Commit Graph

458 Commits

Author SHA1 Message Date
adfoster-r7 85a9accbee Land #14202, Add initial zeitwerk autoloader approach for lib/msf/core 2020-12-08 12:53:02 +00:00
Shelby Pace 45ce738af7 add default payload for targets, run rubocop 2020-12-07 16:17:12 -06:00
dwelch-r7 1617b3ec9b Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
realmatthours 4f7329d93d Remove EOL spaces from consul_service_exec.rb 2020-11-18 09:09:55 +00:00
realmatthours 6f1365b75d Add Windows support to consul_service_exec.rb
Added Windows to the 'Targets' list with CmdStagerFlavor psh_invokewebrequest. Generalised the payload delivery to allow for both Windows and the existing Linux payloads.
2020-11-17 15:37:55 +00:00
Alan Foster 30809787c4 Convert disclosure dates to iso8601 2020-10-02 21:00:37 +01:00
Alan Foster 26ff912291 Fix invalid disclosure date formats 2020-10-02 12:20:05 +01:00
William Vu f08349982d Use CheckModule scanner in java_rmi_server exploit 2020-08-24 10:11:03 -05:00
Alan Foster b841246536 Update autocheck to use prepend instead of include, add ForceExploit functionality 2020-06-30 11:40:46 +01:00
Adam Galway 1a2bf98222 creates standard elog & updates exisiting usages 2020-06-22 12:48:39 +01:00
Shelby Pace b7dd7b3f7a remove old version, rubocop 2020-06-02 14:24:18 -05:00
Shelby Pace ffd79ff8cc add exploit for most versions 2020-06-01 09:41:56 -05:00
William Vu 8473662e32 Land #13463, Oracle WebLogic CVE-2020-2555 exploit 2020-05-20 23:21:07 -05:00
Shelby Pace abff1cd731 change true to false 2020-05-19 14:59:47 -05:00
Shelby Pace 378fe767b5 randomize class name 2020-05-19 14:35:36 -05:00
Shelby Pace 8f43ffa8e3 change title 2020-05-19 13:59:27 -05:00
Shelby Pace 6657d3480e remove returns, add autocheck 2020-05-19 13:47:39 -05:00
Shelby Pace 837f307740 rubocop fixes 2020-05-19 13:12:23 -05:00
Shelby Pace d86e008914 Update modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-05-19 12:29:56 -05:00
Shelby Pace c51a32eaf2 Update modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-05-19 12:29:41 -05:00
Shelby Pace 5857c80f47 Update modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-05-19 12:29:17 -05:00
Shelby Pace 4ff4676ab9 Update modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-05-19 12:28:42 -05:00
Shelby Pace 32386e0947 Update modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-05-19 12:27:38 -05:00
Shelby Pace 9e813b7e1e add archs 2020-05-15 10:22:08 -05:00
Shelby Pace 91e4328198 add documentation, remove some leftover comments 2020-05-15 09:44:45 -05:00
Shelby Pace 302b7134a3 add code for v12.1.3 2020-05-14 19:06:03 -05:00
Shelby Pace f7c6699843 add code for v12.2.1.3 2020-05-14 14:08:05 -05:00
Shelby Pace aaeb5ad5ee mixin madness 2020-05-13 08:37:53 -05:00
Shelby Pace 76d48281d0 add check method 2020-05-12 16:12:51 -05:00
Shelby Pace 8dde3b6fca add Windows-related code, fix alignment 2020-05-12 12:23:55 -05:00
Shelby Pace 5e0469ce4f add t3_send comment and cmdstager code 2020-05-11 13:18:01 -05:00
Pedro Ribeiro cf25629510 Fix advisory link in TM1 module 2020-05-09 14:58:46 +07:00
Shelby Pace 1851f4bc3c add documented object 2020-05-04 10:34:15 -05:00
Pedro Ribeiro d904eed010 add badchars for various targets 2020-03-30 12:49:58 +07:00
Pedro Ribeiro 59c2079aa4 split AIX and Linux cmd targets 2020-03-28 14:35:24 +07:00
Pedro Ribeiro 46286f8981 change to payload.encoded 2020-03-28 14:30:20 +07:00
Pedro Ribeiro 2ac177cb39 make changes for ARCH_CMD, add multiple targets 2020-03-28 14:22:21 +07:00
Pedro Ribeiro 6a6b99885d Add ARCH_CMD, tested and working 2020-03-28 13:55:09 +07:00
Pedro Ribeiro 5ac0145bb4 Update modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2020-03-28 11:04:31 +07:00
Pedro Ribeiro c4f05fb566 Update modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2020-03-27 16:29:34 +07:00
Pedro Ribeiro 8139d0a1f1 change if to positive 2020-03-27 16:18:43 +07:00
Pedro Ribeiro 79abacd186 Fix null response 2020-03-27 16:17:01 +07:00
Pedro Ribeiro 7400720130 Update modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2020-03-27 16:15:56 +07:00
Pedro Ribeiro 75a0a2ae8a change module name 2020-03-27 16:15:43 +07:00
Pedro Ribeiro 3429e86f40 Update modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2020-03-27 16:14:44 +07:00
Pedro Ribeiro f69d9e0b0d Update modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2020-03-27 16:14:33 +07:00
Pedro Ribeiro f81099709d Update modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2020-03-27 16:14:22 +07:00
Pedro Ribeiro cb5fbdf0c0 explain a bit better 2020-03-27 15:23:46 +07:00
Pedro Ribeiro d566fdefae add link to advisory 2020-03-27 14:52:28 +07:00
Pedro Ribeiro 38df0e3a58 Add exploit for IBM TM1 2020-03-27 14:40:56 +07:00