space-r7
|
db00991f26
|
Land #16150, add nagios xi web shell upload
|
2022-02-11 11:45:06 -06:00 |
|
Jake Baines
|
0a78dd78ec
|
Used suggested method for defining user webshell, used suggested depth configuration, and used vars_get in a couple of places
|
2022-02-08 18:20:03 -08:00 |
|
space-r7
|
bed067dda0
|
Land #16125, add ARCH_CMD for GXV3140 support
|
2022-02-08 12:24:42 -06:00 |
|
Jake Baines
|
0fcc7e7733
|
Fixed spelling errors in descriptions
|
2022-02-06 02:55:17 -08:00 |
|
Jake Baines
|
9758251278
|
Initial commit of CVE-2021-37343
|
2022-02-05 18:21:18 -08:00 |
|
space-r7
|
837fdf7c5e
|
Land #16128, add cisco rv unauth rce
|
2022-02-01 10:34:57 -06:00 |
|
Jake Baines
|
78312fb300
|
Update documentation/modules/exploit/linux/http/cisco_rv_series_authbypass_and_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
|
2022-02-01 06:41:26 -05:00 |
|
Jake Baines
|
ccedcfefab
|
Added exploit for CVE-2021-1472/CVE-2021-1473
|
2022-01-29 18:56:53 -08:00 |
|
Brendan Coles
|
feebf25ad4
|
Add support for GXV3140 models and ARCH_CMD busybox telnetd payload
|
2022-01-29 19:38:57 +00:00 |
|
Brendan Coles
|
a4fcddca8e
|
Rename to grandstream_gxv31xx_settimezone_unauth_cmd_exec
|
2022-01-29 19:24:09 +00:00 |
|
Grant Willcox
|
44f040ad78
|
Land #16056, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722)
|
2022-01-24 21:03:46 -06:00 |
|
Grant Willcox
|
15751a0f78
|
Minor langauge fix and final typo
|
2022-01-24 21:01:34 -06:00 |
|
Jake Baines
|
2c989ec714
|
Addressed multiple review comments (spelling, doc details, randomization, etc)
|
2022-01-22 14:09:58 -08:00 |
|
Grant Willcox
|
8bb3e39fd7
|
Land #16036, Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
|
2022-01-19 10:58:42 -06:00 |
|
Brendan Coles
|
ee2feb1207
|
Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
|
2022-01-19 00:04:15 +00:00 |
|
Jake Baines
|
4ebb702405
|
Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722)
|
2022-01-15 12:46:56 -08:00 |
|
Jake Baines
|
d4ee9a0183
|
Initial commit of CVE-2021-20039 exploit
|
2022-01-10 12:43:50 -08:00 |
|
bwatters
|
77812ae4c4
|
Update documentation for multiple binaries, add targeting data,
other bcoles improvements
|
2021-12-02 09:57:48 -06:00 |
|
bwatters
|
1f33305ce1
|
Add documentation
|
2021-12-01 14:54:48 -06:00 |
|
Grant Willcox
|
725c5f8d8c
|
Add in another scenario into documentation and add additional detail to one setup step
|
2021-11-18 17:01:25 -06:00 |
|
Grant Willcox
|
a915c3ce5c
|
Add fixes for some of the issues raised during the review process on both the documentation and module side of things
|
2021-11-17 17:25:50 -06:00 |
|
Spencer McIntyre
|
0b3f95abca
|
Writeup the module docs and move the protocol code
|
2021-11-12 15:15:51 -05:00 |
|
space-r7
|
1dd26bca03
|
Land #15802, add OMIGOD LPE
|
2021-11-09 10:30:50 -06:00 |
|
Spencer McIntyre
|
1ca9f48266
|
Land #15783, Add Sophos UTM CVE-2020-25223 exploit
|
2021-10-28 09:00:08 -04:00 |
|
William Vu
|
2a36287d9d
|
Add more words to module doc
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
76aa872ff5
|
Add (empty) Options header to module doc
For consistency.
