diff --git a/security/metasploit/Makefile b/security/metasploit/Makefile index 007452576..52c5c26a4 100644 --- a/security/metasploit/Makefile +++ b/security/metasploit/Makefile @@ -1,6 +1,6 @@ COMMENT= metasploit framework -VERSION= 6.3.32 +VERSION= 6.3.34 DISTNAME= metasploit-framework-${VERSION} DISTFILES= ${VERSION}.tar.gz diff --git a/security/metasploit/distinfo b/security/metasploit/distinfo index bc258848a..ba26afc1d 100644 --- a/security/metasploit/distinfo +++ b/security/metasploit/distinfo @@ -1,2 +1,2 @@ -SHA256 (6.3.32.tar.gz) = ltIXl4WZS9f+zNwXYy7Q3A5hE0SLOon2OkQgJUxAA9M= -SIZE (6.3.32.tar.gz) = 72544867 +SHA256 (6.3.34.tar.gz) = tSsv41aKYKMsL3sDKzkxtoFURKDsRePeOG+DdhbqPgk= +SIZE (6.3.34.tar.gz) = 73559189 diff --git a/security/metasploit/pkg/MESSAGE b/security/metasploit/pkg/MESSAGE index bc4397a1c..8ca6c6797 100644 --- a/security/metasploit/pkg/MESSAGE +++ b/security/metasploit/pkg/MESSAGE @@ -1,5 +1,5 @@ -Metasploit Framework 6.3.32 +Metasploit Framework 6.3.34 Help: diff --git a/security/metasploit/pkg/PLIST b/security/metasploit/pkg/PLIST index 66590dea9..240d5f74b 100644 --- a/security/metasploit/pkg/PLIST +++ b/security/metasploit/pkg/PLIST @@ -711,6 +711,8 @@ share/metasploit/data/exploits/CVE-2023-21768/CVE-2023-21768.x64.dll share/metasploit/data/exploits/CVE-2023-21839/ share/metasploit/data/exploits/CVE-2023-21839/PayloadRuns.class share/metasploit/data/exploits/CVE-2023-21839/PayloadRuns.java +share/metasploit/data/exploits/CVE-2023-28252/ +share/metasploit/data/exploits/CVE-2023-28252/CVE-2023-28252.x64.dll share/metasploit/data/exploits/QTJavaExploit.class share/metasploit/data/exploits/R7_2015_17/ share/metasploit/data/exploits/R7_2015_17/stream.raw @@ -1998,6 +2000,7 @@ share/metasploit/data/wordlists/default_pass_for_services_unhash.txt share/metasploit/data/wordlists/default_userpass_for_services_unhash.txt share/metasploit/data/wordlists/default_users_for_services_unhash.txt share/metasploit/data/wordlists/dlink_telnet_backdoor_userpass.txt +share/metasploit/data/wordlists/flask_secret_keys.txt share/metasploit/data/wordlists/grafana_plugins.txt share/metasploit/data/wordlists/hci_oracle_passwords.csv share/metasploit/data/wordlists/http_default_pass.txt @@ -2039,6 +2042,7 @@ share/metasploit/data/wordlists/sensitive_files.txt share/metasploit/data/wordlists/sensitive_files_win.txt share/metasploit/data/wordlists/sid.txt share/metasploit/data/wordlists/snmp_default_pass.txt +share/metasploit/data/wordlists/superset_secret_keys.txt share/metasploit/data/wordlists/telerik_ui_asp_net_ajax_versions.txt share/metasploit/data/wordlists/telnet_cdata_ftth_backdoor_userpass.txt share/metasploit/data/wordlists/tftp.txt @@ -2453,6 +2457,7 @@ share/metasploit/documentation/modules/auxiliary/fileformat/odt_badodt.md share/metasploit/documentation/modules/auxiliary/gather/ share/metasploit/documentation/modules/auxiliary/gather/adobe_coldfusion_fileread_cve_2023_26360.md share/metasploit/documentation/modules/auxiliary/gather/advantech_webaccess_creds.md +share/metasploit/documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md share/metasploit/documentation/modules/auxiliary/gather/asterisk_creds.md share/metasploit/documentation/modules/auxiliary/gather/billquick_txtid_sqli.md share/metasploit/documentation/modules/auxiliary/gather/browser_getprivateip.md @@ -2494,11 +2499,15 @@ share/metasploit/documentation/modules/auxiliary/gather/office365userenum.md share/metasploit/documentation/modules/auxiliary/gather/peplink_bauth_sqli.md share/metasploit/documentation/modules/auxiliary/gather/pimcore_creds_sqli.md share/metasploit/documentation/modules/auxiliary/gather/piwigo_cve_2023_26876.md +share/metasploit/documentation/modules/auxiliary/gather/prometheus_api_gather.md +share/metasploit/documentation/modules/auxiliary/gather/prometheus_node_exporter_gather.md share/metasploit/documentation/modules/auxiliary/gather/pulse_secure_file_disclosure.md +share/metasploit/documentation/modules/auxiliary/gather/python_flask_cookie_signer.md share/metasploit/documentation/modules/auxiliary/gather/qnap_backtrace_admin_hash.md share/metasploit/documentation/modules/auxiliary/gather/qnap_lfi.md share/metasploit/documentation/modules/auxiliary/gather/rails_doubletap_file_read.md share/metasploit/documentation/modules/auxiliary/gather/redis_extractor.md +share/metasploit/documentation/modules/auxiliary/gather/roundcube_auth_file_read.md share/metasploit/documentation/modules/auxiliary/gather/saltstack_salt_root_key.md share/metasploit/documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md share/metasploit/documentation/modules/auxiliary/gather/shodan_honeyscore.md @@ -2608,6 +2617,7 @@ share/metasploit/documentation/modules/auxiliary/scanner/http/dir_webdav_unicode share/metasploit/documentation/modules/auxiliary/scanner/http/directadmin_login.md share/metasploit/documentation/modules/auxiliary/scanner/http/docker_version.md share/metasploit/documentation/modules/auxiliary/scanner/http/dolibarr_16_contact_dump.md +share/metasploit/documentation/modules/auxiliary/scanner/http/elasticsearch_memory_disclosure.md share/metasploit/documentation/modules/auxiliary/scanner/http/emby_ssrf_scanner.md share/metasploit/documentation/modules/auxiliary/scanner/http/emby_version_ssrf.md share/metasploit/documentation/modules/auxiliary/scanner/http/enum_wayback.md @@ -2745,6 +2755,8 @@ share/metasploit/documentation/modules/auxiliary/scanner/msmail/ share/metasploit/documentation/modules/auxiliary/scanner/msmail/exchange_enum.md share/metasploit/documentation/modules/auxiliary/scanner/msmail/host_id.md share/metasploit/documentation/modules/auxiliary/scanner/msmail/onprem_enum.md +share/metasploit/documentation/modules/auxiliary/scanner/msmq/ +share/metasploit/documentation/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.md share/metasploit/documentation/modules/auxiliary/scanner/mssql/ share/metasploit/documentation/modules/auxiliary/scanner/mssql/mssql_ping.md share/metasploit/documentation/modules/auxiliary/scanner/mysql/ @@ -3016,9 +3028,11 @@ share/metasploit/documentation/modules/exploit/linux/http/ipfire_oinkcode_exec.m share/metasploit/documentation/modules/exploit/linux/http/ipfire_pakfire_exec.md share/metasploit/documentation/modules/exploit/linux/http/ipfire_proxy_exec.md share/metasploit/documentation/modules/exploit/linux/http/ivanti_csa_unauth_rce_cve_2021_44529.md +share/metasploit/documentation/modules/exploit/linux/http/ivanti_sentry_misc_log_service.md share/metasploit/documentation/modules/exploit/linux/http/jenkins_cli_deserialization.md share/metasploit/documentation/modules/exploit/linux/http/kaltura_unserialize_cookie_rce.md share/metasploit/documentation/modules/exploit/linux/http/kaltura_unserialize_rce.md +share/metasploit/documentation/modules/exploit/linux/http/kibana_timelion_prototype_pollution_rce.md share/metasploit/documentation/modules/exploit/linux/http/klog_server_authenticate_user_unauth_command_injection.md share/metasploit/documentation/modules/exploit/linux/http/librenms_addhost_cmd_inject.md share/metasploit/documentation/modules/exploit/linux/http/librenms_collectd_cmd_inject.md @@ -3051,6 +3065,7 @@ share/metasploit/documentation/modules/exploit/linux/http/netgear_unauth_exec.md share/metasploit/documentation/modules/exploit/linux/http/netsweeper_webadmin_unixlogin.md