Skip to content

Commit 3156832

Browse files
author
Brent Cook
committed
Merge branch 'upstream-master' into land-8021-
2 parents 0ebd51d + bbf271f commit 3156832

File tree

9 files changed

+276
-202
lines changed

9 files changed

+276
-202
lines changed

Gemfile.lock

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ PATH
1414
metasploit-concern
1515
metasploit-credential
1616
metasploit-model
17-
metasploit-payloads (= 1.2.14)
17+
metasploit-payloads (= 1.2.15)
1818
metasploit_data_models
1919
metasploit_payloads-mettle (= 0.1.7)
2020
msgpack
@@ -169,7 +169,7 @@ GEM
169169
activemodel (~> 4.2.6)
170170
activesupport (~> 4.2.6)
171171
railties (~> 4.2.6)
172-
metasploit-payloads (1.2.14)
172+
metasploit-payloads (1.2.15)
173173
metasploit_data_models (2.0.14)
174174
activerecord (~> 4.2.6)
175175
activesupport (~> 4.2.6)
@@ -279,7 +279,7 @@ GEM
279279
rex-socket
280280
rex-text
281281
rex-struct2 (0.1.0)
282-
rex-text (0.2.11)
282+
rex-text (0.2.12)
283283
rex-zip (0.1.1)
284284
rex-text
285285
rkelly-remix (0.0.7)

documentation/modules/auxiliary/admin/chromecast/chromecast_youtube.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
This module plays (by default) [https://www.youtube.com/watch?v=kxopViU98Xo]("Epic sax guy 10 hours") on a target Google Chromecast via YouTube.
1+
This module plays (by default) ["Epic sax guy 10 hours"](https://www.youtube.com/watch?v=kxopViU98Xo) on a target Google Chromecast via YouTube.
22

33
Naturally, audio should be cranked to 11 before running this module.
44

@@ -12,7 +12,7 @@ Naturally, audio should be cranked to 11 before running this module.
1212

1313
**VID**
1414

15-
The YouTube video to be played. Defaults to [https://www.youtube.com/watch?v=kxopViU98Xo](kxopViU98Xo)
15+
The YouTube video to be played. Defaults to [kxopViU98Xo](https://www.youtube.com/watch?v=kxopViU98Xo)
1616

1717
## Sample Output
1818

documentation/modules/auxiliary/admin/http/netgear_soap_password_extractor.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,18 @@
11
## Vulnerable Application
22

33
The following list is a non-exhaustive list of vulnerable Netgear devices:
4-
1. R6300v2 < [1.0.3.28](http://kb.netgear.com/app/answers/detail/a_id/28372)
5-
2. WNDR3300 - V1.0.45 (current, confirmed vuln)
6-
3. WNDR3700v1 - 1.0.7.98, 1.0.16.98 (confirmed vuln)
7-
4. WNDR3700v2 - 1.0.1.14 (EOL, confirmed vuln)
8-
5. WNDR3700v4 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28355)
9-
6. WNDR3800 - 1.0.0.48 (EOL, confirmed vuln)
10-
7. WNDR4300 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28037)
11-
8. WNR1000v2 - 1.0.1.1, 1.1.2.58 (EOL, confirmed vuln)
12-
9. WNR2000v3 < [1.1.2.12](http://kb.netgear.com/app/answers/detail/a_id/30024)
13-
10. WNR2200 < [1.0.1.96](http://kb.netgear.com/app/answers/detail/a_id/28036)
14-
11. WNR2500 < [1.0.0.32](http://kb.netgear.com/app/answers/detail/a_id/28351)
4+
5+
1. R6300v2 < [1.0.3.28](http://kb.netgear.com/app/answers/detail/a_id/28372)
6+
2. WNDR3300 - V1.0.45 (current, confirmed vuln)
7+
3. WNDR3700v1 - 1.0.7.98, 1.0.16.98 (confirmed vuln)
8+
4. WNDR3700v2 - 1.0.1.14 (EOL, confirmed vuln)
9+
5. WNDR3700v4 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28355)
10+
6. WNDR3800 - 1.0.0.48 (EOL, confirmed vuln)
11+
7. WNDR4300 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28037)
12+
8. WNR1000v2 - 1.0.1.1, 1.1.2.58 (EOL, confirmed vuln)
13+
9. WNR2000v3 < [1.1.2.12](http://kb.netgear.com/app/answers/detail/a_id/30024)
14+
10. WNR2200 < [1.0.1.96](http://kb.netgear.com/app/answers/detail/a_id/28036)
15+
11. WNR2500 < [1.0.0.32](http://kb.netgear.com/app/answers/detail/a_id/28351)
1516

