Skip to content

Commit 478ebb0

Browse files
author
Pedro Ribeiro
authored
Merge pull request #27 from rapid7/master
ffff
2 parents ca0bb85 + 2f074ef commit 478ebb0

File tree

22 files changed

+1266
-63
lines changed

22 files changed

+1266
-63
lines changed

.github/label-actions.yml

+8
Original file line numberDiff line numberDiff line change
@@ -123,3 +123,11 @@ issues:
123123
When creating an issue, please ensure that the default issue template has been updated with the required details.
124124
125125
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
126+
127+
ruby-3.0.0:
128+
close: true
129+
comment: |
130+
This issue appears to be related to Ruby 3.0.0. At this time Metasploit does not support Ruby 3.0.0.
131+
Please try using Ruby 2.7.x with Metasploit.
132+
133+
Closing this issue as a duplicate of #14666 - which aims to track this feature request.

.rubocop.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ Layout/ExtraSpacing:
192192
# When true, allows things like 'obj.meth(arg) # comment',
193193
# rather than insisting on 'obj.meth(arg) # comment'.
194194
# If done for alignment, either this OR AllowForAlignment will allow it.
195-
AllowBeforeTrailingComments: false
195+
AllowBeforeTrailingComments: true
196196
# When true, forces the alignment of `=` in assignments on consecutive lines.
197197
ForceEqualSignAlignment: false
198198

Dockerfile

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ RUN chown -R root:metasploit $APP_HOME/
5959
RUN chmod 664 $APP_HOME/Gemfile.lock
6060
RUN gem update --system
6161
RUN cp -f $APP_HOME/docker/database.yml $APP_HOME/config/database.yml
62-
RUN curl -O https://bootstrap.pypa.io/get-pip.py && python get-pip.py && rm get-pip.py
62+
RUN curl -L -O https://github.com/pypa/get-pip/raw/3843bff3a0a61da5b63ea0b7d34794c5c51a2f11/get-pip.py && python get-pip.py && rm get-pip.py
6363
RUN pip install impacket
6464

6565
WORKDIR $APP_HOME

db/modules_metadata_base.json

+183-4
Original file line numberDiff line numberDiff line change
@@ -43307,7 +43307,7 @@
4330743307

