sfewer-r7
f632cf34bf
add in a module and docs fo rteh EPMM exploit
2026-02-05 12:26:38 +00:00
Valentin Lobstein
7776588577
Address PR #20768 review feedback
...
- gladinet.rb: Fix machineKey regex to match decryptionKey then validationKey explicitly
- gladinet.rb: Remove DEFAULT_WEB_CONFIG_PATH constant, inline in each module's datastore option
- gladinet_storage_access_ticket_forge.rb: Inline version check
- gladinet_storage_access_ticket_forge.rb: Inline FILEPATH default value (with C:\ for absolute path)
- gladinet_storage_lfi_cve_2025_11371.rb: Inline version check
- gladinet_storage_lfi_cve_2025_11371.rb: Inline valid_response? method (removed)
- gladinet_storage_lfi_cve_2025_11371.rb: Inline FILEPATH default value (without C:\, stripped by build_lfi_path)
- gladinet_storage_lfi_cve_2025_11371.rb: Use vars_get with encode_params instead of manual URL building
- gladinet_viewstate_deserialization: Remove nil fallback (mandatory option with default)
- gladinet_viewstate_deserialization: Remove DEFAULT_MACHINE_KEY constant, inline in datastore option
- gladinet_viewstate_deserialization: Remove duplicate detect_app_type/extract_build_version (already in shared lib)
Note: Suggestion to rename gladinet? to is_gladinet? was NOT applied.
msftidy enforces Naming/PredicatePrefix convention which requires predicate
methods to NOT have 'is_' prefix (gladinet? is correct, is_gladinet? is not).
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2026-02-04 08:38:35 +01:00
Valentin Lobstein
628c5ee7af
Update Gladinet modules: fix AutoCheck in auxiliary modules and update documentation with real outputs
2026-02-04 08:38:32 +01:00
Valentin Lobstein
478345506e
Add Gladinet CentreStack/Triofox auxiliary modules and exploit
2026-02-04 08:38:31 +01:00
Spencer McIntyre
e55d22a7cd
Merge pull request #20739 from cdelafuente-r7/add_mitre_tech_kerb_unconst_deleg
...
Add MITRE ATT&CK techniques to Kerberos and unconstrained delegation modules
2026-02-03 16:11:37 -05:00
Christophe De La Fuente
0c0e290cc2
Code review 2
2026-02-03 21:53:05 +01:00
Christophe De La Fuente
b85b2d4528
Add comments and remove T1077_WINDOWS_ADMIN_SHARES (deprecated)
2026-02-02 12:03:17 +01:00
jheysel-r7
c31a606cb4
Merge pull request #20898 from raboof/exploit-continuum-add-cve-reference
...
add CVE reference to Continuum exploit
2026-01-30 06:47:30 -08:00
jheysel-r7
641ab527aa
Merge pull request #20857 from msutovsky-r7/exploit/freepbx/sql_to_rce_chain
...
Adds exploit module for FreePBX (CVE-2025-66039, CVE-2025-61675)
2026-01-28 20:03:17 -08:00
Jack Heysel
63a66ee162
Improved CVE version range info in description
2026-01-28 20:15:25 -07:00
jheysel-r7
7d931c960c
Merge pull request #20858 from msutovsky-r7/exploit/freepbx/unrestricted_file_upload
...
Adds exploit module for FreePBX (CVE-2025-66039, CVE-2025-61678)
2026-01-28 06:23:43 -08:00
jheysel-r7
147a94cee5
Update freepbx_firmware_file_upload print statement
2026-01-28 06:08:47 -08:00
Martin Sutovsky
e6b97a79a4
Addresses comments
2026-01-28 11:33:54 +01:00
jheysel-r7
f31776caf0
Merge pull request #20778 from h00die/ssh_keys
...
Update and combine ssh key persistence with mixin
2026-01-27 06:39:10 -08:00
h00die
0b68476817
Update modules/exploits/multi/persistence/ssh_key.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2026-01-26 16:44:46 -05:00
Martin Sutovsky
b44e06f25f
Code cleanup, adds more entropy to job name
2026-01-26 13:40:31 +01:00
Martin Sutovsky
ce4e176798
Expands check method
2026-01-26 13:30:26 +01:00
Arnout Engelen
2f2fea7f6b
add CVE reference to Continuum exploit
2026-01-26 12:36:12 +01:00
Martin Sutovsky
b263530180
Increases entropy of payload filename
2026-01-26 11:32:33 +01:00
h00die
048163ea89
ssh_key persistence review
2026-01-24 16:36:54 -05:00
Spencer McIntyre
c0e9288ac5
Merge pull request #20799 from jheysel-r7/feat/cacti_graph_template_rce
...
