Brendan Coles
1eeb1005db
Update modules/auxiliary/admin/oracle/oracle_index_privesc.rb
...
Use print_error for errors and print the error details,
Co-Authored-By: moshekaplan <me@moshekaplan.com>
2018-11-30 09:39:57 -05:00
Julien Legras
6874dddc55
Fix space at EOL and sed replace
2018-11-30 15:26:14 +01:00
Julien Legras
a4ee221333
Fixed the timeout for web requests
2018-11-30 14:47:41 +01:00
Jacob Robles
8047bf2b09
Add authenticating... message
2018-11-30 07:24:35 -06:00
Jacob Robles
b31afb4e3d
Spaces at EOL fixes
2018-11-29 17:29:05 -06:00
Jacob Robles
fcbc0cddba
Land #11035 , improve fingerprinting for Cisco ASA VPN scanner
2018-11-29 16:41:22 -06:00
Jacob Robles
dec08a0b43
Land #10954 , apache spark unauth rce module
2018-11-29 13:56:21 -06:00
Jacob Robles
88ca775fd3
Land #10952 , WP GDPR Compliance plugin exploit
2018-11-29 13:31:31 -06:00
Julien Legras
160015d3a7
Check the HTTP response first
2018-11-29 18:54:07 +01:00
Julien Legras
984354194f
Check the HTTP response first
2018-11-29 18:49:41 +01:00
bwatters-r7
1304f93f1f
Add more checks and a cleanup function
2018-11-29 10:39:46 -06:00
Jacob Robles
01af176679
Change delay implementation
2018-11-29 10:05:47 -06:00
Jacob Robles
ed6c2896e3
Remove duplicate check
2018-11-29 10:04:51 -06:00
Jacob Robles
8508824cc2
Modify check logic
2018-11-29 10:04:05 -06:00
Julien Legras
2b61c4e118
Fixes for PR
2018-11-29 15:02:03 +01:00
Thomas Gregory
a4c3b8edc7
Add CyberLink LabelPrint < 2.5 - Local Buffer Overflow (SEH Unicode)
...
Add CyberLink LabelPrint < 2.5 - Local Buffer Overflow (SEH Unicode)
2018-11-29 20:20:05 +07:00
Jacob Robles
3de07f1bff
Add Notes metadata and warning
2018-11-29 06:35:37 -06:00
Jacob Robles
bfaa6cb416
Add module suggestion
2018-11-29 06:23:45 -06:00
epi
5058afb615
Fixed lport and scopeid offsets.
...
Offsets for scopeid and lport were incorrect in the previous commit.
Updated offsets to the correct values. Confirmed by viewing the connect
syscall values with strace.
2018-11-29 05:42:54 -06:00
epi
947f5ffbf3
Add Linux x86_64 IPv6 Inline Reverse Shell
...
Implements inline x86_64 Linux reverse bourne shell over IPv6.
2018-11-28 21:58:12 -06:00
Green-m
4888ec0c29
Delete unused variable.
2018-11-29 10:48:25 +08:00
Jacob Robles
6845f44a2e
Logic...
2018-11-28 20:26:27 -06:00
Jacob Robles
2864c30965
Fix fail_with issue
2018-11-28 20:18:03 -06:00
Jacob Robles
e142f5716e
Update documentation
2018-11-28 19:08:01 -06:00
Jacob Robles
1af7cf2b3b
Update print statements
2018-11-28 18:03:55 -06:00
Jacob Robles
c4959da77f
Email validation and user registration
2018-11-28 17:56:55 -06:00
Jacob Robles
9c0c9b3ba9
Use warnings when changing config options
2018-11-28 17:44:02 -06:00
Jacob Robles
43cef24f6b
Fix version check
2018-11-28 17:43:33 -06:00
Brent Cook
bff261616c
improve fingerprinting for Cisco ASA VPN scanner
2018-11-28 14:30:17 -06:00
asoto-r7
504237c77a
Land #10877 , ibm-mq-login username/password checker
2018-11-28 11:36:53 -06:00
asoto-r7
84f0a59fe6
ibm_mq_login: Added support for WebSphere 9 via the PASSWORD option
2018-11-28 11:08:37 -06:00
Green-m
ca0a2684f5
Randomize payload main class.
2018-11-28 11:26:51 +08:00
Brent Cook
b3ad4a0358
Land #11033 , update refs for imap_open vulnerability
2018-11-27 20:23:46 -06:00
h00die
e3e7285288
Land #9946 a UEB local priv escalation
2018-11-27 21:19:34 -05:00
h00die
38a99ac90a
ueb privesc updates
2018-11-27 21:18:05 -05:00
h00die
4af5ab3089
ueb privesc updates
2018-11-27 21:14:05 -05:00
h00die
63125bbc1a
update imap_open refs
2018-11-27 20:31:57 -05:00
Wei Chen
d6db5ebdfe
Land #10716 , Create PureVPN Credential Collector Post Explotation Module
2018-11-27 17:42:23 -06:00
Brendan Coles
180876d8fc
Add check for SMAP
2018-11-27 23:24:02 +00:00
bwatters-r7
503a544c17
Merge branch 'master' of github.com:rapid7/metasploit-framework into upstream-master
2018-11-27 16:57:39 -06:00
Brent Cook
b05bb616bf
Land #10987 , add exploit for PHP imap_open function against various web apps
2018-11-27 16:44:51 -06:00
Wei Chen
830a80e598
Check -1 user/pass condition and improved exception handling
2018-11-27 16:23:09 -06:00
Brent Cook
66cae6240f
Land #10994 , Added exploit for CVE-2018-18955
2018-11-27 16:12:05 -06:00
Shelby Pace
6712363bb5
Land #10737 , add TeamCity XML-RPC exploit module
2018-11-27 14:59:37 -06:00
Shelby Pace
56f14733a9
changed cmd_stager flavor to printf
2018-11-27 14:23:56 -06:00
Wei Chen
d523124faf
Land #10965 , Add the macOS LPE from pwn2own2018 (CVE-2018-4237)
2018-11-27 14:00:35 -06:00
Brendan Coles
398987e94a
::File.binread
2018-11-27 18:58:05 +00:00
Brendan Coles
45ca248568
chmod
2018-11-27 18:39:03 +00:00
Brendan Coles
aae86241ef
Update version check
2018-11-27 18:13:29 +00:00
William Vu
befca0f2fe
Land #10949 , ForceExploit for Linux local exploits
2018-11-27 11:23:03 -06:00
Wei Chen
1f2827c3d0
Land #10975 , More Capture Docs
2018-11-26 13:51:57 -06:00
Brent Cook
0fddb8e31c
Land #10768 , Exploit for Netgear CVE-2016-1555
2018-11-26 11:45:10 -06:00
bwatters-r7
14b2cdc120
Land #10886 , Bypassuac computerdefault
...
