Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ def initialize(info = {})
super(
update_info(
info,
'Name' => 'Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner',
'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection Scanner (Shellshock)',
'Description' => %q{
This module scans for the Shellshock vulnerability, a flaw in how the Bash shell
handles external environment variables. This module targets CGI scripts in the
Expand Down
2 changes: 2 additions & 0 deletions modules/auxiliary/server/dhclient_bash_env.rb
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,8 @@ def initialize
to DHCP requests with a malicious hostname, domainname, and URL which are then
passed to the configuration scripts as environment variables, resulting in code
execution.

See exploits/unix/dhcp/dhclient_bash_env for a version which uses /etc/crontab
},
'Author' => [
'scriptjunkie', 'apconole[at]yahoo.com', # Original DHCP Server auxiliary module
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,18 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::TFTPServer
include Msf::Auxiliary::Report
include Msf::Module::Deprecated
moved_from 'auxiliary/server/pxeexploit'

def initialize
super(
'Name' => 'PXE Boot Exploit Server',
'Name' => 'PXE Boot Server',
'Description' => %q{
This module provides a PXE server, running a DHCP and TFTP server.
The default configuration loads a linux kernel and initrd into memory that
The default configuration loads a Linux kernel and initrd into memory that
reads the hard drive; placing a payload to install metsvc, disable the
firewall, and add a new user metasploit on any Windows partition seen,
and add a uid 0 user with username and password metasploit to any linux
and add a uid 0 user with username and password metasploit to any Linux
partition seen. The windows user will have the password p@SSw0rd!123456
(in case of complexity requirements) and will be added to the administrators
group.
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/linux/http/ipfire_bashbug_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ def initialize(info = {})
super(
update_info(
info,
'Name' => 'IPFire Bash Environment Variable Injection (Shellshock)',
'Name' => 'IPFire Bash Environment Variable Code Injection (Shellshock)',
'Description' => %q{
IPFire, a free linux based open source firewall distribution,
version <= 2.15 Update Core 82 contains an authenticated remote
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/osx/local/vmware_bash_function_root.rb
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ def initialize(info = {})
super(
update_info(
info,
'Name' => 'OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection (Shellshock)',
'Name' => 'OS X VMWare Fusion Privilege Escalation via Bash Environment Variable Code Injection (Shellshock)',
'Description' => %q{
This module exploits the Shellshock vulnerability, a flaw in how the Bash shell
handles external environment variables. This module targets the VMWare Fusion
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,12 +7,14 @@ class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::DHCPServer
include Msf::Module::Deprecated
moved_from 'exploits/unix/dhcp/bash_environment'

def initialize(info = {})
super(
update_info(
info,
'Name' => 'Dhclient Bash Environment Variable Injection (Shellshock)',
'Name' => 'DHCP Client Bash Environment Variable Code Injection (Shellshock)',
'Description' => %q{
This module exploits the Shellshock vulnerability, a flaw in how the Bash shell
handles external environment variables. This module targets dhclient by responding
Expand All @@ -21,6 +23,8 @@ def initialize(info = {})
execution. Due to length restrictions and the unusual networking scenario at the
time of exploitation, this module achieves code execution by writing the payload
into /etc/crontab and then cleaning it up after a session is created.

See auxiliary/server/dhclient_bash_env for a version which has more payloads options
},
'Author' => [
'Stephane Chazelas', # Vulnerability discovery
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/unix/smtp/qmail_bash_env_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ def initialize(info = {})
super(
update_info(
info,
'Name' => 'Qmail SMTP Bash Environment Variable Injection (Shellshock)',
'Name' => 'Qmail SMTP Bash Environment Variable Code Injection (Shellshock)',
'Description' => %q{
This module exploits a shellshock vulnerability on Qmail, a public
domain MTA written in C that runs on Unix systems.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,16 +8,20 @@ class MetasploitModule < Msf::Exploit::Remote

include Msf::Exploit::Remote::TFTPServer
include Msf::Auxiliary::Report
include Msf::Module::Deprecated
moved_from 'exploits/windows/local/pxeexploit'

def initialize
super(
'Name' => 'PXE Exploit Server',
'Name' => 'PXE Boot Server',
'Description' => %q{
This module provides a PXE server, running a DHCP and TFTP server.
The default configuration loads a linux kernel and initrd into memory that
The default configuration loads a Linux kernel and initrd into memory that
reads the hard drive; placing the payload on the hard drive of any Windows
partition seen.

See auxiliary/server/pxe_boot for a version which has more payloads options.

Note: the displayed IP address of a target is the address this DHCP server
handed out, not the "normal" IP address the host uses.
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,21 +5,24 @@

class MetasploitModule < Msf::Post
include Msf::Auxiliary::Report
include Msf::Module::Deprecated
moved_from 'post/windows/manage/pxeexploit'

def initialize
super(
'Name' => 'Windows Manage PXE Exploit Server',
'Name' => 'Windows Manage PXE Boot Server',
'Description' => %q{
This module provides a PXE server, running a DHCP and TFTP server.
The default configuration loads a linux kernel and initrd into memory that
The default configuration loads a Linux kernel and initrd into memory that
reads the hard drive; placing a payload to install metsvc, disable the
firewall, and add a new user metasploit on any Windows partition seen,
and add a uid 0 user with username and password metasploit to any linux
and add a uid 0 user with username and password metasploit to any Linux
partition seen. The windows user will have the password p@SSw0rd!123456
(in case of complexity requirements) and will be added to the administrators
group.

See exploit/windows/misc/pxesploit for a version to deliver a specific payload.
See auxiliary/server/pxe_boot for a version which has more payloads options.
See exploit/windows/local/pxe_boot for a version to deliver a specific Windows payload.

Note: the displayed IP address of a target is the address this DHCP server
handed out, not the "normal" IP address the host uses.
Expand Down
Loading