msutovsky-r7
b6f37bef11
Land #20976 , adds module for StoryChief WP plugin (CVE-2025-7441)
...
Add StoryChief WordPress 1.0.42 unauthenticated RCE module (CVE-2025-7441)
2026-02-19 10:06:25 +01:00
Nayeraneru
9c7347d6b5
Trriged failed_with and Removed unnecessary line
2026-02-18 02:20:36 +02:00
Nayera
faca50288d
Enhance CheckCode::Safe message for clarity
...
Update CheckCode::Safe to include a detailed message.
2026-02-18 00:14:18 +02:00
Nayeraneru
8ee79fa524
Add StoryChief WordPress 1.0.42 unauthenticated RCE module
2026-02-16 00:44:20 +02:00
LucasCsmt
bbfe139e7f
Merge branch 'master' into multi/http/churchcrm_unauth_rce
2026-02-13 15:01:52 +01:00
LucasCsmt
b1758de52b
Adding version control on the check method
2026-02-13 14:42:07 +01:00
LucasCsmt
d90b3fdc89
Resolving compatibility issues
...
In the last version of ChurchCRM (6.8.0), in order to be correct, the
url in the post request needed to end with a '/'. This issues is now
fixed and the exploit work again on the 6.8.0 version.
2026-02-13 14:36:52 +01:00
LucasCsmt
efcd0411e4
Adding a code to the check method
2026-02-13 14:04:40 +01:00
LucasCsmt
fe302d30e1
Refactoring the code
2026-02-13 13:43:00 +01:00
LucasCsmt
dcf4221cff
Adding support for fetch payload
2026-02-13 13:23:40 +01:00
Diego Ledda
a4ec3cd40d
Merge pull request #20917 from sfewer-r7/solarwinds-webhelpdesk-rce
...
Add exploit module for SolarWinds Web Help Desk (CVE-2025-40536 + CVE-2025-40551)
2026-02-13 06:51:42 -05:00
LucasCsmt
3e98c7a045
Changing code according to Rubocop
2026-02-13 11:35:11 +01:00
LucasCsmt
06eba2245e
Creating a check method
2026-02-13 11:34:46 +01:00
LucasCsmt
867624cad3
Removing default option
...
The default option has been remove in favor of metasploit's default
selection.
2026-02-13 10:42:42 +01:00
LucasCsmt
dc2e73b44a
Adding a failwith if the injection fail
2026-02-13 09:57:39 +01:00
LucasCsmt
aacbd1d180
Changing PHP injection logic
...
The PHP payload is injected directly into the PHP code injection. The
cleanup method has been remove in favor of a InitialAutoRunScript that
clear the config file.
2026-02-13 09:52:48 +01:00
LucasCsmt
78f4b8f97d
Merge branch 'master' into multi/http/churchcrm_unauth_rce
2026-02-13 08:50:23 +01:00
Spencer McIntyre
35b52df28a
Merge pull request #20849 from haicenhacks/haicen_xerte
...
Add three modules for exploiting Xerte Online Toolkits
2026-02-12 15:01:42 -05:00
haicen
803e6d3991
adds auto-check and fixes print statements
2026-02-12 12:58:01 -05:00
haicen
0af126cba9
adds ability to create a project if none exist.
2026-02-12 12:50:00 -05:00
haicen
930bb4fecd
fixes error in .htaccess policy generation
2026-02-12 12:43:16 -05:00
haicen
b4f26d0329
conform to uri normalization pattern
2026-02-12 12:42:33 -05:00
haicen
f25fab7c40
fixes error in .htaccess policy generation
2026-02-12 12:41:28 -05:00
haicen
66aad682d6
changes the .htaccess payload to use heredoc
2026-02-11 18:30:20 -05:00
haicen
208dc3489c
fixes linting errors
2026-02-11 17:55:21 -05:00
Brendan
2c7b7e8b5c
Merge pull request #20942 from rudraditya21/attack-exploit-privesc
...
