clean up previous modules
...
Missed in 35670713ff .
2018-09-05 19:56:32 -05:00
Shelby Pace
55bf6e5dd4
removed require in erb file
2018-09-05 18:09:29 -05:00
Shelby Pace
6a3a4de289
included path to erb, removed multiline pdf string
2018-09-05 14:09:10 -05:00
Erin Bleiweiss
e243ce9eee
Update AKA for ghostscript_type_confusion
2018-08-31 16:56:35 -05:00
Erin Bleiweiss
5092d561f9
Update AKA values for ms17_010_psexec
2018-08-31 16:56:28 -05:00
Erin Bleiweiss
69a785ff46
Update json for python modules
2018-08-31 16:56:22 -05:00
Erin Bleiweiss
eb17d9b198
Refactor AKA references for modules
2018-08-31 16:56:05 -05:00
asoto-r7
8fe8bf62e3
Renamed to match existing struts2_content_type_ognl and improved comments
2018-08-31 13:48:22 -05:00
asoto-r7
35022d8332
Added payload upload+execution and OGNL-specific URI encoding
2018-08-31 13:39:42 -05:00
William Vu
7c7f63df45
Fix missing normalize_uri in struts2_rest_xstream
...
I missed this one previously. May not be necessary but nice to have.
2018-08-30 15:56:43 -05:00
Shelby Pace
6ec8522786
Land #10482 , Add Network Manager VPNC Privesc
2018-08-30 10:46:54 -05:00
Jacob Robles
9d3e1c1942
Land #10540 , weblogic_deserialize, add check method and linux target
2018-08-30 06:08:03 -05:00
Jacob Robles
953bafc7e7
Land #10545 , foxit fix generated strings, update doc
2018-08-30 05:55:44 -05:00
Austin
0887236f5e
Fix spaces issue
2018-08-29 19:28:48 -04:00
Clément Notin
d489cd7248
ms17_010_eternalblue: use SMBDomain value when provided instead of ignoring it
2018-08-29 23:53:58 +02:00
Jacob Robles
3161beff69
Prefer opt hash
2018-08-29 14:56:31 -05:00
Adam Cammack
a57e5ac5c0
Land #10594 , Remove trailing space from CVE number
2018-08-29 14:31:21 -05:00
Jacob Robles
bc4442694e
Fix Windows target options, remove comspec
2018-08-29 14:23:00 -05:00
Ben Schmeckpeper
c4d697a629
Remove trailing space from CVE identifier
...
ASUS Net4Switch ipswcom exploit mistakenly included a trailing space at the end of its CVE reference.
2018-08-29 14:12:49 -05:00
William Vu
468613f688
Land #10536 , https:// reference check for msftidy
2018-08-29 11:14:42 -05:00
Jacob Robles
d5ad683ba6
More doc updates
2018-08-29 10:59:36 -05:00
Jacob Robles
086ec5bdfb
Fix generated strings in pdf
2018-08-29 06:24:20 -05:00
William Vu
326f006146
Land #10542 , CVE ref for office_ms17_11882 exploit
2018-08-29 00:42:53 -05:00
Christian Mehlmauer
14fa41a376
merge changes
2018-08-29 06:09:40 +02:00
asoto-r7
b373dcc5d4
First draft of module and documentation for struts_namespace_rce against CVE-2018-11776
2018-08-28 16:53:26 -05:00
William Vu
f6b868bac2
Prefer regex for target check in exploit method
...
This is how I initially wrote it out, and I think I like it better.
Obviously we'll still check individual symbols in execute_command, since
some of the matching is disjoint.
2018-08-28 15:56:45 -05:00
William Vu
3dec79da23
Add Windows ARCH_CMD target and refactor again
...
Must have been an oversight that I didn't add the target.
2018-08-28 15:03:41 -05:00
Ben Schmeckpeper
6335d867ec
Add CVE reference to office_ms17_11882 exploit
...
The CVE identifier appears in a GitHub URI but is not referenced separately.
2018-08-28 13:44:01 -05:00
Jacob Robles
94e8cdac37
Move files to correct location
2018-08-28 12:38:54 -05:00
Jacob Robles
2986a9538d
Whitespace fix
2018-08-28 11:53:08 -05:00
Jacob Robles
49c5a91fa7
Add linux target to weblogic_deserialize module
2018-08-28 11:51:04 -05:00
Jacob Robles
12e9cf6af7
Version output
2018-08-28 08:20:02 -05:00
Jacob Robles
f92d2263d0
Add check to weblogic_deserialize module
2018-08-28 08:09:30 -05:00
Christian Mehlmauer
a66556b436
fix msftidy errors
2018-08-28 13:12:43 +02:00
William Vu
7d21c2094e
Improve PSH target and refactor check code
2018-08-27 20:18:35 -05:00
William Vu
df5f4caaae
Uncomment PSH target in struts2_rest_xstream
...
I'm full of shit. It works.
msf5 exploit(multi/http/struts2_rest_xstream) > run
[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Powershell command length: 2467
[*] Sending stage (206403 bytes) to 192.168.56.101
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:49691) at 2018-08-27 20:00:47 -0500
meterpreter > getuid
Server username: MSEDGEWIN10\IEUser
meterpreter > sysinfo
Computer : MSEDGEWIN10
OS : Windows 10 (Build 17134).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 3
Meterpreter : x64/windows
meterpreter >
2018-08-27 20:01:00 -05:00
Brent Cook
47ca6c6a14
Land #10527 , Fix msftdiy EDB link check, enable HTTPS
2018-08-27 10:49:20 -05:00
Jacob Robles
79b3e4564a
Land #10487 , add php5 session file target
2018-08-27 06:22:28 -05:00
Brendan Coles
9725e90ba7
Fix msftdiy EDB link check
2018-08-26 04:18:38 +00:00
William Vu
6df235062b
Land #10505 , post-auth and default creds info
2018-08-24 18:08:15 -05:00
Jacob Robles
f6674a96d9
Update poc link
2018-08-24 10:52:01 -05:00
Jacob Robles
7f3824b067
Additional path for Linux target
2018-08-24 07:18:24 -05:00
William Vu
672dbb7acb
Land #9364 , HP PJL/SNMP CVE-2017-2741 exploit
...
Finally!
2018-08-23 22:47:09 -05:00