Brent Cook
09e721c4eb
See #6885 , merge tiny whitespace fix
2016-06-03 08:00:24 -05:00
Brent Cook
d5c2a8e3c8
whitespace
2016-06-03 07:59:48 -05:00
Brent Cook
d371fd0798
Land #6885 , add aux control module for PhoenixContact PLCs
2016-06-03 07:50:39 -05:00
Brent Cook
ba9a693435
condense a little more
2016-06-03 07:50:13 -05:00
Brent Cook
064d6b3f51
wording and formatting updates
2016-06-03 07:42:54 -05:00
wchen-r7
2423a336a4
Land #6937 , Magento Unserialize() Remote Code Execution
2016-06-02 17:14:07 -05:00
wchen-r7
1dad9bf7fa
Correct module doc path for magento_unserialize.md
2016-06-02 17:12:39 -05:00
wchen-r7
184802d7d1
Add documentation for magento_unserialize
2016-06-02 17:10:26 -05:00
wchen-r7
f333481fb8
Add vendor patch info
2016-06-02 16:41:06 -05:00
wchen-r7
7c9227f70b
Cosmetic changes for magento_unserialize to pass msftidy & guidelines
2016-06-02 16:34:41 -05:00
dmohanty-r7
a15c79347b
Add canon printer credential harvest module
...
Praedasploit
2016-06-02 16:07:28 -05:00
William Vu
9128ba3e57
Add popen() vuln to ImageMagick exploit
...
So... we've actually been sitting on this vuln for a while now. Now that
the cat's out of the bag [1], I'm updating the module. :)
Thanks to @hdm for his sharp eye. ;x
[1] http://permalink.gmane.org/gmane.comp.security.oss.general/19669
2016-06-02 11:35:37 -05:00
William Vu
43c82f764d
Land #6938 , typo fix for md5_lookup tool
2016-06-02 11:19:47 -05:00
James Barnett
e0cf4721c5
Land #6927 , Fix exception handling in #exploit_simple
2016-06-02 11:15:25 -05:00
Andrey
92b62d010f
Update md5_lookup.rb
...
:)
2016-06-02 18:49:22 +03:00
Brian Patterson
7dfb06d632
Land #6933 host tags commands eagerloaded instead of joining
2016-06-02 09:49:40 -05:00
Brian Patterson
dbc1cf4141
Merge remote-tracking branch 'upstream/master' into landing-6933
2016-06-02 09:42:39 -05:00
mr_me
4f42cc8c08
Added module
2016-06-02 09:24:10 -05:00
Brian Patterson
22bea44785
Land #6935 disable SSL tests that no longer work on Travis
2016-06-02 09:23:27 -05:00
h00die
68d647edf1
Merge branch 'master' of https://github.com/rapid7/metasploit-framework into op5
2016-06-01 18:05:18 -04:00
Brent Cook
c99505923f
disable SSL tests that no longer work on Travis
2016-06-01 16:33:34 -05:00
David Maloney
ffa4177575
missed a few joins
...
missed a few joins statements before
MS-1593
2016-06-01 15:32:51 -05:00
h00die
52d5028548
op5 config exec
2016-06-01 15:07:31 -04:00
David Maloney
2047475901
host tags commands eagerloaded instead of joining
...
someone tried to fix a rails deprecation warning by doing an
eager load, but caused an actual exception instead. switching to
propper joins makes everything work properly
MS-1593
2016-06-01 13:50:38 -05:00
a-marionette
7f92088242
Revised the SQL query for the exploits/unix/webapps/joomla_content_history_sqli_rce.rb. The exploit is now working for me.
2016-06-01 09:47:32 -07:00
root
d72492fe30
Add support for older Data Protector versions
...
Increases support by enabling all SSL ciphers. Some older versions
of DP only support weaker export ciphers not enabled by default.
2016-06-01 10:45:47 +01:00
wchen-r7
3109bfb8e4
Land #6930 , show full_uri in auxiliary/scanner/http/jenkins_enum
2016-05-31 22:21:33 -05:00
sho-luv
98cfcc65ae
Added IP address to returned information.
...
This scanner module doesn't tell you the location of the found information. So when using the -R option to fill the RHOSTS all you get is a bunch of successful findings, however you won't know to which systems they belong.
2016-05-31 19:47:00 -07:00
Ian Lovering
eb2398a446
Renamed hp_dataprotector_encrypted_comms
...
Renamed to match other data protector exploits
2016-05-31 22:58:32 +01:00
Ian Lovering
54c4771626
Exploit for HP Data Protector Encrypted Comms
...
Added exploit for HP Data Protector when using encrypted communications.
This has been tested against v9.00 on Windows Server 2008 R2 but should also work against older versions of DP.
2016-05-31 22:44:14 +01:00
David Maloney
a27d10c200
fixes the exception handling in #exploit_simple
...
The exception handling in the #exploit_simple method tries to set
error on exploit but exploit is defined within the begin block
causing a noMethodError on nilClass
MS-1608
2016-05-31 11:46:05 -05:00
wchen-r7
fb678564b1
Land #6923 , Check the correct check code for ms13_081_track_popup_menu
2016-05-31 11:40:02 -05:00
h00die
8ce59ae330
travis fixes
2016-05-31 05:46:20 -04:00
Metasploit
c35322ec3f
Bump version of framework to 4.12.6
2016-05-30 22:34:13 -07:00
h00die
3163af603d
md fix
2016-05-30 10:25:49 -04:00
h00die
057947d7e8
ipfire proxy exec
2016-05-30 10:24:17 -04:00
h00die
9b5e3010ef
doc/module cleanup
2016-05-30 06:33:48 -04:00
h00die
df55f9a57c
first add of ipfire shellshock
2016-05-29 20:40:12 -04:00
Tijl Deneut
2c4b387eb2
Update phoenix_command.md
2016-05-28 15:35:00 +02:00
Tijl Deneut
2afcda9d49
Did some more rubocopy work and
...
added module documentation
2016-05-28 15:32:18 +02:00
James Lee
f7382f5b3b
Make `jobs` display a full uri
...
Addresses the problem of LURI taking the place of URIPATH, which has
different semantics.
See #4623
2016-05-27 11:15:12 -05:00
Bruno Morisson
01a691a46c
Update sap_router_portscanner.rb
...
Added additional SAP TCP/IP ports for sap_port_info function.
ref: https://wiki.scn.sap.com/wiki/display/TCPIP/Services
2016-05-27 14:43:16 +01:00
Brendan Watters
00b18c8ac5
Land #6917 , Fix minor issues with the RC4 stager
2016-05-26 10:12:54 -05:00
Tijl Deneut
552b672893
Merge pull request #1 from bcook-r7/land-6885-
...
Fixes for https://github.com/rapid7/metasploit-framework/pull/6885
2016-05-26 15:10:11 +02:00
Brent Cook
a3d2cba698
Land #6906 , Improve msfvenom error handling and spec coverage
2016-05-26 07:58:37 -05:00
Brent Cook
c2cf992560
added spec for #6915
2016-05-26 07:57:17 -05:00
Brent Cook
96c459c71d
fix #6915 , handle nil payloads and alert to the user
2016-05-26 07:22:09 -05:00
Brent Cook
8612eaa553
remove senduuid for now, give RC4PASSWORD a default
2016-05-26 06:34:51 -05:00
wchen-r7
fb95abc645
Land #6909 , Add WordPress Ninja Forms unauthenticated file upload
2016-05-25 15:40:10 -05:00
wchen-r7
14e1baf331
Minor style changes
2016-05-25 15:39:26 -05:00