Green-m
69e7956adf
Land #11174 , Fix platform bug when upgrade shell.
...
The platform on windows powershell should be 'win', rather than
'windows', this bug leads to failure when upgrade powershell session
to meterpreter.
2018-12-26 11:31:39 +08:00
L
ee7120d63a
fixed post/multi/manage/shell_to_meterpreter
2018-12-25 15:00:39 +08:00
Brent Cook
b9742802aa
Land #11137 , Clean up linux/local/vmware_alsa_config exploit module
2018-12-21 17:04:11 -06:00
Jacob Robles
4bc871c499
Add CmdStager to erlang_cookie_rce
2018-12-21 07:33:37 -06:00
Brent Cook
b83c6ad496
Land #11149 , fix a PTY leak in Python Meterpreter
2018-12-20 17:30:42 -06:00
William Vu
5af05ad976
Land #11143 , nc -j fix for cups_root_file_read
2018-12-19 22:37:00 -06:00
Jeffrey Martin
bf4bb0a5b9
bump metasploit-payloads gem
...
Update metasploit-payloads gem to 1.3.57 to pick up
fix for Python Meterpreter PTY Leak from rapid7/metasploit-payloads#319
2018-12-19 18:19:24 -06:00
asoto-r7
d601837e03
Land #10401 , java_jmx_server scanner for Java JMX MBean servers
2018-12-19 13:12:03 -06:00
asoto-r7
50b7d93a18
java_jmx_scanner: Incorporate @bcoles suggestions
2018-12-19 12:56:53 -06:00
Wei Chen
f7eb3452be
Land #11083 , set user agent in Windows reverse_http(s) stagers
2018-12-19 11:38:12 -06:00
Jacob Robles
6921b79890
Land #11089 , Erlang cookie rce exploit module
2018-12-19 08:02:40 -06:00
William Vu
1b8b3bbb95
Update nc -j check in cups_root_file_read
2018-12-18 17:38:33 -06:00
asoto-r7
51ce96a2b4
Merge branch 'jmx_scanner' of https://github.com/sgorbaty/metasploit-framework into sgorbaty-jmx_scanner
2018-12-18 16:05:03 -06:00
Milton-Valencia
bb758f9a61
I didn't forget msftidy I swear
2018-12-18 14:55:12 -06:00
Milton-Valencia
8a2a605a99
added targets
2018-12-18 14:50:57 -06:00
Brent Cook
fc2d217c0a
Land #11135 , strip comments from source code before uploading it to the target
2018-12-17 21:23:29 -06:00
Brent Cook
333d44186b
Land #11138 , add reverse_tcp mixin for vax payload
2018-12-17 21:17:40 -06:00
bwatters
bf13693d37
Land #11101 , temp fix for x64/xor stage encoder
...
Merge branch 'land-11101' into upstream-master
2018-12-17 14:14:55 -06:00
LouDnl
2a69fffa6b
fix for ReverseTcp error
...
Update vax shell_reverse_tcp.rb to fix ReverseTcp NameError
Error:
/opt/metasploit-framework/embedded/framework/modules/payloads/singles/bsd/vax/shell_reverse_tcp.rb:24:in `initialize': uninitialized constant Msf::Handler::ReverseTcp (NameError)
After adding this line the error dissapeared for me and I was able to run msfconsole again.
2018-12-17 19:28:07 +01:00
Shelby Pace
2fc501d260
Land #11112 , Fix bpf_priv_esc exploit module
2018-12-17 10:00:50 -06:00
Jacob Robles
7839add2fd
Land #11123 , Add module windows persistent service
2018-12-17 09:07:21 -06:00
Jacob Robles
88b7b7df4a
Fix additional path space issues
2018-12-17 07:00:23 -06:00
Brendan Coles
d973a58052
Clean up linux/local/vmware_alsa_config
2018-12-17 08:01:34 +00:00
Green-m
0aa6e5a640
Handle path with spaces correctly.
