Matthias Brun
d3aba846b9
Make minor changes
2017-04-24 23:35:36 +02:00
h00die
8e4c093a22
added version numbers
2017-04-22 09:45:55 -04:00
Matthias Brun
714ada2b66
Inline execute_cmd function
2017-04-21 15:32:15 +02:00
Matthias Brun
8218f024e0
Add WiPG-1000 Command Injection module
2017-04-20 16:32:23 +02:00
Jonathan Claudius
f5430e5c47
Revert Msf::Exploit::Remote::Tcp
2017-04-18 19:27:35 -04:00
Jonathan Claudius
9a870a623d
Make use of Msf::Exploit::Remote::Tcp
2017-04-18 19:17:48 -04:00
Jonathan Claudius
03e3065706
Fix MSF tidy issues
2017-04-18 18:56:42 -04:00
Jonathan Claudius
32f0b57091
Fix new line issues
2017-04-18 18:52:53 -04:00
Jonathan Claudius
bfca4da9b0
Add mercurial ssh exec
2017-04-18 16:33:23 -04:00
Tod Beardsley
1fcc1f7417
Trailing comma. Why isn't this Lua?
2017-04-18 14:27:44 -05:00
Tod Beardsley
4ec71f9272
Add a reference to the original PR
...
This was the source of first public disclosure, so may as well include
it.
2017-04-18 14:20:25 -05:00
Nate Caroe
92e7183a74
Small typo fix
...
Running msfconsole would generate an Ubuntu crash report (?). This seems to be the culprit.
2017-04-17 11:14:51 -06:00
Ahmed S. Darwish
e21504b22d
huawei_hg532n_cmdinject: Use send_request_cgi() 'vars_get' key
...
Instead of rolling our own GET parameters implementation.
Thanks @wvu-r7!
2017-04-17 09:11:50 +02:00
Ahmed S. Darwish
7daec53106
huawei_hg532n_cmdinject: Improve overall documentation
...
- Add section on compiling custom binaries for the device
- Add documentation for Huawei's wget flavor (thanks @h00die)
- Abridge the module's info hash contents (thanks @wwebb-r7)
- Abridge the module's comments; reference documentation (@h00die)
2017-04-17 08:00:51 +02:00
Ahmed S. Darwish
8a302463ab
huawei_hg532n_cmdinject: Use minimum permissions for staged binary
...
Use u+rwx permissions only, instead of full 777, while staging the
wget binary to target. As suggested by @wvu-r7 and @busterb.
2017-04-17 03:27:57 +02:00
Ahmed S. Darwish
7ca7528cba
huawei_hg532n_cmdinject: Spelling fixes suggested by @wvu-r7
2017-04-17 03:23:20 +02:00
Ahmed S. Darwish
7b8e5e5016
Add Huawei HG532n command injection exploit
2017-04-15 21:01:47 +02:00
m0t
5e42dde6b6
msftidy clean up
2017-04-12 16:25:21 +01:00
m0t
374d7809b5
last fixes and tests
2017-04-11 09:48:57 +01:00
m0t
9a0789f839
Exploit for pmmasterd Buffer Overflow (CVE-2017-6553)
2017-04-05 17:59:54 +01:00
bwatters-r7
64c06a512e
Land #8020 , ntfs-3g local privilege escalation
2017-04-04 09:48:15 -05:00
Brent Cook
4c0539d129
Land #8178 , Add support for non-Ruby modules
2017-04-02 21:02:37 -05:00
h00die
0092818893
Land #8169 add exploit rank where missing
2017-04-02 20:59:25 -04:00
Bryan Chu
151ed16c02
Re-ranking files
...
../exec_shellcode.rb
Rank Great -> Excellent
../cfme_manageiq_evm_upload_exec.rb
Rank Great -> Excellent
../hp_smhstart.rb
Rank Average -> Normal
2017-04-02 18:33:46 -04:00
h00die
e80b8cb373
move sploit.c out to data folder
2017-03-31 20:51:33 -04:00
Adam Cammack
6910cb04dd
Add first exploit written in Python
2017-03-31 17:07:55 -05:00
dmohanty-r7
1ce7bf3938
Land #8126 , Add SolarWind LEM Default SSH Pass/RCE
2017-03-31 11:21:32 -05:00
dmohanty-r7
c445a1a85a
Wrap ssh.loop with begin/rescue
2017-03-31 11:16:10 -05:00
Bryan Chu
5e31a32771
Add missing ranks
...