4330843308
],
4330943309
"targets": null,
43310-
"mod_time": "2018-09-15 18:54:45 +0000",
43310+
"mod_time": "2021-01-27 10:14:52 +0000",
4331143311
"path": "/modules/auxiliary/scanner/ssh/ssh_enumusers.rb",
4331243312
"is_install_path": true,
4331343313
"ref_name": "scanner/ssh/ssh_enumusers",
@@ -71067,6 +71067,48 @@
7106771067
},
7106871068
"needs_cleanup": null
7106971069
},
71070+
"exploit_multi/fileformat/archive_tar_arb_file_write": {
71071+
"name": "PEAR Archive_Tar < 1.4.11 Arbitrary File Write",
71072+
"fullname": "exploit/multi/fileformat/archive_tar_arb_file_write",
71073+
"aliases": [
71074+
71075+
],
71076+
"rank": 600,
71077+
"disclosure_date": "2020-11-17",
71078+
"type": "exploit",
71079+
"author": [
71080+
"gwillcox-r7",
71081+
"xorathustra"
71082+
],
71083+
"description": "This module takes advantages of Archive_Tar < 1.4.11's lack of validation of file stream wrappers contained\n within filenames to write an arbitrary file containing user controlled content to an arbitrary file\n on disk. Note that the file will be written to disk with the permissions of the user that PHP is\n running as, so it may not be possible to overwrite some files if the PHP user is not appropriately\n privileged.",
71084+
"references": [
71085+
"URL-https://github.com/pear/Archive_Tar/issues/33",
71086+
"URL-https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949",
71087+
"CVE-2020-28949"
71088+
],
71089+
"platform": "PHP",
71090+
"arch": "php",
71091+
"rport": null,
71092+
"autofilter_ports": [
71093+
71094+
],
71095+
"autofilter_services": [
71096+
71097+
],
71098+
"targets": [
71099+
"Archive_Tar < 1.4.11"
71100+
],
71101+
"mod_time": "2021-01-19 09:25:56 +0000",
71102+
"path": "/modules/exploits/multi/fileformat/archive_tar_arb_file_write.rb",
71103+
"is_install_path": true,
71104+
"ref_name": "multi/fileformat/archive_tar_arb_file_write",
71105+
"check": false,
71106+
"post_auth": false,
71107+
"default_credential": false,
71108+
"notes": {
71109+
},
71110+
"needs_cleanup": null
71111+
},
7107071112
"exploit_multi/fileformat/evince_cbt_cmd_injection": {
7107171113
"name": "Evince CBT File Command Injection",
7107271114
"fullname": "exploit/multi/fileformat/evince_cbt_cmd_injection",
@@ -76376,6 +76418,59 @@
7637676418
},
7637776419
"needs_cleanup": null
7637876420
},
76421+
"exploit_multi/http/microfocus_ucmdb_unauth_deser": {
76422+
"name": "Micro Focus UCMDB Java Deserialization Unauthenticated Remote Code Execution",
76423+
"fullname": "exploit/multi/http/microfocus_ucmdb_unauth_deser",
76424+
"aliases": [
76425+
76426+
],
76427+
"rank": 600,
76428+
"disclosure_date": "2020-10-28",
76429+
"type": "exploit",
76430+
"author": [
76431+
"Pedro Ribeiro <[email protected]>"
76432+
],
76433+
"description": "This module exploits two vulnerabilities, that when chained allow an attacker\n to achieve unauthenticated remote code execution in Micro Focus UCMDB.\n UCMDB included in versions 2020.05 and below of Operations Bridge Manager are affected,\n but this module can probably also be used to exploit Operations Bridge Manager\n (containeirized) and Application Performance Management.\n Check the advisory and module documentation for details.\n The first vulnerability is a hardcoded password for the \"diagnostics\" user, which\n allows us to login to UCMDB. The second vulnerability is a run-of-the-mill Java\n deserialization, which can be exploited with ysoserial's CommonsBeanutils1 payload.\n Both Windows and Linux installations are vulnerable.",
76434+
"references": [
76435+
"URL-https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md",
76436+
"CVE-2020-11853",
76437+
"CVE-2020-11854",
76438+
"ZDI-20-1287",
76439+
"ZDI-20-1288"
76440+
],
76441+
"platform": "Unix,Windows",
76442+
"arch": "",
76443+
"rport": 8443,
76444+
"autofilter_ports": [
76445+
80,
76446+
8080,
76447+
443,
76448+
8000,
76449+
8888,
76450+
8880,
76451+
8008,
76452+
3000,
76453+
8443
76454+
],
76455+
"autofilter_services": [
76456+
"http",
76457+
"https"
76458+
],
76459+
"targets": [
76460+
"Windows",
76461+
"Linux"
76462+
],
76463+
"mod_time": "2021-01-25 22:25:07 +0000",
76464+
"path": "/modules/exploits/multi/http/microfocus_ucmdb_unauth_deser.rb",
76465+
"is_install_path": true,
76466+
"ref_name": "multi/http/microfocus_ucmdb_unauth_deser",
76467+
"check": true,
76468+
"post_auth": false,
76469+
"default_credential": false,
76470+
"notes": {
76471+
},
76472+
"needs_cleanup": null
76473+
},
7637976474
"exploit_multi/http/mma_backdoor_upload": {
7638076475
"name": "Th3 MMA mma.php Backdoor Arbitrary File Upload",
7638176476
"fullname": "exploit/multi/http/mma_backdoor_upload",
@@ -88338,7 +88433,7 @@
8833888433
"author": [
8833988434
"unknown"
8834088435
],
88341-
"description": "No module description",
88436+
"description": "This module exploits a stack-based buffer overflow in Apple QuickTime\n before version 7.3.1. By sending an overly long RTSP response to a\n client, an attacker may be able to execute arbitrary code.",
