Skip to content

Commit ebf5121

Browse files
committed
Merge branch 'upstream/master' into add-bypassuac-eventvwr
2 parents 6890e56 + 3c9ebb9 commit ebf5121

File tree

26 files changed

+581
-88
lines changed

26 files changed

+581
-88
lines changed

.ruby-version

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.3.2
1+
2.3.3

.travis.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ addons:
1010
- graphviz
1111
language: ruby
1212
rvm:
13-
- '2.3.2'
13+
- '2.3.3'
1414

1515
env:
1616
- RAKE_TASKS="cucumber cucumber:boot" CREATE_BINSTUBS=true

Gemfile.lock

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
PATH
22
remote: .
33
specs:
4-
metasploit-framework (4.13.1)
4+
metasploit-framework (4.13.3)
55
actionpack (~> 4.2.6)
66
activerecord (~> 4.2.6)
77
activesupport (~> 4.2.6)
@@ -140,7 +140,7 @@ GEM
140140
factory_girl_rails (4.7.0)
141141
factory_girl (~> 4.7.0)
142142
railties (>= 3.0.0)
143-
faraday (0.9.2)
143+
faraday (0.10.0)
144144
multipart-post (>= 1.2, < 3)
145145
ffi (1.9.14)
146146
filesize (0.1.1)
@@ -153,24 +153,24 @@ GEM
153153
loofah (2.0.3)
154154
nokogiri (>= 1.5.9)
155155
metasm (1.0.2)
156-
metasploit-concern (2.0.2)
156+
metasploit-concern (2.0.3)
157157
activemodel (~> 4.2.6)
158158
activesupport (~> 4.2.6)
159159
railties (~> 4.2.6)
160-
metasploit-credential (2.0.7)
160+
metasploit-credential (2.0.8)
161161
metasploit-concern
162162
metasploit-model
163163
metasploit_data_models
164164
pg
165165
railties
166166
rubyntlm
167167
rubyzip
168-
metasploit-model (2.0.2)
168+
metasploit-model (2.0.3)
169169
activemodel (~> 4.2.6)
170170
activesupport (~> 4.2.6)
171171
railties (~> 4.2.6)
172172
metasploit-payloads (1.2.1)
173-
metasploit_data_models (2.0.8)
173+
metasploit_data_models (2.0.9)
174174
activerecord (~> 4.2.6)
175175
activesupport (~> 4.2.6)
176176
arel-helpers
@@ -196,7 +196,7 @@ GEM
196196
network_interface (0.0.1)
197197
nokogiri (1.6.8.1)
198198
mini_portile2 (~> 2.1.0)
199-
octokit (4.6.1)
199+
octokit (4.6.2)
200200
sawyer (~> 0.8.0, >= 0.5.3)
201201
openssl-ccm (1.2.1)
202202
openvas-omp (0.0.4)
@@ -234,7 +234,7 @@ GEM
234234
thor (>= 0.18.1, < 2.0)
235235
rake (11.3.0)
236236
rb-readline-r7 (0.5.2.0)
237-
recog (2.0.24)
237+
recog (2.1.0)
238238
nokogiri
239239
redcarpet (3.3.4)
240240
rex-arch (0.1.2)
@@ -245,42 +245,42 @@ GEM
245245
rex-core
246246
rex-struct2
247247
rex-text
248-
rex-core (0.1.2)
249-
rex-encoder (0.1.0)
248+
rex-core (0.1.3)
249+
rex-encoder (0.1.1)
250250
metasm
251251
rex-arch
252252
rex-text
253-
rex-exploitation (0.1.2)
253+
rex-exploitation (0.1.3)
254254
jsobfu
255255
metasm
256256
rex-arch
257257
rex-encoder
258258
rex-text
259-
rex-java (0.1.2)
259+
rex-java (0.1.3)
260260
rex-mime (0.1.1)
261261
rex-text
262262
rex-nop (0.1.0)
263263
rex-arch
264-
rex-ole (0.1.2)
264+
rex-ole (0.1.3)
265265
rex-text
266-
rex-powershell (0.1.66)
266+
rex-powershell (0.1.68)
267267
rex-random_identifier
268268
rex-text
269-
rex-random_identifier (0.1.0)
269+
rex-random_identifier (0.1.1)
270270
rex-text
271-
rex-registry (0.1.0)
272-
rex-rop_builder (0.1.0)
271+
rex-registry (0.1.1)
272+
rex-rop_builder (0.1.1)
273273
metasm
274274
rex-core
275275
rex-text
276-
rex-socket (0.1.1)
276+
rex-socket (0.1.2)
277277
rex-core
278-
rex-sslscan (0.1.0)
278+
rex-sslscan (0.1.1)
279279
rex-socket
280280
rex-text
281281
rex-struct2 (0.1.0)
282-
rex-text (0.2.5)
283-
rex-zip (0.1.0)
282+
rex-text (0.2.9)
283+
rex-zip (0.1.1)
284284
rex-text
285285
rkelly-remix (0.0.6)
286286
robots (0.10.1)
@@ -303,9 +303,9 @@ GEM
303303
rspec-support (3.5.0)
304304
rubyntlm (0.6.1)
305305
rubyzip (1.2.0)
306-
sawyer (0.8.0)
306+
sawyer (0.8.1)
307307
addressable (>= 2.3.5, < 2.6)
308-
faraday (~> 0.8, < 0.10)
308+
faraday (~> 0.8, < 1.0)
309309
shoulda-matchers (3.1.1)
310310
activesupport (>= 4.0.0)
311311
simplecov (0.12.0)
@@ -316,12 +316,12 @@ GEM
316316
slop (3.6.0)
317317
sqlite3 (1.3.12)
318318
sshkey (1.8.0)
319-
thor (0.19.1)
319+
thor (0.19.4)
320320
thread_safe (0.3.5)
321321
timecop (0.8.1)
322322
tzinfo (1.2.2)
323323
thread_safe (~> 0.1)
324-
tzinfo-data (1.2016.9)
324+
tzinfo-data (1.2016.10)
325325
tzinfo (>= 1.0.0)
326326
windows_error (0.0.2)
327327
xpath (2.0.0)