Merge branch 'land-10886' into upstream-master
2018-11-26 11:19:46 -06:00
Brent Cook
0b6c73a7d4
Land #11019 , Replace WsfDelay with WfsDelay
2018-11-26 10:59:04 -06:00
Brent Cook
7b4b573942
Land #9915 , Cleanup and improvements to influxdb_enum
2018-11-26 10:25:07 -06:00
h00die
e2d58afe13
cleaned up code, added custom
2018-11-25 10:59:53 -05:00
Brendan Coles
5c06cdca73
Replace WsfDelay with WfsDelay - Fixes #11018
2018-11-25 05:09:16 +00:00
Brendan Coles
be6cfde921
Land #11015 , Fix payload and console check for Xorg_privesc Linux targets
2018-11-25 04:51:27 +00:00
Aaron Ringo
93db7b399f
Using Wfsdelay instead of sleep loop, users get shells ASAP
2018-11-24 22:26:04 -06:00
Brendan Coles
debf79416b
Replace WsfDelay with WfsDelay - Fixes #11018
2018-11-25 04:22:11 +00:00
Brendan Coles
01ed57cbb3
Remove check for nosuid
2018-11-25 01:53:07 +00:00
Brendan Coles
ff23a006b7
cleanup
2018-11-25 00:16:39 +00:00
Aaron Ringo
1783617770
consolelock check updated to use id, payload upload changed, documentation updated, misc formatting
2018-11-24 15:10:21 -06:00
h00die
945755b058
add custom php_imap target
2018-11-24 14:18:13 -05:00
h00die
45f2c5beb2
update php_imap_open docs
2018-11-24 07:26:42 -05:00
h00die
e36cef3b96
e107 exploitable now
2018-11-23 20:16:53 -05:00
L
f4cbdc8e3e
No Threads in datastore
2018-11-23 17:15:33 +08:00
William Vu
8a402da056
Explain "junk" in buffer for morris_fingerd_bof
...
And unrelated whitespace changes because I suck.
2018-11-22 23:15:12 -06:00
Moshe Kaplan
0a2c0751fa
Randomize more
2018-11-22 15:25:51 -05:00
Brent Cook
a59913434d
Land #10916 , Xorg SUID privesc
2018-11-21 19:46:11 -06:00
Brent Cook
5d9195fe72
Land #10981 , start printjob docs and bug fixes
2018-11-21 16:35:02 -06:00
Brent Cook
5fed559264
Land #10997 , Remove harmful default command to execute
2018-11-21 16:19:40 -06:00
asoto-r7
96ede80dc4
Land #10876 , ibm_mq_enum: IBM WebSphere MQ Name and Version Enumeration
2018-11-21 16:10:59 -06:00
asoto-r7
a3131f15de
ibm_mq_enum: Code cleanup, server channel and general exception handling improvements
2018-11-21 16:09:18 -06:00
Adam Cammack
188d94027c
Land #10996 , Check `check` code for ms15-034
2018-11-21 14:45:56 -06:00
David Yates
e706e2b58d
Remove harmful default command to execute
2018-11-21 11:09:13 +02:00
L
ae3538952a
Fix ms15-034 module
2018-11-21 12:31:56 +08:00
Green-m
2197da4cd9
Fix code as jrobles suggest.
2018-11-21 11:24:50 +08:00
h00die
acf421ffb0
remove eol spaces
2018-11-20 19:45:17 -05:00
h00die
31ad58fb91
edb and author
2018-11-20 19:30:43 -05:00
h00die
4111a61e1a
fix module description
2018-11-20 18:35:20 -05:00
h00die
4c59a271e2
added suitecrm to imap_open exploit
2018-11-20 18:33:42 -05:00
asoto-r7
7084538b8c
ibm_mq_channel_brute: Exception handling when channel.length > 20 chars
2018-11-20 16:24:17 -06:00
asoto-r7
d2a5b966f3
Land #10875 , IBM WebSphere MQ Channel Name Bruteforce auxiliary module
2018-11-20 16:23:23 -06:00
Shelby Pace
288d78d372
Land #10352 , Add check/response for CVE-2017-12149
2018-11-20 13:11:05 -06:00
Brent Cook
d5d8216377
Land #10977 , Add documentation and some enhancement to freesshd_authbypass module
2018-11-20 11:44:49 -06:00
Brent Cook
bccb0972cf
Land #10984 , don't examine a nil object in ms15_034_ulonglongadd
2018-11-20 08:37:48 -06:00
Shelby Pace
63a2396626
updated testing branch to branch off master
2018-11-20 08:14:19 -06:00
Brendan Coles
eb17c45000
Add Linux Nested User Namespace idmap Limit Local Privilege Escalation module
2018-11-20 14:10:28 +00:00
Brendan Coles
901b51f247
Update modules/auxiliary/scanner/http/iis_shortname_scanner.rb
...
Co-Authored-By: egre55 <34132245+egre55@users.noreply.github.com>
2018-11-20 11:13:17 +00:00
Brendan Coles
6c382ba711
Update modules/auxiliary/scanner/http/iis_shortname_scanner.rb
...
Co-Authored-By: egre55 <34132245+egre55@users.noreply.github.com>
2018-11-20 11:13:05 +00:00
Brendan Coles
5e513b209d
Update modules/auxiliary/scanner/http/iis_shortname_scanner.rb
...
Co-Authored-By: egre55 <34132245+egre55@users.noreply.github.com>
2018-11-20 11:12:51 +00:00
Tim W
3829cc11bb
add DEBUG_EXPLOIT option
2018-11-20 17:58:36 +08:00
Tim W
57bad6b213
move offsets to hash
...
fix
2018-11-20 17:58:34 +08:00
Green-m
9884bea84e
Update the reference link.
2018-11-20 17:39:01 +08:00
Green-m
9f573d6f27
Fix code as jrobles suggest.
2018-11-20 16:54:22 +08:00
Tim W
bee3c3d4d3
add documentation
2018-11-20 16:53:34 +08:00
Tim W
44b1b6fe31
fix forking
2018-11-20 15:58:55 +08:00
Shelby Pace
52df29ebcc
test on branch off master
2018-11-19 15:08:38 -06:00
Brent Cook
509e1c2587
Land #10973 , Rework DisclosureDate check in msftidy, including ISO 8601 support
2018-11-19 10:46:18 -06:00
h00die
a28feed7d8
fix normalize and date
2018-11-19 04:00:58 -05:00
Shaksham Jaiswal
d904b93ec9
fixed is_vul
2018-11-19 13:39:08 +05:30
h00die
4b09584047
php_imap_open_rce
2018-11-18 21:28:19 -05:00
egre55
4a22656005
fixes
2018-11-18 21:56:51 +00:00
egre55
8b63c85bd2
fixes
2018-11-18 21:21:28 +00:00
Brendan Coles
467e0877f5
res.code
2018-11-18 12:40:09 +00:00
h00die
7ecdaa09c5
start printjob docs and bug fixes
2018-11-17 21:17:12 -05:00
Imran E. Dawoodjee
b679bfa3d9
Carriage return errors fixed.