8834288437
"references": [
8834388438
"CVE-2007-6166",
8834488439
"OSVDB-40876",
@@ -88359,7 +88454,7 @@
8835988454
"Mac OS X 10.4.8 x86, QuickTime 7.1.3",
8836088455
"Mac OS X 10.5.0 x86, QuickTime 7.2.1"
8836188456
],
88362-
"mod_time": "2020-10-02 17:38:06 +0000",
88457+
"mod_time": "2021-01-22 23:29:16 +0000",
8836388458
"path": "/modules/exploits/osx/rtsp/quicktime_rtsp_content_type.rb",
8836488459
"is_install_path": true,
8836588460
"ref_name": "osx/rtsp/quicktime_rtsp_content_type",
@@ -130645,6 +130740,56 @@
130645130740
},
130646130741
"needs_cleanup": null
130647130742
},
130743+
"exploit_windows/http/prtg_authenticated_rce": {
130744+
"name": "PRTG Network Monitor Authenticated RCE",
130745+
"fullname": "exploit/windows/http/prtg_authenticated_rce",
130746+
"aliases": [
130747+
130748+
],
130749+
"rank": 600,
130750+
"disclosure_date": "2018-06-25",
130751+
"type": "exploit",
130752+
"author": [
130753+
"Josh Berry <[email protected]>",
130754+
"Julien Bedel <[email protected]>"
130755+
],
130756+
"description": "Notifications can be created by an authenticated user and can execute scripts when triggered.\n Due to a poorly validated input on the script name, it is possible to chain it with a user-supplied command allowing command execution under the context of privileged user.\n The module uses provided credentials to log in to the web interface, then creates and triggers a malicious notification to perform RCE using a Powershell payload.\n It may require a few tries to get a shell because notifications are queued up on the server.\n This vulnerability affects versions prior to 18.2.39. See references for more details about the vulnerability allowing RCE.",
130757+
"references": [
130758+
"CVE-2018-9276",
130759+
"URL-https://www.codewatch.org/blog/?p=453"
130760+
],
130761+
"platform": "Windows",
130762+
"arch": "x86, x64",
130763+
"rport": 80,
130764+
"autofilter_ports": [
130765+
80,
130766+
8080,
130767+
443,
130768+
8000,
130769+
8888,
130770+
8880,
130771+
8008,
130772+
3000,
130773+
8443
130774+
],
130775+
"autofilter_services": [
130776+
"http",
130777+
"https"
130778+
],
130779+
"targets": [
130780+
"Automatic Targeting"
130781+
],
130782+
"mod_time": "2021-01-21 18:32:05 +0000",
130783+
"path": "/modules/exploits/windows/http/prtg_authenticated_rce.rb",
130784+
"is_install_path": true,
130785+
"ref_name": "windows/http/prtg_authenticated_rce",
130786+
"check": true,
130787+
"post_auth": true,
130788+
"default_credential": true,
130789+
"notes": {
130790+
},
130791+
"needs_cleanup": null
130792+
},
130648130793
"exploit_windows/http/psoproxy91_overflow": {
130649130794
"name": "PSO Proxy v0.91 Stack Buffer Overflow",
130650130795
"fullname": "exploit/windows/http/psoproxy91_overflow",
@@ -175680,7 +175825,7 @@
175680175825
"autofilter_ports": null,
175681175826
"autofilter_services": null,
175682175827
"targets": null,
175683-
"mod_time": "2020-06-11 13:09:25 +0000",
175828+
"mod_time": "2021-01-22 22:00:30 +0000",
175684175829
"path": "/modules/post/multi/recon/local_exploit_suggester.rb",
175685175830
"is_install_path": true,
175686175831
"ref_name": "multi/recon/local_exploit_suggester",
@@ -180692,6 +180837,40 @@
180692180837
},
180693180838
"needs_cleanup": null
180694180839
},
180840+
"post_windows/gather/forensics/fanny_bmp_check": {
180841+
"name": "FannyBMP or DementiaWheel Detection Registry Check",
180842+
"fullname": "post/windows/gather/forensics/fanny_bmp_check",
180843+
"aliases": [
180844+
180845+
],
180846+
"rank": 300,
180847+
"disclosure_date": null,
180848+
"type": "post",
180849+
"author": [
180850+
"William M."
180851+
],
180852+
"description": "This module searches for the Fanny.bmp worm related reg keys.\n fannybmp is a worm that exploited zero day vulns\n (more specifically, the LNK Exploit CVE-2010-2568).\n Which allowed it to spread even if USB Autorun was turned off.\n This is the same exploit that was used in StuxNet.",
180853+
"references": [
180854+
"URL-https://securelist.com/a-fanny-equation-i-am-your-father-stuxnet/68787",
180855+
"CVE-2010-2568"
180856+
],
180857+
"platform": "Windows",
180858+
"arch": "",
180859+
"rport": null,
180860+
"autofilter_ports": null,
180861+
"autofilter_services": null,
180862+
"targets": null,
180863+
"mod_time": "2021-01-25 13:56:04 +0000",
180864+
"path": "/modules/post/windows/gather/forensics/fanny_bmp_check.rb",
180865+
"is_install_path": true,
180866+
"ref_name": "windows/gather/forensics/fanny_bmp_check",
180867+
"check": false,
180868+
"post_auth": false,
180869+
"default_credential": false,
180870+
"notes": {
180871+
},
180872+
"needs_cleanup": null
180873+
},
180695180874
"post_windows/gather/forensics/imager": {
180696180875
"name": "Windows Gather Forensic Imaging",
180697180876
"fullname": "post/windows/gather/forensics/imager",

0 commit comments

Comments
 (0)