1617
## Verification Steps
1718

documentation/modules/exploit/linux/local/bpf_priv_esc.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
## Notes
22

3-
This module (and the original exploit) are written in several parts: hello, doubleput, and suidhelper.
3+
This module (and the original exploit) are written in several parts: `hello`, `doubleput`, and `suidhelper`.
44

5-
Mettle at times on this exploit will give back an invalid session number error. In these cases payload/linux/x64/shell/bind_tcp seemed to always work.
5+
Mettle at times on this exploit will give back an invalid session number error. In these cases `payload/linux/x64/shell/bind_tcp` seemed to always work.
66

7-
As of PR submission, the original shell becomes unresposive when the root shell occurs. Metasm fails to compile due to fuse.h being required.
7+
As of PR submission, the original shell becomes unresposive when the root shell occurs. Metasm fails to compile due to `fuse.h` being required.
88

9-
As of PR submission, killing of the process hello and doubleput has to occur manually. /tmp/fuse_mount also needs to be unmounted and deleted.
9+
As of PR submission, killing of the process `hello` and `doubleput` has to occur manually. `/tmp/fuse_mount` also needs to be unmounted and deleted.
1010

1111
## Creating A Testing Environment
1212

1313
There are a few requirements for this module to work:
1414

15-
1. CONFIG_BPF_SYSCALL=y must be set in the kernel (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
16-
2. kernel.unprivileged_bpf_disabled can't be set to 1 (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
15+
1. `CONFIG_BPF_SYSCALL=y` must be set in the kernel (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
16+
2. `kernel.unprivileged_bpf_disabled` can't be set to `1` (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
1717
3. fuse needs to be installed (non-default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
1818

1919
Using Ubuntu 16.04, simply `sudo apt-get install fuse` and you're all set!

documentation/modules/module_doc_template.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
The following is the recommended format for module documentation.
22
But feel free to add more content/sections to this.
3-
3+
One of the general ideas behind these documents is to help someone troubleshoot the module if it were to stop
4+
functioning in 5+ years, so giving links or specific examples can be VERY helpful.
45

56
## Vulnerable Application
67

7-
Instructions to get the vulnerable application.
8+
Instructions to get the vulnerable application. If applicable, include links to the vulnerable install files,
9+
as well as instructions on installing/configuring the environment if it is different than a standard install.
10+
Much of this will come from the PR, and can be copy/pasted.
811

912
## Verification Steps
1013

11-
Example steps in this format:
14+
Example steps in this format (is also in the PR):
1215

1316
1. Install the application
1417
2. Start msfconsole
@@ -20,7 +23,7 @@ But feel free to add more content/sections to this.
2023

2124
**Option name**
2225

23-
Talk about what it does, and how to use it appropriately.
26+
Talk about what it does, and how to use it appropriately. If the default value is likely to change, include the default value here.
2427

2528
## Scenarios
2629

lib/msf/ui/console/command_dispatcher/jobs.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,9 @@ def cmd_handler(*args)
321321
'ExitOnSession' => exit_on_session,
322322
'RunAsJob' => true
323323
}
324+
324325
handler.datastore.reverse_merge!(payload_datastore)
326+
handler.datastore.merge!(handler_opts)
325327

326328
# Launch our Handler and get the Job ID
327329
handler.exploit_simple(handler_opts)

modules/auxiliary/scanner/http/owa_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ def initialize
9292
OptString.new('AD_DOMAIN', [ false, "Optional AD domain to prepend to usernames", ''])
9393
], self.class)
9494

95-
deregister_options('BLANK_PASSWORDS', 'RHOSTS','PASSWORD','USERNAME')
95+
deregister_options('BLANK_PASSWORDS', 'RHOSTS')
9696
end
9797

9898
def setup

0 commit comments

Comments
 (0)