2018-11-18 03:29:17 +08:00
Imran E. Dawoodjee
fd0f40a141
Add PowerShell as a separate target then set it as default.
2018-11-18 03:20:48 +08:00
Carsten Maartmann-Moe
cbdcd367ee
Minor print out mod
2018-11-16 20:31:34 +01:00
christopher lee
2deaf198b3
Added module docs
2018-11-16 13:29:22 -06:00
Brendan Coles
6f094799b6
Update modules/exploits/windows/http/hp_imc_java_deserialize.rb
...
Print payload length
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-16 20:20:52 +01:00
Brendan Coles
709befea5c
Update modules/exploits/windows/http/hp_imc_java_deserialize.rb
...
Fixed if/else block return
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-16 20:19:23 +01:00
William Vu
90b9204703
Update DisclosureDate to ISO 8601 in my modules
...
Basic msftidy fixer:
diff --git a/tools/dev/msftidy.rb b/tools/dev/msftidy.rb
index 9a21b9e398..e9ff2b21e5 100755
--- a/tools/dev/msftidy.rb
+++ b/tools/dev/msftidy.rb
@@ -442,6 +442,8 @@ class Msftidy
# Check disclosure date format
if @source =~ /["']DisclosureDate["'].*\=\>[\x0d\x20]*['\"](.+?)['\"]/
d = $1 #Captured date
+ File.write(@full_filepath, @source.sub(d, Date.parse(d).to_s))
+ fixed('Probably updated traditional DisclosureDate to ISO 8601')
# Flag if overall format is wrong
if d =~ /^... (?:\d{1,2},? )?\d{4}$/
# Flag if month format is wrong
2018-11-16 12:18:28 -06:00
Imran E. Dawoodjee
08b3efa046
Enhanced module and added documentation.
2018-11-16 21:18:45 +08:00
Aaron Ringo
a174c606aa
Changed SELINUX check to use built in methods
2018-11-16 04:22:18 -06:00
h00die
189f29e534
Land #10572 eaton ssh private key scanner
2018-11-15 17:16:36 -05:00
h00die
de014f0599
remove variable only used once
2018-11-15 17:14:13 -05:00
h00die
8b4cf2c3e2
Merge branch 'master' of https://github.com/rapid7/metasploit-framework into capture_docs2
2018-11-15 17:02:50 -05:00
h00die
3d53170694
fail_with instead of error and return
2018-11-15 17:01:52 -05:00
Carsten Maartmann-Moe
680393d4d6
Refined check method to actually verify vulnerability
2018-11-15 22:31:31 +01:00
Tim W
420be60900
add CVE-2018-4237
2018-11-15 08:48:10 +08:00
Tim W
2c30459a1b
add CVE-2018-4233 and CVE-2018-4404
2018-11-15 08:44:18 +08:00
Christopher Lee
38bea6c29c
Added msmailprobe to msf
2018-11-14 16:15:11 -06:00
Chris Higgins
4987f67b9b
Land #10925 , smb_login error/status message
2018-11-14 13:19:04 -06:00
Jacob Robles
795aa3c99c
Land #10828 , git submodule url exec CVE-2018-17456
2018-11-14 12:39:13 -06:00
Julien Legras
02f2a2828e
Fix references CVE and WPVDB
2018-11-14 18:19:12 +01:00
Julien Legras
3daec992c8
Fix indentation
2018-11-14 18:08:31 +01:00
Jacob Robles
798d3156bc
Print git command for module
2018-11-14 10:57:36 -06:00
Julien Legras
b9348bd579
Added the CVE number in the references
2018-11-14 16:52:57 +01:00
Julien Legras
5f9570cbcf
Added WordPress Duplicator <= 1.2.40 and documentation
2018-11-14 16:39:42 +01:00
Green-m
f43aaac290
Clean code.
2018-11-14 16:48:39 +08:00
Aaron Ringo
4fc047db87
Added advanced option to check console lock on linux systems, default true & updated docs
2018-11-13 22:33:12 -06:00
Green-m
7cc4d09a92
Clean code.
2018-11-14 10:35:38 +08:00
Shelby Pace
5e85683228
removed to_s from string
2018-11-13 15:28:55 -06:00
BrianWGray
3849d5de18
resolve description update request
2018-11-13 16:21:43 -05:00
Shelby Pace
ac8932c144
update 9631 to a current branch
2018-11-13 15:15:25 -06:00
Alex Gonzalez
da134f06e3
Updated check method
...
Fixed check method and redundant variable declarations
2018-11-13 16:01:40 -05:00
Brent Cook
f2712ecdf6
Land #10607 , Add External Module: office365userenum.py
2018-11-13 10:57:05 -06:00
Green-m
7a4770790c
Land #10938 , add docs for modules and fix bug.
...
Add docs for auxiliary module http_basic/imap/mysql, and fix a bug
in modules/auxiliary/server/capture/mysql.rb
2018-11-13 16:22:03 +08:00
thomas.labadie
11a2fa7f0d
Space at EOL removed from description
2018-11-13 00:23:21 +01:00
thomas.labadie
9d1554498d
WP GDPR Compliance plugin exploit - privsec to admin registering
2018-11-12 23:33:47 +01:00
Aaron Ringo
538055c406
Initial documentation for Xorg Privesc Module
...
killed white spaces
2018-11-12 15:44:13 -06:00
Carsten Maartmann-Moe
541283a4dd
Tidied up set_payload
2018-11-12 20:45:49 +01:00
Brendan Coles
0bdab320f7
Remove useless variable declaration
...
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-12 12:04:22 +01:00
Green-m
388aebc335
Add exploit module for spark unauthenticated rce.
2018-11-12 17:07:50 +08:00
Imran E. Dawoodjee
16d146fd59
Fixing indentation.
2018-11-12 13:24:00 +08:00
Imran E. Dawoodjee
3e4df06500
Some more modifications
...
Placed contents of request_post into execute_command
Randomized fingerprint with rand_text_alpha(12)
Spaces at EOL fixed
Normalized target URI
2018-11-12 13:04:42 +08:00
Imran E. Dawoodjee
818cb37aca
Implemented changes recommended by @bcoles.
2018-11-12 12:26:23 +08:00
Carsten Maartmann-Moe
e06af184c8
Tidy check method
2018-11-11 22:53:13 +01:00
Carsten Maartmann-Moe
8894af58de
serialized, not deserialized...
