Commit Graph

51371 Commits (1e5253b0eb6a7f62bdd9065a58065d5e205d6d83)

Author SHA1 Message Date
h00die 1e5253b0eb add python and generate bcrypt on fly 2019-04-13 10:36:56 -04:00
h00die 0739f5080a expand hashes identify library and add spec 2019-04-12 17:08:19 -04:00
Brent Cook 69dedcac98
Land #11704, Fix duplicate host header 2019-04-09 21:22:46 -05:00
Jacob Robles 4777fb7618
Update syntax to match 2019-04-09 20:05:00 -05:00
Metasploit 5e70904ab8
automatic module_metadata_base.json update 2019-04-09 12:04:19 -07:00
Shelby Pace 4d0a41ff1a
Land #11657, add Horde form file upload 2019-04-09 13:47:59 -05:00
Shelby Pace 4018d47b65
changed if not to unless 2019-04-09 13:43:54 -05:00
Jacob Robles ee23a1557e
Fix duplicate host header 2019-04-09 09:08:34 -05:00
RatioSec Research b56e171172 Fix extraction of session tokens 2019-04-09 09:28:52 +01:00
Brent Cook a5184d39dc
Land #11702, use a released metasm gem for update 2019-04-08 18:12:01 -05:00
Jeffrey Martin dfd35cd7e3
Bump to released metasm 1.0.4 2019-04-08 17:55:43 -05:00
Jeffrey Martin 8502f0cc53
Land #11701, Bump rex-powershell version to 0.1.80 2019-04-08 16:07:08 -05:00
Pearce Barry 0e33a55805
Bump rex-powershell gem version to 0.1.80...
...to pick up https://github.com/rapid7/rex-powershell/pull/18.
2019-04-08 16:00:02 -05:00
Metasploit 3c2c42677d
automatic module_metadata_base.json update 2019-04-08 08:55:07 -07:00
Brent Cook e32bb9e915
Land #11682, don't check 'localhost' unconditionally, fix headers 2019-04-08 10:39:18 -05:00
Brent Cook e9eb008a7a
Land #11699, fix Failure scoping for psexec 2019-04-08 10:29:02 -05:00
Brent Cook 0308f80c0e fix Failure scoping (needed for libraries) 2019-04-08 09:57:22 -05:00
Brent Cook 24a1dc856a
Land #11694, early merge fix for https://github.com/jjyg/metasm/pull/39 2019-04-08 09:10:15 -05:00
Jeffrey Martin e8eed3bb6a
use branched metasm until 2.5 fix is released 2019-04-06 19:50:23 -05:00
Metasploit b2be6bb75c
automatic module_metadata_base.json update 2019-04-06 13:52:56 -07:00
Pearce Barry 7e62a69e16
Land #11660, Update use_single_quotes to wrap_double_quotes 2019-04-06 15:44:39 -05:00
Metasploit 0c7e589db8
automatic module_metadata_base.json update 2019-04-04 13:32:00 -07:00
Shelby Pace fff129ae9f
Land #11587, add Wordpress core RCE module 2019-04-04 15:22:56 -05:00
Shelby Pace 6efd80e139
added note in info 2019-04-04 15:19:58 -05:00
Shelby Pace 2884d9afcb
modified checks, added function 2019-04-04 15:09:12 -05:00
Metasploit 2710c422c2
Bump version of framework to 5.0.16 2019-04-04 10:08:31 -07:00
Metasploit 45752affd0
automatic module_metadata_base.json update 2019-04-03 17:29:13 -07:00
William Vu a2165a2954
Land #11685, proper XML encoding for Wemo exploit 2019-04-03 19:20:43 -05:00
William Vu e164c2350c Properly encode command input with XML entities
REXML would make this less ghetto.
2019-04-03 19:10:27 -05:00
Shelby Pace d5ac1e3a33
minor adjustments to indentation and requests 2019-04-03 19:03:47 -05:00
Metasploit 40a3f3c24f
automatic module_metadata_base.json update 2019-04-03 12:51:31 -07:00
Adam Cammack de6397445c
Land #11681, Remove trailing space in metadata 2019-04-03 14:34:41 -05:00
Javan Rasokat 8350effaa5
Fixed wrong check (did never work)
* HOST was always localhost 
* Now sends both Range and the legacy 'Request-Range'
TODO: Method HEAD is not always sufficient, should be editable
2019-04-03 16:23:58 +02:00
Ben Schmeckpeper 7d1f6afd4a Remove trailing space from CVE reference 2019-04-03 09:21:55 -05:00
Metasploit ced68536ab
automatic module_metadata_base.json update 2019-04-02 13:04:27 -07:00
William Vu bc4857954e
Land #11679, duplicate mailcleaner_exec CVE fix 2019-04-02 14:55:36 -05:00
todb-r7 9e3984ea51
Remove duplicate CVE for Mailcleaner module
See #11304
2019-04-02 12:51:09 -05:00
Brent Cook 94eb039bd3
Land #11677, add missing payload specs 2019-04-02 07:23:16 -05:00
wilfried 3081b13a1f Adding payload in exploit code 2019-04-02 10:24:48 +02:00
Metasploit 46535074f6
automatic module_metadata_base.json update 2019-04-01 16:24:03 -07:00
Jeffrey Martin a53ce7539d
add missing payload specs 2019-04-01 18:23:52 -05:00
surefire 1b6cd64016 Land #11136, exploit/multi/misc/weblogic_deserialize_unicastref 2019-04-01 18:15:26 -05:00
surefire 40191e5a01 Dissected JSOs, randomized strings, copied T3 header breakdown from @acamro 2019-04-01 18:05:45 -05:00
Metasploit 601719f0e8
automatic module_metadata_base.json update 2019-04-01 14:07:11 -07:00
William Vu 06397bb087
Land #11636, postgres_createlang version check fix 2019-04-01 15:21:57 -05:00
Metasploit 3318f52524
automatic module_metadata_base.json update 2019-04-01 12:20:28 -07:00
surefire f292befed4 Land #11134, exploit/multi/misc/weblogic_serialize_marshalledobject 2019-04-01 14:11:30 -05:00
surefire 4d0e47044b Fixed a hardcoded payload length resulting in 40% failures 2019-04-01 14:05:39 -05:00
Brendan Coles ddbd7ba080 Case insensitive match 2019-04-01 18:58:14 +00:00
Metasploit 66a6b61441
automatic module_metadata_base.json update 2019-04-01 10:47:23 -07:00