Commit Graph

4742 Commits

Author SHA1 Message Date
Spencer McIntyre 0ec9b1bcb9 Fix a multicast socket issue 2024-11-21 15:14:46 -05:00
Spencer McIntyre 24d3ef16cf Remove some unnecessary code, switch to passive stance 2024-11-21 15:08:43 -05:00
remmons-r7 720312ba1c Create cups_ipp_remote_code_execution.rb 2024-11-11 15:51:09 -06:00
jheysel-r7 222df0bfdf Land #19527 Add bypass for GiveWP RCE (CVE-2024-8353)
This updates the exploit module wp_giveup_rce_bypass to incorporate the bypass CVE, allowing the payload to work on all affected versions of the GiveWP plugin.
2024-10-30 16:29:14 -04:00
Jack Heysel f643aee5a4 Lint 2024-10-30 16:17:36 -04:00
jheysel-r7 9c0dc56aa6 Update modules/exploits/multi/http/wp_givewp_rce.rb 2024-10-30 16:04:28 -04:00
Chocapikk bcd1fab0b8 Add suggestions 2024-10-29 20:42:13 +01:00
Valentin Lobstein 0686cdbb82 Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-10-14 18:13:19 +02:00
Valentin Lobstein fdb450955e Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-10-14 18:13:19 +02:00
Chocapikk 611a16d368 Update 2024-10-14 18:13:18 +02:00
Chocapikk 465ae37ad2 Use wordpress_sqli_initialize instead 2024-10-14 18:13:18 +02:00
Chocapikk a9f7fb3ace Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-10-14 18:13:18 +02:00
Chocapikk 6c099f2b73 Add WordPress wp-automatic SQLi to RCE module (CVE-2024-27956) 2024-10-14 18:13:17 +02:00
Chocapikk 3515015e1b Lint 2024-10-04 19:35:15 +02:00
Valentin Lobstein 686f31aac1 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:32:18 +02:00
Valentin Lobstein 888c446f9a Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:32:10 +02:00
Valentin Lobstein 3a244212e2 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:32:03 +02:00
Valentin Lobstein b8aad8b22f Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:31:54 +02:00
Chocapikk 98b857e1a7 Lint 2024-10-04 18:04:21 +02:00
Valentin Lobstein 0dba8f0963 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 16:01:29 +02:00
Chocapikk 5733d43fb0 Update check function 2024-10-03 14:13:29 +02:00
Chocapikk d14866a34d Update description 2024-10-02 21:02:26 +02:00
Chocapikk 1d083cf9e8 Add credit for the bypass 2024-10-02 20:57:57 +02:00
Chocapikk fbb74a6d2d Add bypass for GiveWP RCE (CVE-2024-8353) 2024-10-02 19:53:20 +02:00
dledda-r7 6e696e24e5 Land #19457, WP Plugin LiteSpeed Cache Account Take Over Module 2024-09-17 06:30:33 -04:00
Jack Heysel 84a8eb7273 Respond to comments 2024-09-16 09:46:57 -07:00
Jack Heysel 96e506d9f5 Fix cookie regex 2024-09-13 09:36:18 -07:00
Jack Heysel e7da81c271 Fix AdminCookieError admin_cookie check 2024-09-13 09:35:43 -07:00
jheysel-r7 300d2f5aa9 Apply suggestions from code review
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-13 11:58:08 -04:00
Jack Heysel 38a3e7696d Responded to comments 2024-09-12 07:36:16 -07:00
Jack Heysel c80a03fece WP LiteSpeed exploit CVE-2024-44000 2024-09-11 23:31:26 -07:00
Jack Heysel dd5dd54af1 beta commit module working 2024-09-11 15:23:46 -07:00
dledda-r7 5e2bf5aaca fix(modules): spip_bigup_unauth_rce minor fix 2024-09-11 11:46:52 -04:00
dledda-r7 62e852176d Land #19444, SPIP BigUp Plugin Unauthenticated RCE 2024-09-11 10:29:12 -04:00
dwelch-r7 9de9b525d9 Land #19432, Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin 2024-09-11 14:57:48 +01:00
Chocapikk af5c7ecc8f Fix bug 2024-09-08 07:54:11 +02:00
Chocapikk 4f859f129c Fix bug 2024-09-08 07:52:40 +02:00
Chocapikk 59faa1bf0c Change version fingerprinting 2024-09-08 07:01:23 +02:00
Chocapikk 43fabb07e5 Update doc + module + (mixin see #19444) 2024-09-08 06:56:13 +02:00
Chocapikk 289f47fac1 Update documentation with docker setup, working mixin now, update module 2024-09-08 05:59:11 +02:00
Chocapikk cc6127897f Add suggestions 2024-09-07 04:00:25 +02:00
Valentin Lobstein 0b768791d6 Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:56:21 +02:00
Valentin Lobstein 484cdc940f Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:56:09 +02:00
Valentin Lobstein c90f9b1ae5 Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:55:54 +02:00
Chocapikk 92a25e5a29 Add source (oopsie) 2024-09-07 03:11:49 +02:00
Chocapikk 8b1e1dab1b Add some comments and CVE ID 2024-09-07 03:09:42 +02:00
Chocapikk fdc28080c9 Update disclosure date 2024-09-06 22:14:27 +02:00
Chocapikk 8608e7021d Add spip_bigup_unauth_rce module 2024-09-06 22:10:18 +02:00
Jack Heysel 152710403d Land #19330, Add SSL opt in start_service
The start_service method now allows users to specify their SSL
preferences directly through the opts parameter. If the ssl option is
not provided in opts, it will default to the value in datastore["SSL"]
2024-09-05 09:08:07 -07:00
Jack Heysel 434593dcb4 Suggestion and rubocop fixes 2024-09-05 08:49:32 -07:00