Commit Graph

51148 Commits (2a0e3690dba0553cd8d8bee7a15d74f277be511e)

Author SHA1 Message Date
William Vu 6c4729de7e Prefer a soft error for invalid module names 2019-03-11 22:54:34 -05:00
William Vu c06190c122 Revert Msf::ModuleLoadError exception
Msf::Modules::Error is already a thing! My bad.
2019-03-11 22:34:37 -05:00
William Vu fd20d29fd7
Land #11551, jobify fix for aux modules 2019-03-11 16:33:55 -05:00
Fabio Cogno e906ecb163 Add a function to check extensions 2019-03-11 22:23:11 +01:00
Metasploit 6ad2d380dd
automatic module_metadata_base.json update 2019-03-11 14:00:51 -07:00
Brent Cook 896f4cd933
Land #11543, tweak rubocop settings 2019-03-11 15:50:05 -05:00
Brent Cook 5ee43d43d6
Land #11544, add reregister_tcp/udp_options 2019-03-11 15:49:23 -05:00
Brent Cook b731f3e619 remove Ruby 2.2 constraint 2019-03-11 15:32:25 -05:00
Metasploit 8112978aac
automatic module_metadata_base.json update 2019-03-11 13:19:00 -07:00
Shelby Pace a4c1181b9f
Land #11545, Add elFinder Command Injection 2019-03-11 15:01:46 -05:00
Brent Cook d14ace42ed fix jobify support with aux modules
Looks like we hit another bug involving variable scope in parameters passed down to run_simple via 'run_single'. Since 'run_single' doesn't actually even run a single invocation of a module, let's just unwind that function, and get the rest of the parameters passed down.

