Commit Graph

14849 Commits

Author SHA1 Message Date
cgranleese-r7 96c62aea20 Lands #14411 Fixes eternalblue-win8 to run only with python3 2020-12-05 14:22:32 +00:00
A Galway c83c21bcea additional string to byte conversions 2020-12-03 16:21:55 +00:00
Spencer McIntyre a322647913 Change the cookie to PHPSESSID from my_id for the Simple PHP blog exploit 2020-12-02 10:09:05 -05:00
justinopatrny c200a274b2 Corrected headers check for retrieved cookie
Previous get_cookies method not working properly
2020-11-29 19:07:44 -06:00
Tim W 6de55b3d79 Land #14433, fix typo in exploits/windows/local/bypassuac_comhijack.rb 2020-11-26 20:13:42 +00:00
Tim W 87eba681e0 Land #14365, Update TP-Link AC1750 Pwn2Own 2019 module 2020-11-26 19:55:00 +00:00
Pedro Ribeiro a99ce581dd Update TP-Link AC1750 Pwn2Own 2019 module 2020-11-26 12:56:02 +00:00
Graeme Robinson f6f78d4710 Make changes suggested in code review 2020-11-26 13:46:02 +01:00
Graeme Robinson 7fa10a0684 Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:02 +01:00
Graeme Robinson 5dc7e8f04e Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:02 +01:00
Graeme Robinson 78c042cbb7 Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson 7894f1eb9a Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson fcde932e1b Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson 2a9898df25 Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson 9a35a5fdee Remove frozen_string_literal directive
Remove directive that was added by `rubocop -A`, as suggested in review.

Note that this results in an additional offense being reported by rubocop
2020-11-26 13:46:01 +01:00
Graeme Robinson e33a2ca463 Use cleanup method to perform cleanup 2020-11-26 13:46:01 +01:00
Graeme Robinson f6d39147af Removed pointless comment. 2020-11-26 13:46:01 +01:00
Graeme Robinson 2de77b6e8a Refactored code. Primarily line length increased. 2020-11-26 13:46:01 +01:00
Graeme Robinson 012b040fc1 Reformat code layout to satisfy msftidy 2020-11-26 13:46:01 +01:00
Graeme Robinson 41ff86178b Add new module exploit module
Add new module /exploits/multi/http/apache_nifi_processor_rce.rb
2020-11-26 13:46:01 +01:00
Jan Bucher 6d6c71bc2a Fix another typo in the bypassuac_comhijack module 2020-11-26 13:14:36 +01:00
Jan Bucher 9757c68f9b Fix typo in modules/exploits/windows/local/bypassuac module
Correct small typo in the output to the msfconsole.
2020-11-26 12:55:29 +01:00
Grant Willcox 63a98adff0 Land #14427, phpstudy_backdoor_rce.rb TARGETURI handling and default value modifications 2020-11-25 10:32:53 -06:00
Grant Willcox ca28f59ac4 Update the description of the TARGETURI option to reflect the recent changes 2020-11-25 10:32:17 -06:00
Spencer McIntyre 95665e916c Land #14416, wordpress plugin 'simple file list' rce 2020-11-25 09:58:26 -05:00
Spencer McIntyre 94c157bc95 Tweak the documentation and module output just a little for clarity 2020-11-25 09:58:07 -05:00
cgranleese-r7 31426576e0 Land #14264, Add exploit/multi/http/kong_gateway_admin_api_rce 2020-11-25 11:09:02 +00:00
Grant Willcox efdc7f062e Land #14241, OpenMediaVault 5.5.11 Authenticated Remote Code Execution 2020-11-24 13:42:53 -06:00
Grant Willcox e0a8aff72b Ninja edit in fix to remove support for IN_MEMORY Unix payloads since most of them don't work correctly or return multiple shells if they do work. Will potentially add this in with another PR once fixes are made to make it more reliable 2020-11-24 13:41:57 -06:00
Natto c8fc5b52cf TARGETURI Default value modification
TARGETURI Default value modification
2020-11-24 14:05:49 +08:00
Graeme Robinson 8e299de712 Update modules/exploits/multi/http/kong_gateway_admin_api_rce.rb
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2020-11-22 14:49:51 +00:00
h00die a988e85d90 remove not needed code 2020-11-22 09:07:11 -05:00
h00die 92c92f1573 simple file list rce 2020-11-21 08:51:07 -05:00
Spencer McIntyre 1031b12c57 Land #14206, Rockwell FactoryTalk CVE-2020-12027 RCE 2020-11-20 08:49:39 -05:00
A Galway 5e4e52c619 convert strings to bytes and mandate python3 2020-11-20 12:57:36 +00:00
Spencer McIntyre a5024238d3 Tweak the check method to return detected and fix a typo 2020-11-19 09:24:27 -05:00
adfoster-r7 2eb2fad212 Land #14294, Allow adding details to CheckCodes, and update ms17_010_eternalblue to validate the target is x64 2020-11-19 14:09:55 +00:00
Pedro Ribeiro b56d2e00fe Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:59 +07:00
Pedro Ribeiro c635538e9d Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:47 +07:00
Pedro Ribeiro 4c8adcfd46 Update rockwell_factorytalk_rce.rb 2020-11-19 17:56:31 +07:00
William Vu d3f16c7061 Land #14361, COOKIE for sharepoint_ssi_viewstate 2020-11-18 15:55:19 -06:00
William Vu 72a6993408 Add patch bypass (CVE-2020-14750) to references
We were already using it... but now there's a CVE.
2020-11-18 10:57:05 -06:00
William Vu 78999bb92c Add an exploit from Exploit-DB
Written by either (Nguyen) Jang or Mohammed Althibyani. Not used by the
module.

https://www.exploit-db.com/exploits/48971
2020-11-18 10:56:03 -06:00
William Vu 83beae731f Add WebLogic Administration Console Handle RCE
CVE-2020-14882
CVE-2020-14883
2020-11-18 10:56:02 -06:00
William Vu f73a88a39c Land #14396, hadoop_unauth_exec clarification 2020-11-16 12:44:13 -06:00
Tod Beardsley 06a0634828 Describe the Hadoop vuln as not-a-vuln clearly 2020-11-16 11:31:59 -06:00
A Galway 0328e3f815 Land #14359, gives preference to default target options 2020-11-13 14:44:13 +00:00
Christophe De La Fuente d6b412c58e Land #14340, Add HorizontCMS 1.0.0-beta exploit module and documentation 2020-11-13 13:03:04 +01:00
Alan Foster 79a3328cd3 Validate that AutoCheck is prepended 2020-11-11 22:15:40 +00:00
William Vu fcb507e412 Fix AutoCheck
I'm a big dummy.
2020-11-11 15:57:38 -06:00