Commit Graph

50048 Commits (ed98fc8b713d966db89e6479ccbb334e5f99eaf2)

Author SHA1 Message Date
h00die ed98fc8b71 update PR template to ask for unique branch 2019-01-04 21:53:25 -05:00
Matthew Kienow b5c4ac6af3
Land #11113, fixes for vuln and credential APIs 2019-01-04 17:05:12 -05:00
Metasploit 9ac96b213f
Weekly dependency update 2019-01-04 14:00:12 -08:00
James Barnett 1b29e17827
Dont array wrap refs 2019-01-04 15:10:21 -06:00
James Barnett b875d391fc
WIP: updating ref lookup based on code review comments 2019-01-04 15:10:20 -06:00
James Barnett 5f43ec0a79
Address code review comment 2019-01-04 15:10:20 -06:00
James Barnett 81f877ad09
Remove doc references to Mdm::Module::Ref
It doesnt look like this ever gets set anywhere. Mdm::Vuln.refs
seems to have replaced it
2019-01-04 15:10:20 -06:00
James Barnett 0281ddf78c
Remove vuln_refs from Vuln JSON schema
This object is just a pointer between Vulns and refs. We don't need to surface it
2019-01-04 15:10:20 -06:00
James Barnett 10cceb0e9b
Fix a couple of bugs introduced by symbolizing to_ar 2019-01-04 15:10:20 -06:00
James Barnett e9931fa70e
Fix bug when updating Mdm::Vuln.refs 2019-01-04 15:10:19 -06:00
James Barnett bcfe434d1e
Update to_ar to use symbolized keys 2019-01-04 15:10:19 -06:00
Brent Cook 260bfdc071
Land #11195, update travis to use latest rubygems 2019-01-04 06:00:39 -06:00
Jeffrey Martin 7faca5e4c5
update travis to use latest rubygems
By using the latest rubygems available bundler version
limits should become more compatible.
2019-01-03 13:50:48 -06:00
Adam Cammack 0d6ef39fac
Land #11194, Pin Travis CI bundler to 1.17.3 2019-01-03 13:42:07 -06:00
Jeffrey Martin 3c123d93f9
set bundler version for travis for now 2019-01-03 13:23:16 -06:00
Brent Cook e990bb31df
Land #11182, bump mettle, change debug and background options 2019-01-03 02:57:19 -06:00
William Vu cfec99b1a8
Land #11154, tab completion for aux rerun/exploit 2019-01-02 18:44:04 -06:00
Metasploit e1c6799076
automatic module_metadata_base.json update 2018-12-29 02:22:55 -08:00
Brendan Coles 5957315167
Land #11141, Ensure Byte XORi Encoder uses cacheflush() 2018-12-29 10:20:07 +00:00
Brendan Coles 005b2664b8
Land #11140, Ensure MIPS Long XOR Encoder uses cacheflush() 2018-12-29 10:14:47 +00:00
bwatters 9e109c7e7c
Update cache size 2018-12-28 16:08:15 -06:00
bwatters c6e83d109d
Update Gemfile.lock with mettle 0.5.1 2018-12-28 15:45:33 -06:00
bwatters f81c11bbe5
Update gemspec to mettle 0.5.1 2018-12-28 15:44:42 -06:00
Metasploit 2418dcf6aa
automatic module_metadata_base.json update 2018-12-28 07:22:50 -08:00
Shelby Pace 29e7c49332
Land #10444, add Consul rexec RCE module 2018-12-28 09:14:28 -06:00
Shelby Pace b1ad271cb8
fixed link 2018-12-28 09:12:31 -06:00
Metasploit 8cfc16ce4e
automatic module_metadata_base.json update 2018-12-28 06:50:05 -08:00
Shelby Pace fb8f06b2f5
Land #10443, add Consul service RCE module 2018-12-28 08:33:56 -06:00
Metasploit a7e44e39f1
Weekly dependency update 2018-12-27 10:05:39 -08:00
Brent Cook 66505790f9
Land #11179, Replace Sysrandom with Ruby default SecureRandom 2018-12-27 11:33:29 -06:00
Brent Cook 0d0356ccdd
Land #11126, Update sessions through the DBManager 2018-12-26 13:15:43 -06:00
Matthew Kienow ebc7a3a315
Replace sysrandom with ruby default securerandom 2018-12-26 13:40:44 -05:00
Metasploit 10be720843
automatic module_metadata_base.json update 2018-12-25 19:45:11 -08:00
Green-m 69e7956adf
Land #11174, Fix platform bug when upgrade shell.
The platform on windows powershell should be 'win', rather than
'windows', this bug leads to failure when upgrade powershell session
to meterpreter.
2018-12-26 11:31:39 +08:00
L ee7120d63a fixed post/multi/manage/shell_to_meterpreter 2018-12-25 15:00:39 +08:00
Quentin Kaiser 53a3caba2b List the vulnerable application and versions affected + cleaner cleanup script. 2018-12-24 13:54:02 +01:00
Quentin Kaiser 18c844623a Remove extra spaces. 2018-12-24 13:48:07 +01:00
Quentin Kaiser b9d4a46972 And the output that corresponds to the new script. 2018-12-24 13:42:25 +01:00
Quentin Kaiser 46ee2a6c94 Add vulnerable version information + new reference regarding this exact vulnerability. 2018-12-24 13:40:12 +01:00
Quentin Kaiser e10792f4e6 Remove extra space. 2018-12-24 13:30:03 +01:00
Green-m 12a948dde5
Move down cmd_rerun to fix rspec issue. 2018-12-24 11:30:02 +08:00
Metasploit a457973702
automatic module_metadata_base.json update 2018-12-21 15:14:24 -08:00
Brent Cook b9742802aa
Land #11137, Clean up linux/local/vmware_alsa_config exploit module 2018-12-21 17:04:11 -06:00
Brent Cook af60cb642e
Land #11038, add REG_MULTI_SZ support for Meterpreter registry reads 2018-12-21 17:00:16 -06:00
Brent Cook 69d882eb54 bump payloads with REG_MULTI_SZ support 2018-12-21 16:53:51 -06:00
Brent Cook 9736e8252c Merge branch 'master' into land-11038- 2018-12-21 16:31:53 -06:00
Brent Cook 620c411d1f
Land #11160, Add CMDSTAGER::SSL datastore option 2018-12-21 15:33:19 -06:00
Metasploit 8f61fe457a
automatic module_metadata_base.json update 2018-12-21 13:16:16 -08:00
William Vu b4ff3b544f Add CMDSTAGER::SSL datastore option
It has come to my attention that since I added the HTTP(S) command
stagers, no one has used HTTPS. This is probably why.

The CmdStager options hash takes precedence over any datastore options.
2018-12-21 14:51:49 -06:00
Brent Cook 2e8e927a93
Land #11156, Add CmdStager to erlang_cookie_rce 2018-12-21 14:43:49 -06:00