Commit Graph

36413 Commits

Author SHA1 Message Date
redwaysecurity.com d89df446bf WIP - added module for CVE-2024-34102
on-behalf-of: @redwaysecurity info@redwaysecurity.com
2024-07-04 16:24:39 +02:00
adfoster-r7 90ef017cfb Land #19289, Update apache_nifi_credentials algo regex 2024-06-28 15:59:24 +01:00
h00die eb0933fc9a Update apache_nifi_credentials algo regex 2024-06-28 10:36:35 -04:00
adeherdt-r7 52142f280f MS-9454 Redis Scanner: Support versions
Updating the Redis Login Scanner to properly support all versions of Redis and their implementations to handle the `AUTH` command.
2024-06-28 15:25:49 +02:00
Spencer McIntyre a5afdd6e04 Land #19205, Add MS-NRPC users enumeration module 2024-06-24 18:52:47 -04:00
Spencer McIntyre 858a2f8400 Fix rubocop issues 2024-06-24 18:21:49 -04:00
Spencer McIntyre dc2adc0798 Land #19259, warn on weak meterpreter keys
Fixing meterpreter to support is_weak_key byte flag from mettle
2024-06-24 08:58:40 -04:00
Christophe De La Fuente 24fa34e7b9 Land #19188, Netis MW5360 unauthenticated RCE [CVE-2024-22729] 2024-06-24 13:40:51 +02:00
dledda-r7 09debbb93f fix: fixed rubocop issue 2024-06-24 05:33:30 -04:00
dledda-r7 2de112891c fix: fixed payload cached size 2024-06-24 05:21:07 -04:00
adfoster-r7 2e51b37f1c Land #19267, Escape LDAP query string filters 2024-06-20 10:42:19 +01:00
Jack Heysel bae70a4b98 Land #19255, Add SolarWinds Serv-U aux module
This module exploits an unauthenticated file read vulnerability, due to
directory traversal, affecting SolarWinds Serv-U FTP Server 15.4, Serv-U
Gateway 15.4, and Serv-U MFT Server 15.4. All versions prior to the
vendor supplied hotfix "15.4.2 Hotfix 2" (version 15.4.2.157) are
affected.
2024-06-19 10:54:45 -07:00
jheysel-r7 06c0c7392f Rubocop add space after comma 2024-06-19 13:20:52 -04:00
jheysel-r7 fd9c74766d Update Windows TARGETFILE matching 2024-06-19 13:15:35 -04:00
Spencer McIntyre a6fd6defcb Escape LDAP query strings 2024-06-18 17:47:56 -04:00
Spencer McIntyre 08575d0895 Land #19176, Add missing Arch parameter
Adding Arch parameter to dnn_cookie_deserialization_rce module
2024-06-18 17:07:08 -04:00
Spencer McIntyre 0110ed2b2a Land #19253, Corrected a mistaken CVE
Corrected a mistaken CVE-ID in exploit references.
2024-06-18 15:52:55 -04:00
Jack Heysel c1826cd2f3 Land #18829, Allow multiple HttpServers in module
Adding multiple HttpServer services in a module is sometimes complex
since they share the same methods. This usually this causes issues where
on_request_uri needs to be overridden to handle requests coming from
each service. This updates the cmdstager and the Java HTTP ClassLoader
mixins, since these are commonly used in the same module. This also
updates the manageengine_servicedesk_plus_saml_rce_cve_2022_47966 module
to make use of these new changes
2024-06-18 09:51:38 -07:00
sud0Ru 5ec4f25e95 Class variable changed back to an instance variable 2024-06-18 17:57:54 +03:00
sud0Ru 03a1aee487 Delete old module 2024-06-18 17:53:32 +03:00
Spencer McIntyre 29307b1321 Appease msftidy 2024-06-18 09:23:41 -04:00
Jack Heysel dc70aa0896 Land #19247, PHP CGI Arg injection RCE
XAMPP installs running on Windows system configured to use Japanese or
Chinese (simplified or traditional) locales are vulnerable to a PHP CGI
argument injection vulnerability. This exploit module returns a session
running in the context of the Administrator user
2024-06-17 11:27:38 -07:00
Spencer McIntyre 818d67b3ee Land #19249, Apache OFBiz Directory Traversal RCE
Apache OFBiz Directory Traversal RCE [CVE-2024-32113]
2024-06-17 11:22:44 -04:00
dwelch-r7 17a6d443b5 Land #19260, Update windows acceptance tests 2024-06-17 10:19:25 +01:00
Jack Heysel e14dd93d6f Rebased encoder fix, removed PS paylaod dependency 2024-06-14 16:59:55 -07:00
Jack Heysel ade11a5a4b Added default options fixed Verification Steps 2024-06-14 16:41:12 -07:00
Jack Heysel 1dfd5da51e Apache OFBiz Dir Traversal RCE 2024-06-14 16:41:12 -07:00
Jack Heysel 90bb6b9b01 Land #19261, Fix powershell_base64 encoder
The powershell_base64 encoder was changed to use the Windows start
command, which broke some payload after they were encoded. This was
because when using start, the argument can not be a string of commands
joined by & which is required by the fetch payloads. This fixes that
issue by removing the start command from the encoder
2024-06-14 15:41:22 -07:00
Jack Heysel 178bb3e085 Land #19229, Junos OS PHPRC module enhancement
The junos_phprc_auto_prepend_file module used to depend on having a user
authenticated to the J-Web application to steal the necessary session
tokens in order to exploit. With this enhancement the module will now
create a session if one doesnt exist. Also it adds datastore options to
change the hash format to be compatible with older version as well an
option to attempt to set ssh root login to true before attempting to
establish a root ssh session
2024-06-14 11:35:15 -07:00
Christophe De La Fuente 8fc6e20cec Update other modules to use java_class_loader_start_service and cmdstager_start_service 2024-06-14 12:57:42 +02:00
softScheck d68a57f649 junos_ssh_jail: replaced asdf with alphanumeric random string 2024-06-14 10:45:19 +02:00
softScheck 0a34168906 junos_ssh_jail: revert to old get_csrf_token method with securephpsessid added 2024-06-14 10:38:24 +02:00
Spencer McIntyre 111d329609 Fix the powershell_base64 encoder 2024-06-13 15:46:02 -04:00
Jack Heysel 35d161be91 Land #19221, CheckPoint Security Gateway file read
This module leverages an unauthenticated arbitrary root file read
vulnerability for Check Point Security Gateway appliances. When the
IPSec VPN or Mobile Access blades are enabled on affected devices,
traversal payloads can be used to read any files on the local file
system. This vulnerability is tracked as CVE-2024-24919.
2024-06-13 11:03:58 -07:00
adfoster-r7 30c9ea2064 Update windows acceptance tests 2024-06-13 18:05:30 +01:00
Christophe De La Fuente 70b21ff3f2 Update manageengine_servicedesk_plus_saml_rce_cve_2022_47966 module 2024-06-13 16:53:07 +02:00
Stephen Fewer b98e0b8cfc STORE_LOOT is OptBool, so will be either true or false, we can remove equality check here.
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 15:13:53 +01:00
Stephen Fewer fb44c7e6ff fix typo in module description
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 15:10:14 +01:00
remmons-r7 297cbb2e8e Single quotes to double quotes for string interpolation
Secondary commit from peer review suggestion.
2024-06-13 08:14:35 -05:00
remmons-r7 dc028fdb1e Enable SSL by default
From peer review suggestion.

