Grant Willcox
e4ce1c53dd
Fix reference URL link
2022-06-22 15:49:43 -05:00
dwelch-r7
3f06e237b7
Correctly format the notes sections
2022-06-10 14:01:57 +01:00
Grant Willcox
93334b56ef
Properly credit Azeria and also include blog post at her request
2022-05-11 18:43:27 -05:00
Grant Willcox
1c934b87b4
Land #16169 , Add sploit for Cisco RV340 SSL VPN - CVE-2022-20699
2022-05-11 10:15:08 -05:00
Grant Willcox
68fdb103fe
Add in final touch ups to documentation to fix a typo or two for formatting. Also update exploit ranking since this exploit doesn't retrieve version information before exploiting and is not 100% reliable so Excellent ranking isn't appropriate
2022-05-11 09:39:47 -05:00
Pedro Ribeiro
e1079a587d
remove cache flush from shellcode, dont need it
2022-03-06 23:02:02 +00:00
Pedro Ribeiro
92856e739b
Fix shellcode so that it works with "0" octets in LHOST IP
2022-02-17 23:06:53 +07:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
Pedro Ribeiro
5e738309f9
add shellcode comment
2022-02-14 02:24:59 +07:00
Pedro Ribeiro
99e2cfdab4
correct CVE number
2022-02-13 01:15:10 +07:00
Pedro Ribeiro
963a8e7b0d
add sploit for Cisco RV340 SSL VPN
2022-02-11 16:42:08 +07:00
Spencer McIntyre
d7cb7804e6
Implement some changes from PR feedback
2021-11-18 16:35:13 -05:00
Grant Willcox
a915c3ce5c
Add fixes for some of the issues raised during the review process on both the documentation and module side of things
2021-11-17 17:25:50 -06:00
Spencer McIntyre
9fa65092d1
Switch to the new Rex stopwatch function
2021-11-16 10:12:57 -05:00
Spencer McIntyre
0b3f95abca
Writeup the module docs and move the protocol code
2021-11-12 15:15:51 -05:00
Spencer McIntyre
1f1e0fc2cc
Write and use a check method
2021-11-12 14:08:19 -05:00
Spencer McIntyre
7284f14fd8
Define custom Thrift types, improve syncing
2021-11-12 10:30:48 -05:00
Spencer McIntyre
21ff65994c
Initial commit of the Storm Nimbus cmd exec
2021-11-12 10:30:15 -05:00
Spencer McIntyre
21c45b3733
Update module metadata
2021-10-27 11:58:53 -04:00
Spencer McIntyre
60b17b5c6f
Add the module docs for OMIGOD
2021-10-26 12:08:48 -04:00
Spencer McIntyre
33bacd2b20
Update references and add a check method
2021-10-26 10:35:13 -04:00
Spencer McIntyre
e9582d1ddb
Initial commit for CVE-2021-38647
2021-10-25 17:36:55 -04:00
Jeffrey Martin
731b3d5ffe
OptRegExp default value as string representation
...
OptRegExp default should be string to utilize in a Regex.
This allows for the object to serialize in metadata and via
rpc bridge when transimiteed using msgpack.
2021-09-17 16:34:46 -05:00
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
Shelby Pace
de22236902
add AutoCheck and update docs output
2021-04-30 15:38:57 -05:00
Rob V
41fe16463d
switching to CmdStager
...
- had to switch away from python payload to appease CmdStager
- removed systemd service adjustments preferring to use sleep to avoid rate limits
- updated check function to accomodate more current vulnerable version information in vendor advisory
2021-04-30 12:53:33 -04:00
Rob V
1ba22f9b0c
leveraging Udp mixin for version check
2021-04-09 15:21:38 -04:00
Rob V
3ecd97f8bc
using Rex::Version over more manual process
2021-04-09 14:39:32 -04:00
Rob V
ffcec1f3b4
adding comment header
2021-04-09 14:16:20 -04:00
robvinson
85176f4385
style change using unless instead of if not
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2021-04-09 09:17:58 -05:00
robvinson
c913762077
move privileged from false to true
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2021-04-09 09:16:49 -05:00
Rob V
748ff19ef4
attempt to please linting
2021-03-25 16:11:43 -04:00
Rob V
63ce27f4ca
adding IGEL OS RCE module
2021-03-25 14:39:23 -04:00
dwelch-r7
319f15d938
Handle nil versions for rubygems 4
2021-02-25 16:47:49 +00:00
Alan Foster
b06c5c12aa
Rubocop recently landed modules continued
2021-02-25 14:13:40 +00:00
Alan Foster
5b3fde7735
Rubocop recently landed modules
2021-02-16 15:08:08 +00:00
Brendan Coles
6cdb484d7c
Add Aerospike Database UDF Lua Code Execution exploit
2020-12-05 14:15:22 +00:00
Pedro Ribeiro
a99ce581dd
Update TP-Link AC1750 Pwn2Own 2019 module
2020-11-26 12:56:02 +00:00
A Galway
0328e3f815
Land #14359 , gives preference to default target options
2020-11-13 14:44:13 +00:00
William Vu
67ae309896
Set plat/arch in saltstack_salt_unauth_rce targets
...
Looks like I forgot this, and it affects compatible payloads.
2020-11-11 13:09:26 -06:00
Alan Foster
5b438fd933
Preference target values when registering options
2020-11-05 23:16:37 +00:00
Spencer McIntyre
659137da94
Remove the DRuby remote code execution module
2020-11-02 08:32:52 -05:00
Spencer McIntyre
ba17a5d67f
Apply rubocop fixes for the DRuby RCE module
2020-10-22 12:35:35 -04:00
Spencer McIntyre
8aca08f80b
Add the DRuby RCE check method
2020-10-22 12:34:51 -04:00
Spencer McIntyre
34e41e66ec
Fix the syscall DRuby target by adding a small delay before execve
2020-10-22 12:18:12 -04:00
Spencer McIntyre
49145bfd31
Don't start the DRuby service, it appears unnecessary
2020-10-22 12:15:39 -04:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
William Vu
36b5d237fa
Make cmd/unix target types consistent to :unix_cmd
...
There were some using :unix_command, and it was just an oversight.
2020-07-05 11:16:47 -05:00
Spencer McIntyre
a27bf9df38
Fix some grammatical mistakes and set a default target for anydesk
2020-07-01 15:27:33 -04:00
Spencer McIntyre
bb33bc9c62
Randomize the bad unicode character used to trigger the vulnerability
2020-06-26 13:05:43 -04:00