share/metasploit/documentation/modules/exploit/linux/http/nexus_repo_manager_el_injection.md share/metasploit/documentation/modules/exploit/linux/http/op5_config_exec.md +share/metasploit/documentation/modules/exploit/linux/http/opentsdb_key_cmd_injection.md share/metasploit/documentation/modules/exploit/linux/http/opentsdb_yrange_cmd_injection.md share/metasploit/documentation/modules/exploit/linux/http/optergy_bms_backdoor_rce_cve_2019_7276.md share/metasploit/documentation/modules/exploit/linux/http/oracle_ebs_rce_cve_2022_21587.md @@ -3072,6 +3087,7 @@ share/metasploit/documentation/modules/exploit/linux/http/roxy_wi_exec.md share/metasploit/documentation/modules/exploit/linux/http/saltstack_salt_api_cmd_exec.md share/metasploit/documentation/modules/exploit/linux/http/saltstack_salt_wheel_async_rce.md share/metasploit/documentation/modules/exploit/linux/http/samsung_srv_1670d_upload_exec.md +share/metasploit/documentation/modules/exploit/linux/http/solarview_unauth_rce_cve_2023_23333.md share/metasploit/documentation/modules/exploit/linux/http/sonicwall_cve_2021_20039.md share/metasploit/documentation/modules/exploit/linux/http/sophos_utm_webadmin_sid_cmd_injection.md share/metasploit/documentation/modules/exploit/linux/http/sourcegraph_gitserver_sshcmd.md @@ -3097,6 +3113,7 @@ share/metasploit/documentation/modules/exploit/linux/http/vmware_nsxmgr_xstream_ share/metasploit/documentation/modules/exploit/linux/http/vmware_vcenter_analytics_file_upload.md share/metasploit/documentation/modules/exploit/linux/http/vmware_vcenter_vsan_health_rce.md share/metasploit/documentation/modules/exploit/linux/http/vmware_view_planner_4_6_uploadlog_rce.md +share/metasploit/documentation/modules/exploit/linux/http/vmware_vrli_rce.md share/metasploit/documentation/modules/exploit/linux/http/vmware_vrni_rce_cve_2023_20887.md share/metasploit/documentation/modules/exploit/linux/http/vmware_vrops_mgr_ssrf_rce.md share/metasploit/documentation/modules/exploit/linux/http/vmware_workspace_one_access_cve_2022_22954.md @@ -3370,6 +3387,7 @@ share/metasploit/documentation/modules/exploit/multi/http/shiro_rememberme_v124_ share/metasploit/documentation/modules/exploit/multi/http/shopware_createinstancefromnamedarguments_rce.md share/metasploit/documentation/modules/exploit/multi/http/solr_velocity_rce.md share/metasploit/documentation/modules/exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli.md +share/metasploit/documentation/modules/exploit/multi/http/sonicwall_shell_injection_cve_2023_34124.md share/metasploit/documentation/modules/exploit/multi/http/splunk_upload_app_exec.md share/metasploit/documentation/modules/exploit/multi/http/spring_cloud_function_spel_injection.md share/metasploit/documentation/modules/exploit/multi/http/spring_framework_rce_spring4shell.md @@ -3608,6 +3626,7 @@ share/metasploit/documentation/modules/exploit/windows/fileformat/office_word_ht share/metasploit/documentation/modules/exploit/windows/fileformat/syncbreeze_xml.md share/metasploit/documentation/modules/exploit/windows/fileformat/vlc_mkv.md share/metasploit/documentation/modules/exploit/windows/fileformat/winrar_ace.md +share/metasploit/documentation/modules/exploit/windows/fileformat/winrar_cve_2023_38831.md share/metasploit/documentation/modules/exploit/windows/fileformat/word_msdtjs_rce.md share/metasploit/documentation/modules/exploit/windows/fileformat/word_mshtml_rce.md share/metasploit/documentation/modules/exploit/windows/fileformat/zahir_enterprise_plus_csv.md @@ -3651,6 +3670,7 @@ share/metasploit/documentation/modules/exploit/windows/http/hp_imc_java_deserial