h00die
ebd6eb0302
add authentication processing
2020-05-14 08:53:32 -04:00
h00die
3d054973f5
updates to work with 4.4
2020-05-13 20:46:38 -04:00
h00die
9aa8578a75
cve-2020-11108
2020-05-12 22:52:44 -04:00
gwillcox-r7
d2b196f172
Land #13353 , Trixbox CE endpoint_devicemap.php Authenticated RCE
2020-05-04 16:11:05 -05:00
Anastasios Stasinopoulos
18ebf5efa6
Trixbox CE <= v2.8.0.4 Authenticated RCE
...
This module exploits a post-authentication OS command injection vulnerability found in Trixbox CE <= v2.8.0.4 which may allow arbitrary command execution on the underlying operating system.
2020-05-04 15:58:38 -05:00
William Vu
4d635cdcfc
Update module doc
2020-05-01 04:28:17 -05:00
William Vu
c5df5355ac
Update my module documentation to the new standard
...
Also update CheckModule to match current style and best practices.
2020-04-20 20:06:52 -05:00
gwillcox-r7
d759fbaed3
Land #13259 , Miscellaneous fixes for @wvu's modules and documentation
2020-04-16 22:10:10 -05:00
bwatters-r7
15f4f7ea95
Land #13049 , Add fileformat exploit for libnotify plugin
...
Merge branch 'land-13049' into upstream-master
2020-04-16 16:03:14 -05:00
bwatters-r7
a18a5fab68
Rubocop autocorrect and update docs to use ascending numbers
2020-04-16 16:00:56 -05:00
Spencer McIntyre
fe8a191eed
Fix the fixed version for CVE-2020-7350
2020-04-16 15:45:48 -04:00
Spencer McIntyre
286a83afee
Add module documentation and fix the payload CachedSize value
2020-04-16 15:00:18 -04:00
William Vu
994097b410
Update all my module docs to use "options"
2020-04-15 15:47:51 -05:00
William Vu
02ba071b84
Punctuate check prints to match CheckCodes
2020-04-15 15:47:50 -05:00
William Vu
0c3080c318
Add ThinkPHP Multiple PHP Injection RCEs
2020-04-13 02:21:01 -05:00
h00die
e7da6e77a5
remove and check for instruction text
2020-03-24 09:15:04 -04:00
William Vu
865d15975b
Add automatic grammar selection by version number
2020-03-03 18:44:48 -06:00
William Vu
975eb742cb
Add old grammar target and refactor check
2020-03-03 17:41:04 -06:00
William Vu
260aa0533a
Add check method and reorder mixins for super
...
Also fix copypasta'd vulnerable commit.
2020-03-03 17:41:04 -06:00
William Vu
9be6b0a81e
Add module doc
2020-03-03 17:41:04 -06:00
William Vu
e92b9ef97c
Use AutoCheck mixin in OpenSMTPD CVE-2020-7247
...
Also updates the check to be more precise. I had originally copied the
check method from the Morris worm Sendmail exploit:
220 simh Sendmail 5.51/5.17 ready at Wed, 18 Dec 85 11:14:07 PST
Note that there was no "ESMTP" string in 1985's Sendmail.
2020-02-28 10:42:02 -06:00
William Vu
8820944696
Fix exploit/unix/smtp/opensmtpd_mail_from_rce
2020-02-27 02:11:08 -06:00
Christophe De La Fuente
f9077bcd8d
Land #12704 , OpenNetAdmin 18.1.1 Remote Code Execution exploit
2020-02-21 15:49:26 +01:00
Onur ER
e4456c9006
Update opennetadmin_ping_cmd_injection.md
2020-02-21 04:14:21 +03:00
Onur ER
1fe1506b42
Update documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:06:56 +03:00
Adam Galway
65521270ea
Land #12853 , InfiniteWP exploit & mixin upgrades
2020-02-10 11:33:49 +00:00
William Vu
eab1245eef
Update module doc
2020-02-07 12:30:00 -06:00
William Vu
763dbf5d5d
Check WordPress version
2020-02-07 03:14:17 -06:00
William Vu
6c59d7c37c
Refactor module
2020-02-07 01:38:11 -06:00
William Vu
8c07e17912
Update module docs
2020-02-06 15:57:54 -06:00
William Vu
68565f575f
Update module doc
2020-02-06 14:55:41 -06:00
William Vu
62c98710ad
Reword vulnerable commit range
2020-02-06 11:03:20 -06:00
William Vu
95fa8602bc
Refactor modules that use Expect
2020-02-05 21:16:21 -06:00
William Vu
b98c0c6876
Add module doc
2020-02-05 17:01:58 -06:00
William Vu
2fc1eb10a8
Add verification steps to module doc
2020-01-22 17:16:41 -06:00
William Vu
10a5e9292e
Add description header to module doc
2020-01-22 17:08:26 -06:00
William Vu
88b72e6f2e
Update module doc to new standard
2020-01-22 16:48:23 -06:00
tperry-r7
3518b9465c
Merge pull request #12831 from h00die/doc_cleanup
...
Documentation standardization. This is the first step in standardizing the module documentation.
2020-01-22 14:53:12 -06:00
h00die
ca59b06fd3
module doc standardizations
2020-01-20 21:26:59 -05:00
William Vu
972cb545f0
Restore the original PLUGIN_FILE contents
2020-01-18 14:57:41 -06:00
William Vu
cbd949927d
Add WordPress InfiniteWP Client plugin exploit
2020-01-17 20:12:21 -06:00
h00die
947102e2fe
sample output to scenarios
2020-01-16 11:15:06 -05:00
h00die
b2e0950bba
caps
2020-01-16 11:09:29 -05:00
h00die
3a4209a092
verification to verification steps
2020-01-16 10:41:12 -05:00
William Vu
5c4189fdb4
Move unix/webapp/webmin_backdoor to linux/http
2020-01-14 00:50:04 -06:00
Onur ER
3be3a398ae
Update and rename documentation/modules/exploit/linux/http/opennetadmin_ping_cmd_injection.md to documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
2019-12-14 16:33:13 +03:00
dwelch-r7
41569b78ba
Land #12503 , Add exploit module for Ajenti 2.1.31
2019-12-01 16:13:06 +00:00
Christophe De La Fuente
373d147efd
Land #12555 - Wordpress Plainview Activity Monitor RCE
2019-11-29 11:10:24 +01:00
Onur ER
f93fda79f6
Add Module Documentation
2019-11-18 20:25:56 +03:00
sinn3r
5c6686a105
Land #12532 , Add FusionPBX Command exec.php Command Execution
...
Add FusionPBX Command exec.php Command Execution
2019-11-13 11:33:21 -06:00