Julien Voisin
0106a4440e
Merge branch 'master' into aka_equationgroup
2025-05-30 17:17:54 +02:00
bcoles
943c94774a
Modules: Resolve Rubocop Lint/Syntax violations
2025-05-21 18:27:24 +10:00
jheysel-r7
18dc39e9a5
Merge pull request #20213 from bcoles/modules-exploits-linux-pop3
...
modules/exploits/linux/pop3: Resolve RuboCop violations
2025-05-20 11:22:05 -07:00
jheysel-r7
3a0e294f50
Merge pull request #20212 from bcoles/modules-exploits-linux-redis
...
modules/exploits/linux/redis: Resolve RuboCop violations
2025-05-20 11:21:35 -07:00
jheysel-r7
426aaa80fb
Merge pull request #20211 from bcoles/modules-exploits-linux-ids
...
modules/exploits/linux/ids: Resolve RuboCop violations
2025-05-20 10:57:03 -07:00
jheysel-r7
b99e161003
Merge pull request #20210 from bcoles/modules-exploits-linux-imap
...
modules/exploits/linux/imap: Resolve RuboCop violations
2025-05-20 10:50:58 -07:00
jheysel-r7
dd3093c806
Merge pull request #20203 from bcoles/rubocop-modules-exploits-linux-upnp
...
modules/exploits/linux/upnp: Resolve RuboCop violations
2025-05-20 10:46:46 -07:00
jheysel-r7
2810fdaa4a
Merge pull request #20165 from bcoles/rubocop-modules-exploits-linux-browser
...
modules/exploits/linux/browser: Resolve RuboCop violations
2025-05-20 09:19:34 -07:00
bcoles
693620e1a5
modules/exploits/linux/pop3: Resolve RuboCop violations
2025-05-21 02:19:09 +10:00
bcoles
6597a6c5fc
modules/exploits/linux/redis: Resolve RuboCop violations
2025-05-21 02:07:54 +10:00
bcoles
3aa6e2d8db
modules/exploits/linux/ids: Resolve RuboCop violations
2025-05-20 23:54:29 +10:00
bcoles
ec7d54152b
modules/exploits/linux/imap: Resolve RuboCop violations
2025-05-20 23:42:47 +10:00
bcoles
d567248b16
modules/exploits/linux/upnp: Resolve RuboCop violations
2025-05-18 16:29:41 +10:00
jheysel-r7
71565c6cdc
Update modules/exploits/linux/browser/adobe_flashplayer_aslaunch.rb
...
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com >
2025-05-16 15:07:08 -07:00
Diego Ledda
c68b10b640
Merge pull request #20164 from bcoles/rubocop-modules-exploits-linux-games
...
modules/exploits/linux/games: Resolve RuboCop violations
2025-05-16 10:27:24 +02:00
Brendan
76471731f9
Merge pull request #20112 from cdelafuente-r7/mod/ivanti/rce/cve_2025_22457
...
Ivanti Connect Secure Unauthenticated RCE via Stack-based Buffer Overflow CVE-2025-22457
2025-05-15 11:44:49 -05:00
bcoles
42a383e4c7
modules/exploits/linux/games: Resolve RuboCop violations
2025-05-16 00:09:30 +10:00
Christophe De La Fuente
365caab8fc
Update the error message in case of Broken pipe error and update the documentation
2025-05-15 12:10:53 +02:00
Christophe De La Fuente
3d121839c8
Fix from code review #2
2025-05-13 17:17:41 +02:00
Christophe De La Fuente
4aea95f93c
Fix from code review
2025-05-13 12:54:31 +02:00
bcoles
5062f596fd
modules/exploits/linux/browser: Resolve RuboCop violations
2025-05-10 18:15:50 +10:00
bcoles
16ae7af550
modules/exploits/linux/antivirus: Resolve RuboCop violations
2025-05-10 18:15:04 +10:00
jheysel-r7
4b9032a487
Merge pull request #20060 from mekhalleh/rce_cve-2025-21293
...
