Commit Graph

49910 Commits (ef8601aa71de061c628fe3d8f8a32c63405bfaf0)

Author SHA1 Message Date
Quentin Kaiser ef8601aa71 Bail early if we receive an unexpected response. 2018-12-18 19:42:26 +01:00
Quentin Kaiser 4ee7bdee6c Merge branch 'consul_service_exec' of github.com:QKaiser/metasploit-framework into consul_service_exec 2018-12-18 19:33:51 +01:00
Quentin Kaiser b3563b1bc2 Cleaner version of check function thanks to @bcoles. 2018-12-18 19:33:30 +01:00
Brendan Coles 5e134d7d8d
Update modules/exploits/multi/misc/consul_service_exec.rb
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:27:19 +01:00
Brendan Coles 5192c081ee
Update modules/exploits/multi/misc/consul_service_exec.rb
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:27:08 +01:00
Quentin Kaiser 6ad40deac3 print_status will never throw a JSON::ParseError exception. 2018-12-18 19:15:13 +01:00
Quentin Kaiser a3d020a7e2 Add support for authorization with X-Consul-Token ACL header. 2018-12-18 16:56:03 +01:00
Quentin Kaiser 1839144978 Cleaner to define this as a Hash, then call .to_json on it. 2018-12-18 16:53:49 +01:00
Quentin Kaiser 177ae2f927 fail_with is not allowed in check method. Use vprint_error and return a CheckCode instead. Cleaner response check in check function. Usage of CheckCode instead of Exploit::CheckCode. 2018-12-18 16:33:53 +01:00
Quentin Kaiser 0feadf636b Define in RPORT and SSL in register_options rather than DefaultOptions. Support for echo and printf command stager flavors + support for curl and wget command stager flavors (hence reactivation of SRVHOST, SRVPORT, URIPATH and SSLCert). 2018-12-18 16:29:36 +01:00
Quentin Kaiser 0acdcd98f2 Merge branch 'master' into consul_service_exec 2018-12-18 16:27:08 +01:00
Wei Chen 847e3232ab
Land #11102, remove old metasm remnants 2018-12-18 08:53:53 -06:00
Metasploit 483a3618ae
automatic module_metadata_base.json update 2018-12-17 19:32:00 -08:00
Brent Cook fc2d217c0a
Land #11135, strip comments from source code before uploading it to the target 2018-12-17 21:23:29 -06:00
Brent Cook 333d44186b
Land #11138, add reverse_tcp mixin for vax payload 2018-12-17 21:17:40 -06:00
Metasploit 595ebf5dc7
automatic module_metadata_base.json update 2018-12-17 12:23:47 -08:00
bwatters bf13693d37
Land #11101, temp fix for x64/xor stage encoder
Merge branch 'land-11101' into upstream-master
2018-12-17 14:14:55 -06:00
LouDnl 2a69fffa6b
fix for ReverseTcp error
Update vax shell_reverse_tcp.rb to fix ReverseTcp NameError
Error:
/opt/metasploit-framework/embedded/framework/modules/payloads/singles/bsd/vax/shell_reverse_tcp.rb:24:in `initialize': uninitialized constant Msf::Handler::ReverseTcp (NameError)

After adding this line the error dissapeared for me and I was able to run msfconsole again.
2018-12-17 19:28:07 +01:00
Metasploit 1b581b0c1f
automatic module_metadata_base.json update 2018-12-17 08:11:04 -08:00
Shelby Pace 2fc501d260
Land #11112, Fix bpf_priv_esc exploit module 2018-12-17 10:00:50 -06:00
Metasploit 601804d315
automatic module_metadata_base.json update 2018-12-17 07:18:35 -08:00
Jacob Robles 7839add2fd
Land #11123, Add module windows persistent service 2018-12-17 09:07:21 -06:00
Green-m cb0cde3602
Merge pull request #7 from jrobles-r7/patch/service_doc
Documentation Update
2018-12-17 21:44:43 +08:00
Jacob Robles 80e70b29ef
Doc Formatting 2018-12-17 07:34:52 -06:00
Green-m b5904bcd82
Merge pull request #6 from jrobles-r7/patch/service_space
Fix additional path space issues
2018-12-17 21:20:42 +08:00
Jacob Robles 88b7b7df4a
Fix additional path space issues 2018-12-17 07:00:23 -06:00
Green-m 0aa6e5a640
Handle path with spaces correctly. 2018-12-17 10:25:06 +08:00
Brendan Coles fcb512878c Add strip_comments method to Linux local exploits 2018-12-16 14:11:54 +00:00
Wei Chen 5bf28887d2
Land #11127, Fix TARGETURI support in struts2_namespace_ognl 2018-12-15 09:33:48 -06:00
Green-m b2c6dfa0df
Merge pull request #5 from jrobles-r7/patch/service_code
Patch/service code
2018-12-15 14:06:17 +08:00
Brendan Coles cba195b7d8 Update tested versions 2018-12-15 05:44:32 +00:00
Brendan Coles a7b5737980 Update documentation 2018-12-15 05:41:40 +00:00
Brendan Coles b8e134b95d Update version check 2018-12-15 05:39:50 +00:00
Francesco Soncina 6237740116
lint: remove spaces 2018-12-15 01:02:13 +01:00
Metasploit ed03590ad8
automatic module_metadata_base.json update 2018-12-14 14:02:44 -08:00
Wei Chen e268691511
Land #11124, delete unused variable 2018-12-14 15:22:42 -06:00
Jacob Robles 8adfef5730
Remove Version, Fix Whitespace 2018-12-14 13:19:49 -06:00
Jacob Robles e67eaa94c9
Move code to ERB template 2018-12-14 13:13:32 -06:00
William Vu 38bdee19e8 Fix TARGETURI support in struts2_namespace_ognl 2018-12-14 13:08:50 -06:00
Auxilus 6c9fafb9d5
Delete unused variable
I suppose the variable 'f' was for Name in 06720ee18b/modules/exploits/linux/smtp/haraka.py (L70)

I'm not sure, should it be 'f' at 06720ee18b/modules/exploits/linux/smtp/haraka.py (L70) or just the way it is atm?
2018-12-14 22:27:11 +05:30
Jacob Robles 556d182231
Remove code that was replaced 2018-12-14 09:15:01 -06:00
Jacob Robles a057b72bd9
Use argument 2018-12-14 09:14:27 -06:00
Jacob Robles dfa84aa1af
Use exploit default exception handling 2018-12-14 09:12:32 -06:00
Jacob Robles 5fd7b82f7a
Remove unused parameter 2018-12-14 09:10:29 -06:00
Green-m 48ad8e8038
Merge pull request #4 from jrobles-r7/service-patch
Work around snprintf
2018-12-14 20:05:32 +08:00
Brent Cook 06720ee18b
Land #11121, remove call to undefined port_allowed? 2018-12-13 20:01:15 -06:00
Jeffrey Martin 4963647bf6
remove call to method not defined 2018-12-13 17:00:41 -06:00
Metasploit 1205615b6c
automatic module_metadata_base.json update 2018-12-13 14:24:49 -08:00
Brent Cook 673cfe6889
Land #11119, Add WEBUI_PORT to hp_van_sdn_cmd_inject exploit 2018-12-13 16:15:53 -06:00
Metasploit 04d8e2fc63
automatic module_metadata_base.json update 2018-12-13 13:40:15 -08:00