3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 7/5/19
Injecting the Time Machine
From contributor timwr [https://github.com/timwr] comes a new module targeting
Time Machine on macOS 10.14.3 and earlier. Specifically, the tmdiagnose binary
for these vulnerable versions suffers from a command injection vulnerability
that can be exploited via a specially crafted disk label. This new module uses
an existing session for exploitation on the target, allowing the Framework user
to run a payload as root.
What’s on TV?
If you are nearby to a vulnerable Supr
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/28/19
I am Root
An exploit module [https://github.com/rapid7/metasploit-framework/pull/11987]
for Nagios XI v5.5.6 was added by community contributor yaumn
[https://github.com/yaumn]. This module includes two exploits chained together
to achieve code execution with root privileges, and it all happens without
authentication. A single unsanitized parameter in magpie_debug.php enables the
ability to write arbitrary PHP code to a publicly accessible directory and get
code execution. Privilege escalation
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/21/19
TLS support and expanded options for the BlueKeep scanner module, two new modules for Cisco Prime Infrastructure, and more.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/14/19
It’s Summertime, and the Hackin’ is Easy
It is still early in the season, but there’s a whole lot of fixes that are
already shipping. Straight off a week of intellectual synergy from the
world-wide hackathon, we started to fix a lot of things we noticed while we
coded over street tacos and Austin-famous beverages. All told, this week we made
Metasploit more inclusive, transparent, and configurable!
Inclusive
@wvu-r7 has been on a roll trying to make Metasploit play well with others. He
teamed u
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/7/19
Read up on how the recent community hackathon in Austin went, three new modules, and the usual long list of fixes and enhancements.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 5/31/19
Unauthenticated scanner for BlueKeep, community hackathon in Austin, and the usual long list of fixes and enhancements.
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 5/24/19
BSD love
Outside of macOS, not many people run (or run into) a BSD-flavored system very
often. Even still, bcoles [https://github.com/bcoles] and space-r7
[https://github.com/space-r7] teamed up for a pair of BSD enhancements. The
first, a privilege escalation, affects FreeBSD's runtime linker dealing with
LD_PRELOAD in FreeBSD 7.1, 7.2, and 8.0. The next enhancement adds BSD targets
to our known-credential ssh executor which now allows BSD-specific payloads. Not
wanting macOS to be left out ti
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up: May 17, 2019
Take a moment from this week's barrage of vulnerabilities in seemingly everything to see the cool stuff happening with the Metasploit team of contributors: a video interview between two greats, a new exploit module in GetSimple CMS, and a whole host of improvements.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 5/10/19
A new Chrome browser exploit, some WebLogic RCE, and an exploit for PostgreSQL. Also announcing the return of our annual Open-Source Security Meetup in Vegas!
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 5/3/19
Better persistence options thanks to two new modules for Yum and APT package managers. Plus, new exploits for Rails DoubleTap and Spring Cloud Config.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 4/26/19
Faster tab completion for `set PAYLOAD` and faster output for `show payloads`. Plus, four new exploits, including unauthenticated template injection for Atlassian Confluence and Ruby on Rails DoubleTap directory traversal.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 4/19/19
A more useful use command
From among the many musings of longtime contributor/team member Brent Cook
[https://github.com/busterb], in a combined effort with the ever-present wvu
[https://github.com/wvu-r7], the use command has become so much more useful. PR
11724 [https://github.com/rapid7/metasploit-framework/pull/11724] takes new
functionality [https://github.com/rapid7/metasploit-framework/pull/11652] from
search -u one step further by automatically appying it when use is called with a
uniq
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 4/12/19
WordPress RCE
tiyeuse [https://github.com/tiyeuse] submitted a Metasploit module
[https://github.com/rapid7/metasploit-framework/pull/11587] for an authenticated
remote code execution vulnerability in WordPress, which was described in a blog
post by RIPS Technology [https://www.sonarsource.com/blog/]. After
authenticating as a user with at least author privileges, the module starts by
uploading an image file with PHP code that will be used later. Then the image
metadata that references the file
2 min
Metasploit
Metasploit Wrap-Up 4/5/19
Your workflow just got easier
Are you tired of copy/pasting module names from the search results before you
can use them? Thanks to this enhancement (PR #11652)
[https://github.com/rapid7/metasploit-framework/pull/11652] by Brent Cook
[https://github.com/busterb], you can now run search with the -u flag to
automatically use a module if there is only one result. Now you're one step
closer to popping a shell!
A pair of new JSO modules
Metasploit published research a few weeks ago on Java Serializ
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 3/29/19
Introducing Metasploit Development Diaries
We are happy to introduce a new quarterly series, the Metasploit Development
Diaries. The dev diaries walk users and developers through some example exploits
and give detailed analysis of how the exploits operate and how Metasploit
evaluates vulnerabilities for inclusion in Framework. The first in the dev
diaries series features technical analysis by sinn3r
[https://twitter.com/_sinn3r?lang=en] and includes modules from community
members and fellow rese