documentation/modules/exploit/linux/local/netfilter_priv_esc.md renamed to documentation/modules/exploit/linux/local/netfilter_priv_esc_ipv4.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This does not work against the following vulnerable systems. Additional work ma
2727

2828
1. Start msfconsole
2929
2. Exploit a box via whatever method
30-
4. Do: `use exploit/linux/local/netfilter_priv_esc`
30+
4. Do: `use exploit/linux/local/netfilter_priv_esc_ipv4`
3131
5. Do: `set session #`
3232
6. Do: `set verbose true`
3333
7. Do: `exploit`
@@ -115,7 +115,7 @@ This does not work against the following vulnerable systems. Additional work ma
115115

116116
#### Escalate w/ pre-compiled binaries
117117

118-
msf exploit(netfilter_priv_esc) > exploit
118+
msf exploit(netfilter_priv_esc_ipv4) > exploit
119119

120120
[*] Started reverse TCP handler on 192.168.2.117:4444
121121
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed
@@ -160,9 +160,9 @@ This does not work against the following vulnerable systems. Additional work ma
160160

161161
In this scenario, we already exploit the box, for whatever reason our shell died. So now we want to re-exploit, but we dont need to run desc again.
162162

163-
msf exploit(netfilter_priv_esc) > set reexploit true
163+
msf exploit(netfilter_priv_esc_ipv4) > set reexploit true
164164
reexploit => true
165-
msf exploit(netfilter_priv_esc) > exploit
165+
msf exploit(netfilter_priv_esc_ipv4) > exploit
166166

167167
[*] Started reverse TCP handler on 192.168.2.117:4444
168168
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed
@@ -191,9 +191,9 @@ In this scenario, we already exploit the box, for whatever reason our shell died
191191