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
7bbf0305c0
|
Fix elapsed time calculation using monotonic clock
Hat tip @adfoster-r7.
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
365365bfb0
|
Add module doc
|
2021-10-27 19:31:03 -05:00 |
|
Spencer McIntyre
|
9635110050
|
Add documentation for CVE-2021-38648
|
2021-10-27 12:06:01 -04:00 |
|
Spencer McIntyre
|
21c45b3733
|
Update module metadata
|
2021-10-27 11:58:53 -04:00 |
|
Spencer McIntyre
|
60b17b5c6f
|
Add the module docs for OMIGOD
|
2021-10-26 12:08:48 -04:00 |
|
William Vu
|
42ed1b6eef
|
Add Windows support to CVE-2021-26084 exploit
|
2021-10-14 16:58:04 -05:00 |
|
William Vu
|
78ba617aef
|
Add module doc
|
2021-10-06 16:43:57 -05:00 |
|
sjanusz
|
2c7aa022d4
|
Add PoC for CVE-2021-22555 Netfilter Priv Escalation
|
2021-10-04 16:48:23 +01:00 |
|
space-r7
|
12af64c4d8
|
Land #15604, add buffer overflow G-Cam module
|
2021-09-16 13:02:57 -05:00 |
|
Spencer McIntyre
|
480dec9a1e
|
Land #15658, Add module for CVE-2021-32682
|
2021-09-14 14:09:27 -04:00 |
|
space-r7
|
91ae50eb27
|
escapeshellcmd -> escapeshellarg
|
2021-09-09 17:28:05 -05:00 |
|
space-r7
|
0095613a94
|
add completed module and documentation
|
2021-09-09 16:58:40 -05:00 |
|
William Vu
|
5ed5bc3903
|
Add module doc
|
2021-09-08 09:37:02 -05:00 |
|
Grant Willcox
|
0e0e3bbcfb
|
Land #15603, Add Geutebruck CVE_2021_335XX command injection module
|
2021-09-01 10:59:22 -05:00 |
|
bwatters
|
ff50a94348
|
Land #15567, Add in Exploit for CVE-2021-3490
Merge branch 'land-15567' into upstream-master
|
2021-08-31 18:46:25 -05:00 |
|
Grant Willcox
|
0a57641aa4
|
Add in documentation and module code cleanness improvements and also make the output easier for readers to understand should something fail midway through.
|
2021-08-31 18:24:57 -05:00 |
|
Grant Willcox
|
30a7ee1bf2
|
Final very minor documentation fixes for better clarity
|
2021-08-31 18:24:56 -05:00 |
|
Your Name
|
56cde3eaba
|
Add Geutebruck CVE_2021_335XX command injections module
|
2021-08-31 18:24:14 -05:00 |
|
Grant Willcox
|
3bca3b0bcb
|
Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match
|
2021-08-31 15:07:37 -05:00 |
|
Your Name
|
6a501a37ff
|
Add CVE-2021-33549 exploit for Geutebruck G-CAM
|
2021-08-27 01:28:26 +01:00 |
|
Grant Willcox
|
6f9b06fb4b
|
Add in Manfred Paul's original blog post and chompie1337's original PoC to the list of links. Also add in a relatively detailed description of how to add in new targets to this exploit to the documentation in case that helps anyone down the line
|
2021-08-25 18:09:07 -05:00 |
|
Grant Willcox
|
bd490d35ed
|
Add support for Linux 5.11.x on Fedora
|
2021-08-23 15:09:10 -05:00 |
|
Grant Willcox
|
db5ac81ecf
|
Fix up mistakes bcoles pointed out and also add in a check to ensure we are only targetting x64 systems
|
2021-08-23 13:23:40 -05:00 |
|
Grant Willcox
|
e46611cffb
|
Add in support for exploiting Fedora 32 with Linux kernel 5.10.12
|
2021-08-20 18:04:59 -05:00 |
|