Spencer McIntyre
ffb681cb79
Land #13485 , Update eyesofnetwork_autodiscovery_rce with SQLi auth bypass
2020-05-21 17:24:23 -04:00
Spencer McIntyre
ecd3c0f820
Minor doc changes, add module notes and SQLi progress output
2020-05-21 16:31:45 -04:00
William Vu
8473662e32
Land #13463 , Oracle WebLogic CVE-2020-2555 exploit
2020-05-20 23:21:07 -05:00
kalba-security
7c2c227ea0
Improve version checks, remove comments from previous testing
2020-05-20 18:06:42 -04:00
William Vu
655088bb0d
Fix punctuation typo in exchange_ecp_viewstate
2020-05-20 09:47:11 -05:00
Shelby Pace
4a1d6f362c
remove eol spaces from doc
2020-05-19 14:52:34 -05:00
Shelby Pace
df3e8f2c0e
fix docs
2020-05-19 12:32:52 -05:00
Shelby Pace
67f4cc8fb6
Update documentation/modules/exploit/multi/misc/weblogic_deserialize_badattrval.md
...
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-05-19 12:19:05 -05:00
Shelby Pace
ec7ff5efe0
Update documentation/modules/exploit/multi/misc/weblogic_deserialize_badattrval.md
...
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-05-19 12:18:58 -05:00
Shelby Pace
aea7eb9304
Update documentation/modules/exploit/multi/misc/weblogic_deserialize_badattrval.md
...
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-05-19 12:18:46 -05:00
Shelby Pace
3073479dc8
Update documentation/modules/exploit/multi/misc/weblogic_deserialize_badattrval.md
...
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-05-19 12:18:38 -05:00
Shelby Pace
ddc549e11d
Update documentation/modules/exploit/multi/misc/weblogic_deserialize_badattrval.md
...
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
2020-05-19 12:18:29 -05:00
kalba-security
6d72fe4854
Update eyesofnetwork_autodiscovery_rce module and documentation
2020-05-19 11:48:48 -04:00
Alan Foster
c019c06505
Land #13445 , Pi-Hole <= 4.4 root RCE CVE-2020-11108
2020-05-18 13:41:57 +01:00
Shelby Pace
861ea8d696
add jdk info
2020-05-15 10:16:26 -05:00
Shelby Pace
91e4328198
add documentation, remove some leftover comments
2020-05-15 09:44:45 -05:00
h00die
ebd6eb0302
add authentication processing
2020-05-14 08:53:32 -04:00
Brendan Coles
a5250072bf
distinct_tftp_traversal: increase delay between upload requests
2020-05-14 05:22:36 +00:00
h00die
3d054973f5
updates to work with 4.4
2020-05-13 20:46:38 -04:00
h00die
9aa8578a75
cve-2020-11108
2020-05-12 22:52:44 -04:00
Spencer McIntyre
f48be0d45c
Add missing docs from #13401 merging
2020-05-12 14:26:05 -04:00
bwatters-r7
9b40554ec6
Land #13370 , Add Druva inSync inSyncCPHwnet64.exe RPC Type 5 Privilege Escalation
...
Merge branch 'land-13370' into upstream-master
2020-05-12 13:20:27 -05:00
Spencer McIntyre
e3e82ca17e
Land #13401 , Add SaltStack Salt root key disclosure and RCE
2020-05-12 14:18:50 -04:00
William Vu
d431cd9a6b
Actually write the setup guide in the module docs
...
Oops. This should have been filled out.
2020-05-12 12:27:19 -05:00
William Vu
235f822937
Add Netsweeper WebAdmin unixlogin.php pre-auth RCE
2020-05-12 08:34:20 -05:00
William Vu
f85a8c2e79
Add module docs
2020-05-11 12:05:38 -05:00
Pedro Ribeiro
bba9d0a843
Update advisory link in doc
2020-05-09 14:57:32 +07:00
Spencer McIntyre
b4e2599921
Remove trailing whitespace to fix build failures
2020-05-07 09:59:34 -04:00
Spencer McIntyre
9769e04b6e
Land #13322 , CVE-2020-0668 Service tracing file junction overwrite
2020-05-07 09:47:20 -04:00
Spencer McIntyre
26d4cb7a47
Tweak the service tracking checks and update docs markdown
2020-05-07 09:46:19 -04:00
gwillcox-r7
a1275845ec
Land #13200 , CVE-2019-0808 LPE for Windows 7 x86 SP0 and SP1
2020-05-06 17:23:52 -05:00
bwatters-r7
a5fe498610
Update ARCH handling, suggested changes, and last-minute fixes
2020-05-06 15:36:53 -05:00
Christophe De La Fuente
3473016aea
Land #13107 , Kentico deserialization RCE
2020-05-06 16:16:05 +02:00
Brendan Coles
bf16307d7f
Add Druva inSync inSyncCPHwnet64.exe RPC Type 5 Privilege Escalation
2020-05-06 14:09:46 +00:00
gwillcox-r7
02bc959d1b
Documentation alignment to 72 character width as is standard
2020-05-05 21:01:52 -05:00
William Vu
80b64830cc
Land #13304 , IBM DRM SSH exploit
2020-05-05 12:08:02 -05:00
William Vu
e0a67f4fd1
Land #13300 , IBM DRM RCE
2020-05-05 12:07:15 -05:00
William Vu
227962d1f3
Fix EOL space
2020-05-05 11:27:31 -05:00
Pedro Ribeiro
1cb91dcb42
Address review comments
...
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/ssh/ibm_drm_a3user.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update ibm_drm_a3user.md
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/ssh/ibm_drm_a3user.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
use fail_with
2020-05-05 10:58:05 -05:00
Pedro Ribeiro
a17d78a327
Address review comments
...
Update documentation/modules/exploit/linux/http/ibm_drm_rce.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/http/ibm_drm_rce.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update documentation/modules/exploit/linux/http/ibm_drm_rce.md
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update ibm_drm_rce.md
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
make final changes!
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
Update modules/exploits/linux/http/ibm_drm_rce.rb
Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com >
final final final
2020-05-05 10:53:08 -05:00
gwillcox-r7
d2b196f172
Land #13353 , Trixbox CE endpoint_devicemap.php Authenticated RCE
2020-05-04 16:11:05 -05:00
Anastasios Stasinopoulos
18ebf5efa6
Trixbox CE <= v2.8.0.4 Authenticated RCE
...
This module exploits a post-authentication OS command injection vulnerability found in Trixbox CE <= v2.8.0.4 which may allow arbitrary command execution on the underlying operating system.
2020-05-04 15:58:38 -05:00
Spencer McIntyre
c128a3ba92
Add CmdStager and Powershell targets to the Kentico RCE exploit
2020-05-04 10:07:10 -04:00
Patrick Webster
626b9be63c
Update kentico_staging_syncserver.md
2020-05-04 09:26:14 -04:00
Patrick Webster
affc745ed5
Update documentation/modules/exploit/windows/http/kentico_staging_syncserver.md
...
Typo
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-05-04 09:26:13 -04:00
Patrick Webster
376c61bc46
Added exploit module kentico_staging_syncserver.
2020-05-04 09:26:13 -04:00
William Vu
0bcc473ded
Rename option to HOSTINFO_NAME and update doc
2020-05-01 12:59:01 -05:00
William Vu
b2355568f8
Update module doc
2020-05-01 12:19:12 -05:00
William Vu
84061881b8
Clarify module description
2020-05-01 12:19:12 -05:00
William Vu
64f4cb7e41
Add module doc
2020-05-01 12:19:12 -05:00