2018-11-11 22:47:57 +01:00
Carsten Maartmann-Moe
1e8fbc3a1b
Fixed indentation and added a status message printout when exploiting
2018-11-11 22:37:42 +01:00
Carsten Maartmann-Moe
cf5ca78350
Added YSOSerial payload generating string
2018-11-11 22:15:30 +01:00
Aaron Ringo
ef7fc783be
Added Selinux check, changed version check, retested on all platforms
2018-11-11 12:34:30 -06:00
Brendan Coles
a5429d21a6
Update modules/exploits/multi/local/xorg_x11_suid_server.rb
...
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-11 07:39:32 -06:00
Brendan Coles
2a7b18bcbf
Update modules/exploits/multi/local/xorg_x11_suid_server.rb
...
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-11 07:38:42 -06:00
Brendan Coles
40bc44d2b6
Add ForceExploit to Linux local modules
2018-11-11 09:37:56 +00:00
Aaron Ringo
e6f548c5f4
added meterpreter, took out in session, moved to exploits/multi/local
2018-11-11 01:43:36 -06:00
Brendan Coles
3770f121fe
Changing result parsing style
...
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:07:37 +01:00
Brendan Coles
951d3e1117
Changing result parsing style
...
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:07:32 +01:00
Brendan Coles
446eec00b3
Remove disconnect
...
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:43 +01:00
Brendan Coles
189c203e3d
Remove handler
...
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:34 +01:00
Brendan Coles
e5df5494d9
Remove connect
...
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:22 +01:00
Carsten Maartmann-Moe
5a978dca2e
Removed architecture to make payload selection work
2018-11-10 23:00:54 +01:00
Carsten Maartmann-Moe
cbaacf696a
Add exploit module for CVE-2017-12557
...
HP Intelligent Management Java Deserialization RCE (Windows)
2018-11-10 22:36:43 +01:00
BrianWGray
1c2da8a5c8
correct trailing space issue
2018-11-10 15:40:03 -05:00
BrianWGray
33f624bbb2
Module updated to reflect requested changes
2018-11-10 14:36:06 -05:00
Brendan Coles
1f14a9846d
Land #10767 , Add Cisco Prime Infrastructure remote root exploit
2018-11-10 17:08:16 +00:00
h00die
bf15fa0770
hash not password for mysql
2018-11-09 18:32:21 -05:00
h00die
c31c75c790
fix mysql capture store creds
2018-11-09 18:18:50 -05:00
Green-m
981893a8bf
Merge branch 'master' into sparkrce
2018-11-09 14:12:33 +08:00
Aaron Ringo
b93f14a5c2
Fixed some PR feedback, still working on adding meterpreter and cleanup
2018-11-08 22:10:46 -06:00
Aaron Ringo
3f3bee6a79
added version check
2018-11-08 22:08:11 -06:00
Aaron Ringo
012c8a450f
Feedback from PR work cont. changed loop, formatting errors, options
2018-11-08 22:08:11 -06:00
Aaron Ringo
adb8be7f9f
includes partially implemented feedback from PR
2018-11-08 22:08:11 -06:00
Brendan Coles
18bf58e547
Update modules/exploits/openbsd/local/xorg_x11_suid_server.rb
...
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-08 22:08:11 -06:00
Brendan Coles
8c4eb5f741
Update modules/exploits/openbsd/local/xorg_x11_suid_server.rb
...
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-08 22:08:11 -06:00
Brendan Coles
84b79e6787
Update modules/exploits/openbsd/local/xorg_x11_suid_server.rb
...
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-08 22:08:11 -06:00
Aaron Ringo
7feb960d9b
Initial add of Xorg SUID privesc
2018-11-08 22:08:11 -06:00
h00die
792b451f40
capture server docs and updates
2018-11-08 21:23:27 -05:00
root
f192b50a8e
Catch exceptions
2018-11-08 18:47:56 +00:00
root
1fbf779f9c
Added more verbose output
2018-11-08 18:35:15 +00:00
root
88e4d384d2
increased default timeout value
2018-11-08 16:13:55 +00:00
h00die
3c6f2157ae
land #10895 fix vmware_http_login undefined variables
2018-11-07 08:45:51 -05:00
Aaron Ringo
9dd0f2a5ea
modified to allow unix cmd for testing and other targets not supported, took out interpolation,notes section re-added
...
added notes section back in
2018-11-06 20:45:20 -06:00
Jacob Robles
682433f62e
smb_login error/status message
2018-11-05 17:49:58 -06:00
Jeffrey Martin
dd57b27652
Rename `hash` to `generate_process_hash`
...
In the interest of compatibility this uses a more descriptive name for
the process hash creation method instead of overriding ruby's hash method.
See https://docs.ruby-lang.org/en/2.0.0/Hash.html
2018-11-05 17:16:16 -06:00
h00die
aff4ef0752
land #10912 moving polycom exploit to misc folder
2018-11-05 16:54:24 -05:00
Shelby Pace
0c38babb9e
Land #10874 , rm size restriction from pyld_inject
2018-11-05 15:16:40 -06:00
bwatters-r7
f185c06204
Land 10794, Add support for ms17_010_eternalblue_win8 ProcessName option
...
Merge branch 'land-10794' into upstream-master
2018-11-05 15:08:59 -06:00
bwatters-r7
7ca2311325
Land #10792 , Add support for ms17_010_eternalblue ProcessName option
...
Merge branch 'land-10792' into upstream-master
2018-11-05 14:19:10 -06:00
bwatters-r7
1f0941101f
shut up, msftidy
2018-11-05 14:13:33 -06:00
bwatters-r7
4f2ba46125
Stop some of the rubocop carnage
2018-11-05 14:11:24 -06:00
Wei Chen
a32d8083f0
Land #10847 - Add blueimp's jQuery (Arbitrary) File Upload
...
CVE-2018-9206
2018-11-05 11:37:20 -06:00
Brent Cook
cb229411bc
Land #10888 , Fix Net::SSH::CommandStream session open failure
2018-11-05 11:15:09 -06:00
bwatters-r7
5ec155fd44
Changed some options to advanced
2018-11-05 09:59:17 -06:00
Green-m
708d067e65
Land #10919 , Add doc for ftp capture module.
...
And add a custom option banner for it.
2018-11-05 14:15:52 +08:00
l9c
ff07289132
better style according to the review
2018-11-05 13:46:36 +08:00
h00die
04218cff39
ftp capture
2018-11-04 21:46:01 -05:00
Pedro Ribeiro
7464d81c01
Add warning about JSP deletion
2018-11-05 00:52:34 +09:00
Shaksham Jaiswal
e3246a9b88
made fixes
2018-11-04 18:07:43 +05:30
Brendan Coles
fdf45f269b
Move polycom_hdx_auth_bypass to exploit/unix/misc/
2018-11-04 06:14:26 +00:00
Brendan Coles
c3080d69f2
Use writable? method for local modules
2018-11-04 05:28:32 +00:00
bwatters-r7
4ac9fe5c9f
Land #10834 , For real this time
...
