cgranleese-r7
ec7347cd49
Land #17509 , tomcat 7 priv esc on rhel based systems (cve-2016-5425)
2023-03-14 10:16:18 +00:00
h00die-gr3y
fc711131a2
added MIME, added break in mixin and added link with installation instructions
2023-03-09 09:28:46 -06:00
Grant Willcox
deafceed00
Update documentation, library, and Gemspec from review
2023-03-09 09:28:27 -06:00
h00die-gr3y
dc8ebb722a
Added support for native PHP payloads and reengineered webshells
2023-03-09 09:28:03 -06:00
h00die-gr3y
c844d4d714
removed check and fix up some code
2023-03-09 09:27:29 -06:00
h00die-gr3y
771f32bd8a
Add documentation and apply code updates
2023-03-09 09:27:03 -06:00
Christophe De La Fuente
bbc071d254
Land #17737 , Add Gather Wowza Streaming Engine Credentials
2023-03-08 19:13:21 +01:00
bcoles
f62994b4c0
Add Gather Wowza Streaming Engine Credentials
2023-03-09 01:31:23 +11:00
bcoles
3f781de8e9
Add Wowza Streaming Engine Manager Login Utility
2023-03-07 23:42:42 +11:00
cgranleese-r7
6259f02051
Land #17684 , Add rbcd exploitation documentation to docs site
2023-03-03 13:31:53 +00:00
adfoster-r7
0047ce5d3a
Add rbcd exploitation documentation to docs site
2023-03-03 13:18:29 +00:00
Spencer McIntyre
a418bd9c65
Land #17638 , Lucee Scheduled Job RCE
2023-03-02 08:57:19 -05:00
JBince
1245124afa
updated docs to reflect changes from smcintyre-r7
2023-02-28 19:58:39 -06:00
Jack Heysel
3abd62076c
Land #17624 , Oracle E-Business Suite Module
...
This pull request adds an exploit module for CVE-2022-21587
an arbitrary file upload vulnerability in Oracle Web Applications
Desktop Integrator as shipped with 12.2.3 through to 12.2.11
which results in RCE
2023-02-28 17:04:20 -05:00
Spencer McIntyre
a916163b49
Cleanup files and fixup messages
2023-02-28 16:41:57 -05:00
space-r7
b3e6767125
Land #17676 , add SIS login module
2023-02-28 15:41:24 -06:00
JBince
8b03f2fda8
Reworked payload execution logic
2023-02-27 11:09:34 -06:00
Jack Heysel
5311a491e9
Froxlor 2.0.7 is actually vulnerable too
2023-02-24 13:18:34 -05:00
Jack Heysel
5749b402af
Land #17672 , disable ClamAV on Linux
...
This PR includes a post module that will disable
ClamAV on Linux systems.
2023-02-23 21:51:48 -05:00
space-r7
9621f77bac
Land #17640 , add Froxlor RCE
2023-02-22 12:11:38 -06:00
Imran E. Dawoodjee
62439bbcd0
Update documentation
2023-02-22 22:52:43 +08:00
Imran E. Dawoodjee
2b5b17916f
Update docs, improved robustness of module+lib
2023-02-22 22:41:14 +08:00
sfewer-r7
690abcfe1f
improve the documentation, mention some steps required during setup.
2023-02-22 09:42:11 +00:00
Jack Heysel
f6ec3855b3
Removed space at EOL
2023-02-22 00:35:42 -05:00
Jack Heysel
0c8df1a67b
Updated docs and module suggetsions
2023-02-22 00:33:40 -05:00
Imran E. Dawoodjee
6e9a7a9d07
Minor fixes
2023-02-20 23:45:59 +08:00
archcloudlabs
f61c3bcefc
initial commit of disable_av documentation
2023-02-19 19:49:39 -05:00
Imran E. Dawoodjee
bdc435f5c8
Add login module for Softing Secure Integration Server
2023-02-19 22:25:22 +08:00
Grant Willcox
38d8b70873
Make msftidy_docs.rb happy and then also clarify where to find software download links
2023-02-17 14:56:51 -06:00
Grant Willcox
c713da368d
Add in a few fixes from the review
2023-02-17 14:52:57 -06:00
JBince
ce9933fc4c
Feedback changes + rubocop & msftidy changes
2023-02-17 08:16:49 -06:00
sfewer-r7
73e82274dd
changes as per @gwillcox-r7 review
2023-02-17 13:10:53 +00:00
JBince
a3a6ae9c4a
feedback fixes
2023-02-16 14:33:03 -06:00
Spencer McIntyre
ecd5ad29a7
Add module docs
2023-02-15 16:29:42 -05:00
Spencer McIntyre
ac9d60ce9e
Land #17281 , Added module for CVE-2022-2992
...
Added module for CVE-2022-2992 - Gitlab Remote Command Execution via Github import
2023-02-14 16:57:29 -05:00
sfewer-r7
d1463df3cc
fix documentation issues from msftidy_docs
2023-02-14 10:47:47 +00:00
Jack Heysel
ca0b1ffe05
Documentation fixes
2023-02-13 19:56:23 -05:00
Jack Heysel
2e195b2742
Initial commit Froxlor RCE
2023-02-13 19:39:18 -05:00
Grant Willcox
d012145726
Land #17599 , Cisco RV LAN Exploit - CVE-2022-20705 and CVE-2022-20707
2023-02-13 17:50:06 -06:00
JBince
1dadd113dd
msftidy changes to documentation
2023-02-13 15:27:07 -06:00
JBince
9c3cfd8bdb
Added documentation, cleaned up functions, rubocop fixes
2023-02-13 15:19:45 -06:00
Grant Willcox
45e453d687
Fix up remaining review comments
2023-02-13 15:07:25 -06:00
Spencer McIntyre
c3fa924cfa
Remove the NGROK_URL option
2023-02-13 14:31:44 -05:00
Spencer McIntyre
210b7a3254
Use #get_json_document instead of JSON.parse
...
Also fix typos
2023-02-13 14:00:13 -05:00
sfewer-r7
6b29b14c46
add in module documentation
2023-02-10 12:41:55 +00:00
Grant Willcox
f2a86327d0
Minor fixes from review
2023-02-09 15:34:25 -06:00
Spencer McIntyre
c7279e9a0a
Add credit for CVE-2023-0669; fix path in docs
2023-02-09 13:02:40 -05:00
bcoles
de8a6e1445
Move fortra_goanywhere_rce_cve_2023_0669 module documentation to documentation directory
2023-02-09 23:12:45 +11:00
Stephen Wildow
427c181e9a
Utilized msftidy_docs.rb to clean up missing sections, excessively long lines, spaces at EOL, and space end of file. Removed credit section. Expanded on installation procedure. Modified steps procedure to include Verify options and removed failure status. Removed Targets section. Scenarios have device, target, and architecture.
2023-02-08 19:18:14 -05:00
Jack Heysel
19bcf8be7f
Working hardcoded payload
2023-02-08 18:14:11 -05:00