Commit Graph

50102 Commits (16b8cf705994aaa04a9fc7925585cd5a695583f3)

Author SHA1 Message Date
Matthew Kienow 8361dab983
Minor method comment change 2018-12-27 21:57:31 -05:00
Metasploit a7e44e39f1
Weekly dependency update 2018-12-27 10:05:39 -08:00
Brent Cook 66505790f9
Land #11179, Replace Sysrandom with Ruby default SecureRandom 2018-12-27 11:33:29 -06:00
Matthew Kienow 34e99c3857
Modify GET error message to match other servlets 2018-12-26 22:45:33 -05:00
Brent Cook 0d0356ccdd
Land #11126, Update sessions through the DBManager 2018-12-26 13:15:43 -06:00
Matthew Kienow ebc7a3a315
Replace sysrandom with ruby default securerandom 2018-12-26 13:40:44 -05:00
Mehmet İnce 4e8ad22a7a Adding CVE number 2018-12-26 13:15:36 +03:00
Metasploit 10be720843
automatic module_metadata_base.json update 2018-12-25 19:45:11 -08:00
Green-m 69e7956adf
Land #11174, Fix platform bug when upgrade shell.
The platform on windows powershell should be 'win', rather than
'windows', this bug leads to failure when upgrade powershell session
to meterpreter.
2018-12-26 11:31:39 +08:00
Mehmet İnce fa542b9691 Adding platform and arch to top level 2018-12-25 15:56:25 +03:00
L ee7120d63a fixed post/multi/manage/shell_to_meterpreter 2018-12-25 15:00:39 +08:00
Quentin Kaiser 53a3caba2b List the vulnerable application and versions affected + cleaner cleanup script. 2018-12-24 13:54:02 +01:00
Quentin Kaiser 18c844623a Remove extra spaces. 2018-12-24 13:48:07 +01:00
Quentin Kaiser b9d4a46972 And the output that corresponds to the new script. 2018-12-24 13:42:25 +01:00
Quentin Kaiser 46ee2a6c94 Add vulnerable version information + new reference regarding this exact vulnerability. 2018-12-24 13:40:12 +01:00
Quentin Kaiser e10792f4e6 Remove extra space. 2018-12-24 13:30:03 +01:00
Green-m 12a948dde5
Move down cmd_rerun to fix rspec issue. 2018-12-24 11:30:02 +08:00
@shellfail e6b2b6cee5
Update documentation/modules/exploit/linux/http/mailcleaner_exec.md
Co-Authored-By: mmetince <mmetince@users.noreply.github.com>
2018-12-22 23:16:51 +03:00
@shellfail 9a43507416
Update documentation/modules/exploit/linux/http/mailcleaner_exec.md
Co-Authored-By: mmetince <mmetince@users.noreply.github.com>
2018-12-22 23:16:43 +03:00
Matthew Kienow bad8176548
Change event info example specification
Allows API documentation to display the event model example correctly.
2018-12-21 22:24:59 -05:00
Matthew Kienow e9d40248f4
Add OpenAPI documentation for events GET operation 2018-12-21 22:24:20 -05:00
Matthew Kienow ff8c70f6af
Restore events test for remote DB 2018-12-21 22:19:09 -05:00
Matthew Kienow b5bc65c3bd
Add GET handler to query events 2018-12-21 22:18:10 -05:00
Matthew Kienow a448b26f73
Remove unnecessary argument default value 2018-12-21 22:13:52 -05:00
Matthew Kienow 5e971132f3
Enhance events method to fully query events 2018-12-21 22:07:43 -05:00
Matthew Kienow 7e10b38421
Add events method 2018-12-21 21:37:42 -05:00
Metasploit a457973702
automatic module_metadata_base.json update 2018-12-21 15:14:24 -08:00
Brent Cook b9742802aa
Land #11137, Clean up linux/local/vmware_alsa_config exploit module 2018-12-21 17:04:11 -06:00
Brent Cook af60cb642e
Land #11038, add REG_MULTI_SZ support for Meterpreter registry reads 2018-12-21 17:00:16 -06:00
Brent Cook 69d882eb54 bump payloads with REG_MULTI_SZ support 2018-12-21 16:53:51 -06:00
Brent Cook 9736e8252c Merge branch 'master' into land-11038- 2018-12-21 16:31:53 -06:00
Brent Cook 620c411d1f
Land #11160, Add CMDSTAGER::SSL datastore option 2018-12-21 15:33:19 -06:00
Metasploit 8f61fe457a
automatic module_metadata_base.json update 2018-12-21 13:16:16 -08:00
William Vu b4ff3b544f Add CMDSTAGER::SSL datastore option
It has come to my attention that since I added the HTTP(S) command
stagers, no one has used HTTPS. This is probably why.

The CmdStager options hash takes precedence over any datastore options.
2018-12-21 14:51:49 -06:00
Brent Cook 2e8e927a93
Land #11156, Add CmdStager to erlang_cookie_rce 2018-12-21 14:43:49 -06:00
William Vu 5cff330a38
Land #11128, Rex::Exploitation::CmdStagerFetch 2018-12-21 14:16:57 -06:00
William Vu d499c657ab Bump Gemfile.lock and LICENSE_GEMS 2018-12-21 14:16:25 -06:00
Jacob Robles 2e6f471f54
Land #11155, Fix typo 2018-12-21 08:15:51 -06:00
Jacob Robles 4bc871c499
Add CmdStager to erlang_cookie_rce 2018-12-21 07:33:37 -06:00
Garvit Dewan 3021a05553
Fix typo in report.rb 2018-12-21 17:51:46 +05:30
Green-m 06de47ce68
Enhance the command auto-complete in aux. 2018-12-21 18:03:57 +08:00
Alex 33bc2be34a
Merge pull request #1 from jrobles-r7/enhance/windows-chrome-cookies
Add Windows Support For Chrome Cookies
2018-12-21 11:54:00 +11:00
Metasploit 0471d69c16
automatic module_metadata_base.json update 2018-12-20 15:39:02 -08:00
Brent Cook b83c6ad496
Land #11149, fix a PTY leak in Python Meterpreter 2018-12-20 17:30:42 -06:00
Matthew Kienow 1280b0de20
Land #11150, make requirements check more verbose 2018-12-20 15:38:25 -05:00
Metasploit 1676f7306a
Weekly dependency update 2018-12-20 12:22:02 -08:00
asoto-r7 c2c8066f09
msfdb: Reverted back to unless and nil? 2018-12-20 13:28:47 -06:00
asoto-r7 30b914e4f0
msfdb: Added verbosity to 'missing requirements' error 2018-12-20 12:07:35 -06:00
Quentin Kaiser bf2de42077 Now supports all version of Consul. 2018-12-20 18:56:07 +01:00
Quentin Kaiser 0389262034 Merge branch 'consul_exec' of github.com:QKaiser/metasploit-framework into consul_exec 2018-12-20 18:41:56 +01:00