Commit Graph

26119 Commits (cf7096f8ba899a93c254f9e83417865257681d1a)

Author SHA1 Message Date
Brent Cook e7974e4955 bump mettle and other gems 2019-04-11 17:26:15 -05:00
asoto-r7 513b939e61
Land #11690, Add overwrite_config action to cisco_upload_file 2019-04-11 16:05:44 -05:00
William Vu db0803136a Add lost registered option DUMP_OUTPUT
Oops, I forgot this in the refactor.
2019-04-11 12:21:11 -05:00
asoto-r7 b32d116e9a
Land #11669, exploit/windows/fileformat/microsoft_windows_contact 2019-04-10 17:18:33 -05:00
asoto-r7 94785dabbb
Renamed module from 'microsoft_windows_contact_remote_code_execution' to 'microsoft_windows_contact' 2019-04-10 17:17:50 -05:00
asoto-r7 62bf38d530
Simplified user options, recreated CONTACT template from a clean file 2019-04-10 17:14:04 -05:00
William Vu d72672feed
Land #11672, Zimbra XXE and SSRF exploit 2019-04-10 09:58:45 -05:00
ct5595 a8535b9b20 Merge branch 'master' of github.com:ct5595/metasploit-framework into cisco_running_config 2019-04-10 08:42:59 -04:00
Shelby Pace 4d0a41ff1a
Land #11657, add Horde form file upload 2019-04-09 13:47:59 -05:00
Shelby Pace 4018d47b65
changed if not to unless 2019-04-09 13:43:54 -05:00
ct5595 517cc36841 restore variables ciscoFlashCopyEntryStatus
and ciscoFlashCopyCommand for checking if the host is alive and
that the community is valid to prevent putting these in every action
2019-04-09 09:01:33 -04:00
RatioSec Research b56e171172 Fix extraction of session tokens 2019-04-09 09:28:52 +01:00
ct5595 56c38b8205 Merge branch 'master' of github.com:ct5595/metasploit-framework into cisco_running_config 2019-04-08 16:34:17 -04:00
ct5595 2412aa7472 fixed EOL errors from msftidy 2019-04-08 16:29:36 -04:00
ct5595 403cf825a8 modify cisco_upload_file to include actions
default action is Upload_File, which was the original function
the new action Override_Config will override the running config
2019-04-08 16:12:21 -04:00
ct5595 f34314547b update description to reflect upcoming changes and add ct5595 to list of authors 2019-04-08 13:55:13 -04:00
Brent Cook e32bb9e915
Land #11682, don't check 'localhost' unconditionally, fix headers 2019-04-08 10:39:18 -05:00
ct5595 9a7d5d96f5 remove previous changes 2019-04-08 09:39:35 -04:00
ct5595 d848361dc6 Added ct5595 to the list of authors 2019-04-08 09:19:17 -04:00
ct5595 8762bd0842 Merge branch 'master' of github.com:ct5595/metasploit-framework into cisco_running_config 2019-04-08 09:13:55 -04:00
Pearce Barry 7e62a69e16
Land #11660, Update use_single_quotes to wrap_double_quotes 2019-04-06 15:44:39 -05:00
Shelby Pace fff129ae9f
Land #11587, add Wordpress core RCE module 2019-04-04 15:22:56 -05:00
Shelby Pace 6efd80e139
added note in info 2019-04-04 15:19:58 -05:00
Shelby Pace 2884d9afcb
modified checks, added function 2019-04-04 15:09:12 -05:00
ct5595 8786150bdf Added functionality for OVERRIDE_CONFIG option 2019-04-04 10:43:08 -04:00
ct5595 b5449b7035 Added OVERRIDE_CONFIG option to cisco_upload_file.rb 2019-04-04 09:47:42 -04:00
William Vu e164c2350c Properly encode command input with XML entities
REXML would make this less ghetto.
2019-04-03 19:10:27 -05:00
Shelby Pace d5ac1e3a33
minor adjustments to indentation and requests 2019-04-03 19:03:47 -05:00
Javan Rasokat 8350effaa5
Fixed wrong check (did never work)
* HOST was always localhost 
* Now sends both Range and the legacy 'Request-Range'
TODO: Method HEAD is not always sufficient, should be editable
2019-04-03 16:23:58 +02:00
Ben Schmeckpeper 7d1f6afd4a Remove trailing space from CVE reference 2019-04-03 09:21:55 -05:00
todb-r7 9e3984ea51
Remove duplicate CVE for Mailcleaner module
See #11304
2019-04-02 12:51:09 -05:00
wilfried 3081b13a1f Adding payload in exploit code 2019-04-02 10:24:48 +02:00
surefire 1b6cd64016 Land #11136, exploit/multi/misc/weblogic_deserialize_unicastref 2019-04-01 18:15:26 -05:00
surefire 40191e5a01 Dissected JSOs, randomized strings, copied T3 header breakdown from @acamro 2019-04-01 18:05:45 -05:00
Jacob Robles 3d662bd962
Fix words because words... 2019-04-01 17:21:23 -05:00
Jacob Robles 69062bb220
Syntax fixes 2019-04-01 17:05:42 -05:00
William Vu 06397bb087
Land #11636, postgres_createlang version check fix 2019-04-01 15:21:57 -05:00
surefire f292befed4 Land #11134, exploit/multi/misc/weblogic_serialize_marshalledobject 2019-04-01 14:11:30 -05:00
surefire 4d0e47044b Fixed a hardcoded payload length resulting in 40% failures 2019-04-01 14:05:39 -05:00
Brendan Coles ddbd7ba080 Case insensitive match 2019-04-01 18:58:14 +00:00
William Vu 5867158238
Land #11595, can_flood post module 2019-04-01 12:38:46 -05:00
William Vu f5f4c4bec2 Clean up module 2019-04-01 12:24:35 -05:00
Jacob Robles c07b015734
File cleanup 2019-04-01 11:39:40 -05:00
Jacob Robles 51d1216953
Update module name 2019-04-01 07:48:26 -05:00
Jacob Robles 0873ba7ac1
Add Zimbra XXE to RCE module 2019-04-01 07:32:57 -05:00
BrennerLittle e733d225b6
microsoft_windows_contact_remote_code_execution 2019-03-31 11:12:09 -05:00
PietroBiondi 2afd27a671 1)Fixed documentation format 2)Refactoring and more efficient loop 2019-03-30 17:12:15 +01:00
William Vu 496f270b30 Update use_single_quotes to wrap_double_quotes 2019-03-29 18:14:56 -05:00
Brent Cook 82b7c926fe
Land #11579, Add support for splunk 7.2.4 to splunk_upload_app_exec 2019-03-29 16:22:26 -05:00
Brent Cook 9c38d58e9f
Land #11625, add es file explorer open port CVE-2019-6447 module 2019-03-29 15:46:09 -05:00