Merge branch 'land-10834' into upstream-master
2018-11-02 14:35:00 -05:00
bwatters-r7
15cc699071
Land #10834 , messagebox payload for x64
...
Merge branch 'land-10834' into upstream-master
2018-11-02 14:17:59 -05:00
Jacob Robles
6bc4b71ca3
Land #10873 , Add notes to exploit modules
2018-11-02 14:11:11 -05:00
Spencer McIntyre
7faa775b55
Remove the now unnecessary DisableNops option
2018-11-02 14:57:41 -04:00
Jacob Robles
2d3403cdd2
Land #10901 , Add modules for iOS images and texts
2018-11-02 13:46:58 -05:00
Brent Cook
86469cc5a0
Land #10836 , Add Morris worm sendmail debug mode exploit
2018-11-02 11:17:33 -05:00
Brent Cook
1d81f3764f
Land #10700 , Add Morris worm fingerd exploit and VAX reverse shell
2018-11-02 11:16:46 -05:00
pasta
6752bdd536
space's purge
2018-11-02 11:27:53 -03:00
Shelby Pace
0d8c8da470
remove useless method wrappers, fix indentation
2018-11-02 08:01:15 -05:00
William Vu
e9b3502f98
Fix Net::SSH::CommandStream session open failure
...
I suspected this might be a problem for libssh servers.
2018-11-02 01:08:05 -05:00
Shelby Pace
4a8c1ef8f4
changed where pwd was getting executed
2018-11-01 16:06:08 -05:00
Shelby Pace
a1abebedd1
changed location of some code
2018-11-01 15:29:53 -05:00
Shelby Pace
2a2b1a47cc
updated block size, title
2018-11-01 15:00:38 -05:00
Brendan Coles
a80e571355
Update style
2018-11-01 07:26:12 +00:00
Brendan Coles
ca16e93200
rescue => e
2018-11-01 07:24:28 +00:00
Brendan Coles
ffecd189ee
Report rhost, as ip is undefined
2018-11-01 07:23:44 +00:00
bwatters-r7
114a8127e8
Land #10858 , bypassuac_eventvwr optimizations - reduce created processes and artifacts
...
Merge branch 'land-10858' into upstream-master
2018-10-31 16:44:32 -05:00
bwatters-r7
af7a7d586b
Add validation check to make sure x64 remote host and a x86 session
...
cannot select an x64 target.
2018-10-31 16:31:52 -05:00
Shelby Pace
7e61ec53da
downloading images by modifying block size
2018-10-31 14:36:45 -05:00
pasta
a7bb211c20
add OptEnum to filter icon type
2018-10-30 20:30:49 -03:00
pasta
3fb047c0f1
29 rubocop's issues fixed
2018-10-30 19:47:28 -03:00
Shelby Pace
b57b269df4
storing images
2018-10-30 15:43:25 -05:00
pasta
c8740a1b0f
deleted spaces at EOL
2018-10-30 15:09:39 -03:00
bwatters-r7
08ec8e1ef9
Land #10553 , add x86/xor_dynamic and x64/xor_dynamic encoders
...
Merge branch 'land-10553' into upstream-master
2018-10-30 09:56:15 -05:00
Fabien
0cf8563fae
Update bypassuac_computerDefault.rb
2018-10-30 11:37:05 +01:00
Fabien
bf295ecce5
Update bypassuac_computerDefault.rb
2018-10-30 11:36:38 +01:00
Luisco100
7f26364d5b
Changes suggested by OJ
2018-10-29 22:01:47 -05:00
Shelby Pace
d1da7d84db
added metadata and main function
2018-10-29 15:26:26 -05:00
pasta
4960e1b8c8
modification to accomplish the guideline and license changed to GPL
2018-10-29 14:11:21 -03:00
Elazar Broad
6fe7bb0bb6
Increase sleep time to 10 seconds
...
Increase the wait time before removing the registry key - allows the payload to spawn successfully on slow systems.
2018-10-29 12:55:03 -04:00
Quentin Kaiser
1d337e9987
No debug.
2018-10-29 13:46:07 +01:00
Quentin Kaiser
e76f3ab22f
No debug.
2018-10-29 13:44:16 +01:00
root
b705059bca
Added channel name length check
2018-10-28 20:18:58 +00:00
root
60aa1181ca
Add IBM WebSphere MQ Login Bruteforce module
...
Used to bruteforce usernames that can connect to the Queue Manager. The name of a valid server-connection channel without SSL configured is required, as well as a list of usernames to try.
* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
* Download and install MQ Server from the above link
* Create a new Queue Manager
* Create a new channel (without SSL)
* Allow remote connections for admin users by removing the CHLAUTH record that denies all users or configure access for a specific username.
* Run the module
2018-10-28 19:29:45 +00:00
pkb1s
92d5ab469c
Update ibm_mq_channel_brute.rb
2018-10-28 18:21:54 +00:00
Brendan Coles
1c340f8202
Land #10853 , Add universal targeting to Mercury/32 IMAP LOGIN exploit
2018-10-28 18:17:46 +00:00
Brendan Coles
296d9a08eb
Removing unnecessary line
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:51 +00:00
Brendan Coles
3e3be18189
Using print_line instead of print("\n")
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:14 +00:00
Brendan Coles
f8c829dc81
Using print_line instead of print("\n")
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:09 +00:00
Brendan Coles
67e8a7ce13
Changing CHANNELS_FILE option type
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:08:12 +00:00
Brendan Coles
f51a95465e
Changed http to https in metasploit url
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:07:20 +00:00
pkb1s
a6135e3738
Added "increase timeout" message
2018-10-28 17:48:15 +00:00
root
02d9d0f006
Add IBM WebSphere MQ Queue Manager Name and MQ Version Enumeration module
...
Run this auxiliary against the listening port of an IBM MQ Queue Manager to identify its name and version. Any channel type can be used to get this information as long as the name of the channel is valid.
* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
* Download and install MQ Server from the above link
* Create a new Queue Manager
* Create a new channel (without SSL)
* Run the module
2018-10-28 16:09:17 +00:00
root
a23cb7dfe8
Add IBM WebSphere MQ Channel Name Bruteforce module
...
Uses a dictionary to bruteforce MQ channel names. For all identified channels it also returns if SSL is used and whether it is a server-connection channel.
* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
** Download and install MQ Server
** Create a Queue Manager
** Create a new channel (without SSL)
** Run the module
2018-10-28 15:22:27 +00:00
kr3bz
370bcaf8d8
Update mercury_login.md
2018-10-28 09:49:15 +01:00
Brendan Coles
a34310095c
Update modules/exploits/windows/imap/mercury_login.md
...