Cacti Graph Template Authenticated RCE [CVE-2025-24367]
2026-01-22 14:26:38 -05:00
Spencer McIntyre
18a4cf8c00
Use the ssl setting for HttpServer#start_service
2026-01-22 13:49:28 -05:00
Jack Heysel
e9a6a6fd45
Responded to comments
2026-01-22 15:03:32 +01:00
Jack Heysel
96b788e1e8
Increase length of cron job name
2026-01-22 15:03:32 +01:00
Jack Heysel
0e0a6cc9cd
Removed duplicate platform
2026-01-22 15:03:31 +01:00
Jack Heysel
2e484d552e
Finishing touches
2026-01-22 15:03:31 +01:00
Jack Heysel
99e032f4af
SmarterTools SmarterMail Unauth File Upload RCE [CVE-2025-52691]
2026-01-22 15:03:30 +01:00
msutovsky-r7
537a1c5395
Land #19821 , adds Burpsuite persistence module
...
Burp extension persistence
2026-01-22 11:03:08 +01:00
jheysel-r7
719874a7f4
Merge pull request #20750 from MatDupas/add-exploit-oracle-ebs-cve-2025-61882-module
...
Add exploit oracle ebs CVE 2025 61882 module
2026-01-21 16:08:09 -08:00
Jack Heysel
927f5330f4
Rubocop fixes
2026-01-21 14:56:08 -08:00
Jack Heysel
c45309e9ab
Added payload length guards
2026-01-21 11:34:21 -08:00
jheysel-r7
b6da204725
Apply suggestions from code review
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2026-01-21 10:09:12 -08:00
MatDupas
b46649769e
Fix formatting issues in oracle_ebs exploit script
2026-01-21 09:00:52 +01:00
MatDupas
a05863f6f6
Clean up comment in generate_xsl_payload method
...
Removed comment about generating XSLT payload.
2026-01-21 08:57:10 +01:00
MatDupas
cb3df4b4de
Refactor payload options in Oracle EBS exploit
2026-01-21 08:56:01 +01:00
MatDupas
c5df078b41
Clarify payload option comment in exploit module
...
Updated the comment for the payload option to clarify usage.
2026-01-21 08:54:53 +01:00
Martin Sutovsky
ffb725f4da
Rubocopes
2026-01-21 08:16:39 +01:00
h00die
0234dc7a26
Update modules/exploits/multi/persistence/burp_extension.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2026-01-20 19:28:18 -05:00
h00die
ad343cb383
Update modules/exploits/multi/persistence/burp_extension.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2026-01-20 19:27:46 -05:00
h00die
cf43e496b1
Update modules/exploits/multi/persistence/burp_extension.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2026-01-20 19:27:08 -05:00
jheysel-r7
c47a74d0dd
Merge pull request #20770 from vognik/Splunk_2022-43571_CVE-2024-36985
...
Add Splunk RCE Exploits (CVE-2022-43571 & CVE-2024-36985)
2026-01-20 12:36:51 -08:00
MatDupas
c351514291
Refine description for Oracle EBS CVE-2025-61882 exploit
...
Updated the description of the Oracle E-Business Suite CVE-2025-61882 RCE exploit module to provide more detailed information about the exploit mechanism and affected versions.
2026-01-20 21:09:25 +01:00
MatDupas
37c69a9bf1
Refactor Oracle EBS CVE-2025-61882 exploit module
...
Updated the Oracle E-Business Suite exploit module to fix rubocop linting errors
2026-01-20 09:12:05 +01:00
vognik
9e320dd168
add suggestions from @jheysel-r7
2026-01-19 18:45:01 -08:00
MatDupas
bff88db29b
Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2026-01-19 15:07:45 +01:00
MatDupas
9377662118
Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2026-01-19 15:06:47 +01:00
MatDupas
68f7d42bb8
Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2026-01-19 15:04:59 +01:00
MatDupas
47d0b1c208
Clarify default payload comment in exploit module
...
Updated the comment for the default payload option to clarify its usage.
2026-01-19 10:47:47 +01:00
MatDupas
141fa5a169
Refactor smuggling payload creation and session handling
...
Refactor HTTP request smuggling logic and error handling.
2026-01-19 10:41:23 +01:00
MatDupas
daf0fc89fc
Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2026-01-19 10:34:24 +01:00