share/metasploit/documentation/modules/exploit/windows/http/hpe_sim_76_amf_deserialization.md share/metasploit/documentation/modules/exploit/windows/http/ivanti_avalanche_filestoreconfig_upload.md share/metasploit/documentation/modules/exploit/windows/http/kentico_staging_syncserver.md +share/metasploit/documentation/modules/exploit/windows/http/lg_simple_editor_rce.md share/metasploit/documentation/modules/exploit/windows/http/manage_engine_opmanager_rce.md share/metasploit/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_authenticated_rce.md share/metasploit/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219.md @@ -3729,6 +3749,7 @@ share/metasploit/documentation/modules/exploit/windows/local/cve_2022_21999_spoo share/metasploit/documentation/modules/exploit/windows/local/cve_2022_26904_superprofile.md share/metasploit/documentation/modules/exploit/windows/local/cve_2022_3699_lenovo_diagnostics_driver.md share/metasploit/documentation/modules/exploit/windows/local/cve_2023_21768_afd_lpe.md +share/metasploit/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md share/metasploit/documentation/modules/exploit/windows/local/dnsadmin_serverlevelplugindll.md share/metasploit/documentation/modules/exploit/windows/local/docker_credential_wincred.md share/metasploit/documentation/modules/exploit/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_esc.md @@ -5084,6 +5105,18 @@ share/metasploit/external/source/exploits/CVE-2023-21768/exploit.c share/metasploit/external/source/exploits/CVE-2023-21768/exploit.h share/metasploit/external/source/exploits/CVE-2023-21768/ioring.c share/metasploit/external/source/exploits/CVE-2023-21768/ioring.h +share/metasploit/external/source/exploits/CVE-2023-28252/ +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/ +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252.sln +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/CVE-2023-28252.vcxproj +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/clfs_eop.cpp +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/clfs_eop.h +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/crc32.h +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/dllmain.cpp +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/exploit.cpp +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/exploit.h +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/ntos.h +share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/ntoskrnl.lib share/metasploit/external/source/exploits/IE11SandboxEscapes/ share/metasploit/external/source/exploits/IE11SandboxEscapes/CVE-2013-5045/ share/metasploit/external/source/exploits/IE11SandboxEscapes/CVE-2013-5045/CVE-2013-5045.cpp @@ -6839,6 +6872,7 @@ share/metasploit/lib/msf/core/auxiliary/nmap.rb share/metasploit/lib/msf/core/auxiliary/ntp.rb share/metasploit/lib/msf/core/auxiliary/password_cracker.rb share/metasploit/lib/msf/core/auxiliary/pii.rb +share/metasploit/lib/msf/core/auxiliary/prometheus.rb share/metasploit/lib/msf/core/auxiliary/redis.rb share/metasploit/lib/msf/core/auxiliary/report.rb share/metasploit/lib/msf/core/auxiliary/rocketmq.rb @@ -7064,6 +7098,7 @@ share/metasploit/lib/msf/core/exploit/remote/http/drupal.rb share/metasploit/lib/msf/core/exploit/remote/http/exchange/ share/metasploit/lib/msf/core/exploit/remote/http/exchange.rb share/metasploit/lib/msf/core/exploit/remote/http/exchange/proxy_maybe_shell.rb +share/metasploit/lib/msf/core/exploit/remote/http/flask_unsign.rb share/metasploit/lib/msf/core/exploit/remote/http/gitea/ share/metasploit/lib/msf/core/exploit/remote/http/gitea.rb share/metasploit/lib/msf/core/exploit/remote/http/gitea/base.rb @@ -8751,37 +8786,37 @@ share/metasploit/lib/telephony/ share/metasploit/lib/telephony.rb share/metasploit/lib/telephony/modem.rb share/metasploit/lib/windows_console_color_support.rb -share/metasploit/metasploit-framework-6.3.32/ -share/metasploit/metasploit-framework-6.3.32/.dockerignore -share/metasploit/metasploit-framework-6.3.32/.git-blame-ignore-revs -share/metasploit/metasploit-framework-6.3.32/.github/ -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/ -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/bug_report.md -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/config.yml -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/documentation.md -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/feature_suggestion.md -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/module_suggestion.md -share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/question.md -share/metasploit/metasploit-framework-6.3.32/.github/PULL_REQUEST_TEMPLATE.md -share/metasploit/metasploit-framework-6.3.32/.github/SECURITY.md -share/metasploit/metasploit-framework-6.3.32/.github/workflows/ -share/metasploit/metasploit-framework-6.3.32/.github/workflows/acceptance.yml -share/metasploit/metasploit-framework-6.3.32/.github/workflows/docs.yml -share/metasploit/metasploit-framework-6.3.32/.github/workflows/labels.yml -share/metasploit/metasploit-framework-6.3.32/.github/workflows/lint.yml -share/metasploit/metasploit-framework-6.3.32/.github/workflows/schedule-stale.yml -share/metasploit/metasploit-framework-6.3.32/.github/workflows/verify.yml -share/metasploit/metasploit-framework-6.3.32/.github/workflows/weekly-dependencies-pr.yml -share/metasploit/metasploit-framework-6.3.32/.gitignore -share/metasploit/metasploit-framework-6.3.32/.gitmodules -share/metasploit/metasploit-framework-6.3.32/.mailmap -share/metasploit/metasploit-framework-6.3.32/.rspec -share/metasploit/metasploit-framework-6.3.32/.rubocop.yml -share/metasploit/metasploit-framework-6.3.32/.ruby-gemset -share/metasploit/metasploit-framework-6.3.32/.ruby-version -share/metasploit/metasploit-framework-6.3.32/.simplecov -share/metasploit/metasploit-framework-6.3.32/.solargraph.yml -share/metasploit/metasploit-framework-6.3.32/.yardopts +share/metasploit/${DISTNAME}/ +share/metasploit/${DISTNAME}/.dockerignore +share/metasploit/${DISTNAME}/.git-blame-ignore-revs +share/metasploit/${DISTNAME}/.github/ +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/ +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/bug_report.md +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/config.yml +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/documentation.md +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/feature_suggestion.md +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/module_suggestion.md +share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/question.md +share/metasploit/${DISTNAME}/.github/PULL_REQUEST_TEMPLATE.md +share/metasploit/${DISTNAME}/.github/SECURITY.md +share/metasploit/${DISTNAME}/.github/workflows/ +share/metasploit/${DISTNAME}/.github/workflows/acceptance.yml +share/metasploit/${DISTNAME}/.github/workflows/docs.yml +share/metasploit/${DISTNAME}/.github/workflows/labels.yml +share/metasploit/${DISTNAME}/.github/workflows/lint.yml +share/metasploit/${DISTNAME}/.github/workflows/schedule-stale.yml +share/metasploit/${DISTNAME}/.github/workflows/verify.yml +share/metasploit/${DISTNAME}/.github/workflows/weekly-dependencies-pr.yml +share/metasploit/${DISTNAME}/.gitignore +share/metasploit/${DISTNAME}/.gitmodules +share/metasploit/${DISTNAME}/.mailmap +share/metasploit/${DISTNAME}/.rspec +share/metasploit/${DISTNAME}/.rubocop.yml +share/metasploit/${DISTNAME}/.ruby-gemset +share/metasploit/${DISTNAME}/.ruby-version +share/metasploit/${DISTNAME}/.simplecov +share/metasploit/${DISTNAME}/.solargraph.yml +share/metasploit/${DISTNAME}/.yardopts share/metasploit/metasploit-framework.gemspec share/metasploit/modules/ share/metasploit/modules/README.md @@ -9289,6 +9324,7 @@ share/metasploit/modules/auxiliary/gather/android_htmlfileprovider.rb share/metasploit/modules/auxiliary/gather/android_object_tag_webview_uxss.rb share/metasploit/modules/auxiliary/gather/android_stock_browser_uxss.rb share/metasploit/modules/auxiliary/gather/apache_rave_creds.rb +share/metasploit/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.rb share/metasploit/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb share/metasploit/modules/auxiliary/gather/apple_safari_webarchive_uxss.rb share/metasploit/modules/auxiliary/gather/asterisk_creds.rb @@ -9376,11 +9412,15 @@ share/metasploit/modules/auxiliary/gather/opennms_xxe.rb share/metasploit/modules/auxiliary/gather/peplink_bauth_sqli.rb share/metasploit/modules/auxiliary/gather/pimcore_creds_sqli.rb share/metasploit/modules/auxiliary/gather/piwigo_cve_2023_26876.rb +share/metasploit/modules/auxiliary/gather/prometheus_api_gather.rb +share/metasploit/modules/auxiliary/gather/prometheus_node_exporter_gather.rb share/metasploit/modules/auxiliary/gather/pulse_secure_file_disclosure.rb +share/metasploit/modules/auxiliary/gather/python_flask_cookie_signer.rb share/metasploit/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb share/metasploit/modules/auxiliary/gather/qnap_lfi.rb share/metasploit/modules/auxiliary/gather/rails_doubletap_file_read.rb share/metasploit/modules/auxiliary/gather/redis_extractor.rb +share/metasploit/modules/auxiliary/gather/roundcube_auth_file_read.rb share/metasploit/modules/auxiliary/gather/safari_file_url_navigation.rb share/metasploit/modules/auxiliary/gather/saltstack_salt_root_key.rb share/metasploit/modules/auxiliary/gather/samsung_browser_sop_bypass.rb @@ -9557,6 +9597,7 @@ share/metasploit/modules/auxiliary/scanner/http/dolibarr_16_contact_dump.rb share/metasploit/modules/auxiliary/scanner/http/dolibarr_login.rb share/metasploit/modules/auxiliary/scanner/http/drupal_views_user_enum.rb share/metasploit/modules/auxiliary/scanner/http/ektron_cms400net.rb +share/metasploit/modules/auxiliary/scanner/http/elasticsearch_memory_disclosure.rb share/metasploit/modules/auxiliary/scanner/http/elasticsearch_traversal.rb share/metasploit/modules/auxiliary/scanner/http/emby_ssrf_scanner.rb share/metasploit/modules/auxiliary/scanner/http/emby_version_ssrf.rb @@ -9843,6 +9884,8 @@ share/metasploit/modules/auxiliary/scanner/msmail/shared/ share/metasploit/modules/auxiliary/scanner/msmail/shared/src/ share/metasploit/modules/auxiliary/scanner/msmail/shared/src/msmail/ share/metasploit/modules/auxiliary/scanner/msmail/shared/src/msmail/msmail.go +share/metasploit/modules/auxiliary/scanner/msmq/ +share/metasploit/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb share/metasploit/modules/auxiliary/scanner/mssql/ share/metasploit/modules/auxiliary/scanner/mssql/mssql_hashdump.rb share/metasploit/modules/auxiliary/scanner/mssql/mssql_login.rb @@ -10516,9 +10559,11 @@ share/metasploit/modules/exploits/linux/http/ipfire_oinkcode_exec.rb share/metasploit/modules/exploits/linux/http/ipfire_pakfire_exec.rb share/metasploit/modules/exploits/linux/http/ipfire_proxy_exec.rb share/metasploit/modules/exploits/linux/http/ivanti_csa_unauth_rce_cve_2021_44529.rb +share/metasploit/modules/exploits/linux/http/ivanti_sentry_misc_log_service.rb share/metasploit/modules/exploits/linux/http/jenkins_cli_deserialization.rb