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:29 +01:00
Brendan Coles
bfd3a17c0e
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:14 +01:00
kr3bz
5efbefdaea
Update mercury_login.md
2018-10-28 09:37:47 +01:00
kr3bz
2839a73cbd
Update mercury_login.rb
2018-10-28 09:35:15 +01:00
Spencer McIntyre
52fee303d4
Remove the size restriction from payload_inject
2018-10-27 21:26:09 -04:00
Spencer McIntyre
caf76a6555
Add applicable notes to my exploit modules
2018-10-27 20:54:14 -04:00
kr3bz
c61737bb18
Update mercury_login.md
2018-10-27 20:52:54 +02:00
kr3bz
239632ca03
Update mercury_login.md
2018-10-27 20:52:24 +02:00
kr3bz
3cf8a01b55
Update mercury_login.md
2018-10-27 20:51:31 +02:00
Brendan Coles
965c2d5c01
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-26 13:37:37 +02:00
bwatters-r7
b4c005c4d4
Land #10561 , Add Windows local privilege escalation - CVE-2018-0824
...
Merge branch 'land-10561' into upstream-master
2018-10-25 13:22:31 -05:00
Fabien
6b4e132f35
Create bypassuac_computerDefault.rb
2018-10-25 16:58:56 +02:00
Fabien
280a714faf
Delete bypassuac_computerDefault.rb
2018-10-25 16:58:34 +02:00
William Vu
e1a7c35834
Clean up check_banner
2018-10-25 05:20:20 -05:00
Green-m
f90992dc08
Fix typo.
2018-10-25 17:55:01 +08:00
Green-m
760b14e71d
Update the version match code.
2018-10-25 15:33:54 +08:00
Wei Chen
2ab9a003d4
Land #10864 , Add Cisco WebEx RCE Modules
2018-10-24 16:20:00 -05:00
Wei Chen
f52cbdf9d7
Change option types
2018-10-24 16:18:17 -05:00
Wei Chen
4ec7e41f9e
Change option type
2018-10-24 16:16:03 -05:00
Wei Chen
e84ba62740
Cosmetic changes for local/webexec
2018-10-24 16:13:47 -05:00
Elazar Broad
16d633fabd
Remove spaces before EOL
2018-10-24 11:04:41 -04:00
Shelby Pace
3729e9ed7b
added description, references
2018-10-24 09:46:00 -05:00
Fabien
9f0c8a0929
Create bypassuac_computerDefault.rb
2018-10-24 15:06:07 +02:00
kr3bz
2e2d742ae7
Added updated mercury_login
...
Added additional space for the payload, made recommended changes, msftidy does not produce errors, readded null byte as a badchar.
2018-10-24 11:08:37 +02:00
William Vu
458f635159
Add supported payloads to module description
2018-10-24 01:30:27 -05:00
William Vu
839c4e0467
Drop rank to AverageRanking for now
2018-10-24 01:30:17 -05:00
William Vu
37560760df
Add RequiredCmd for generic and telnet
2018-10-24 01:23:15 -05:00
Elazar Broad
ef2854c918
Use in-memory reflection for executing the payload
...
Use to_win32pe_psh_reflection() instead of to_win32pe_psh_net() in order to reduce the amount of processes and forensic artifacts created by this module.
2018-10-23 22:12:10 -04:00
Elazar Broad
d75c599929
Use ShellExecuteA to spawn eventvwr.exe
...
Use ShellExecuteA from railgun to spawn eventvwr.exe, as opposed to cmd /c. This reduces the amount of processes generated by this module.
2018-10-23 21:52:36 -04:00
Elazar Broad
da4b424780
Fix typo in cleanup message
2018-10-23 21:33:49 -04:00
bwatters-r7
569c2e03c9
Fix exploit relics and documentation
2018-10-23 17:15:34 -05:00
William Vu
67f2933b58
Make fewer assumptions about Apache
...
Returning CheckCode::Safe is too aggressive for a supplemental check.
Admins can change the directive in top-level configuration, anyway.
2018-10-23 16:26:17 -05:00
egre55
d1111ace5d
fixes
2018-10-23 17:19:14 -04:00
Shelby Pace
34ae9c38f9
added WebEx modules, arch check
2018-10-23 15:51:23 -05:00
bwatters-r7
927a29530b
Remove duplicated files
2018-10-23 12:31:18 -05:00
Brent Cook
65c0573738
Land #10848 , improve play_youtube post module
2018-10-23 12:26:55 -05:00
Brent Cook
e992b63520
Land #10856 , add SSL support to php meterpreter
2018-10-23 11:59:09 -05:00
kr3bz
be2ec76ed2
Added modified mercury_login.rb
...
Modified the script with recommendations.
2018-10-23 17:17:30 +02:00
William Vu
9c49acb924
Fail scanner instead of returning
2018-10-23 10:07:38 -05:00
William Vu
58a1b65e60
Update Exploit::CheckCode::Unknown
...
Brain fart.
2018-10-23 09:34:48 -05:00
William Vu
899238a4e3
Update libssh_auth_bypass with command output
2018-10-23 09:34:42 -05:00
Spencer McIntyre
c71bbc1019
Remove spaces that msftidy caught
2018-10-23 10:13:44 -04:00
Brendan Coles
0e7259040d
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:53 +02:00
Brendan Coles
903f5e9ede
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:44 +02:00
Brendan Coles
0b37e29c9a
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:38 +02:00
Brendan Coles
43dd23042b
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:10 +02:00
William Vu
bdf2d44415
Augment check with Apache Server header
2018-10-23 07:04:14 -05:00
William Vu
0249f1a4af
Improve check method and refactor
2018-10-23 06:20:31 -05:00
Ivan Racic
ee3c663baf
Upgraded exploit to work on any Windows target
...
In short, added egghunter and return address of
the executable file itself, so it should work
on any windows system.
Also, upgraded to modern exploit module requirements.
2018-10-23 12:11:56 +02:00
William Vu
3d06c10ad0
Link to Apache AllowOverride directive and change
2018-10-23 03:51:16 -05:00
William Vu
c9673df3b8
Add WordPress Work The Flow File Upload links
...
As noted by @bcoles, we have a module exploiting this vuln in #5130 ,
though it was described as the WordPress plugin and not the asset it had
included. The vuln was "patched" in the plugin by deleting the code.
Somehow this flew under everyone's noses.
msf5 exploit(unix/webapp/wp_worktheflow_upload) > edit
msf5 exploit(unix/webapp/wp_worktheflow_upload) > git diff
[*] exec: git diff
diff --git a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
index 727c1936f5..2146be49ec 100644
--- a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
+++ b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
@@ -50,8 +50,7 @@ class MetasploitModule < Msf::Exploit::Remote
post_data = data.to_s
res = send_request_cgi({
- 'uri' => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
- 'jQuery-File-Upload-9.5.0', 'server', 'php', 'index.php'),
+ 'uri' => '/jQuery-File-Upload/server/php/index.php',
'method' => 'POST',
'ctype' => "multipart/form-data; boundary=#{data.bound}",
'data' => post_data
@@ -70,8 +69,7 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Calling payload...")
send_request_cgi(
- 'uri' => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
- 'jQuery-File-Upload-9.5.0', 'server', 'php', 'files', php_pagename)
+ 'uri' => "/jQuery-File-Upload/server/php/files/#{php_pagename}"
)
end
end
msf5 exploit(unix/webapp/wp_worktheflow_upload) > rerun
[*] Reloading module...