Add MITRE ATT&CK mappings for exploit and privilege escalation modules
2026-02-11 15:38:59 -06:00
LucasCsmt
838d047b66
Fix the GHSA notation
2026-02-11 11:27:24 +01:00
LucasCsmt
af3ce4a0f5
Changing placeholders to random text inside request
...
The 'alter_config' function has been altered in order to use random text
as placeholder to fake information in the configuration. The GHSA is
fixed too.
2026-02-11 11:26:59 +01:00
Lucas Coussement
7c9f18bbab
Shorten the if condition's format
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2026-02-11 10:48:54 +01:00
Lucas Coussement
fc9d2b2fce
adding CONFIG_CHANGES to side effect
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2026-02-11 10:47:49 +01:00
LucasCsmt
37fe98c7bd
Merge branch 'master' into multi/http/churchcrm_unauth_rce
2026-02-10 16:34:08 +01:00
haicen
68e17f2b13
Normalizes URI construction
2026-02-09 20:56:08 -05:00
haicen
a1b02d1139
adds newlines between functions
2026-02-09 20:53:36 -05:00
haicen
3ee7bd435b
changes URI construction to comply with standards
2026-02-09 20:45:10 -05:00
haicen
e28afb7e12
renames files to conform to standards
2026-02-09 20:30:33 -05:00
haicen
d8fd09b156
adds newline between functions
2026-02-09 20:30:29 -05:00
haicen
98d8e35d85
adds checks to address nil condition on variables
2026-02-09 20:30:25 -05:00
haicen
f852aac863
Changes url structure to conform to requested changes
2026-02-09 20:30:18 -05:00
haicen
60b0209914
Improves module vulnerability check
2026-02-09 20:29:50 -05:00
Rudraditya Thakur
8d6f775ebe
added: ATT&CK references to exploit and privilege escalation modules
2026-02-09 23:03:01 +05:30
Valentin Lobstein
f41eda1128
Add GHSA and OSV reference type support
...
Add support for GHSA (GitHub Security Advisories) and OSV (Open Source
Vulnerabilities) as structured reference types in Metasploit modules.
Convert 49 hardcoded GHSA URLs to structured ['GHSA', 'GHSA-xxxx'] format
across existing modules, and add support for repository-specific GHSA
references with an optional third parameter ['GHSA', 'GHSA-xxxx', 'repo'].
Update reference validation, module validator, and info_fixups to handle
the new reference types correctly.
2026-02-09 15:17:23 +01:00
sfewer-r7
5accca7907
Lower the ranking to GreatRanking and stability is CRASH_SERVICE_RESTARTS due to how the 12.8.* target on Windows works.
2026-02-05 21:38:27 +00:00
sfewer-r7
58dd29107f
remove SMB_SRVPORT as an option. It must allways be 445 so the user cannot change it. We print a message to inform the user this port is intended to be in use so that the SMB server is not compleatly opaque.
2026-02-05 17:21:31 +00:00
sfewer-r7
5338a8e4b9
this is the prefered way to test for a non routable IP
2026-02-05 17:20:04 +00:00
sfewer-r7
2a39aa5124
fix typo in SRVPORT
2026-02-05 16:28:31 +00:00
LucasCsmt
9cb6ddb7c1
Mentioning the version in the title
...
Title has been changed in order to mention the version where the exploit
work.
2026-02-05 15:46:38 +01:00
LucasCsmt
eb5507844b
Testing the module on different version
...
The module have been tested on different version of ChurchCRM (6.8.0 and
6.2.0) prooving it's vulnerability to this exploit. This commit contains
modification of the dockerfile/docker-compose in order to support
multi-version installation.
2026-02-05 12:36:26 +01:00
sfewer-r7
c7e18ee5d6
block untill we get a session, so we dont tear down the SMB/LDAP service prematurly.
2026-02-04 20:35:57 +00:00
sfewer-r7
7d926efa95
Ships as a Java application running in a x64 java.exe process
2026-02-04 20:35:40 +00:00
sfewer-r7
153a65fbb6
rework the targets/paylaods. We now support 12.8.* on windows and 12.7.* on linux and windows. 12.8.* on linux might work but depends on the underlying cron daemon
2026-02-04 20:14:44 +00:00