Commit Graph

59852 Commits

Author SHA1 Message Date
dwelch-r7 ab93041409 Add autoload for `bindata` 2021-03-10 12:15:18 +00:00
Metasploit 17ef194c52
automatic module_metadata_base.json update 2021-03-08 16:58:04 -06:00
Shelby Pace fbd6f19d04
Land #14846, add HPE SIM unauth AMF deser rce 2021-03-08 16:50:49 -06:00
Grant Willcox 514d46bd4d
Rubocop module again and also update the documentation to reflect recent changes 2021-03-08 16:08:36 -06:00
Grant Willcox 8479f01290
Improve the check logic to more accurately detect if a target is vulnerable or not 2021-03-08 15:59:26 -06:00
Grant Willcox 2e45962cc0
Change gsub! to gsub so that we don't end up with nil errors when a match isn't found 2021-03-08 15:11:58 -06:00
Shelby Pace d114641468
Land #14201, add favorite command 2021-03-08 13:06:22 -06:00
Metasploit c4517329c1
automatic module_metadata_base.json update 2021-03-08 08:08:22 -06:00
Spencer McIntyre 2562a261e2
Land #14809, Add VMware vCenter Server CVE-2021-21972 exploit 2021-03-08 09:01:40 -05:00
kalba-security 22662c18ad Merge branch 'space-r7-pr-14201' into fav_modules 2021-03-06 07:24:24 -05:00
William Vu 729994d4af Update module doc 2021-03-05 17:25:37 -06:00
William Vu bcf7ad000b Add CheckModule to fingerprint VMware product 2021-03-05 17:25:37 -06:00
William Vu 33e52b0fb2 Update and refactor check
Now with more science!
2021-03-05 17:25:37 -06:00
William Vu 7bbb4cc09a Add module doc 2021-03-05 17:25:37 -06:00
William Vu 26f1c209b2 Add VMware vCenter Server CVE-2021-21972 exploit 2021-03-05 17:25:37 -06:00
Spencer McIntyre cba591f0e2
Land #14857, Update metasploit-payloads gem to 2.0.37 2021-03-05 13:43:16 -05:00
Grant Willcox 02e89947c7
Update check method to fix an incorrect check code, change from Appears to Detected 2021-03-05 11:16:24 -06:00
Grant Willcox 2b488800e6
Update the check method to eliminate potential false positives by searching for the presence of three strings that together should only be returned by HPE SIM web servers. 2021-03-05 11:14:30 -06:00
Spencer McIntyre d35f2bc2fe Update metasploit-payloads gem to 2.0.37 2021-03-05 11:26:54 -05:00
Metasploit 5a3f1ba8d7
automatic module_metadata_base.json update 2021-03-05 08:31:52 -06:00
Spencer McIntyre 53f4d3f193
Land #14792, Apply fixes for invalid architecture checks to affected modules
Fixes #14599
2021-03-05 09:24:34 -05:00
Metasploit 1a4f3f7d6c
automatic module_metadata_base.json update 2021-03-05 04:08:41 -06:00
Christophe De La Fuente 32899a61ea
Land #14847, Add Microsoft Windows RRAS Service MIBEntryGet Overflow 2021-03-05 11:01:58 +01:00
Grant Willcox 59d7288773
RuboCop module and fix small spelling mistake in documentation 2021-03-04 18:48:19 -06:00
Grant Willcox f193caa48e
Also make sure that the default option is to use Windows Powershell since this supports Meterpreter and is generally a lot more reliable 2021-03-04 18:40:21 -06:00
Grant Willcox d739bf7809
Fix up payload_template_adjustments function to use a simpler loop like structure as per space-r7
's recommendations
2021-03-04 18:34:45 -06:00
Grant Willcox 41794fe4e7
Remove redundant assignments of sysinfo["Architecture"] to unused "arch" variable 2021-03-04 15:54:38 -06:00
Grant Willcox 306e1979af
First round of code adjustments per review comments 2021-03-04 12:38:11 -06:00
Metasploit 8837345a2d
Bump version of framework to 6.0.34 2021-03-04 12:04:28 -06:00
Grant Willcox 1d23b7becb
Land #14853, Prefix Time with namespace resolution operator for lib/rex 2021-03-04 11:16:38 -06:00
Alan Foster af330874f5
Prefix time module with namespace resolution operator 2021-03-04 13:19:09 +00:00
Grant Willcox 5576a2c4e9
Land #14843, Extract PseudoShell into its own file for zeitwerk 2021-03-03 16:57:27 -06:00
Metasploit 2ca049c10a
automatic module_metadata_base.json update 2021-03-03 16:06:34 -06:00
Grant Willcox 0b9cd7f6f4
Land #14816, Autoload faker to avoid potential missing constant errors 2021-03-03 15:59:18 -06:00
Grant Willcox f6fde70280
Land #14821 - Allow search to start from root path 2021-03-03 15:38:21 -06:00
Grant Willcox adbb6f164f
Add source code for generating emp.ser 2021-03-03 10:14:48 -06:00
Grant Willcox 3ef8fcd996
Update module to fix an extra print statement and write documentation 2021-03-03 10:14:41 -06:00
Brendan Coles 3da8fce9cf Add Microsoft Windows RRAS Service MIBEntryGet Overflow 2021-03-03 02:50:42 +00:00
Grant Willcox f327d30e08
First attempt at CVE-2020-7200 module, with RuboCopped module 2021-03-02 16:38:19 -06:00
Shelby Pace 8ba02f4c97
add module limit, other minor changes 2021-03-02 16:26:01 -06:00
Grant Willcox 1e87453428
Land #14838, Add "Windows Storage Server 2008 R2" to MS17-010 psexec fingerprints 2021-03-02 10:22:03 -06:00
dwelch-r7 dc8fea2063 remove `require 'faker'` since we globally autoload it now 2021-03-02 13:59:32 +00:00
dwelch-r7 4755aea4b5 autoload faker globally 2021-03-02 13:49:38 +00:00
dwelch-r7 1e8ec469fb Extract `PseudoShell` into it's own file for zeitwerk to pick it up properly 2021-03-02 12:39:41 +00:00
agalway-r7 49e11fad1b
Land #14840, remove unneeded require rex/ui statement
Remove extra `require` in msfrpc client
2021-03-02 11:27:21 +00:00
dwelch-r7 b833a7a421 Remove extra `require` for a now deleted file that no longer exists 2021-03-02 10:57:07 +00:00
zerosum0x0 fb393d8a36
add "Windows Storage Server 2008 R2" to fingerprints 2021-03-01 19:05:35 -07:00
Shelby Pace 0d8df5e0bf
allow searches to start from root path 2021-02-26 15:53:33 -06:00
Metasploit 053853a86c
automatic module_metadata_base.json update 2021-02-26 15:30:20 -06:00
Grant Willcox 5334f05ce2
Land #14518, Add fortios path traversal credential grabber (cve-2018-13379) 2021-02-26 15:22:27 -06:00