Last updated at Thu, 25 Jan 2024 01:56:40 GMT
It’s 11 o’clock. Do you know where your file uploads are?
Repeat contributor Erik Wynter and our own wvu-r7 each submitted modules exploiting web applications which allow attackers to upload files to arbitrary locations, including where the web application would interpret them as code! The first targets HorizontCMS, exploiting CVE-2020-27387, and was merged by cdelafuente-r7. The second targets Oracle WebLogic Server's administration console, exploiting CVE-2020-14750, and was landed by smcintyre-r7, who had the unenviable job of testing Oracle software on Windows.
Little fixes add up
A number of smaller fixes that add up to large quality of life improvements also made it in this week. Notable ones include PR #14361 by chmod750 for adding a SharePoint cookie when you have one instead of trying to re-authenticate, several reliability improvements to the SecureCRT password gatherer in PR #14341 by gwillcox-r7, and option handling fixes for default targets in PR #14359 by adfoster-r7. Thanks y'all!
CTF 2020 #2 coming soon
We're happy to announce another #Metasploit community CTF coming your way December 4! We developed this year's game to be accessible to beginners who want to connect with the community. Teams of all sizes are encouraged—registration opens 11/30. Read the full details in our blog post.
New modules (2)
- HorizontCMS Arbitrary PHP File Upload by Erik Wynter, which exploits CVE-2020-27387
- Oracle WebLogic Server Administration Console Handle RCE by wvu, Jang, and voidfyoo, which exploits CVE-2020-14750
Enhancements and features
- PR #14361 by chmod750 adds a
COOKIE
option to theexploit/windows/http/sharepoint_ssi_viewstate
module that is primarily useful when SharePoint is authenticated through a web form. - PR #14341 by gwillcox-r7 improves the SecureCRT password gatherer in a few ways: 1. Applies updates to the regex to hopefully work on both new and old versions of SecureCRT. This needs to be tested further to ensure I haven't broken anything. 2. Updates the code to fix the cases where .match() results were being used without first checking if they were nil. 3. Updates the code to add in some fail_with calls where there are potential cases that the code should bail at.
Bugs fixed
- PR #14408 by cdelafuente-r7 bumps the RubySMB gem to version 2.0.7 which includes a fix for misaligned Netlogon data structures that notably caused the Zerologon module to fail when the NetBIOS name was of certain lengths.
- PR #14393 by jmartin-r7 fixes a bug where the verbose output of jobs with
jobs -v
, and persistence of jobs withjobs -P
, would crash when auxiliary jobs are present. - PR #14381 by cgranleese-r7 fixes a crash when
RHOST_HTTP_URL
was used in conjunction with the check command. TheRHOST_HTTP_URL
option can be enabled with the commandfeatures set RHOST_HTTP_URL true
. - PR #14359 by adfoster-r7 fixes an edge case where the default options of a target were not correctly used by by the module's datastore when it was loaded by the user for the first time.
- PR #14294 by zeroSteiner adds more details to check code values and updates
ms17_010_eternalblue
to validate that the target is x64. For instance, targeting a 32-bit system will now provide a failure message ofThis exploit module only support x64 (64-bit) targets
. - PR #14219 by h00die fixes a bug in tests that meant Brocade hashes weren't checked for the
.
character
Get it
As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git
user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
binary installers (which also include the commercial edition).