Spencer McIntyre
0ec9b1bcb9
Fix a multicast socket issue
2024-11-21 15:14:46 -05:00
Spencer McIntyre
24d3ef16cf
Remove some unnecessary code, switch to passive stance
2024-11-21 15:08:43 -05:00
remmons-r7
720312ba1c
Create cups_ipp_remote_code_execution.rb
2024-11-11 15:51:09 -06:00
jheysel-r7
222df0bfdf
Land #19527 Add bypass for GiveWP RCE (CVE-2024-8353)
...
This updates the exploit module wp_giveup_rce_bypass to incorporate the bypass CVE, allowing the payload to work on all affected versions of the GiveWP plugin.
2024-10-30 16:29:14 -04:00
Jack Heysel
f643aee5a4
Lint
2024-10-30 16:17:36 -04:00
jheysel-r7
9c0dc56aa6
Update modules/exploits/multi/http/wp_givewp_rce.rb
2024-10-30 16:04:28 -04:00
Chocapikk
bcd1fab0b8
Add suggestions
2024-10-29 20:42:13 +01:00
Valentin Lobstein
0686cdbb82
Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-10-14 18:13:19 +02:00
Valentin Lobstein
fdb450955e
Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-10-14 18:13:19 +02:00
Chocapikk
611a16d368
Update
2024-10-14 18:13:18 +02:00
Chocapikk
465ae37ad2
Use wordpress_sqli_initialize instead
2024-10-14 18:13:18 +02:00
Chocapikk
a9f7fb3ace
Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi
2024-10-14 18:13:18 +02:00
Chocapikk
6c099f2b73
Add WordPress wp-automatic SQLi to RCE module (CVE-2024-27956)
2024-10-14 18:13:17 +02:00
Chocapikk
3515015e1b
Lint
2024-10-04 19:35:15 +02:00
Valentin Lobstein
686f31aac1
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:32:18 +02:00
Valentin Lobstein
888c446f9a
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:32:10 +02:00
Valentin Lobstein
3a244212e2
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:32:03 +02:00
Valentin Lobstein
b8aad8b22f
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:31:54 +02:00
Chocapikk
98b857e1a7
Lint
2024-10-04 18:04:21 +02:00
Valentin Lobstein
0dba8f0963
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 16:01:29 +02:00
Chocapikk
5733d43fb0
Update check function
2024-10-03 14:13:29 +02:00
Chocapikk
d14866a34d
Update description
2024-10-02 21:02:26 +02:00
Chocapikk
1d083cf9e8
Add credit for the bypass
2024-10-02 20:57:57 +02:00
Chocapikk
fbb74a6d2d
Add bypass for GiveWP RCE (CVE-2024-8353)
2024-10-02 19:53:20 +02:00
dledda-r7
6e696e24e5
Land #19457 , WP Plugin LiteSpeed Cache Account Take Over Module
2024-09-17 06:30:33 -04:00
Jack Heysel
84a8eb7273
Respond to comments
2024-09-16 09:46:57 -07:00
Jack Heysel
96e506d9f5
Fix cookie regex
2024-09-13 09:36:18 -07:00
Jack Heysel
e7da81c271
Fix AdminCookieError admin_cookie check
2024-09-13 09:35:43 -07:00
jheysel-r7
300d2f5aa9
Apply suggestions from code review
...
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com >
2024-09-13 11:58:08 -04:00
Jack Heysel
38a3e7696d
Responded to comments
2024-09-12 07:36:16 -07:00
Jack Heysel
c80a03fece
WP LiteSpeed exploit CVE-2024-44000
2024-09-11 23:31:26 -07:00
Jack Heysel
dd5dd54af1
beta commit module working
2024-09-11 15:23:46 -07:00
dledda-r7
5e2bf5aaca
fix(modules): spip_bigup_unauth_rce minor fix
2024-09-11 11:46:52 -04:00
dledda-r7
62e852176d
Land #19444 , SPIP BigUp Plugin Unauthenticated RCE
2024-09-11 10:29:12 -04:00
dwelch-r7
9de9b525d9
Land #19432 , Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin
2024-09-11 14:57:48 +01:00
Chocapikk
af5c7ecc8f
Fix bug
2024-09-08 07:54:11 +02:00
Chocapikk
4f859f129c
Fix bug
2024-09-08 07:52:40 +02:00
Chocapikk
59faa1bf0c
Change version fingerprinting
2024-09-08 07:01:23 +02:00
Chocapikk
43fabb07e5
Update doc + module + (mixin see #19444 )
2024-09-08 06:56:13 +02:00
Chocapikk
289f47fac1
Update documentation with docker setup, working mixin now, update module
2024-09-08 05:59:11 +02:00
Chocapikk
cc6127897f
Add suggestions
2024-09-07 04:00:25 +02:00
Valentin Lobstein
0b768791d6
Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:56:21 +02:00
Valentin Lobstein
484cdc940f
Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:56:09 +02:00
Valentin Lobstein
c90f9b1ae5
Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:55:54 +02:00
Chocapikk
92a25e5a29
Add source (oopsie)
2024-09-07 03:11:49 +02:00
Chocapikk
8b1e1dab1b
Add some comments and CVE ID
2024-09-07 03:09:42 +02:00
Chocapikk
fdc28080c9
Update disclosure date
2024-09-06 22:14:27 +02:00
Chocapikk
8608e7021d
Add spip_bigup_unauth_rce module
2024-09-06 22:10:18 +02:00
Jack Heysel
152710403d
Land #19330 , Add SSL opt in start_service
...
The start_service method now allows users to specify their SSL
preferences directly through the opts parameter. If the ssl option is
not provided in opts, it will default to the value in datastore["SSL"]
2024-09-05 09:08:07 -07:00
Jack Heysel
434593dcb4
Suggestion and rubocop fixes
2024-09-05 08:49:32 -07:00