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-06-13 08:07:18 -05:00
remmons-r7 eb51d7be45 Change Failure::Unknown to Failure::UnexpectedReply
From peer review suggestion.

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 08:06:25 -05:00
sfewer-r7 7e37ca5d1a add in link to AKB analysis 2024-06-13 10:22:33 +01:00
Jack Heysel b9b638dd83 Land #19196, Cacti import package RCE
This exploit module leverages an arbitrary file write vulnerability
(CVE-2024-25641) in Cacti versions prior to 1.2.27 to achieve RCE. It
abuses the Import Packages feature to upload a specially crafted package
that embeds a PHP file.
2024-06-12 15:43:46 -07:00
bwatters c768b1e1d4 Land #19243, Add exploit for CVE-2024-1800 (Telerik Report Deserialization RCE)
Merge branch 'land-19243' into upstream-master
2024-06-12 15:59:07 -05:00
h00die-gr3y 4e26704d73 Update addressing cdelafuente-r7 comments 2024-06-12 18:57:29 +00:00
Christophe De La Fuente 45815a4cb5 Code review 2024-06-12 19:47:02 +02:00
sfewer-r7 835ff4453a store loot as application/octet-stream if its not ASCII 2024-06-12 17:50:27 +01:00
Zach Goldman f67526e248 Land #19223, wp_ajax_load_more_file_upload.rb : Updated original author 2024-06-12 11:51:03 -04:00
sfewer-r7 043d3231a6 add the serv-u aux module 2024-06-12 16:25:09 +01:00
Spencer McIntyre 18fe758416 Finish up and document the deserialization RCE 2024-06-12 08:58:37 -04:00