diff --git a/modules/exploits/freebsd/http/watchguard_cmd_exec.rb b/modules/exploits/freebsd/http/watchguard_cmd_exec.rb
index c48c552383..56553b4540 100644
--- a/modules/exploits/freebsd/http/watchguard_cmd_exec.rb
+++ b/modules/exploits/freebsd/http/watchguard_cmd_exec.rb
@@ -277,4 +277,8 @@ class Metasploit4 < Msf::Exploit::Remote
send_response(cli, @pl)
end
+ def autofilter
+ true
+ end
+
end
diff --git a/modules/exploits/linux/antivirus/escan_password_exec.rb b/modules/exploits/linux/antivirus/escan_password_exec.rb
index df378d022c..38ad269906 100644
--- a/modules/exploits/linux/antivirus/escan_password_exec.rb
+++ b/modules/exploits/linux/antivirus/escan_password_exec.rb
@@ -107,6 +107,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
+ def autofilter
+ true
+ end
+
def exploit
@pl = generate_payload_exe
if @pl.blank?
diff --git a/modules/exploits/multi/http/coldfusion_rds.rb b/modules/exploits/multi/http/coldfusion_rds.rb
index 33e0c92090..bdeb327d67 100644
--- a/modules/exploits/multi/http/coldfusion_rds.rb
+++ b/modules/exploits/multi/http/coldfusion_rds.rb
@@ -148,6 +148,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
+ def autofilter
+ true
+ end
+
#task scheduler is pretty bad at handling binary files and likes to mess up our meterpreter :-(
#instead we use a CFML filedropper to embed our payload and execute it.
#this also removes the dependancy of using the probe.cfm to execute the file.
diff --git a/modules/exploits/multi/http/jboss_maindeployer.rb b/modules/exploits/multi/http/jboss_maindeployer.rb
index 846fd9daba..514a6a45b3 100644
--- a/modules/exploits/multi/http/jboss_maindeployer.rb
+++ b/modules/exploits/multi/http/jboss_maindeployer.rb
@@ -326,6 +326,10 @@ class Metasploit3 < Msf::Exploit::Remote
res
end
+ def autofilter
+ true
+ end
+
# Try to autodetect the target platform
def detect_platform(res)
if (res.body =~ /
/m)
diff --git a/modules/exploits/multi/http/oracle_reports_rce.rb b/modules/exploits/multi/http/oracle_reports_rce.rb
index a51b98785f..d95a151255 100644
--- a/modules/exploits/multi/http/oracle_reports_rce.rb
+++ b/modules/exploits/multi/http/oracle_reports_rce.rb
@@ -170,6 +170,10 @@ class Metasploit3 < Msf::Exploit::Remote
send_response(cli, @pl)
end
+ def autofilter
+ true
+ end
+
def upload_payload
print_status "#{peer} - Uploading payload ..."
path = "/#{@local_path}#{@payload_dir}#{@payload_name}"
diff --git a/modules/exploits/multi/http/struts_default_action_mapper.rb b/modules/exploits/multi/http/struts_default_action_mapper.rb
index f2365c7e34..af4acfdf6a 100644
--- a/modules/exploits/multi/http/struts_default_action_mapper.rb
+++ b/modules/exploits/multi/http/struts_default_action_mapper.rb
@@ -343,6 +343,10 @@ class Metasploit3 < Msf::Exploit::Remote
send_response(cli, @pl)
end
+ def autofilter
+ true
+ end
+
# wait for the data to be sent
def wait_payload
print_status("#{rhost}:#{rport} - Waiting for the victim to request the payload...")
diff --git a/modules/exploits/multi/misc/arkeia_agent_exec.rb b/modules/exploits/multi/misc/arkeia_agent_exec.rb
index 0087620e60..8570d5745b 100644
--- a/modules/exploits/multi/misc/arkeia_agent_exec.rb
+++ b/modules/exploits/multi/misc/arkeia_agent_exec.rb
@@ -552,4 +552,9 @@ class Metasploit3 < Msf::Exploit::Remote
register_files_for_cleanup("c:\\#{@down_file}.exe")
end
end
+
+ def autofilter
+ true
+ end
+
end
diff --git a/modules/exploits/multi/misc/java_jmx_server.rb b/modules/exploits/multi/misc/java_jmx_server.rb
index 5c1f979d8e..d5221281f4 100644
--- a/modules/exploits/multi/misc/java_jmx_server.rb
+++ b/modules/exploits/multi/misc/java_jmx_server.rb
@@ -93,6 +93,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
+ def autofilter
+ return true
+ end
+
def check
connect
diff --git a/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb b/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb
index 131a9b0928..bc505ad66f 100644
--- a/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb
+++ b/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb
@@ -59,6 +59,10 @@ class Metasploit3 < Msf::Exploit::Remote
send_response(cli, data)
end
+ def autofilter
+ true
+ end
+
def check
res = send_request_cgi({
'uri' => '/search',
diff --git a/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb b/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb
index 7d7ba20d87..4319647596 100644
--- a/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb
+++ b/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb
@@ -146,4 +146,8 @@ class Metasploit3 < Msf::Exploit::Remote
send_not_found(cli)
end
+ def autofilter
+ true
+ end
+
end
diff --git a/modules/exploits/unix/webapp/wp_pixabay_images_upload.rb b/modules/exploits/unix/webapp/wp_pixabay_images_upload.rb
index 81ab361db5..8ad684d180 100644
--- a/modules/exploits/unix/webapp/wp_pixabay_images_upload.rb
+++ b/modules/exploits/unix/webapp/wp_pixabay_images_upload.rb
@@ -63,6 +63,10 @@ class Metasploit3 < Msf::Exploit::Remote
"#{get_uri}.php"
end
+ def autofilter
+ true
+ end
+
def call_payload(file_name)
res = send_request_cgi({
'method' => 'GET',
diff --git a/modules/exploits/windows/http/rejetto_hfs_exec.rb b/modules/exploits/windows/http/rejetto_hfs_exec.rb
index 47b5642b25..7c24bcaf8f 100644
--- a/modules/exploits/windows/http/rejetto_hfs_exec.rb
+++ b/modules/exploits/windows/http/rejetto_hfs_exec.rb
@@ -81,6 +81,10 @@ class Metasploit3 < Msf::Exploit::Remote
remove_resource(get_resource)
end
+ def autofilter
+ true
+ end
+
def primer
file_name = rand_text_alpha(rand(10)+5)
file_ext = '.vbs'
diff --git a/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb b/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb
index 8afbdce80d..5b423dfa65 100644
--- a/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb
+++ b/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb
@@ -74,6 +74,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
+ def autofilter
+ true
+ end
+
def process_get(cli, request)
if request.uri =~ /#{@basename}(\d)\.bcl/
print_status("GET => Payload")