[*] Started reverse TCP handler on 172.28.128.1:4444
[+] Our payload is at: rLRFvlAiE.php. Calling payload...
[*] Calling payload...
[*] Sending stage (37775 bytes) to 172.28.128.3
[*] Meterpreter session 1 opened (172.28.128.1:4444 -> 172.28.128.3:54386) at 2018-10-23 03:17:59 -0500
[+] Deleted rLRFvlAiE.php
meterpreter > getuid
Server username: www-data (33)
meterpreter > sysinfo
Computer : ubuntu-xenial
OS : Linux ubuntu-xenial 4.4.0-134-generic #160-Ubuntu SMP Wed Aug 15 14:58:00 UTC 2018 x86_64
Meterpreter : php/linux
meterpreter >
Welp.
2018-10-23 03:51:11 -05:00
William Vu
a55f7ff30a
Clarify vuln (re)discovery vs. disclosure
...
https://www.bleepingcomputer.com/news/security/jquery-file-upload-plugin-vulnerable-for-8-years-and-only-hackers-knew/
2018-10-23 03:22:45 -05:00
William Vu
b4bdc52597
Sort path list by frequency
2018-10-22 23:35:42 -05:00
William Vu
dbc0c802d5
Add detection of additional paths
2018-10-22 23:35:42 -05:00
William Vu
c4f8b6c937
Add rudimentary check method
2018-10-22 23:35:42 -05:00
William Vu
dba7e35819
Refactor slightly with methods
...
And also check upload response.
2018-10-22 23:35:42 -05:00
William Vu
e7ada1a40c
Add timeout on payload request
...
This ensures we don't block on execution.
2018-10-22 23:35:42 -05:00
William Vu
15f14bb295
Add note about Apache .htaccess
2018-10-22 23:35:42 -05:00
William Vu
a986a17bb0
Link to @lcashdol's PoC
2018-10-22 23:35:42 -05:00
William Vu
37dbdbf58f
Update project URL to PR
2018-10-22 23:35:42 -05:00
William Vu
41721c31fb
Add blueimp's jQuery (Arbitrary) File Upload
2018-10-22 23:35:42 -05:00
Green-m
c0e8d09802
Add disclosure date.
2018-10-23 09:44:36 +08:00
Spencer McIntyre
15e67de8fc
Add the EMBED option for play_youtube.rb
2018-10-22 19:51:41 -04:00
William Vu
3ca309423a
Add check method to detect 4.3BSD fingerd
2018-10-22 18:32:37 -05:00
William Vu
8459aad215
Prefer aobleq over incl/cmpl/bleq in payload
2018-10-22 18:32:37 -05:00
William Vu
01d11e71db
Add Space, BadChars, Encoder, and DisableNops
2018-10-22 18:32:37 -05:00
William Vu
fa892d8eba
Add Morris worm fingerd stack buffer overflow
2018-10-22 18:32:37 -05:00
William Vu
8f2df4864c
Add 4.3BSD VAX reverse command shell payload
2018-10-22 18:32:37 -05:00
Jeffrey Martin
380aaf7889
bump payloads gem
2018-10-22 18:20:45 -05:00
William Vu
e6bbc6dbd6
Land #10845 , glassfish_traversal typo fix
2018-10-22 15:32:14 -05:00
pasta
8d9bd33222
new version using Metasm
2018-10-22 16:36:04 -03:00
blue-bird1
6125ef06ad
fix small typo
2018-10-23 00:01:13 +08:00
Green-m
4711d6ba08
Move post module persistenct service to exploit.
2018-10-22 18:07:40 +08:00
Luisco100
74683ce951
Add Windows Post Module to disable Windows Defender signatures
2018-10-21 12:07:54 -05:00
William Vu
58a6c4137d
Add a better timeout than expect can provide
2018-10-20 13:56:37 -05:00
William Vu
a965abaf36
Add full payload support by setting $PATH
2018-10-20 13:56:33 -05:00
William Vu
60c4b87ad1
Prefer expect over sleeping between writes
2018-10-20 13:15:15 -05:00
William Vu
ad6f15c8ca
Add Morris worm sendmail debug mode exploit
2018-10-20 13:15:01 -05:00
Brendan Coles
7a36056713
Move exploit/qnx/qconn_exec to exploit/qnx/qconn/qconn_exec
2018-10-20 18:16:59 +00:00
William Vu
aae74472d2
Land #10817 , QNX qconn module rename
2018-10-20 03:10:22 -05:00
Brent Cook
accf9edf89
Land #10835 , libssh fingerprint improvements
2018-10-19 19:48:23 -05:00
bwatters-r7
47353553e5
Get everything together finally (still needs cleanup)
2018-10-19 18:15:44 -05:00
bwatters-r7
a6be9e573f
Should have saved the actual file...
2018-10-19 16:30:21 -05:00
bwatters-r7
eeec3c115e
This is as far as I can take it for an exploit module
...
but it still does not work. Commiting for posterity.
2018-10-19 16:12:47 -05:00
William Vu
abd425c863
Land #10819 , os_name population for ssh_login*
2018-10-19 15:53:38 -05:00
William Vu
db7bd3d50c
Update style
2018-10-19 15:52:26 -05:00
William Vu
2a1dec45ed
Land #10832 , TARGETURI for tomcat_utf8_traversal
2018-10-19 15:47:37 -05:00
William Vu
e4c71265fb
Improve banner checking in libssh_auth_bypass
...
Now we do the right thing when libssh is patched.
2018-10-19 15:21:12 -05:00
pasta
3a02e9e80f
First release, messagebox payload for x64
2018-10-19 16:39:41 -03:00
Spencer McIntyre
65d26d3a1e
Use the DISPLAY environment variable when available
2018-10-19 14:35:35 -04:00
William Vu
21397330f8
Refactor fortinet_backdoor copypasta
2018-10-19 00:07:18 -05:00
William Vu
863ab3447f
Add libssh auth bypass module
2018-10-18 23:03:23 -05:00
Wei Chen
3cee96d8ed
Land #10664 , add Windows SetImeInfoEx Win32k NULL Pointer Dereference
2018-10-18 14:42:14 -05:00
Wei Chen
fac05db154
Update rescue statement
2018-10-18 14:30:20 -05:00
Brendan Coles
02c916b1b4
Update modules/auxiliary/admin/http/tomcat_utf8_traversal.rb
2018-10-19 04:16:26 +11:00
Patrick Webster
175e5e5adf
Added module TARGETURI support.
