Posts tagged Metasploit Weekly Wrapup

2 min Metasploit

Metasploit Wrap-Up 03/28/2025

Windows LPE - Cloud File Mini Filer Driver Heap Overflow This Metasploit release includes an exploit module for CVE-2024-30085, an LPE in cldflt.sys which is known as the Windows Cloud Files Mini Filer Driver. This driver allows users to manage and sync files between a remote server and a local client. The exploit module allows users with an existing session on an affected Windows device to seamlessly escalate their privileges to NT AUTHORITY\SYSTEM. This module has been tested on Windows workst

2 min Metasploit

Metasploit Wrap-Up 03/21/2025

SMB to LDAP Relay This week, the Metasploit team have added an exciting relay module that has been in the works for a long time. This relay module is used to host an SMB server, and execute an SMB to LDAP relay attack against a Domain controller with an LDAP server when NTLMv1 is being used as the SMB authentication method. PetitPotam can be used to coerce authentication on the victim system and relay it to the Domain Controller.The module automatically takes care of removing the relevant flags

1 min Metasploit

Metasploit Weekly Wrap-Up 03/14/25

New module content (1) InvoiceShelf unauthenticated PHP Deserialization Vulnerability Authors: Mickaël Benassouli, Rémi Matasse, and h00die-gr3y [https://github.com/h00die-gr3y] Type: Exploit Pull request: #19950 [https://github.com/rapid7/metasploit-framework/pull/19950] contributed by h00die-gr3y [https://github.com/h00die-gr3y] Path: linux/http/invoiceshelf_unauth_rce_cve_2024_55556 AttackerKB reference: CVE-2024-55556 [https://attackerkb.com/search?q=CVE-2024-55556&referrer=blog] Descripti

3 min Metasploit

Metasploit Wrap-Up 03/06/2025

New module content (3) Get NAA Credentials Authors: skelsec, smashery, and xpn Type: Auxiliary Pull request: #19712 [https://github.com/rapid7/metasploit-framework/pull/19712] contributed by smashery [https://github.com/smashery] Path: admin/sccm/get_naa_credentials Description: Adds an auxiliary module which performs the retrieval of Network Access Account (NAA) credentials from an System Center Configuration Manager (SCCM) server. Given a computer name and password (which can typically be cr

2 min Metasploit

Metasploit Weekly Wrap-Up: 02/28/2025

New module content (5) mySCADA myPRO Manager Credential Harvester (CVE-2025-24865 and CVE-2025-22896) Author: Michael Heinzl Type: Auxiliary Pull request: #19878 [https://github.com/rapid7/metasploit-framework/pull/19878] contributed by h4x-x0r [https://github.com/h4x-x0r] Path: admin/scada/mypro_mgr_creds AttackerKB reference: CVE-2025-22896 [https://attackerkb.com/search?q=CVE-2025-22896&referrer=blog] Description: This module adds credential harvesting for MySCADA MyPro Manager using CVE-20

2 min Metasploit

Metasploit Weekly Wrap-Up 02/21/2025

BeyondTrust exploit + fetch payload updates This Metasploit release includes an exploit module that chains two vulnerabilities, one exploited in the wild by APT groups and another one, a 0-day discovered by Rapid7 [https://attackerkb.com/topics/vC7mUlftWA/cve-2025-1094?referrer=search] during the vulnerability analysis. This week's release also includes a significant enhancement to Metasploit's fetch payloads, which now support PPC, MIPS and ARM architectures. This allows the payloads to be use

2 min Metasploit

Metasploit Weekly Wrap-Up 02/14/2025

New module content (2) Unauthenticated RCE in NetAlertX Authors: Chebuya (Rhino Security Labs) and Takahiro Yokoyama Type: Exploit Pull request: #19868 [https://github.com/rapid7/metasploit-framework/pull/19868] contributed by Takahiro-Yoko [https://github.com/Takahiro-Yoko] Path: linux/http/netalertx_rce_cve_2024_46506 AttackerKB reference: CVE-2024-46506 [https://attackerkb.com/search?q=CVE-2024-46506&referrer=blog] Description: A new module for an unauthenticated remote code execution bug i

