Pflegusch
e66fd8f5ae
Use rand_text_alphanumeric function
2023-03-09 17:03:48 +01:00
Pflegusch
69839d1924
Remove get_proxy_protocol function
2023-03-09 17:02:10 +01:00
Pflegusch
614f4b6d89
Make installation path of owa configurable
2023-03-09 16:32:28 +01:00
Pflegusch
2de53712bd
Use Rex::Version for version comparison
2023-03-09 15:59:42 +01:00
Pflegusch
94ceeb075a
Redirect is not necessary - replace with simple send_request_cgi request
2023-03-09 15:41:15 +01:00
Pflegusch
ee95eb2883
fix typo: establish_connection
2023-03-09 15:09:32 +01:00
Pflegusch
14b5c08a62
Fix the double slash in the shell url
2023-03-09 14:28:15 +01:00
Pflegusch
d59175a463
make it work for https and http and remove the tmp self signed cert bypass
2023-03-09 13:58:56 +01:00
Pflegusch
f0dbf54c69
use fail_with in get_cache_content function
2023-03-09 11:04:00 +01:00
Pflegusch
7068d4c3f1
remove LPORT, RPORT and SSL from DefaultOptions
2023-03-09 11:03:24 +01:00
Pflegusch
76b05a7092
Change DisclosureDate according to nvd.nist.gov
2023-03-08 21:52:13 +01:00
Pflegusch
b37be28191
Working module open web analytics 1.7.3 rce
2023-03-08 21:30:52 +01:00
bcoles
9dcaf93b29
Replace deprecated File.exists? with File.exist?
2023-03-05 14:30:47 +11:00
Spencer McIntyre
a418bd9c65
Land #17638 , Lucee Scheduled Job RCE
2023-03-02 08:57:19 -05:00
Spencer McIntyre
3fabcc3421
Use coldfusion to decode base64 data
...
This means we don't need to rely on base64 being in the path. Also
invoke ARCH_CMD payloads on Windows through cmd.exe and not
powershell.exe.
2023-02-28 17:32:56 -05:00
Spencer McIntyre
c8aa491378
Fail with Unreachable when res is nil
2023-02-28 17:05:59 -05:00
Jack Heysel
3abd62076c
Land #17624 , Oracle E-Business Suite Module
...
This pull request adds an exploit module for CVE-2022-21587
an arbitrary file upload vulnerability in Oracle Web Applications
Desktop Integrator as shipped with 12.2.3 through to 12.2.11
which results in RCE
2023-02-28 17:04:20 -05:00
Spencer McIntyre
a916163b49
Cleanup files and fixup messages
2023-02-28 16:41:57 -05:00
JBince
8b03f2fda8
Reworked payload execution logic
2023-02-27 11:09:34 -06:00
Jack Heysel
ca6faed172
Check method enhancement
2023-02-24 13:33:10 -05:00
Jack Heysel
5311a491e9
Froxlor 2.0.7 is actually vulnerable too
2023-02-24 13:18:34 -05:00
space-r7
9621f77bac
Land #17640 , add Froxlor RCE
2023-02-22 12:11:38 -06:00
Jack Heysel
bf7884b2dc
Removed need to auth twice when AutoCheck enabled
2023-02-22 12:28:28 -05:00
Jack Heysel
0c8df1a67b
Updated docs and module suggetsions
2023-02-22 00:33:40 -05:00
jheysel-r7
42146fc4ec
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 23:02:49 -05:00
jheysel-r7
80cec400bf
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 22:59:23 -05:00
jheysel-r7
fc5f4983f6
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 22:58:49 -05:00
jheysel-r7
647418745f
Update modules/exploits/linux/http/froxlor_log_path_rce.rb
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2023-02-21 22:58:41 -05:00
Jack Heysel
e625e2e474
Land #17652 , module for pyload js2py exploit
...
This adds an exploit for CVE-2023-0297 which is unauthenticated
Javascript injection in pyLoads Click N Load service.
2023-02-21 16:27:04 -05:00
sfewer-r7
963b9a9952
Merge remote-tracking branch 'origin/CVE-2022-21587' into CVE-2022-21587
2023-02-21 18:02:10 +00:00
sfewer-r7
3854c30a11
more specific testing of the response after upload to ensure it contains the expected EBS response data. infer the relative path traversal depth from the path to the upload folder, thanks @gwillcox-r7
2023-02-21 18:00:17 +00:00
JBince
75fb5e883d
Exploit update based on feedback
2023-02-19 09:16:56 -06:00
Grant Willcox
c713da368d
Add in a few fixes from the review
2023-02-17 14:52:57 -06:00
JBince
ce9933fc4c
Feedback changes + rubocop & msftidy changes
2023-02-17 08:16:49 -06:00
sfewer-r7
73e82274dd
changes as per @gwillcox-r7 review
2023-02-17 13:10:53 +00:00
JBince
a3a6ae9c4a
feedback fixes
2023-02-16 14:33:03 -06:00
Jack Heysel
44c393e2f1
Fixed netcat session cleanup
2023-02-16 13:14:24 -05:00
Jack Heysel
1c49b002d2
Changed get_csrf to use xpath
2023-02-16 10:47:04 -05:00
Jack Heysel
00d1637f3d
Changed check method to use xpath
2023-02-16 10:33:15 -05:00
Spencer McIntyre
ecd5ad29a7
Add module docs
2023-02-15 16:29:42 -05:00
Arnout Engelen
5d8b1dc4a6
Link Hadoop YARN exploit to documentation
...
This exploit scans for misconfigured installations, link to the documentation
that describes how to properly secure it.
2023-02-15 21:17:26 +01:00
Spencer McIntyre
557042c91c
Initial exploit is working
2023-02-15 14:18:25 -05:00
Spencer McIntyre
ac9d60ce9e
Land #17281 , Added module for CVE-2022-2992
...
Added module for CVE-2022-2992 - Gitlab Remote Command Execution via Github import
2023-02-14 16:57:29 -05:00
space-r7
78ae5f49ce
add gitlab prefix back to methods
2023-02-14 15:26:01 -06:00
space-r7
304b90ecc8
split mixins between forms and v4 api used
2023-02-14 12:37:43 -06:00
Jack Heysel
8aed02de3d
Linting
2023-02-14 10:39:47 -05:00
Jack Heysel
ff159c8760
Updated TODO
2023-02-13 20:24:32 -05:00
Jack Heysel
ca0b1ffe05
Documentation fixes
2023-02-13 19:56:23 -05:00
Jack Heysel
2e195b2742
Initial commit Froxlor RCE
2023-02-13 19:39:18 -05:00
Grant Willcox
d012145726
Land #17599 , Cisco RV LAN Exploit - CVE-2022-20705 and CVE-2022-20707
2023-02-13 17:50:06 -06:00