Jack Heysel
3abd62076c
Land #17624 , Oracle E-Business Suite Module
...
This pull request adds an exploit module for CVE-2022-21587
an arbitrary file upload vulnerability in Oracle Web Applications
Desktop Integrator as shipped with 12.2.3 through to 12.2.11
which results in RCE
2023-02-28 17:04:20 -05:00
Jack Heysel
5311a491e9
Froxlor 2.0.7 is actually vulnerable too
2023-02-24 13:18:34 -05:00
space-r7
9621f77bac
Land #17640 , add Froxlor RCE
2023-02-22 12:11:38 -06:00
sfewer-r7
690abcfe1f
improve the documentation, mention some steps required during setup.
2023-02-22 09:42:11 +00:00
Jack Heysel
f6ec3855b3
Removed space at EOL
2023-02-22 00:35:42 -05:00
Jack Heysel
0c8df1a67b
Updated docs and module suggetsions
2023-02-22 00:33:40 -05:00
Grant Willcox
38d8b70873
Make msftidy_docs.rb happy and then also clarify where to find software download links
2023-02-17 14:56:51 -06:00
Grant Willcox
c713da368d
Add in a few fixes from the review
2023-02-17 14:52:57 -06:00
sfewer-r7
73e82274dd
changes as per @gwillcox-r7 review
2023-02-17 13:10:53 +00:00
Spencer McIntyre
ecd5ad29a7
Add module docs
2023-02-15 16:29:42 -05:00
sfewer-r7
d1463df3cc
fix documentation issues from msftidy_docs
2023-02-14 10:47:47 +00:00
Jack Heysel
ca0b1ffe05
Documentation fixes
2023-02-13 19:56:23 -05:00
Jack Heysel
2e195b2742
Initial commit Froxlor RCE
2023-02-13 19:39:18 -05:00
Grant Willcox
d012145726
Land #17599 , Cisco RV LAN Exploit - CVE-2022-20705 and CVE-2022-20707
2023-02-13 17:50:06 -06:00
Grant Willcox
45e453d687
Fix up remaining review comments
2023-02-13 15:07:25 -06:00
sfewer-r7
6b29b14c46
add in module documentation
2023-02-10 12:41:55 +00:00
Grant Willcox
f2a86327d0
Minor fixes from review
2023-02-09 15:34:25 -06:00
Stephen Wildow
427c181e9a
Utilized msftidy_docs.rb to clean up missing sections, excessively long lines, spaces at EOL, and space end of file. Removed credit section. Expanded on installation procedure. Modified steps procedure to include Verify options and removed failure status. Removed Targets section. Scenarios have device, target, and architecture.
2023-02-08 19:18:14 -05:00
Jack Heysel
19bcf8be7f
Working hardcoded payload
2023-02-08 18:14:11 -05:00
Stephen Wildow
35749a000a
Added docs. Performed code linting with rubocop.
2023-02-07 20:27:07 -05:00
Matthew Dunn
52fa2e5be6
Add example for version 5.5.6 with CVE-2021-25297
2023-02-07 14:18:53 -06:00
Grant Willcox
489ab24876
Add in additional case documentation for the various targets and CVEs and fix a bug in the code
2023-02-07 14:18:45 -06:00
Matthew Dunn
8ba7a28caf
Add quotes to set-time command in docs
2023-02-07 14:18:45 -06:00
Matthew Dunn
90e07ef5ed
Switch to match over scan and add troubleshooting steps
2023-02-07 14:18:37 -06:00
Matthew Dunn
1cb06b11ac
Adjust exploit and docs to support versions 5.5.6-5.7.5
2023-02-07 14:18:09 -06:00
Matthew Dunn
87176f9d7f
Address Review Comments and add CVE-2021-25297 coverage
2023-02-07 14:18:06 -06:00
Matthew Dunn
b042e71b2a
Make Module work for both target url parameters
2023-02-07 14:18:04 -06:00
Matthew Dunn
b606d1ff6b
Add Documentation for Module
...
Fix CVE format
Add Documentation
2023-02-07 14:18:04 -06:00
adfoster-r7
6870efc34a
Land #17426 , Update all references to old Wiki to point to new docs site
2023-02-01 23:49:20 +00:00
adfoster-r7
bbf17c167c
Land #17511 , add exploit for CVE-2022-44877 command injection in CentOS Control Web Panel
2023-01-31 14:05:19 +00:00
Grant Willcox
6043d0ffba
Update all links from Wiki site to new docs site.
2023-01-27 09:58:53 -06:00
Spencer McIntyre
f81195d0cc
Fix a typo
2023-01-25 13:45:18 -05:00
space-r7
153af9fb68
Land #17407 , add Cacti unauth command injection
2023-01-23 13:06:46 -06:00
Spencer McIntyre
6fe0933c1e
Add exploit for CVE-2022-44877
2023-01-20 09:04:24 -05:00
Grant Willcox
7e23c34e6c
Apply fixes per code review
2023-01-17 12:44:22 -06:00
h00die-gr3y
da3ae22135
added documentation
2023-01-17 12:44:20 -06:00
Grant Willcox
f39973de86
Fix up missing option in documentation and also add some additional validation on server response.
2023-01-04 17:02:05 -06:00
h00die-gr3y
c7b59b4815
updates based on gwillcox-r7 review comments
2023-01-04 17:02:04 -06:00
h00die-gr3y
6801cbd21e
updated Limitation section
2023-01-04 17:02:03 -06:00
h00die-gr3y
fc6acdab6a
added documentation
2023-01-04 17:01:59 -06:00
Christophe De La Fuente
20d70799a7
Land #17298 , Add opentsdb_yrange_cmd_injection module and docs
2022-12-23 13:38:58 +01:00
ErikWynter
8f96746551
fix typo and add credit for discovery
2022-12-23 11:11:31 +02:00
ErikWynter
4c2dfe0279
add cacti_unauthenticated_cmd_injection
2022-12-22 17:55:45 +02:00
ErikWynter
78dfaa12ef
add opentsdb_yrange_cmd_injection module and docs
2022-11-24 21:37:24 +02:00
adfoster-r7
0aa0884e26
Land #17296 , add warning about external links
2022-11-24 10:30:44 +00:00
Spencer McIntyre
6350daf2d8
Land #17273 , F5 exploit module CVE-2022-41800
...
F5 exploit module CVE-2022-41800 (authenticated RCE in RPM code)
2022-11-23 17:57:18 -05:00
Jeffrey Martin
453cfc5939
spelling change per review
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2022-11-23 13:26:19 -06:00
Jeffrey Martin
cb8e023734
add warning about external links
...
Links to external resources not controlled by the project maintainers
are subject to bitrot and malicious take over. Warnings seem appropriate.
2022-11-23 12:08:05 -06:00
Ron Bowes
d0e109b842
Check in exploit module for CVE-2022-41800
2022-11-16 12:04:18 -08:00
Ron Bowes
99e661cfcf
Check in exploit script for CVE-2022-41622 (CSRF into SOAP)
2022-11-16 11:58:15 -08:00