3 min Metasploit

Metasploit Weekly Wrap-Up 02/07/2025

Gathering data and improving workflows This week's release includes 2 new auxiliary modules targeting Argus Surveillance DVR and Ivanti Connect Secure. The former, contributed by Maxwell Francis, and based on the work of John Page, can be used to retrieve arbitrary files on the target's filesystem by exploiting an unauthenticated directory traversal vulnerability. The latter, brought by our very own Martin Šutovský [https://github.com/msutovsky-r7], is a HTTP login scanner for Ivanti Connect Sec

3 min Metasploit

Metasploit Weekly Wrap-Up 01/31/25

ESC4 Detection This week, Metasploit’s jheysel-r7 [https://github.com/jheysel-r7] updated the existing ldap_esc_vulnerable_cert_finder module to include detecting template objects that can be written to by the authenticated user. This means the module can now identify instances of ESC4 from the perspective of the account that the Metasploit operator provided the credentials for. Metasploit has been capable of exploiting ESC4 for some time, but required users to know which certificate templates t

2 min Metasploit

Metasploit Weekly Wrap-Up 01/24/2025

LibreNMS Authenticated RCE module and ESC15 improvements This week the Metasploit Framework was blessed with an authenticated RCE module in LibreNMS, an autodiscovering PHP/MySQL-based network monitoring system. An authenticated attacker can create dangerous directory names on the system and alter sensitive configuration parameters through the web portal. These two defects combined to allow arbitrary OS commands inside shell_exec() calls, thus achieving arbitrary code execution. Additionally, i

2 min Metasploit

Metasploit Wrap-Up 01/17/2025

Three new Metasploit exploit modules released, including a module targeting Cleo File Transfer Software (CVE-2024-55956)

3 min Metasploit

Metasploit Wrap-Up 01/10/2025

New module content (5) OneDev Unauthenticated Arbitrary File Read Authors: Siebene and vultza Type: Auxiliary Pull request: #19614 [https://github.com/rapid7/metasploit-framework/pull/19614] contributed by vultza [https://github.com/vultza] Path: gather/onedev_arbitrary_file_read AttackerKB reference: CVE-2024-45309 [https://attackerkb.com/search?q=CVE-2024-45309&referrer=blog] Description: This adds an exploit module for an unauthenticated arbitrary file read vulnerability, tracked as CVE-202

11 min Metasploit

Metasploit 2024 Annual Wrap-Up

Another year has come and gone, and the Metasploit team has taken some time to review the year’s notable additions. This year saw some great new features added, Metasploit 6.4 released [https://www.rapid7.com/blog/post/2024/03/25/metasploit-framework-6-4-released/] and a slew of new modules. We’re grateful to the community members new and old that have submitted modules and issues this year. The real privilege escalation was the privilege of working with the contributors and friends we made alo

2 min Metasploit

Metasploit Weekly Wrap-Up 12/20/2024

New module content (4) GameOver(lay) Privilege Escalation and Container Escape Authors: bwatters-r7, g1vi, gardnerapp, and h00die Type: Exploit Pull request: #19460 [https://github.com/rapid7/metasploit-framework/pull/19460] contributed by gardnerapp [https://github.com/gardnerapp] Path: linux/local/gameoverlay_privesc AttackerKB reference: CVE-2023-2640 [https://attackerkb.com/search?q=CVE-2023-2640&referrer=blog] Description: Adds a module for CVE-2023-2640 and CVE-2023-32629, a local privil

4 min Metasploit

Metasploit Weekly Wrap-Up 12/13/2024

It’s raining RCEs! It's the second week of December and the weather forecast announced another storm of RCEs in Metasploit-Framework land. This weekly release includes RCEs for Moodle e-Learning platform, Primefaces, WordPress Really Simple SSL and CyberPanel along with two modules to change password through LDAP and SMB protocol. New module content (7) Change Password Author: smashery Type: Auxiliary Pull request: #19671 [https://github.com/rapid7/metasploit-framework/pull/19671] contributed