Jeffrey Martin
731b3d5ffe
OptRegExp default value as string representation
...
OptRegExp default should be string to utilize in a Regex.
This allows for the object to serialize in metadata and via
rpc bridge when transimiteed using msgpack.
2021-09-17 16:34:46 -05:00
space-r7
12af64c4d8
Land #15604 , add buffer overflow G-Cam module
2021-09-16 13:02:57 -05:00
Your Name
a2f83c22ba
Add Pattern Create
2021-09-16 08:22:57 +01:00
Spencer McIntyre
480dec9a1e
Land #15658 , Add module for CVE-2021-32682
2021-09-14 14:09:27 -04:00
space-r7
278807be98
check contents of json after attempted upload
2021-09-14 11:36:28 -05:00
adfoster-r7
1499b1988e
Land #15609 , Add Meterpreter compatibility commands
2021-09-13 15:21:03 +01:00
adfoster-r7
46718e3390
Run Rubocop layout rules on modules
2021-09-10 12:53:39 +01:00
space-r7
91ae50eb27
escapeshellcmd -> escapeshellarg
2021-09-09 17:28:05 -05:00
space-r7
0095613a94
add completed module and documentation
2021-09-09 16:58:40 -05:00
adfoster-r7
059e39a6f0
Specify meterpreter compatibility command requirements
2021-09-08 22:59:25 +01:00
William Vu
8c4e5d262c
Add Atlassian Confluence CVE-2021-26084 exploit
2021-09-08 06:57:31 -05:00
space-r7
80dc8b9502
add elfinder module
2021-09-03 18:26:18 -05:00
Your Name
41690d6e1d
Linting again
2021-09-02 17:33:57 +01:00
Your Name
f336f7a4d6
Removed global vars & Fixed linting
2021-09-02 17:30:18 +01:00
Grant Willcox
0e0e3bbcfb
Land #15603 , Add Geutebruck CVE_2021_335XX command injection module
2021-09-01 10:59:22 -05:00
adfoster-r7
ded8200396
Land #15537 , Add support for ruby 3
2021-09-01 10:30:54 +01:00
bwatters
ff50a94348
Land #15567 , Add in Exploit for CVE-2021-3490
...
Merge branch 'land-15567' into upstream-master
2021-08-31 18:46:25 -05:00
Grant Willcox
d83ede6306
Fix up some check method issues and some XML data validation issues identified during review
2021-08-31 18:25:01 -05:00
Your Name
5599929b6a
Fixed Randomization
2021-08-31 18:25:00 -05:00
Grant Willcox
0a57641aa4
Add in documentation and module code cleanness improvements and also make the output easier for readers to understand should something fail midway through.
2021-08-31 18:24:57 -05:00
Your Name
cd74e34e3c
Fixed Authors
2021-08-31 18:24:51 -05:00
Your Name
b5b0b3087a
Fixed References and Description
2021-08-31 18:24:50 -05:00
Your Name
56cde3eaba
Add Geutebruck CVE_2021_335XX command injections module
2021-08-31 18:24:14 -05:00
Grant Willcox
488f58a068
Attempt to fix RuboCop errors
2021-08-31 15:36:00 -05:00
Grant Willcox
3bca3b0bcb
Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match
2021-08-31 15:07:37 -05:00
Your Name
690af9f956
Fixed CVE Number
2021-08-30 08:18:19 +01:00
Your Name
70f3f9d731
Fixed CVE Number
2021-08-28 11:33:42 +01:00
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
Your Name
8d28dece69
Added Notes
2021-08-27 16:42:54 +01:00
Your Name
6a501a37ff
Add CVE-2021-33549 exploit for Geutebruck G-CAM
2021-08-27 01:28:26 +01:00
Grant Willcox
6f9b06fb4b
Add in Manfred Paul's original blog post and chompie1337's original PoC to the list of links. Also add in a relatively detailed description of how to add in new targets to this exploit to the documentation in case that helps anyone down the line
2021-08-25 18:09:07 -05:00
Grant Willcox
29a230ec72
Improve error handling for module
2021-08-24 17:36:37 -05:00
Grant Willcox
bd490d35ed
Add support for Linux 5.11.x on Fedora
2021-08-23 15:09:10 -05:00
Grant Willcox
db5ac81ecf
Fix up mistakes bcoles pointed out and also add in a check to ensure we are only targetting x64 systems
2021-08-23 13:23:40 -05:00
Grant Willcox
e46611cffb
Add in support for exploiting Fedora 32 with Linux kernel 5.10.12
2021-08-20 18:04:59 -05:00
Grant Willcox
75ae2b76f5
Add support for Fedora 32 Linux Kernel 5.9.8-100 and also fix an error where the wrong file was being used for Fedora 32 Linux Kernel 5.8.8.
2021-08-20 16:50:20 -05:00
Grant Willcox
5abf407228
Add support for Fedora 32 with Linux Kernel 5.8.8-200
2021-08-20 15:42:34 -05:00
Grant Willcox
dd806a9d61
Add in support for Fedora 32 running kernel 5.7.11-200
2021-08-20 13:37:52 -05:00
sjanusz
8e00c5a188
Add default payload option to targets
2021-08-20 16:38:22 +01:00
Grant Willcox
b479cb61a4
Add in scenario for Ubuntu 20.04.02 LTS and show that its still working as expected
2021-08-19 15:05:03 -05:00
Grant Willcox
945004ed97
Fix up typo that was breaking the code and also fix RuboCop errors
2021-08-19 14:12:03 -05:00
Grant Willcox
b60ad3ee26
Fix up mistakes I noticed whilst doing edits on the code as well as some mistakes identified during peer review
2021-08-19 13:55:54 -05:00
Grant Willcox
d5df47692c
Add in first copy of the exploit along with the supporting source code and binaries. Documentation to come
2021-08-17 18:01:14 -05:00
William Vu
521ca14773
Add Lucee Administrator CVE-2021-21307 exploit
2021-08-16 10:09:34 -05:00
Alan Foster
03400991af
Update uses of open ssl
2021-08-10 15:40:23 +01:00
Jack Heysel
29b193406e
Fix for file clean up in the Cisco Hyperflex file upload RCE module
2021-07-30 14:59:52 -04:00
adfoster-r7
951809e164
Land #15491 , add module stability notes
2021-07-29 17:24:42 +01:00
space-r7
809081bc5f
Land #15279 , add Pi-Hole lpe
2021-07-29 11:15:17 -05:00
space-r7
0561ae978f
fix typos, pihole version in docs
2021-07-29 11:13:58 -05:00
cgranleese-r7
56510a2e8e
Updates some notes on modules that weren't passing tests due to new rubocop rule
2021-07-28 16:20:02 +01:00