192192
#### Re-exploit w/ pre-compiled binaries
193193

194-
msf exploit(netfilter_priv_esc) > set reexploit true
194+
msf exploit(netfilter_priv_esc_ipv4) > set reexploit true
195195
reexploit => true
196-
msf exploit(netfilter_priv_esc) > exploit
196+
msf exploit(netfilter_priv_esc_ipv4) > exploit
197197

198198
[*] Started reverse TCP handler on 192.168.2.117:4444
199199
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed

lib/metasploit/framework/version.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ def self.get_hash
3030
end
3131
end
3232

33-
VERSION = "4.13.1"
33+
VERSION = "4.13.3"
3434
MAJOR, MINOR, PATCH = VERSION.split('.').map { |x| x.to_i }
3535
PRERELEASE = 'dev'
3636
HASH = get_hash

lib/msf/core/exploit/http/client.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -366,7 +366,7 @@ def send_request_cgi(opts={}, timeout = 20)
366366
print_line('#' * 20)
367367
print_line(res.to_s)
368368
end
369-
369+
disconnect(c)
370370
res
371371
rescue ::Errno::EPIPE, ::Timeout::Error => e
372372
print_line(e.message) if datastore['HttpTrace']

lib/msf/core/handler/reverse.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ def bind_port
6161
# if it fails to start the listener.
6262
#
6363
def setup_handler
64-
if datastore['Proxies'] and not datastore['ReverseAllowProxy']
64+
if !datastore['Proxies'].blank? && !datastore['ReverseAllowProxy']
6565
raise RuntimeError, "TCP connect-back payloads cannot be used with Proxies. Use 'set ReverseAllowProxy true' to override this behaviour."
6666
end
6767

lib/msf/core/handler/reverse_tcp_double_ssl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ def human_name
6363
# if it fails to start the listener.
6464
#
6565
def setup_handler
66-
if datastore['Proxies'] and not datastore['ReverseAllowProxy']
66+
if !datastore['Proxies'].blank? && !datastore['ReverseAllowProxy']
6767
raise RuntimeError, 'TCP connect-back payloads cannot be used with Proxies. Can be overriden by setting ReverseAllowProxy to true'
6868
end
6969

lib/msf/core/handler/reverse_tcp_ssl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ def self.general_handler_type
4343
# if it fails to start the listener.
4444
#
4545
def setup_handler
46-
if datastore['Proxies'] and not datastore['ReverseAllowProxy']
46+
if !datastore['Proxies'].blank? && !datastore['ReverseAllowProxy']
4747
raise RuntimeError, "TCP connect-back payloads cannot be used with Proxies. Use 'set ReverseAllowProxy true' to override this behaviour."
4848
end
4949

lib/rex/proto/http/client_request.rb

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -108,21 +108,21 @@ def to_s
108108
qstr << set_encode_uri(Rex::Text.rand_text_alphanumeric(rand(32)+1))
109109
end
110110
end
111+
if opts.key?("vars_get") && opts['vars_get']
112+
opts['vars_get'].each_pair do |var,val|
113+
var = var.to_s
111114

112-
opts['vars_get'].each_pair do |var,val|
113-
var = var.to_s
114-
115-
qstr << '&' if qstr.length > 0
116-
qstr << (opts['encode_params'] ? set_encode_uri(var) : var)
117-
# support get parameter without value
118-
# Example: uri?parameter
119-
if val
120-
val = val.to_s
121-
qstr << '='
122-
qstr << (opts['encode_params'] ? set_encode_uri(val) : val)
115+
qstr << '&' if qstr.length > 0
116+
qstr << (opts['encode_params'] ? set_encode_uri(var) : var)
117+
# support get parameter without value
118+
# Example: uri?parameter
119+
if val
120+
val = val.to_s
121+
qstr << '='
122+
qstr << (opts['encode_params'] ? set_encode_uri(val) : val)
123+
end
123124
end
124125
end
125-
126126
if (opts['pad_post_params'])
127127
1.upto(opts['pad_post_params_count'].to_i) do |i|
128128
rand_var = Rex::Text.rand_text_alphanumeric(rand(32)+1)

0 commit comments

Comments
 (0)