This also explicitly disables 'jobify' support for non-scanner aux modules with multiple targets, which I don't think we're ready for until we add the RHOSTS iteration to the module proper. Otherwise, we'll have an explosion of jobs in the current implementation.
2019-03-11 14:20:34 -05:00
Fabio Cogno bb7be797b4 Add documentation 2019-03-10 23:03:16 +01:00
Fabio Cogno 8822b82a28 Refactory and fix 2019-03-10 22:39:27 +01:00
Fabio Cogno 14e0643962 Refactory and fix 2019-03-10 19:33:08 +01:00
Fabio Cogno 0a5964d2a4 Add Total.js Directory Traversal module 2019-03-10 18:47:53 +01:00
Fabio Cogno eb6f0d5620 Add Total.js Directory Traversal module 2019-03-10 17:57:24 +01:00
rwincey 59fc1ec7ab Rubocop changes 2019-03-09 12:22:04 -05:00
Brendan Coles 6d14a53c80 Update tested versions 2019-03-09 04:41:51 +00:00
Brent Cook 19e6507ac4 tweak rubocop disabling some less desirable noise 2019-03-08 21:55:21 -06:00
Brendan Coles 601dc1c79b Add documentation 2019-03-09 03:24:26 +00:00
Brendan Coles 9aa01c9ed2 Add elfinder_php_connector_exiftran_cmd_injection exploit 2019-03-09 03:24:18 +00:00
Brent Cook 172a984d60 add deregister_tcp/udp_options 2019-03-08 16:04:32 -06:00
Brent Cook 1bf93ab1bc
Land #11061, allow the possibilty of empty string values for datastore options in msf5 2019-03-08 09:27:50 -06:00
Metasploit 0b39b6efc7
automatic module_metadata_base.json update 2019-03-07 16:25:17 -08:00
Brent Cook 7c97ca6a8e
Land #11535, add deregister_http_client_options 2019-03-07 18:16:14 -06:00
Metasploit 6b6069e907
automatic module_metadata_base.json update 2019-03-07 10:34:08 -08:00
Wei Chen cf19a711fd
Land #11427, Add Fortinet SSL VPN Bruteforce Login Utility 2019-03-07 12:25:41 -06:00
Metasploit 1588928b44
Bump version of framework to 5.0.11 2019-03-07 10:06:39 -08:00
Brent Cook 656ef8f970
Land #11533, Fix credential reporting service lookups 2019-03-06 20:13:41 -06:00
Brent Cook 3670dd8067
Land #11521, add RMI support for UnicastRef2 responses 2019-03-06 20:05:33 -06:00
Metasploit 76de3b12a7
automatic module_metadata_base.json update 2019-03-06 18:02:18 -08:00
Brent Cook 468679f907
Land #11092, Add FreeBSD 8.3 / 9.0 Intel SYSRET Privilege Escalation module 2019-03-06 19:50:08 -06:00
Brent Cook 9ca5ac294d
Land #10012, Add an Android module to run payloads with su on a rooted device 2019-03-06 19:46:33 -06:00
Brent Cook 433af12942 add deregister_http_client_options 2019-03-06 19:37:56 -06:00
Brent Cook 841c07a42c restore rescue for now 2019-03-06 19:35:12 -06:00
Metasploit 15c58db3be
automatic module_metadata_base.json update 2019-03-06 16:00:53 -08:00
Brent Cook 7347db65a6
Land #11534, fix module title for sonicwall_xmlrpc_rce 2019-03-06 17:44:39 -06:00
Brent Cook eb15c457fe
Land #11524, remove some unused bits from modules 2019-03-06 17:43:20 -06:00
Brent Cook 8b251934ab remove mixin, just register the options 2019-03-06 17:42:27 -06:00
Brent Cook d923e1fb84
Land #11523, remove unneded RHOST reregister in scanners 2019-03-06 17:35:54 -06:00
Patrick Webster d67bfdfea4
Fix module heading and typo
The newline in the name breaks the msfconsole output
2019-03-07 10:29:15 +11:00
Brent Cook 4f08d1e864 Fix credential reporting service lookups.
Noted by @actuated, auxiliary/scanner/ipmi/ipmi_dumphashes was displaying an error when run against an IPMI endpoint that had a common hash. This was due to the services lookup in the database not extracting the first element of the results array.

```
[-] Auxiliary failed: NoMethodError undefined method `id' for #<Array:0x000055615614b970>
[-] Call stack:
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/credential_data_proxy.rb:27:in `block (2 levels) in create_cracked_credential'
[-]   /home/bcook/.rvm/gems/ruby-2.6.1@metasploit-framework/gems/activerecord-4.2.11/lib/active_record/relation/delegation.rb:46:in `each'
[-]   /home/bcook/.rvm/gems/ruby-2.6.1@metasploit-framework/gems/activerecord-4.2.11/lib/active_record/relation/delegation.rb:46:in `each'
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/credential_data_proxy.rb:25:in `block in create_cracked_credential'
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/credential_data_proxy.rb:15:in `create_cracked_credential'
[-]   /home/bcook/projects/metasploit-framework/lib/msf/core/auxiliary/report.rb:26:in `create_cracked_credential'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:317:in `report_cracked_cred'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:244:in `block (2 levels) in run_host'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:237:in `each'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:237:in `block in run_host'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb💯in `each'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb💯in `run_host'
[-]   /home/bcook/projects/metasploit-framework/lib/msf/core/auxiliary/scanner.rb:111:in `block (2 levels) in run'
[-]   /home/bcook/projects/metasploit-framework/lib/msf/core/thread_manager.rb:106:in `block in spawn'
[*] Auxiliary module execution completed
```
2019-03-06 17:08:34 -06:00
Aaron Soto 789e2d57b4
Land #11532, Cleanup changes from DB Manager for Payloads 2019-03-06 13:39:42 -06:00
Matthew Kienow f873d94c10
Check that DB is active before looking up payload 2019-03-06 14:22:32 -05:00
Matthew Kienow 6bcdda4bd1
Add entry to autoload RemotePayloadDataService 2019-03-06 13:41:08 -05:00
Matthew Kienow 63c1903032
Remove empty file 2019-03-06 13:11:34 -05:00
Matthew Kienow a749b86730
Add missing ActiveRecord connection block 2019-03-06 13:07:35 -05:00
Matthew Kienow b658cf5d76
Use data_service_operation block to perform work 2019-03-06 12:11:27 -05:00
Metasploit 6d42964728
automatic module_metadata_base.json update 2019-03-05 23:49:34 -08:00
William Vu 50f89321a0
Land #11419, systemd user service persistence 2019-03-06 01:39:58 -06:00