../exec_shellcode.rb
Rank = Great
This exploit is missing autodetection and version checks,
but should be ranked Great due to high number of possible targets
../cfme_manageiq_evm_upload_exec.rb
Rank = Great
This exploit implements a check to assess target availability,
and the vulnerability does not require any user action
../dlink_dcs_930l_authenticated_remote_command_execution
Rank = Excellent
Exploit utilizes command injection
../efw_chpasswd_exec
Rank = Excellent
Exploit utilizes command injection
../foreman_openstack_satellite_code_exec
Rank = Excellent
Exploit utilizes code injection
../nginx_chunked_size
Rank = Great
Exploit has explicit targets with nginx version auto-detection
../tp_link_sc2020n_authenticated_telnet_injection
Rank = Excellent
See dlink_dcs_930l_authenticated_remote_command_execution,
exploit uses OS Command Injection
../hp_smhstart
Rank = Average
Must be specific user to exploit, no autodetection,
specific versions only
2017-03-31 02:39:44 -04:00
Pearce Barry
9db2e9fbcd
Land #8146 , Add Default Secret & Deserialization Exploit for Github Enterprise
2017-03-24 14:38:47 -05:00
William Webb
e04f01ed6b
Land #7778 , RCE on Netgear WNR2000v5
2017-03-23 15:34:16 -05:00
wchen-r7
3b062eb8d4
Update version info
2017-03-23 13:46:09 -05:00
wchen-r7
fdb52a6823
Avoid checking res.code to determine RCE success
...
Because it's not accurate
2017-03-23 13:39:45 -05:00
wchen-r7
39682d6385
Fix grammar
2017-03-23 13:23:30 -05:00
wchen-r7
ee21377d23
Credit Brent & Adam
2017-03-23 11:22:49 -05:00
wchen-r7
196a0b6ac4
Add Default Secret & Deserialization Exploit for Github Enterprise
2017-03-23 10:40:31 -05:00
Mehmet Ince
d37966f1bb
Remove old file
2017-03-23 12:53:08 +03:00
Mehmet Ince
8a43a05c25
Change name of the module
2017-03-23 12:49:31 +03:00
bwatters-r7
a93aef8b7a
Land #8086 , Add Module Logsign Remote Code Execution
2017-03-22 11:33:49 -05:00
h00die
7bcd53d87d
Land #8079 , exploit and aux for dnaLims
2017-03-20 11:08:05 -04:00
h00die
fd5345a869
updates per pr
2017-03-20 10:40:43 -04:00
h00die
fe5167bf26
changes to file per pr
2017-03-20 10:16:42 -04:00
h00die
84e4b8d596
land #8115 which adds a CVE reference to IMSVA
2017-03-18 09:51:52 -04:00
Mehmet Ince
6aa42dcf08
Add solarwinds default ssh user rce
2017-03-17 21:54:35 +03:00
Mehmet Ince
f706c4d7f6
Removing prefix
2017-03-16 00:49:55 +03:00
Mehmet Ince
60186f6046
Adding CVE number
2017-03-16 00:31:21 +03:00
William Vu
01ea5262b8
Land #8070 , msftidy vars_get fixes
2017-03-14 12:05:24 -05:00
William Vu
5c436f2867
Appease msftidy in tr064_ntpserver_cmdinject
...
Also s/"/'/g.
2017-03-14 11:52:21 -05:00
William Vu
5d6a159ba9
Use query instead of uri in mvpower_dvr_shell_exec
...
I should have caught this in #7987 , @bcoles, but I forgot. Apologies.
This commit finishes what @itsmeroy2012 attempted to do in #8070 .