share/metasploit/modules/exploits/linux/http/kaltura_unserialize_cookie_rce.rb share/metasploit/modules/exploits/linux/http/kaltura_unserialize_rce.rb +share/metasploit/modules/exploits/linux/http/kibana_timelion_prototype_pollution_rce.rb share/metasploit/modules/exploits/linux/http/klog_server_authenticate_user_unauth_command_injection.rb share/metasploit/modules/exploits/linux/http/kloxo_sqli.rb share/metasploit/modules/exploits/linux/http/librenms_addhost_cmd_inject.rb @@ -10569,6 +10614,7 @@ share/metasploit/modules/exploits/linux/http/nuuo_nvrmini_auth_rce.rb share/metasploit/modules/exploits/linux/http/nuuo_nvrmini_unauth_rce.rb share/metasploit/modules/exploits/linux/http/op5_config_exec.rb share/metasploit/modules/exploits/linux/http/openfiler_networkcard_exec.rb +share/metasploit/modules/exploits/linux/http/opentsdb_key_cmd_injection.rb share/metasploit/modules/exploits/linux/http/opentsdb_yrange_cmd_injection.rb share/metasploit/modules/exploits/linux/http/optergy_bms_backdoor_rce_cve_2019_7276.rb share/metasploit/modules/exploits/linux/http/oracle_ebs_rce_cve_2022_21587.rb @@ -10603,6 +10649,7 @@ share/metasploit/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb share/metasploit/modules/exploits/linux/http/samsung_srv_1670d_upload_exec.rb share/metasploit/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb share/metasploit/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb +share/metasploit/modules/exploits/linux/http/solarview_unauth_rce_cve_2023_23333.rb share/metasploit/modules/exploits/linux/http/sonicwall_cve_2021_20039.rb share/metasploit/modules/exploits/linux/http/sophos_utm_webadmin_sid_cmd_injection.rb share/metasploit/modules/exploits/linux/http/sophos_wpa_iface_exec.rb @@ -10645,6 +10692,7 @@ share/metasploit/modules/exploits/linux/http/vmware_nsxmgr_xstream_rce_cve_2021_ share/metasploit/modules/exploits/linux/http/vmware_vcenter_analytics_file_upload.rb share/metasploit/modules/exploits/linux/http/vmware_vcenter_vsan_health_rce.rb share/metasploit/modules/exploits/linux/http/vmware_view_planner_4_6_uploadlog_rce.rb +share/metasploit/modules/exploits/linux/http/vmware_vrli_rce.rb share/metasploit/modules/exploits/linux/http/vmware_vrni_rce_cve_2023_20887.rb share/metasploit/modules/exploits/linux/http/vmware_vrops_mgr_ssrf_rce.rb share/metasploit/modules/exploits/linux/http/vmware_workspace_one_access_cve_2022_22954.rb @@ -11129,6 +11177,7 @@ share/metasploit/modules/exploits/multi/http/solarwinds_store_manager_auth_filte share/metasploit/modules/exploits/multi/http/solr_velocity_rce.rb share/metasploit/modules/exploits/multi/http/sonicwall_gms_upload.rb share/metasploit/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb +share/metasploit/modules/exploits/multi/http/sonicwall_shell_injection_cve_2023_34124.rb share/metasploit/modules/exploits/multi/http/splunk_mappy_exec.rb share/metasploit/modules/exploits/multi/http/splunk_upload_app_exec.rb share/metasploit/modules/exploits/multi/http/spree_search_exec.rb @@ -12099,6 +12148,7 @@ share/metasploit/modules/exploits/windows/fileformat/vuplayer_m3u.rb share/metasploit/modules/exploits/windows/fileformat/watermark_master.rb share/metasploit/modules/exploits/windows/fileformat/winamp_maki_bof.rb share/metasploit/modules/exploits/windows/fileformat/winrar_ace.rb +share/metasploit/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb share/metasploit/modules/exploits/windows/fileformat/winrar_name_spoofing.rb share/metasploit/modules/exploits/windows/fileformat/wireshark_mpeg_overflow.rb share/metasploit/modules/exploits/windows/fileformat/wireshark_packet_dect.rb @@ -12300,6 +12350,7 @@ share/metasploit/modules/exploits/windows/http/kentico_staging_syncserver.rb