Spencer McIntyre
274b954c58
Land #16123 , fix reference URL in cisco_ucs_rce
2022-02-01 17:06:59 -05:00
Spencer McIntyre
06fb748402
Add the missing full disclosure URL reference
2022-02-01 17:06:37 -05:00
space-r7
837fdf7c5e
Land #16128 , add cisco rv unauth rce
2022-02-01 10:34:57 -06:00
Jake Baines
ccedcfefab
Added exploit for CVE-2021-1472/CVE-2021-1473
2022-01-29 18:56:53 -08:00
swapnil shinde
70d4013610
fix faulty URL ref #16078 removed faulty url
...
fix faulty URL ref #16078 , i searched for FULL_DISC tool in Cisco but i cant find anything related to this so i removed it. if that is meant by the issue.
2022-01-29 22:33:33 +05:30
Grant Willcox
44f040ad78
Land #16056 , Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722)
2022-01-24 21:03:46 -06:00
Grant Willcox
15751a0f78
Minor langauge fix and final typo
2022-01-24 21:01:34 -06:00
Jake Baines
04d06a2df1
Switched to proper fail_with calls in exploit failure
2022-01-24 04:13:43 -08:00
Jake Baines
2c989ec714
Addressed multiple review comments (spelling, doc details, randomization, etc)
2022-01-22 14:09:58 -08:00
Grant Willcox
8bb3e39fd7
Land #16036 , Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
2022-01-19 10:58:42 -06:00
Brendan Coles
ee2feb1207
Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
2022-01-19 00:04:15 +00:00
Grant Willcox
8852eaa6b8
Land #16049 - Reference Fixes
2022-01-18 13:46:25 -06:00
Jake Baines
4ebb702405
Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722)
2022-01-15 12:46:56 -08:00
Pedro Ribeiro
053fbe2a28
fix cisco advisory links
2022-01-13 18:55:39 +00:00
Pedro Ribeiro
ea00da0a03
fix NUUO advisory links
2022-01-13 18:54:56 +00:00
Jake Baines
264f2bc03f
Added the AttackerKB analysis
2022-01-11 03:17:45 -08:00
Jake Baines
b0941f746f
Added link to R7 blog
2022-01-10 13:24:33 -08:00
Jake Baines
d4ee9a0183
Initial commit of CVE-2021-20039 exploit
2022-01-10 12:43:50 -08:00
Brendan Coles
5d010fcd25
bash_profile_persistence: Add notes and resolve rubocop violations
2021-12-24 03:06:37 +00:00
bwatters
6c3a29077f
Update rm -rf string to be less fragile
2021-12-02 10:31:47 -06:00
bwatters
77812ae4c4
Update documentation for multiple binaries, add targeting data,
...
other bcoles improvements
2021-12-02 09:57:48 -06:00
bwatters
620b2d2b12
Update targeting selection and payloads, fix python cmd_exec
2021-12-02 08:03:03 -06:00
bwatters
47aacbdf32
Fix cmd_exec to be friendly with binary and python meterpreters
...
Add arch checks for payload/target
2021-12-01 16:18:49 -06:00
bwatters
a3f2d5468a
Add some quick debugging output
2021-12-01 14:54:48 -06:00
bwatters
18cc2ef516
Add support for aarch64 Ubuntu versions
2021-12-01 14:54:48 -06:00
bwatters
c6e2be2cd7
Ensure deletion of exploit and payload even if the exploit fails.
2021-12-01 14:54:48 -06:00
bwatters
b1f6937542
Updated exploit to compile on target, added control over directory creation
...
Added a method to get source code for the write and compile method
2021-12-01 14:54:47 -06:00
bwatters
eba7803e1a
Add check method
2021-12-01 14:54:47 -06:00
bwatters
bf1b3b377c
Add cve-2021-3493 module
2021-12-01 14:54:47 -06:00
Jeffrey Martin
21a6a18d92
trade URI.encode & URI.escape for Ruby 3
...
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.
Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1 ) this should equal.
2021-11-22 14:11:03 -06:00
Spencer McIntyre
d7cb7804e6
Implement some changes from PR feedback
2021-11-18 16:35:13 -05:00
Grant Willcox
a915c3ce5c
Add fixes for some of the issues raised during the review process on both the documentation and module side of things
2021-11-17 17:25:50 -06:00
Spencer McIntyre
9fa65092d1
Switch to the new Rex stopwatch function
2021-11-16 10:12:57 -05:00
Spencer McIntyre
0b3f95abca
Writeup the module docs and move the protocol code
2021-11-12 15:15:51 -05:00
Spencer McIntyre
1f1e0fc2cc
Write and use a check method
2021-11-12 14:08:19 -05:00
Spencer McIntyre
7284f14fd8
Define custom Thrift types, improve syncing
2021-11-12 10:30:48 -05:00
Spencer McIntyre
21ff65994c
Initial commit of the Storm Nimbus cmd exec
2021-11-12 10:30:15 -05:00
space-r7
1dd26bca03
Land #15802 , add OMIGOD LPE
2021-11-09 10:30:50 -06:00
Spencer McIntyre
278d940fee
Update the Python exploit code to fix a bug
2021-11-02 10:10:18 -04:00
dwelch-r7
73e55fcaee
Land #15665 , Add Meterpreter compatibility metadata
2021-10-29 12:45:26 +01:00
Spencer McIntyre
98528c8ba6
Fail over to default paths
2021-10-28 15:01:12 -04:00
Spencer McIntyre
1ca9f48266
Land #15783 , Add Sophos UTM CVE-2020-25223 exploit
2021-10-28 09:00:08 -04:00
William Vu
78ebc89106
Improve sleep timeout using science
2021-10-27 22:49:41 -05:00
William Vu
3c4bc600f7
Link to open() in perldoc
2021-10-27 19:31:03 -05:00
William Vu
c419ca04bd
Warn when LPORT isn't 443
2021-10-27 19:31:03 -05:00
William Vu
14421ed5f5
Refactor elapsed time calculation
2021-10-27 19:31:03 -05:00
William Vu
7bbf0305c0
Fix elapsed time calculation using monotonic clock
...
Hat tip @adfoster-r7.
2021-10-27 19:31:03 -05:00
William Vu
3f9b22dbb7
Add Sophos UTM CVE-2020-25223 exploit
2021-10-27 19:31:03 -05:00
Spencer McIntyre
ae56ffa934
Initial exploit for CVE-2021-38648
2021-10-27 12:05:56 -04:00
Spencer McIntyre
21c45b3733
Update module metadata
2021-10-27 11:58:53 -04:00