2018-12-17 10:25:06 +08:00
Brendan Coles
fcb512878c
Add strip_comments method to Linux local exploits
2018-12-16 14:11:54 +00:00
Wei Chen
5bf28887d2
Land #11127 , Fix TARGETURI support in struts2_namespace_ognl
2018-12-15 09:33:48 -06:00
Brendan Coles
b8e134b95d
Update version check
2018-12-15 05:39:50 +00:00
Francesco Soncina
6237740116
lint: remove spaces
2018-12-15 01:02:13 +01:00
Jacob Robles
8adfef5730
Remove Version, Fix Whitespace
2018-12-14 13:19:49 -06:00
Jacob Robles
e67eaa94c9
Move code to ERB template
2018-12-14 13:13:32 -06:00
William Vu
38bdee19e8
Fix TARGETURI support in struts2_namespace_ognl
2018-12-14 13:08:50 -06:00
Auxilus
6c9fafb9d5
Delete unused variable
...
I suppose the variable 'f' was for Name in https://github.com/rapid7/metasploit-framework/blob/06720ee18b2d661aa5ea695ed80e4daa88fbf20c/modules/exploits/linux/smtp/haraka.py#L70
I'm not sure, should it be 'f' at https://github.com/rapid7/metasploit-framework/blob/06720ee18b2d661aa5ea695ed80e4daa88fbf20c/modules/exploits/linux/smtp/haraka.py#L70 or just the way it is atm?
2018-12-14 22:27:11 +05:30
Jacob Robles
556d182231
Remove code that was replaced
2018-12-14 09:15:01 -06:00
Jacob Robles
a057b72bd9
Use argument
2018-12-14 09:14:27 -06:00
Jacob Robles
dfa84aa1af
Use exploit default exception handling
2018-12-14 09:12:32 -06:00
Jacob Robles
5fd7b82f7a
Remove unused parameter
2018-12-14 09:10:29 -06:00
Brent Cook
673cfe6889
Land #11119 , Add WEBUI_PORT to hp_van_sdn_cmd_inject exploit
2018-12-13 16:15:53 -06:00
Jacob Robles
58aa16d06b
Work around snprintf
2018-12-13 14:29:54 -06:00
bwatters-r7
f00118851a
Revert "Land #10886 , Bypassuac computerdefault"
...
This reverts commit 14b2cdc120 , reversing
changes made to a79b936e09 .
2018-12-13 13:56:16 -06:00
Wei Chen
cc7cb7302e
Land #10944 , Add macOS Safari exploit from pwn2own2018
2018-12-13 13:50:19 -06:00
Jacob Robles
92feeea0ca
Minor syntax change
2018-12-13 13:46:40 -06:00
William Vu
cb5648a1c7
Add WEBUI_PORT to hp_van_sdn_cmd_inject exploit
2018-12-13 12:22:36 -06:00
Milton-Valencia
3f1aa425b4
msftidy....lol
2018-12-13 11:03:41 -06:00
Milton-Valencia
2e26ceac8f
added comments
2018-12-13 10:55:09 -06:00
bwatters-r7
89e4e8bdea
Merge branch 'master' of github.com:rapid7/metasploit-framework into upstream-master
2018-12-13 09:30:10 -06:00
William Vu
8b79634338
Update a few stragglers
...
And since eaton_xpert_backdoor was copied from my fortinet_backdoor
module, update the error handling there, too.
2018-12-12 15:47:18 -06:00
William Vu
e69f006992
Remove CommandShell mixin in exploits
...
This was cargo culting. Exploits use handler instead of start_session.
2018-12-12 15:43:13 -06:00
William Vu
6e77ae7e3e
Update my SSH scanner modules
...
Especially with proper error handling for Net::SSH::CommandStream.
2018-12-12 15:36:54 -06:00
Stephen Haywood
7cffbac65b
Update additional scanner modules.
2018-12-12 15:32:31 -06:00
Stephen Haywood
fa2164ebb9
Update to match coding style.
2018-12-12 15:32:31 -06:00