dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
gwillcox-r7
6ed05df308
Land #13517 , Documalis Free PDF Editor and Free PDF Scanner JPEG PDF Stack Buffer Overflow
2020-08-03 14:11:50 -05:00
gwillcox-r7
b64e843d9f
Remove CVE reference for now until we can add in a proper CVE reference, fix some alignment issues for Notes section
2020-08-03 13:06:45 -05:00
gwillcox-r7
513f2dac9b
Add in Notes section to exploit
2020-08-03 11:00:17 -05:00
gwillcox-r7
b13b3b3d77
Add in a temp valid CVE number to see if that will get builds to pass or not
2020-07-31 17:49:14 -05:00
gwillcox-r7
8ad94e5484
Remove trailing new line at end of the line that was causing the last commit to fail for reasons other than the CVE being missing
2020-07-31 17:47:58 -05:00
gwillcox-r7
2d5fa912c3
Apply fixes to documentation to fix some errors and make it msftidy_docs.rb compliant. Also apply RuboCop updates to the module
2020-07-31 17:36:51 -05:00
gwillcox-r7
e355bc783c
Update the module's description and title to be more accurate, and also remove the EDB field and replace it with a temporary CVE field
2020-07-31 16:07:33 -05:00
gwillcox-r7
96859ba492
Add in the proper instructions corresponding to the gadgets that we use for the SEH handler overwrite within the exploit
2020-07-31 15:50:49 -05:00
gwillcox-r7
907bedca34
Edit up the exploit to correct the size calculation logic so it correctly calculates the maximum size of the payload and ensures we don't overrun this.
2020-07-31 15:36:37 -05:00
Adam Galway
1a2bf98222
creates standard elog & updates exisiting usages
2020-06-22 12:48:39 +01:00
metacom
cefcb6c851
new modules with both programs documalis_pdf_editor_and_scanner
2020-06-19 21:39:16 -05:00
h00die
0b4c047411
doc cleanup
2020-03-24 08:47:21 -04:00
Alan Foster
af9d2a28de
Fix msftidy warnings
2020-02-26 14:56:08 +00:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
William Vu
22a75c7bee
Revert "Fix style"
...
This reverts commit 9f81aeb4ad .
2020-02-04 10:10:46 -06:00
Dave York
7b14442ab0
replace strings with bools
2020-01-14 20:47:27 -05:00
h00die
3b2a54a599
add aka to some modules
2019-12-10 09:53:13 -05:00
William Vu
32334c2386
Update all module splats from http:// to https://
2019-08-15 18:10:44 -05:00
Jacob Robles
a0e90c0848
Remove references to doc.microsoft.com bulletin
...
MSB references point to this location
2019-05-23 07:01:21 -05:00
PierrickV
94f904311b
Fix broken links mostly to Microsoft website
2019-05-16 09:50:19 +02:00
Brent Cook
2242c1f758
prefer File.binread for reading binary file contents
2019-04-24 05:43:28 -05:00
Imran E. Dawoodjee
521277691e
Allow users to add other files for realism.
...
Update docs to reflect this change.
2019-04-18 04:07:46 +08:00
Imran E. Dawoodjee
6676dcb2ec
Allow user to use a file of their own choosing.
...
Updates to documentation and some comments in the module.
2019-04-17 00:18:27 +08:00
Imran E. Dawoodjee
6c798221fb
Module for CVE-2018-20250 and documentation
2019-04-16 02:21:25 +08:00
asoto-r7
94785dabbb
Renamed module from 'microsoft_windows_contact_remote_code_execution' to 'microsoft_windows_contact'
2019-04-10 17:17:50 -05:00
asoto-r7
62bf38d530
Simplified user options, recreated CONTACT template from a clean file
2019-04-10 17:14:04 -05:00
BrennerLittle
e733d225b6
microsoft_windows_contact_remote_code_execution
2019-03-31 11:12:09 -05:00
Wei Chen
c5bff76dc7
Cosmetic changes for office_exel_slk module and documentation
2019-02-11 12:37:17 -06:00
Wei Chen
18afc8f546
Bring PR 11249 up to date with upstream master
2019-02-11 12:19:21 -06:00
Carter Brainerd
2d1cecd4d5
Fix request pattern matching
2019-01-23 13:39:52 -05:00
Carter Brainerd
47fd066a29
Msftidy
2019-01-22 21:06:11 -05:00
Carter Brainerd
1f56bccf31
Small improvements from review
2019-01-22 20:46:28 -05:00
Carter Brainerd
1121ce1127
Change default filename to random
2019-01-17 20:12:53 -05:00
Carter Brainerd
8cd26b74d7
Please msftidy gods
2019-01-13 19:22:51 -05:00
Carter Brainerd
171d46db9b
Add disclosure date, more references, and authors
2019-01-13 19:11:05 -05:00
Carter Brainerd
89e8ff9c80
Update office_excel_slk.rb
2019-01-13 18:08:51 -05:00
Carter Brainerd
d88d1d0f1d
Create office_excel_slk.rb
2019-01-13 17:31:34 -05:00
Brendan Coles
24f807490f
revisionism
2019-01-10 19:19:14 +00:00
Jacob Robles
165f082160
Fix syntax, minor edits
2018-12-11 07:55:20 -06:00
Thomas Gregory
1bc024eaa7
Update cyberlink_lpp_bof.rb
...
Update includes all suggestions and new targets (Win8.1 x64 and Win10 x64)
2018-12-05 14:53:10 +07:00
Thomas Gregory
a4c3b8edc7
Add CyberLink LabelPrint < 2.5 - Local Buffer Overflow (SEH Unicode)
...
Add CyberLink LabelPrint < 2.5 - Local Buffer Overflow (SEH Unicode)
2018-11-29 20:20:05 +07:00
William Vu
90b9204703
Update DisclosureDate to ISO 8601 in my modules
...
Basic msftidy fixer:
diff --git a/tools/dev/msftidy.rb b/tools/dev/msftidy.rb
index 9a21b9e398..e9ff2b21e5 100755
--- a/tools/dev/msftidy.rb
+++ b/tools/dev/msftidy.rb
@@ -442,6 +442,8 @@ class Msftidy
# Check disclosure date format
if @source =~ /["']DisclosureDate["'].*\=\>[\x0d\x20]*['\"](.+?)['\"]/
d = $1 #Captured date
+ File.write(@full_filepath, @source.sub(d, Date.parse(d).to_s))
+ fixed('Probably updated traditional DisclosureDate to ISO 8601')
# Flag if overall format is wrong
if d =~ /^... (?:\d{1,2},? )?\d{4}$/
# Flag if month format is wrong
2018-11-16 12:18:28 -06:00
Spencer McIntyre
caf76a6555
Add applicable notes to my exploit modules
2018-10-27 20:54:14 -04:00
Jacob Robles
50a7ee5e6a
Minor modifications
2018-10-10 12:22:47 -05:00
Jacob Robles
796579e265
Use fail_with
2018-10-10 11:24:16 -05:00
Jacob Robles
4beb434054
Default Payloads
...
exploit:vlc_mkv default target payloads
2018-10-10 11:23:17 -05:00
Jacob Robles
1cb8418b2d
Filename options
...
exploit:vlc_mkv overwrite fileformat filename method
to supply options
2018-10-09 21:15:10 -05:00
Jacob Robles
94f260f289
exploit rand_text
...
exploit:vlc_mkv use rand_text functions defined in exploit.rb
2018-10-09 21:15:05 -05:00