h00die

Results 70 issues of h00die

This is a rework of #16465 and expands on the work of @npm-cesium137-io but unfortunately they seem to gone missing (mainly due to my rework taking a long time). It...

module
library
docs

This PR adds a module which exploits several authenticated sqli in VICIdial. Of note, two of the modules require a permissions change (vicibox sets admin permissions to near nothing, other...

module
docs

Fix "Manage Engine" to be "ManageEngine" in `exploit/windows/http/manageengine_adshacluster_rce` to be consistent with literally every other module. I would update the link as well to `https://security.szurek.pl/en/manage-engine-exchange-reporter-plus-unauthenticated-rce/`

bug
newbie-friendly
easy

https://securityboulevard.com/2022/10/new-text2shell-rce-vulnerability-in-apache-common-texts-cve-2022-42889/

suggestion-module

The current implementation of `ssl_version` does just about nothing unfortunately. I think it was put together in haste to scan for POODLE, but time has not been kind to it....

docs
enhancement

As per discussion here: https://github.com/rapid7/metasploit-framework/pull/17067#issuecomment-1279339260 Implement an upper bounds on the exploitable versions of remote mouse and update the documentation with a vulnerable download link. ## Verification - [ ]...

enhancement

https://github.com/Warxim/CVE-2022-41852

suggestion-module

This PR adds a new exploit for the Remote Control Server software. It's another 1 off from Unified Remote/mobile mouse and wifi mouse. This is the last in the series....

module
docs

## Summary https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens From the article: "In August 2022, the Vectra Protect team identified a post-exploitation opportunity allowing malicious actors with sufficient local or remote file system access to steal...

suggestion-module

# Documentation Issue Finder Generated: 2022-10-09 13:40:24 ## Modules Without Documentation + [ ] [metasploit-framework/modules/auxiliary/scanner/dect/call_scanner](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/dect/call_scanner.rb) + [ ] [metasploit-framework/modules/auxiliary/scanner/dect/station_scanner](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/dect/station_scanner.rb) + [ ] [metasploit-framework/modules/auxiliary/scanner/discovery/ipv6_multicast_ping](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/discovery/ipv6_multicast_ping.rb) + [ ] [metasploit-framework/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb) + [ ]...

docs
newbie-friendly