share/metasploit/modules/exploits/windows/http/kolibri_http.rb share/metasploit/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb share/metasploit/modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb +share/metasploit/modules/exploits/windows/http/lg_simple_editor_rce.rb share/metasploit/modules/exploits/windows/http/mailenable_auth_header.rb share/metasploit/modules/exploits/windows/http/manage_engine_opmanager_rce.rb share/metasploit/modules/exploits/windows/http/manageengine_adaudit_plus_authenticated_rce.rb @@ -12478,6 +12529,7 @@ share/metasploit/modules/exploits/windows/local/cve_2022_21999_spoolfool_privesc share/metasploit/modules/exploits/windows/local/cve_2022_26904_superprofile.rb share/metasploit/modules/exploits/windows/local/cve_2022_3699_lenovo_diagnostics_driver.rb share/metasploit/modules/exploits/windows/local/cve_2023_21768_afd_lpe.rb +share/metasploit/modules/exploits/windows/local/cve_2023_28252_clfs_driver.rb share/metasploit/modules/exploits/windows/local/dnsadmin_serverlevelplugindll.rb share/metasploit/modules/exploits/windows/local/docker_credential_wincred.rb share/metasploit/modules/exploits/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_esc.rb @@ -14227,6 +14279,7 @@ share/metasploit/spec/lib/msf/core/auxiliary/juniper_spec.rb share/metasploit/spec/lib/msf/core/auxiliary/kademlia_spec.rb share/metasploit/spec/lib/msf/core/auxiliary/mikrotik_spec.rb share/metasploit/spec/lib/msf/core/auxiliary/nfs_spec.rb +share/metasploit/spec/lib/msf/core/auxiliary/prometheus_spec.rb share/metasploit/spec/lib/msf/core/auxiliary/redis_spec.rb share/metasploit/spec/lib/msf/core/auxiliary/rocketmq_spec.rb share/metasploit/spec/lib/msf/core/auxiliary/ubiquiti_spec.rb @@ -14275,6 +14328,9 @@ share/metasploit/spec/lib/msf/core/exploit/remote/browser_exploit_server_spec.rb share/metasploit/spec/lib/msf/core/exploit/remote/browser_profile_manager_spec.rb share/metasploit/spec/lib/msf/core/exploit/remote/firefox_addon_generator_spec.rb share/metasploit/spec/lib/msf/core/exploit/remote/firefox_privilege_escalation_spec.rb +share/metasploit/spec/lib/msf/core/exploit/remote/http/ +share/metasploit/spec/lib/msf/core/exploit/remote/http/flask_unsign/ +share/metasploit/spec/lib/msf/core/exploit/remote/http/flask_unsign/session_spec.rb share/metasploit/spec/lib/msf/core/exploit/remote/java/ share/metasploit/spec/lib/msf/core/exploit/remote/java/rmi/ share/metasploit/spec/lib/msf/core/exploit/remote/java/rmi/builder_spec.rb @@ -14872,6 +14928,9 @@ share/metasploit/spec/tools/cpassword_decrypt_spec.rb share/metasploit/spec/tools/dev/ share/metasploit/spec/tools/dev/msftidy_runner_spec.rb share/metasploit/spec/tools/dev/msftidy_spec.rb +share/metasploit/spec/tools/dev/report_generation/ +share/metasploit/spec/tools/dev/report_generation/support_matrix/ +share/metasploit/spec/tools/dev/report_generation/support_matrix/generate_spec.rb share/metasploit/spec/tools/dev/rubocop_runner_spec.rb share/metasploit/spec/tools/egghunter_spec.rb share/metasploit/spec/tools/java_deserializer_spec.rb @@ -15045,6 +15104,10 @@ share/metasploit/tools/dev/msfdb_ws share/metasploit/tools/dev/msftidy.rb share/metasploit/tools/dev/msftidy_docs.rb share/metasploit/tools/dev/pre-commit-hook.rb +share/metasploit/tools/dev/report_generation/ +share/metasploit/tools/dev/report_generation/support_matrix/ +share/metasploit/tools/dev/report_generation/support_matrix/generate.rb +share/metasploit/tools/dev/report_generation/support_matrix/template.erb share/metasploit/tools/dev/set_binary_encoding.rb share/metasploit/tools/dev/sign-dev-keys.sh share/metasploit/tools/dev/update_gem_licenses.sh