2017-03-14 11:51:55 -05:00
itsmeroy2012
79331191be
msftidy error updated 2.5
2017-03-14 22:02:59 +05:30
itsmeroy2012
67fc43a0a1
msftidy error updated 2.4
2017-03-14 21:33:53 +05:30
itsmeroy2012
fe4e2306b4
Reverting one step
2017-03-13 22:22:24 +05:30
William Vu
fe4f20c0cc
Land #7968 , NETGEAR R7000 exploit
2017-03-10 16:02:30 -06:00
itsmeroy2012
1c54e0ba94
msftidy error updated 2.2
2017-03-10 23:59:38 +05:30
itsmeroy2012
6d8789a56e
Updated msftidy error 2.1
2017-03-10 23:03:37 +05:30
itsmeroy2012
c0f17cf6b8
msftidy error updated 2.0
2017-03-10 22:16:27 +05:30
Mehmet Ince
f6bac3ae31
Add iso link to md file and change CheckCode code
2017-03-10 13:00:49 +03:00
flakey-biscuits
0ab3ad86ee
change dnalims_file_retrieve module type
2017-03-09 10:06:31 -05:00
flakey-biscuits
95a01b9f5e
add dnaLIMS exploits
2017-03-09 09:46:18 -05:00
William Vu
081ca17ebf
Specify default resource in start_service
...
This eliminates the need to override resource_uri. Depends on #8078 .
2017-03-09 03:00:51 -06:00
=
c52b0cba5e
msftidy error on master updated
2017-03-08 20:58:01 +05:30
William Vu
0f899fdb0b
Convert ARCH_CMD to CmdStager
2017-03-08 07:35:37 -06:00
=
7976966ce9
Issue 7923 - msftidy errors on master
2017-03-08 03:12:41 +05:30
Carter
14ed60e44d
Fix msftidy warning
2017-03-05 02:06:43 -05:00
Carter
62bcc95b7f
Update model check
2017-03-05 01:53:34 -05:00
wolfthefallen
a49c0a6824
removed trailing line
2017-03-03 11:03:25 -05:00
wolfthefallen
6a83220131
cleaned up travis errors
2017-03-03 10:49:00 -05:00
wolfthefallen
0943eb24a9
DC/OS Marathon UI Exploit
2017-03-03 09:56:14 -05:00
Carter
e0a46c2c06
Create netgear_dnslookup_cmd_exec.rb
2017-03-02 17:51:24 -05:00
h00die
fb5e090f15
fixes from jvoisin
2017-02-28 20:09:26 -05:00
Mehmet Ince
e5636d6ce1
Adding logsign rce module and doc
2017-02-28 21:04:37 +03:00
h00die
e3e607a552
reword description
2017-02-26 15:24:22 -05:00
h00die
0c353841ab
forgot add fixes for travis
2017-02-25 23:25:36 -05:00
h00die
a8609f5c66
ntfs-3g lpe
2017-02-25 23:09:22 -05:00
Pedro Ribeiro
f18b533226
change platform time to unix (although it is linux in reality but whatevs)
2017-02-24 22:58:24 +00:00
Brendan Coles
5d3a4cce67
Use all caps for module option names
2017-02-23 16:30:01 +11:00
Carter
25b3cc685a
Update netgear_r7000_cgibin_exec.rb
2017-02-22 11:36:52 -05:00
Brendan Coles
47fec5626e
Style update
2017-02-22 07:56:17 +00:00
Brendan Coles
e491f01c70
Add MVPower DVR Shell Unauthenticated Command Execution module
2017-02-22 05:15:57 +00:00
wchen-r7
48f6740fee
Land #7969 , Add Module Trend Micro IMSVA Remote Code Execution
2017-02-21 17:29:04 -06:00
bwatters-r7
a9b9a58d4d
Land #7893 , Add Module AlienVault OSSIM/USM Remote Code Execution
2017-02-21 13:35:56 -06:00
Carter
e99ba0ea86
Msftidy stuff
2017-02-18 00:34:49 -05:00
Carter
189d5dc005
Thanks netgear
2017-02-18 00:15:45 -05:00
Carter
52350292cf
Fix msftidy warning
2017-02-17 18:41:11 -05:00
Carter
63d1de9acd
Updates from review
...
