Jack Heysel
8cddffa3d1
Land #18700 , Add Kafka-ui Unauth RCE module
...
This PR adds an exploit module for CVE-2023-52251 which
is an unauthenticated rce vulnerability in Kafka's UI.
2024-02-16 15:38:52 -05:00
Jack Heysel
a1b0ff0fcf
Land #18681 , Update Apache Ofbiz w. Auth-Bypass
...
This PR updates the pre-existing apache_ofbiz_deserialization
module to include functionality that will bypass authentication by
using the newly discovered CVE-2023-51467.
2024-02-16 15:02:34 -05:00
h00die-gr3y
d716e60cf2
added base64 encoder module of zerosteiner
2024-02-14 21:33:50 +00:00
h00die-gr3y
f5c71d09c2
using data/kafka_ui_versions.json for the version check
2024-02-14 20:57:46 +00:00
H00die.Gr3y
8b70cefd83
Update modules/exploits/linux/http/kafka_ui_unauth_rce_cve_2023_52251.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-02-14 20:57:46 +00:00
h00die-gr3y
f75722ecf2
Small updates to module and documentation
2024-02-14 20:57:46 +00:00
h00die-gr3y
dde7e3c5d3
Small tweaks to verbose messages
2024-02-14 20:57:46 +00:00
h00die-gr3y
d5f30befbb
Second release of module
2024-02-14 20:57:46 +00:00
h00die-gr3y
3db32da70f
First release of module.
2024-02-14 20:57:45 +00:00
h00die
84278b8e0e
fix ofbiz auto detection
2024-02-06 16:45:02 -05:00
h00die
2efbf6e2f5
review comments
2024-01-29 17:21:06 -05:00
Jack Heysel
c278ef9b73
Land #18648 , Add Module for GL.iNet products
...
This PR adds an exploit module for a number of
different GL.iNet network products. The module combines
an auth by-pass CVE-2023-50919 with an RCE CVE-2023-50445.
2024-01-23 14:57:29 -05:00
jheysel-r7
13d2968fad
Capitalize remaining references to Meterpreter
2024-01-23 13:11:03 -05:00
h00die-gr3y
8d7907edee
Update based on @jheysel-r7 comments
2024-01-23 10:10:21 +00:00
adfoster-r7
094d6ee36b
Add additional reliability and stability notes to modules
2024-01-22 23:29:57 +00:00
h00die-gr3y
919c846064
Final small updates (removed UDP and corrected typo in release date
2024-01-20 11:27:10 +00:00
Spencer McIntyre
06dcc82ced
Land #18630 , Add CVE-2023-50917: MajorDoMo RCE
...
Add CVE-2023-50917: MajorDoMo Command Injection Module
2024-01-19 17:10:40 -05:00
sfewer-r7
de6ed9e1d6
use get_json_document instead of JSON.parse
2024-01-18 15:35:43 +00:00
sfewer-r7
4ff399844f
By replacing the trailing ';' with a '#' we comment out the remaining portion of the command string (Thank you @jvoisin). We must also include a space character for this to work as expected, doing so also removes the need to bootstrap the Linux payloads with a separate file.
2024-01-18 10:04:38 +00:00
Stephen Fewer
c74fd86961
Update modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2023_46805.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-18 09:18:46 +00:00
Stephen Fewer
3bb1d2bc02
Update modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2023_46805.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-18 09:18:35 +00:00
sfewer-r7
70ef0dcb0d
improve the check logic to fall through when the json doesnt have the key we expect it to have
2024-01-17 10:02:59 +00:00
sfewer-r7
518c1e5d3c
mention Pull Connect as well as the CVEs in the description
2024-01-17 10:02:11 +00:00
sfewer-r7
ad7e348eaa
remove a copy pasta link
2024-01-17 09:16:18 +00:00
h00die
d7cf9155a6
ofbiz working for 18.12.09
2024-01-16 20:06:11 -05:00
sfewer-r7
f9419c4839
seperate commands into an array instead of one bog long string
2024-01-16 17:19:13 +00:00
sfewer-r7
ea1dafa353
this is a slightly nicer way to write this
2024-01-16 17:08:09 +00:00
sfewer-r7
4060e069ed
first commit of the ICS exploit
2024-01-16 14:32:48 +00:00
h00die-gr3y
e7f2abbf9e
Small typo update
2024-01-14 19:26:10 +00:00
h00die
077cad34ab
non-working module
2024-01-08 19:47:24 -05:00
h00die-gr3y
85897a2596
update adding aarch64 architecture and some new targets
2024-01-06 17:26:38 +00:00
h00die-gr3y
94a84960a2
Improved check for v3.x routers to obtain exact version
2024-01-05 16:20:29 +00:00
h00die-gr3y
eb902457f2
small update to module for mt6000 vuln test
2024-01-05 13:19:54 +00:00
h00die-gr3y
adf455e8cb
Third release of module and documentation
2024-01-04 14:01:37 +00:00
h00die-gr3y
b2312c97d3
Second release of module and documentation
2024-01-04 09:26:16 +00:00
h00die-gr3y
9fdac8fd28
First release of module
2024-01-03 19:43:49 +00:00
h00die-gr3y
08c5e6a689
Draft release of module. Not ready for review
2023-12-31 10:19:34 +00:00
Christophe De La Fuente
3182cb4000
Land #18612 , Craft CMS unauthenticed RCE [CVE-2023-41892]
2023-12-22 10:59:39 +01:00
Balgogan
0a2dea523f
Add suggested changes
2023-12-22 00:04:54 +01:00
h00die-gr3y
4c404765a4
Final update to the module based on cdelafuente-r7 comments
2023-12-21 12:06:21 +00:00
Balgogan
9c9af0dca1
Fix statement
2023-12-20 01:51:19 +01:00
Balgogan
22a05c8bf5
Add CVE-2023-50917
2023-12-20 00:43:00 +01:00
h00die-gr3y
5d7cf90521
Some minor changes to the module and documentation
2023-12-18 08:23:16 +00:00
h00die-gr3y
0641839e69
Added documentation and removed debug info
2023-12-17 13:10:18 +00:00
h00die-gr3y
db099f8f4c
Third release of module
2023-12-16 16:06:05 +00:00
h00die-gr3y
d00249f083
Second release with manual cleanup of php* files
2023-12-14 12:57:07 +00:00
h00die-gr3y
ff44932113
first draft release of module
2023-12-10 21:09:40 +00:00
Valentin Lobstein
1438a88eb5
Update modules/exploits/linux/http/vinchin_backup_recovery_cmd_inject.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2023-11-28 08:10:56 +01:00
Valentin Lobstein
c60da4ad58
Update modules/exploits/linux/http/vinchin_backup_recovery_cmd_inject.rb
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2023-11-23 17:33:19 +01:00
Valentin Lobstein
d20a1703b1
Update modules/exploits/linux/http/vinchin_backup_recovery_cmd_inject.rb
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2023-11-23 17:32:57 +01:00