Commit Graph

4869 Commits

Author SHA1 Message Date
Chocapikk 40002f87f4 Apply suggestion to store created WordPress admin creds 2025-05-11 17:53:06 +02:00
Valentin Lobstein 604672433a Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2025-05-11 17:19:12 +02:00
Valentin Lobstein ca6e413bea Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2025-05-11 17:18:51 +02:00
Valentin Lobstein 04915c8c95 Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2025-05-11 17:18:37 +02:00
Valentin Lobstein 5c8013ad92 Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2025-05-11 17:18:29 +02:00
Chocapikk 21a9fa848c Add credits 2025-05-07 23:59:06 +02:00
Chocapikk 879027bd5a Update 2025-05-07 23:50:20 +02:00
Valentin Lobstein 2e9d7db238 Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-05-07 23:34:58 +02:00
Valentin Lobstein 23809f0d08 Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-05-07 23:34:51 +02:00
Chocapikk 4d0c7bb71a Add WP SureTriggers ≤1.0.78 admin-creation & RCE module (CVE-2025-3102) 2025-05-07 17:45:30 +02:00
Martin Sutovsky 1f650b0432 Adding SRVHOST check 2025-04-30 17:58:15 +02:00
Martin Sutovsky f2e0fe79be Responding to comments 2025-04-30 17:53:26 +02:00
Martin Sutovsky b117843c00 Addressing comments 2025-04-25 20:17:46 +02:00
Martin Sutovsky 622abe78f8 Adding cleanup option: 2025-04-25 15:53:47 +02:00
Martin Sutovsky 8fe0003bbe Adding cleanup 2025-04-25 15:51:53 +02:00
Martin Sutovsky 77d0fe5ae0 Fixing calling payload 2025-04-25 15:49:24 +02:00
Martin Sutovsky 665065e4df Module init 2025-04-25 14:35:24 +02:00
msutovsky-r7 bdac31037a Land #20028, pgAdmin modules refactor
Refactor pgAdmin modules to use new lib
2025-04-21 16:03:35 +02:00
msutovsky-r7 140b93e802 Land #20022, Langflow RCE module
Add Langflow unauth RCE module (CVE-2025-3248)
2025-04-14 08:24:44 +02:00
Takah1ro 1f6d5f36d2 Rubocop formatting and update check 2025-04-12 09:33:54 +09:00
Takahiro Yokoyama 4b588e130e Update modules/exploits/multi/http/langflow_unauth_rce_cve_2025_3248.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-04-12 09:16:55 +09:00
Jack Heysel 4c5e0203dd Refactor pgAdmin modules to use new lib 2025-04-11 15:55:46 -07:00
Takah1ro f67dfe6a62 Update check 2025-04-11 21:51:45 +09:00
msutovsky-r7 0b4e133001 Land #20018, pgAdmin Authenticated RCE (CVE-2025-2945)
pgAdmin Query Tool Authenticated RCE (CVE-2025-2945)
2025-04-11 10:34:02 +02:00
Takah1ro 718a0bc5c7 Change directory from linux to multi 2025-04-11 14:45:10 +09:00
Jack Heysel 4cec129e1c Responded to comments 2025-04-10 10:53:05 -07:00
Jack Heysel ddb29d6181 Removed unnecessary method 2025-04-10 07:18:42 -07:00
Jack Heysel 290a35b0f6 pgAdmin Query Tool Authenticated RCE (CVE-2025-2945) 2025-04-09 17:32:10 -07:00
Brendan 4da78bd550 Merge pull request #19994 from sfewer-r7/CVE-2021-35587
Adds exploit module for CVE-2021-35587, an unauthenticated deserialization vulnerability affecting Oracle Access Manager (OAM).
2025-04-08 08:59:18 -05:00
jheysel-r7 d16eeab32c Merge pull request #19995 from chutton-r7/cve-2025-24813
Module for CVE-2025-24813
2025-04-02 14:20:52 -07:00
Jack Heysel b85faf9440 Update documentation 2025-04-02 14:10:46 -07:00
Jack Heysel 3fa7fe68a1 Consolidated Platform check 2025-04-02 13:57:56 -07:00
Jack Heysel c32a34112f Updated register_file_for_clean to account for windows 2025-04-02 13:52:04 -07:00
Jack Heysel 6816589378 Added FileDropper for cleanup 2025-04-02 13:37:39 -07:00
Jack Heysel 4058173a1c Correct spelling 2025-04-02 12:57:20 -07:00
sfewer-r7 59b0860ea1 add in Peterjson as the co-finder with Jang 2025-04-02 20:50:57 +01:00
Jack Heysel 8cd0449550 Responded to comments 2025-04-02 12:50:26 -07:00
sfewer-r7 998d0a78c2 based on the OAM version, pick the prebuilt gadget chain for that version (to account for the serialVersionUID changes) 2025-04-02 15:31:37 +01:00
sfewer-r7 f6bcf19b91 add a helper get_version and use it in the check 2025-04-02 15:30:32 +01:00
sfewer-r7 3f46bfe0ad add in a seperate Unix target, as OAM can run on other things like HP-UX, IBM AIX, and Solaris 2025-04-02 15:29:29 +01:00
chutton-r7 63a86109f6 Better error handling, set default Python Meterpreter (seems most reliable). Fix switch 2025-04-02 10:04:33 +01:00
chutton-r7 e1310f4f89 Simplify logic 2025-04-01 15:50:23 +01:00
chutton-r7 b77489587a Remove CmdStager, add version tested, credit 2025-04-01 15:15:30 +01:00
chutton-r7 c34c627e18 Support Linux, clean DefaultOptions 2025-04-01 15:05:56 +01:00
sfewer-r7 acafd884b5 add in the initial exploit for CVE-2021-35587, only tested on 12.2.1.4.0 so far. 2025-04-01 12:56:38 +01:00
tastyrce 43c929d56e Update checking for authentication
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-03-27 22:13:04 +11:00
tastyrce 10ea4f7f9f use keep_cookies to store cookies 2025-03-27 03:22:11 -04:00
tastyrce e62038cfe5 improve version parsing 2025-03-27 02:01:03 -04:00
tastyrce cbfcc5bd13 add condition for http code 2025-03-27 00:40:13 -04:00
tastyrce f1175420f8 remove get and post wrappers 2025-03-27 00:37:40 -04:00