Also testing some things, line 84 and 85 mostly
2017-02-17 18:29:46 -05:00
Carter
811f6d4d58
Update netgear_r7000_cgibin_exec.rb
2017-02-16 08:38:06 -05:00
Carter
90224af813
Fix msftidy warning
2017-02-15 22:39:16 -05:00
Carter
81d63c8cc7
Create netgear_r7000_cgibin_exec.rb
2017-02-15 22:33:48 -05:00
Mehmet Ince
4ee05313d8
Update tested version numbers
2017-02-08 19:31:01 +03:00
Mehmet Ince
906fcfe355
OSSIM 5.0.0 version requires a authen token on action create
2017-02-03 23:45:33 +03:00
William Webb
2ff170a1fa
Land #7820 , Exploit for TrueOnline Billion 5200W-T
2017-01-31 11:33:56 -06:00
William Webb
f167358540
Land #7821 , Command Injection Exploit for TrueOnline ZyXEL P660HN
2017-01-31 11:28:46 -06:00
William Webb
b3521dfb69
Land #7822 , Command Injection Exploit for TrueOnline P660HN v2
2017-01-31 11:22:49 -06:00
Mehmet Ince
c666ac93f5
Adding xff header
2017-01-31 14:37:22 +03:00
Mehmet Ince
40108c2374
first commit
2017-01-31 14:15:46 +03:00
Pedro Ribeiro
0aceb0b1cb
Fix whitespace, thanks msftidy!
2017-01-30 10:16:42 +00:00
Pedro Ribeiro
5fd31e621e
Add CVE number
2017-01-30 10:03:46 +00:00
Brent Cook
ff2b8dcf99
Revert "Land #7605 , Mysql privilege escalation, CVE-2016-6664" - premature merge
...
This reverts commit 92a1c1ece4
, reversing
changes made to 9b16cdf602
.
2017-01-22 19:16:33 -06:00
Brent Cook
92a1c1ece4
Land #7605 , Mysql privilege escalation, CVE-2016-6664
2017-01-22 17:17:28 -06:00
Brent Cook
836da6177f
Cipher::Cipher is deprecated
2017-01-22 10:20:03 -06:00
Mehmet Ince
c2c352c2ac
Adding Trend Micro IMSVA module
2017-01-18 11:34:16 +03:00
Pedro Ribeiro
2dca53e19a
Add full disclosure link
2017-01-17 11:09:44 +00:00
Pedro Ribeiro
1160a47b55
Add full disclosure link
2017-01-17 11:09:29 +00:00
Pedro Ribeiro
c2cd26a6e1
Add full disclosure link
2017-01-17 11:09:11 +00:00
Pedro Ribeiro
7fafade128
fix msftidy stuff v2
2017-01-12 18:06:13 +00:00
Pedro Ribeiro
ba8dfbd9f1
fix msftidy stuff
2017-01-12 18:05:54 +00:00
Pedro Ribeiro
f88e68da25
fix msftidy stuff
2017-01-12 18:04:58 +00:00
Pedro Ribeiro
2274e38925
fix msftidy stuff
2017-01-12 18:03:12 +00:00
Pedro Ribeiro
b863db9d02
add billion sploit
2017-01-12 17:51:24 +00:00
Pedro Ribeiro
2827a7ea1a
add 660v2 sploit
2017-01-12 17:50:57 +00:00
Pedro Ribeiro
af2516d074
add 660v1 sploit
2017-01-12 17:49:28 +00:00
Pedro Ribeiro
c0880985bc
fix duplicate entry for platform
2017-01-10 01:17:44 +00:00
wchen-r7
74cea5dd04
Use Linux payloads instead of cmd/unix/interact
...
As of now, cmd/unix/interact causes msfconsole to freeze, so
we can't use this.
2017-01-09 11:11:17 -06:00
wchen-r7
e331066d6d
Add CVE-2016-6433 Cisco Firepower Management Console UserAdd Exploit
2017-01-06 17:05:25 -06:00
Pedro Ribeiro
13bca2ebc7
add httpusername and password for auto auth
2017-01-06 16:33:51 +00:00
William Vu
19319f15d4
Land #7626 , Eir D1000 modem exploit
2017-01-04 17:02:39 -06:00
Pedro Ribeiro
d95a3ff2ac
made changes suggested
2017-01-04 23:02:10 +00:00
William Vu
b0e79076fe
Switch to wget CmdStager and tune timing
...
We don't want to trample the device with requests.
