Jon Hart
0eab2fa98d
remove unrelated module
2015-11-09 18:17:16 -08:00
Jon Hart
15eb135295
Resolve merge conflicts
2015-11-09 18:15:40 -08:00
HD Moore
f86f427d54
Move Compat into Payload so that is actually used
2015-11-09 16:06:05 -06:00
m0t
66ed66cc81
Merge pull request #1 from m0t/changes
...
F5 BIG-IP iCall privilege escalation vulnerability (CVE-2015-3628)
2015-11-09 16:11:29 +00:00
KINGSABRI
46e7c53950
Add wordpress masive bruteforce using XMLRPC (wordpress API) fix
2015-11-09 19:04:33 +03:00
m0t
daa999fb1c
f5 module
2015-11-09 16:02:32 +00:00
KINGSABRI
2bf57a3cf3
Add wordpress masive bruteforce using XMLRPC (wordpress API)
2015-11-09 18:23:15 +03:00
KINGSABRI
9586f416a1
Add wordpress masive bruteforce using XMLRPC (wordpress API)
2015-11-09 17:37:06 +03:00
KINGSABRI
9f4f478d2d
Add wordpress masive bruteforce using XMLRPC (wordpress API)
2015-11-09 17:28:58 +03:00
m0t
d4d4e3ddb0
f5 module
2015-11-09 13:41:59 +00:00
m0t
893c4cd52d
f5 module
2015-11-09 13:10:54 +00:00
JT
e019aa12a0
Update pcman_ftp_traversal.rb
2015-11-08 13:40:23 +08:00
JT
f60f2336e3
Update bison_ftp_traversal.rb
2015-11-08 13:39:32 +08:00
JT
be85e85d40
Create bison_ftp_traversal.rb
2015-11-08 13:34:10 +08:00
JT
bb78025dde
Update pcman_ftp_traversal.rb
2015-11-08 13:27:45 +08:00
JT
bf362be0a4
Update pcman_ftp_traversal.rb
2015-11-08 13:17:57 +08:00
JT
bb9e820372
Create pcman_ftp_traversal.rb
...
Adding CVE-2015-7601
2015-11-08 13:08:23 +08:00
fraf0
970c5da9a6
Update dns_srv_enum.rb
2015-11-07 20:01:26 +01:00
fraf0
730f6b2326
Update dns_srv_enum.rb
...
Remove some comment following message on pull-request.
2015-11-07 15:23:32 +01:00
jvoisin
e2678af0fe
The modules now works on 5.1.X and 5.0.X
...
- Added automatic targeting
- Added support for 5.0.X
2015-11-07 14:28:25 +01:00
wchen-r7
0cc8165b52
And I forgot to rm the test line
2015-11-06 18:11:27 -06:00
wchen-r7
8f2a716306
I don't really need to override fail_with
2015-11-06 18:11:08 -06:00
wchen-r7
0213da3810
Handle more NilClass bugs
2015-11-06 18:08:51 -06:00
Jon Hart
43229c16e7
Correct some authors with unbalanced angle brackets
2015-11-06 13:24:58 -08:00
William Vu
2df149b0a5
Land #6189 , extraneous Content-Length fix
2015-11-06 14:36:40 -06:00
William Vu
3cae7999aa
Prefer ctype over headers['Content-Type']
2015-11-06 14:36:21 -06:00
Jon Hart
f408bca3f0
More correct exception handling
2015-11-06 12:25:27 -08:00
wchen-r7
f957acf9ba
Fix Framework Rspec Failure
...
Needs to do:
include Msf::Exploit::Remote::HTTP::Wordpress
2015-11-06 13:56:05 -06:00
wchen-r7
fb9a40f15c
Land #6103 , Add WordPress Plugin Ajax Load More Auth File Upload Vuln
2015-11-06 13:18:48 -06:00
wchen-r7
73f630b25a
Note default.php
2015-11-06 13:18:24 -06:00
Jon Hart
f84e9a88b0
Credit for original vuln discovery
2015-11-06 10:40:07 -08:00
jvoisin
f93f3397ec
Fix some mistakes pointed by @wchen-r7
2015-11-06 19:35:22 +01:00
Jon Hart
1473f2cfa7
More consistent printing
2015-11-06 10:03:06 -08:00
Jon Hart
7101ff2ecc
Better handling of motd printing
2015-11-06 09:52:12 -08:00
Jon Hart
55e224b7e7
Improve auth handling
2015-11-06 09:50:39 -08:00
Jon Hart
fc97266588
Handle errors more carefully
2015-11-06 09:44:05 -08:00
Jon Hart
d3ebb8ae93
Style cleanup of auth checking
2015-11-06 08:34:17 -08:00
jvoisin
c540ca763c
Add the EDB id
2015-11-06 17:21:28 +01:00
Andrew Smith
c44ecfeb15
Spacing
2015-11-06 10:55:29 -05:00
jvoisin
7998955b46
The double-quote character is a badchar
2015-11-06 16:43:53 +01:00
jvoisin
30e7a35452
Add the possibility to target non-default path
2015-11-06 15:33:30 +01:00
jvoisin
bb0e64e541
Implement a module for the recent vBulletin RCE
...
This module implements the recent unserialize-powered RCE against
vBulletin 5.1.X
Step to reproduce:
1. Install vBulletin 5.1.X
2. Launch the exploit against it
```
msf exploit(vbulletin_unserialize) > check
[*] 192.168.1.25:80 - The target appears to be vulnerable.
msf exploit(vbulletin_unserialize) >
```
```
msf exploit(vbulletin) > run
[*] Started reverse handler on 192.168.1.11:4444
[*] Sending stage (33068 bytes) to 192.168.1.25
[*] Meterpreter session 1 opened (192.168.1.11:4444 -> 192.168.1.25:49642) at 2015-11-06 14:04:46 +0100
meterpreter > getuid
Server username: www-data (33)
```
2015-11-06 14:59:25 +01:00
jakxx
e4d8909815
Initial Commit
2015-11-05 20:43:30 -05:00
wchen-r7
46fac897bd
Land #6144 , China Chopper Web Shell (Backdoor) module
2015-11-05 18:29:36 -06:00
wchen-r7
ea22583ed1
Update title and description
2015-11-05 18:29:03 -06:00
wchen-r7
27be832c4c
remove the fail_with because it's always triggering anyway
2015-11-05 18:19:46 -06:00
nixawk
2adcd0a0d2
add references
2015-11-05 23:45:29 +00:00
dmohanty-r7
a71d7ae2ae
Land #6089 , @jvazquez-r7 Fix HTTP mixins namespaces
2015-11-05 16:56:41 -06:00
wchen-r7
038cb66937
Use the right module path
2015-11-05 16:16:46 -06:00
jvazquez-r7
20679ea6c6
Land #5720 , @g0tmi1k's changes to firefox_creds post module
2015-11-05 15:36:08 -06:00