Chocapikk
|
40002f87f4
|
Apply suggestion to store created WordPress admin creds
|
2025-05-11 17:53:06 +02:00 |
|
Valentin Lobstein
|
604672433a
|
Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2025-05-11 17:19:12 +02:00 |
|
Valentin Lobstein
|
ca6e413bea
|
Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2025-05-11 17:18:51 +02:00 |
|
Valentin Lobstein
|
04915c8c95
|
Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2025-05-11 17:18:37 +02:00 |
|
Valentin Lobstein
|
5c8013ad92
|
Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2025-05-11 17:18:29 +02:00 |
|
Chocapikk
|
21a9fa848c
|
Add credits
|
2025-05-07 23:59:06 +02:00 |
|
Chocapikk
|
879027bd5a
|
Update
|
2025-05-07 23:50:20 +02:00 |
|
Valentin Lobstein
|
2e9d7db238
|
Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2025-05-07 23:34:58 +02:00 |
|
Valentin Lobstein
|
23809f0d08
|
Update modules/exploits/multi/http/wp_suretriggers_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2025-05-07 23:34:51 +02:00 |
|
Chocapikk
|
4d0c7bb71a
|
Add WP SureTriggers ≤1.0.78 admin-creation & RCE module (CVE-2025-3102)
|
2025-05-07 17:45:30 +02:00 |
|
Martin Sutovsky
|
1f650b0432
|
Adding SRVHOST check
|
2025-04-30 17:58:15 +02:00 |
|
Martin Sutovsky
|
f2e0fe79be
|
Responding to comments
|
2025-04-30 17:53:26 +02:00 |
|
Martin Sutovsky
|
b117843c00
|
Addressing comments
|
2025-04-25 20:17:46 +02:00 |
|
Martin Sutovsky
|
622abe78f8
|
Adding cleanup option:
|
2025-04-25 15:53:47 +02:00 |
|
Martin Sutovsky
|
8fe0003bbe
|
Adding cleanup
|
2025-04-25 15:51:53 +02:00 |
|
Martin Sutovsky
|
77d0fe5ae0
|
Fixing calling payload
|
2025-04-25 15:49:24 +02:00 |
|
Martin Sutovsky
|
665065e4df
|
Module init
|
2025-04-25 14:35:24 +02:00 |
|
msutovsky-r7
|
bdac31037a
|
Land #20028, pgAdmin modules refactor
Refactor pgAdmin modules to use new lib
|
2025-04-21 16:03:35 +02:00 |
|
msutovsky-r7
|
140b93e802
|
Land #20022, Langflow RCE module
Add Langflow unauth RCE module (CVE-2025-3248)
|
2025-04-14 08:24:44 +02:00 |
|
Takah1ro
|
1f6d5f36d2
|
Rubocop formatting and update check
|
2025-04-12 09:33:54 +09:00 |
|
Takahiro Yokoyama
|
4b588e130e
|
Update modules/exploits/multi/http/langflow_unauth_rce_cve_2025_3248.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2025-04-12 09:16:55 +09:00 |
|
Jack Heysel
|
4c5e0203dd
|
Refactor pgAdmin modules to use new lib
|
2025-04-11 15:55:46 -07:00 |
|
Takah1ro
|
f67dfe6a62
|
Update check
|
2025-04-11 21:51:45 +09:00 |
|
msutovsky-r7
|
0b4e133001
|
Land #20018, pgAdmin Authenticated RCE (CVE-2025-2945)
pgAdmin Query Tool Authenticated RCE (CVE-2025-2945)
|
2025-04-11 10:34:02 +02:00 |
|
Takah1ro
|
718a0bc5c7
|
Change directory from linux to multi
|
2025-04-11 14:45:10 +09:00 |
|
Jack Heysel
|
4cec129e1c
|
Responded to comments
|
2025-04-10 10:53:05 -07:00 |
|
Jack Heysel
|
ddb29d6181
|
Removed unnecessary method
|
2025-04-10 07:18:42 -07:00 |
|
Jack Heysel
|
290a35b0f6
|
pgAdmin Query Tool Authenticated RCE (CVE-2025-2945)
|
2025-04-09 17:32:10 -07:00 |
|
Brendan
|
4da78bd550
|
Merge pull request #19994 from sfewer-r7/CVE-2021-35587
Adds exploit module for CVE-2021-35587, an unauthenticated deserialization vulnerability affecting Oracle Access Manager (OAM).
|
2025-04-08 08:59:18 -05:00 |
|
jheysel-r7
|
d16eeab32c
|
Merge pull request #19995 from chutton-r7/cve-2025-24813
Module for CVE-2025-24813
|
2025-04-02 14:20:52 -07:00 |
|
Jack Heysel
|
b85faf9440
|
Update documentation
|
2025-04-02 14:10:46 -07:00 |
|
Jack Heysel
|
3fa7fe68a1
|
Consolidated Platform check
|
2025-04-02 13:57:56 -07:00 |
|
Jack Heysel
|
c32a34112f
|
Updated register_file_for_clean to account for windows
|
2025-04-02 13:52:04 -07:00 |
|
Jack Heysel
|
6816589378
|
Added FileDropper for cleanup
|
2025-04-02 13:37:39 -07:00 |
|
Jack Heysel
|
4058173a1c
|
Correct spelling
|
2025-04-02 12:57:20 -07:00 |
|
sfewer-r7
|
59b0860ea1
|
add in Peterjson as the co-finder with Jang
|
2025-04-02 20:50:57 +01:00 |
|
Jack Heysel
|
8cd0449550
|
Responded to comments
|
2025-04-02 12:50:26 -07:00 |
|
sfewer-r7
|
998d0a78c2
|
based on the OAM version, pick the prebuilt gadget chain for that version (to account for the serialVersionUID changes)
|
2025-04-02 15:31:37 +01:00 |
|
sfewer-r7
|
f6bcf19b91
|
add a helper get_version and use it in the check
|
2025-04-02 15:30:32 +01:00 |
|
sfewer-r7
|
3f46bfe0ad
|
add in a seperate Unix target, as OAM can run on other things like HP-UX, IBM AIX, and Solaris
|
2025-04-02 15:29:29 +01:00 |
|
chutton-r7
|
63a86109f6
|
Better error handling, set default Python Meterpreter (seems most reliable). Fix switch
|
2025-04-02 10:04:33 +01:00 |
|
chutton-r7
|
e1310f4f89
|
Simplify logic
|
2025-04-01 15:50:23 +01:00 |
|
chutton-r7
|
b77489587a
|
Remove CmdStager, add version tested, credit
|
2025-04-01 15:15:30 +01:00 |
|
chutton-r7
|
c34c627e18
|
Support Linux, clean DefaultOptions
|
2025-04-01 15:05:56 +01:00 |
|
sfewer-r7
|
acafd884b5
|
add in the initial exploit for CVE-2021-35587, only tested on 12.2.1.4.0 so far.
|
2025-04-01 12:56:38 +01:00 |
|
tastyrce
|
43c929d56e
|
Update checking for authentication
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
|
2025-03-27 22:13:04 +11:00 |
|
tastyrce
|
10ea4f7f9f
|
use keep_cookies to store cookies
|
2025-03-27 03:22:11 -04:00 |
|
tastyrce
|
e62038cfe5
|
improve version parsing
|
2025-03-27 02:01:03 -04:00 |
|
tastyrce
|
cbfcc5bd13
|
add condition for http code
|
2025-03-27 00:40:13 -04:00 |
|
tastyrce
|
f1175420f8
|
remove get and post wrappers
|
2025-03-27 00:37:40 -04:00 |
|