Brent Cook
ef8ec13c88
added module docs and testing notes
2020-02-23 01:04:30 -08:00
airevan
adaa9e239a
Add phpstudy backdoor exploit module
2020-02-23 10:23:32 +08:00
Christophe De La Fuente
f9077bcd8d
Land #12704 , OpenNetAdmin 18.1.1 Remote Code Execution exploit
2020-02-21 15:49:26 +01:00
bwatters-r7
c9e4ca34c3
Land #12921 , Updating regex in ms16_075_reflection_juicy exploit windows version check
...
Merge branch 'land-12921' into upstream-master
2020-02-20 21:10:37 -06:00
Onur ER
e4456c9006
Update opennetadmin_ping_cmd_injection.md
2020-02-21 04:14:21 +03:00
Onur ER
1fe1506b42
Update documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:06:56 +03:00
William Vu
de6306fa35
Fix message, once more with feeling
2020-02-20 11:26:21 -06:00
William Vu
9c69059a24
Fix DisablePayloadHandler warning once and for all
2020-02-20 10:35:47 -06:00
Christophe De La Fuente
f484e6c83c
Land #12862 , Apache James 2.3.2 arbitrary file write exploit module
2020-02-20 10:41:13 +01:00
mattaberegg
739928b56a
Added line break to docs
2020-02-19 17:56:13 -08:00
Shelby Pace
db8555e007
Land #12942 , add Diamorphine privilege escalation
2020-02-19 10:36:39 -06:00
ide0x90
ac482a0d31
Typo in documentation
2020-02-19 23:32:07 +08:00
kalba-security
9980a96917
Move documentation to correct directory
2020-02-19 16:57:38 +02:00
William Vu
0264802756
Reformat module doc
2020-02-18 23:28:08 -06:00
William Vu
a34ffb3694
Fix typos in module doc
2020-02-18 23:27:15 -06:00
William Vu
6ad9956af8
Correct module doc filename
2020-02-18 23:24:46 -06:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
Christophe De La Fuente
828d974db5
Update code and documentation
...
- Add `OperationMaxRetries` option documentation
- Add default value to `TARGETURI` and update the documentation
- Remove `PosOffset` advanced option and hardcode the value
- Update `Description`
- Move URI encoding logic to `send_crafted_request`
- Refactor `send_crafted_request` to handle the HTTP parameter and final & (%26)
2020-02-17 18:25:10 +01:00
Christophe De La Fuente
226f4b0a53
Line wrap to 80 columns and small fix
...
- Line wrap documentation to 80 columns
- Line wrap `Description` field to 80 columns
- Remove unnecessary unless statement
2020-02-17 13:06:32 +01:00
Brendan Coles
ac6d0e4391
Add Diamorphine Rootkit Signal Privilege Escalation module
2020-02-16 14:53:16 +00:00
Christophe De La Fuente
9193ace50b
Add documentation
2020-02-14 17:17:45 -06:00
RAMELLA Sébastien
27effc1b56
typo. cmdstager command
2020-02-14 12:25:56 +04:00
dwelch-r7
0e55e20c9c
Land #12902 , Add exploit module for crosschex buffer overflow
2020-02-13 15:43:38 +00:00
0x44434241
9e46926a0f
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:49 +09:00
0x44434241
785dbb6ba3
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:27 +09:00
Adam Galway
946e244c8c
Updates docs and adds basic options
2020-02-11 13:40:51 +00:00
Adam Galway
a7a80e08a8
Updated docs with platform info
2020-02-11 12:55:07 +00:00
Adam Galway
65521270ea
Land #12853 , InfiniteWP exploit & mixin upgrades
2020-02-10 11:33:49 +00:00
0x44434241
9c30250161
Updating documentation for juicy potato exploit.
...
Added a link to information on the expiry of the bug, and explicitly
listing which versions of Microsoft Windows were and were not
vulnerable.
2020-02-10 16:33:45 +09:00
mattaberegg
90503b2c61
Documentation cosmetic updates
2020-02-07 18:28:24 -08:00
mattaberegg
a05611d756
Improve cleanup functionality
2020-02-07 16:13:25 -08:00
William Vu
eab1245eef
Update module doc
2020-02-07 12:30:00 -06:00
Alan Foster
4dcb2fbd96
Land #12889 , Add OpenSMTPD MAIL FROM RCE
2020-02-07 11:43:18 +00:00
ide0x90
7a0bf69eb0
Major refactor, and more complete testing with cmd/unix payloads
2020-02-07 19:34:18 +08:00
William Vu
763dbf5d5d
Check WordPress version
2020-02-07 03:14:17 -06:00
William Vu
6c59d7c37c
Refactor module
2020-02-07 01:38:11 -06:00
William Vu
8c07e17912
Update module docs
2020-02-06 15:57:54 -06:00
bwatters-r7
7f3c0c9314
Land #12906 , Add module for CVE-2019-19363
...
Merge branch 'land-12906' into upstream-master
2020-02-06 15:22:17 -06:00
William Vu
68565f575f
Update module doc
2020-02-06 14:55:41 -06:00
Shelby Pace
e736588795
change method of exploitation for reliability
...
This commit changes a few things:
1. The module first writes the dll to a
temp location.
2. The module writes a batch file to a
temp location.
3. The batch file copies the dll until
the copy command fails (presumably
because the dll is now in use by
PrintIsolationHost.exe).
4. The dropped files are deleted.
5. Docs updated to reflect changes.
2020-02-06 12:51:36 -06:00
William Vu
62c98710ad
Reword vulnerable commit range
2020-02-06 11:03:20 -06:00
William Vu
95fa8602bc
Refactor modules that use Expect
2020-02-05 21:16:21 -06:00
William Vu
b98c0c6876
Add module doc
2020-02-05 17:01:58 -06:00
Shelby Pace
a154efa250
Land #12887 , add dlink ssdpcgi cmd inject
2020-02-05 13:19:05 -06:00
Shelby Pace
691a18c997
move docs file, add options
2020-02-05 12:58:46 -06:00
bwatters-r7
9db6b5184b
Land #12894 , Add Windscribe WindscribeService Named Pipe Privilege Escalation
...
Merge branch 'land-12894' into upstream-master
2020-02-05 12:37:34 -06:00
kalba-security
20386f1aa4
Add apache_activemq_traversal_upload module and documentation
2020-02-04 12:01:41 +02:00
Shelby Pace
772431a29e
add documentation
2020-02-03 16:25:16 -06:00
William Vu
fa6573f8e7
Note arch in supported target
2020-02-03 11:16:16 -06:00
William Vu
e12d993027
Move SMB DOPU module to match new naming scheme
2020-02-03 11:16:16 -06:00