2017-01-04 16:42:53 -06:00
William Vu
94d76cfb06
Merge remote-tracking branch 'upstream/master' into tr-069-ntpserver-command-injection
2017-01-03 17:04:04 -06:00
Adam Cammack
fe0a3c8669
Update themoon exploit to use wget command stager
2017-01-03 15:50:57 -06:00
phroxvs
a9a83bc21c
fix for uninitialized constant in Net::SSH on OS X
2017-01-03 06:16:07 -05:00
phroxvs
3c2486b9f5
initial version of CVE-2016-7456 exploit
2017-01-03 03:39:22 -05:00
phroxvs
589084896a
initial version of CVE-2016-7456 exploit
2017-01-03 03:36:49 -05:00
Pedro Ribeiro
9d3e90e8e5
cleanup
2017-01-02 17:32:38 +00:00
Pedro Ribeiro
4c29d23c8a
further cleaning
2016-12-31 17:02:34 +00:00
Pedro Ribeiro
956602cbfe
add final wnr2000 sploits
2016-12-31 16:49:05 +00:00
William Vu
9d0ada9b83
Land #7749 , make drb_remote_codeexec great again
2016-12-28 06:11:48 -06:00
William Vu
cfca4b121c
Clean up module
2016-12-28 06:10:46 -06:00
William Vu
afd8315e1d
Remove apache_continuum_cmd_exec CmdStager flavor
...
It is inferred from the platform, and we don't want to override it
needlessly. :bourne is what worked during testing, but it won't always
work. Now we can override the flavor with CMDSTAGER::FLAVOR.
2016-12-27 16:24:16 -06:00
Pedro Ribeiro
870e8046b5
add sploits
2016-12-27 21:12:35 +00:00
joernchen of Phenoelit
679ebf31bd
Minor fix to make dRuby great again
2016-12-23 15:12:22 +01:00
joernchen of Phenoelit
d69acd116d
Make dRuby great again
2016-12-22 15:37:16 +01:00
Tod Beardsley
a4f681ae35
Add quoted hex encoding
2016-12-06 09:05:35 -06:00
Tod Beardsley
d549c2793f
Fix module filename to be TR-064
2016-12-02 08:49:21 -06:00
Tod Beardsley
9e4e9ae614
Add a reference to the TR-064 spec
2016-12-02 08:48:09 -06:00
Tod Beardsley
ddac5600e3
Reference TR-064, not TR-069
2016-12-02 08:45:15 -06:00
William Vu
1d6ee7192a
Land #7427 , new options for nagios_xi_chained_rce
2016-11-30 17:11:02 -06:00
William Vu
3e8cdd1f36
Polish up USER_ID and API_TOKEN options
2016-11-30 17:10:52 -06:00
Tod Beardsley
43cd788350
Switch back to echo as cmdstager flavor
2016-11-30 10:18:09 -06:00
Tod Beardsley
b75fbd454a
Add missing peer in vprint_error
2016-11-30 07:59:41 -06:00
Tod Beardsley
657d52951b
Linemax 63, switch to printf
2016-11-30 07:51:36 -06:00
Tod Beardsley
08b9684c1a
Add a FORCE_EXPLOIT option for @FireFart
2016-11-29 16:37:13 -06:00
Tod Beardsley
57d156a5e2
Revert "XML encode the command passed"
...
This reverts commit 9952c0ac6f
.
2016-11-29 16:24:26 -06:00
Tod Beardsley
b7904fe0cc
Oh silly delimiters and lack thereof
2016-11-29 15:53:05 -06:00
Tod Beardsley
9952c0ac6f
XML encode the command passed
2016-11-29 15:49:55 -06:00
Tod Beardsley
851aae3f15
Oops, wrong module
...
This reverts commit d55d2099c5
.
2016-11-29 15:15:18 -06:00
Tod Beardsley
d55d2099c5
Just one platform thanks
2016-11-29 15:08:45 -06:00
Tod Beardsley
4d6b2dfb46
Use CmdStager instead
...
Oh, and this is totally untested as of this commit.
2016-11-29 15:03:38 -06:00
Tod Beardsley
8de17981c3
Get rid of the WiFi key stealer
2016-11-29 14:48:04 -06:00
Tod Beardsley
75bcf82a09
Never set DefaultPaylod, reverse target options
2016-11-29 14:43:10 -06:00