Added exploit module for CVE-2025-32433 (Erlang/OTP)
2025-05-02 07:05:30 -07:00
RAMELLA Sebastien
8da70b64d7
modify exploit response message
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-05-02 13:41:47 +04:00
RAMELLA Sebastien
eef2fac8dc
add HrrRbSsh and fix exploit response message
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-05-02 13:18:21 +04:00
Christophe De La Fuente
d83e6072ef
Add the module and documentation for Ivanti RCE CVE-2025-22457
2025-04-30 22:02:16 +02:00
Chocapikk
73f0963d81
Lint ^^
2025-04-30 16:16:30 +02:00
Valentin Lobstein
691cead95c
Update modules/exploits/linux/http/craftcms_preauth_rce_cve_2025_32432.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2025-04-30 16:10:32 +02:00
Valentin Lobstein
c85fe60596
Update modules/exploits/linux/http/craftcms_preauth_rce_cve_2025_32432.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-04-30 11:33:14 +02:00
Valentin Lobstein
301e9e64e7
Update modules/exploits/linux/http/craftcms_preauth_rce_cve_2025_32432.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-04-30 11:32:58 +02:00
Chocapikk
39a5d710aa
Refactor module: modularization, session-path leak, randomized key, improved check
...
- Centralized fetch_cookies_and_csrf and execute_via_session methods for clarity
- Added leak_session_path() to call send_transform("phpinfo") and parse session.save_path via XPath
- In check(): first try to leak the PHP session directory (report vulnerable if successful), then perform a simple RCE check by summing two 4-digit random numbers with print_r()
- Stub injection now happens once in fetch_cookies_and_csrf; execute_via_session only needs the payload
- Randomized the "as hack" key in send_transform
- Simplified exploit() to reuse execute_via_session with a Base64-encoded payload
- Big thanks to @jvoisin for the suggestions!
2025-04-30 00:24:25 +02:00
Valentin Lobstein
9d0d12004e
Update modules/exploits/linux/http/craftcms_preauth_rce_cve_2025_32432.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-04-29 19:59:09 +02:00
Valentin Lobstein
59b9249cec
Update modules/exploits/linux/http/craftcms_preauth_rce_cve_2025_32432.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-04-29 19:58:38 +02:00
RAMELLA Sebastien
32a8e6797e
fixes review
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-04-27 20:31:13 +04:00
Chocapikk
a0e9758c7f
Improve error handling, and search csrf_token in root uri
2025-04-27 08:01:17 +02:00
Chocapikk
ba094199da
Fix typo
2025-04-26 10:41:30 +02:00
Chocapikk
332c61b6ea
Fix cookie handling and switch to send_request_cgi for HTTP requests
2025-04-26 08:24:11 +02:00
Chocapikk
3e96b4148e
Add comment about msftidy issue
2025-04-26 06:02:27 +02:00
Chocapikk
9392d0bdf9
Add suggestions
2025-04-26 05:56:41 +02:00
Chocapikk
c4e621f3cf
Add new exploit for CVE-2025-32432: Craft CMS Preauth RCE
2025-04-26 05:43:13 +02:00
RAMELLA Sebastien
740a8130d4
combine modules
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-04-25 10:35:16 +04:00
adfoster-r7
1bfb43a467
Merge pull request #20077 from adfoster-r7/update-haraka-module-to-work-with-newer-python-versions
...
Update haraka module to work with newer python versions
2025-04-23 17:43:53 +01:00
adfoster-r7
da8e9e1b03
Update haraka module to work with newer python versions
2025-04-23 17:28:29 +01:00
Takah1ro
dc8531e37f
Fix after applied suggestions (escape ')
2025-04-22 21:57:05 +09:00
Takahiro Yokoyama
f579235b95
Apply suggestions from code review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-04-22 21:53:05 +09:00
RAMELLA Sebastien
0a428b8d03
add scanner capability + code review
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-04-20 18:02:52 +04:00
RAMELLA Sebastien
fbbaab9480
fix. fail with timeout expired
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-04-19 00:51:54 +04:00
RAMELLA Sebastien
59ed219775
Added exploit module for CVE-2025-21293 (Erlang/OTP)
...
Signed-off-by: RAMELLA Sebastien <sebastien.ramella@pirates.re >
2025-04-19 00:18:46 +04:00
Takah1ro
e1b5109c70
Add BentoML RCE module (CVE-2025-32375)
2025-04-17 20:46:43 +09:00
Takahiro Yokoyama
5945e0db0e
Update modules/exploits/linux/http/bentoml_rce_cve_2025_27520.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-04-16 22:05:04 +09:00