2018-10-19 03:55:45 +11:00
Tim W
b3d45586db
feedback from code review
2018-10-18 12:30:46 +08:00
Green-m
73d3cb8c03
Fix some format errors.
2018-10-18 12:01:57 +08:00
Tim W
64e257649f
cleanup module
2018-10-18 11:45:59 +08:00
Tim W
290d4428c1
create git mixin
2018-10-18 11:31:31 +08:00
Tim W
063e477ff2
git submodule url exec (CVE-2018-17456)
2018-10-18 11:02:28 +08:00
bwatters-r7
d2c013001d
Update stuff
2018-10-17 17:17:05 -05:00
Green-m
f59792773f
Add post module windows persistent service.
2018-10-17 18:44:46 +08:00
h00die
763506f28d
ssh_login now populates the os_name field
2018-10-16 22:02:44 -04:00
h00die
4a06fe1d4b
use store_valid_credential instead
2018-10-16 14:01:49 -04:00
Brendan Coles
a14df8d86e
Move exploit/unix/misc/qnx_qconn_exec to exploit/qnx/qconn_exec
2018-10-16 16:21:28 +00:00
Tim W
2e91ec1495
semicolons :)
2018-10-16 14:59:27 +08:00
Tim W
96ba3c636b
fix indentation and add author
2018-10-16 14:56:25 +08:00
Tim W
57e2dd2192
send payload url to loader
2018-10-16 14:41:34 +08:00
Shelby Pace
9e069c95f5
add auto targeting
2018-10-15 23:26:08 -07:00
Shelby Pace
6cdfe604d4
removed exception handling for reg_file_for_handle
2018-10-15 18:29:15 -07:00
Wei Chen
a19046dedb
Land #10793 , improve windows_defender_js_hta
2018-10-15 17:42:21 -05:00
Wei Chen
8e442cc980
Update documenation
2018-10-15 15:45:39 -05:00
Wei Chen
b0313dd25c
Update getgodm_http_response_bof for proper auto targets
2018-10-15 15:25:55 -05:00
Wei Chen
ff9f3ed9ff
Add support for v5
2018-10-15 15:14:12 -05:00
Wei Chen
5433d2cca9
Sync up upstream master
2018-10-15 14:19:07 -05:00
Dhiraj Mishra
f78ccbf995
Indentation
2018-10-15 08:32:58 +05:30
h00die
8877582086
Land #10668 rsh stack clash solaris priv esc
2018-10-14 10:34:48 -04:00
h00die
f399b59ae4
Merge branch 'master' of https://github.com/rapid7/metasploit-framework into cisco_device_manager
2018-10-13 13:31:20 -04:00
Shelby Pace
a942654515
rescue-from-method addressed
2018-10-12 14:47:05 -05:00
Shelby Pace
26631bcfbd
addressed suggestions
2018-10-12 14:35:42 -05:00
William Vu
5b14d94957
Land #10671 , struts2_namespace_ognl updates
...
There are still some outstanding concerns, but I want to unblock this.
2018-10-12 11:08:33 -05:00
William Vu
2989507b85
Copy check for data_header to avoid crash
...
Variable was used but out of scope.
2018-10-12 11:06:26 -05:00
Dhiraj Mishra
96eeaf7da3
Made few changes
...
Thank you bcoles
2018-10-12 11:47:53 +05:30
h00die
f675ba5243
password not username
2018-10-11 17:08:03 -04:00
h00die
20a376130e
cat variable name
2018-10-11 17:04:57 -04:00
h00die
7cc46df6db
add docs and update cisco_device_manager
2018-10-11 17:01:38 -04:00
Shelby Pace
a67122aaf7
updated doc, added x86_64 binary
2018-10-11 12:37:51 -05:00
Shelby Pace
521b50af55
added separate binaries, extended for x86
2018-10-11 10:43:35 -05:00
amaloteaux
f8ad47d475
improve windows_defender_js_hta :
...
-add platform detection for jsc
-prevent cmd prompt when launching jsc
2018-10-11 17:38:47 +02:00
Alex Gonzalez
1da99c8bd1
Fixed syntax errors
...
Corrected redundant returns and indentation errors
2018-10-11 10:01:47 -04:00
Alex Gonzalez
86f7c270c6
Fixed stylistic and syntax errors
2018-10-11 09:19:35 -04:00
l9c
ed2ba1cb00
add support for ProcessName option, defaults to spoolsv.exe
2018-10-11 17:23:59 +08:00
l9c
ce848712dd
add support for ProcessName option, defaults to spoolsv.exe
2018-10-11 10:56:07 +08:00
Patrick DeSantis
c0aff8f134
Description update / typo fix
...
fix typo in module description (added one word)
2018-10-10 17:56:17 -04:00
Shelby Pace
04cc40136f
changed formatting, deleted post, renamed files
2018-10-10 14:41:14 -05:00
Shelby Pace
76325bd21e
fixed indentation
2018-10-10 14:18:44 -05:00
Jacob Robles
fb689da24c
Land #10335 , Add vlc_mkv exploit module
2018-10-10 13:47:08 -05:00
Alex Gonzalez
0f3917f540
Fixed syntax errors
2018-10-10 13:26:49 -04:00
Jacob Robles
50a7ee5e6a
Minor modifications
2018-10-10 12:22:47 -05:00
Dhiraj Mishra
ee2c6274c7
Updating description
2018-10-10 22:26:07 +05:30
Dhiraj Mishra
4a821101ce
Fixing cmd_exec_get_pid
2018-10-10 21:59:46 +05:30
Jacob Robles
796579e265
Use fail_with
2018-10-10 11:24:16 -05:00
Jacob Robles
4beb434054
Default Payloads
...
exploit:vlc_mkv default target payloads
2018-10-10 11:23:17 -05:00
Dhiraj Mishra
c1c07d5c8f
Updating
...
Suggestion given by Shelby
2018-10-10 21:30:12 +05:30
Tim W
fe356dabca
convert payload to dylib
2018-10-10 23:35:20 +08:00
Brendan Coles
8826932f72
Fix syntax errors
2018-10-10 14:39:07 +00:00
Brendan Coles
15cfeb37ea
CamelCase
2018-10-10 14:35:34 +00:00
Brendan Coles
7a048afd14
Make WritableDir an advanced option
2018-10-10 14:12:29 +00:00
Tim W
4653cbdda1
add macho mixin
2018-10-10 20:27:56 +08:00
Tim W
7fce2bd428
initial commit of 32bit trident exploit
2018-10-10 17:41:28 +08:00
Dhiraj Mishra
dbcee56995
Fixing spaces at EOL
2018-10-10 15:10:58 +05:30