Anzeigen der neuesten Beiträge
0 Mitglieder und 1 Gast betrachten dieses Thema.
This updates Metasploit to 4.6.0. This update includes several new features and updates, including: Support for OWASP Top 10 2013 Revamped user interface More effective website spider Get shells using SQL injection Support for web app authentication Reports with remediation advice Quick penetration testing wizard Web application testing wizard Phishing simulation wizardIt also includes 6 new modules, including exploits for Linksys E1500/E2500 and Netgear DGN1000B routers and new auxiliary modules for DLink routers and PostgreSQL. In addition, this update fixes 2 issues.This release also removes both Armitage and msfgui, the two Java-based thick clients, from the Metasploit binary installers. This should help clarify which GUI is actually supported (and supportable) by Rapid7 in an installed environment. It also frees up these projects to develop, test, and release on their own schedules instead of being beholden to Metasploit development schedules to land new features and bug fixes. Over the next couple months, expect to see more shuffling around ofMetasploit's other secondary projects. For example, Meterpreter will be exiting the Metasploit source repository soon, thanks to the valiant untangling efforts by Egypt and Meatballs. Meterpreter, PacketFu, John the Ripper -- these are all stand-alone components that effectively have their own development requirements and their own testing/QA conventions and release schedules, so there's no good reason to try to subject them to Metasploit's dictates.
SummaryThis update includes 7 new modules, including exploits for D-Link Devices, Foreman, Apple Quicktime, HP Managed Printing Administration and VMware vCenter. It also includes a new auxiliary module for Foreman.In addition, this update fixes 4 issues.Module ChangesExploit modules D-Link Devices UPnP SOAP Command Execution by juan vazquez and Michael Messner exploits OSVDB-94924 Foreman (Red Hat OpenStack/Satellite) bookmarks/create Code Injection by Ramon de C Valle exploits CVE-2013-2121 Apple Quicktime 7 Invalid Atom Length Buffer Overflow by sinn3r, Jason Kratzer, Paul Bates, and Tom Gallagher exploits ZDI-13-110 Apple Quicktime 7 Invalid Atom Length Buffer Overflow by sinn3r, Jason Kratzer, Paul Bates, and Tom Gallagher exploits ZDI-13-110 HP Managed Printing Administration jobAcct Remote Command Execution by juan vazquez and Andrea Micalizzi exploits ZDI-11-352 VMware vCenter Chargeback Manager ImageUploadServlet Arbitrary File Upload by juan vazquez and Andrea Micalizzi exploits ZDI-13-147Auxiliary and post modules Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment by Ramon de C Valle exploits CVE-2013-2113Notable Changes and Resolved Issues 2095 - Add arguments to osx exec payload 4790 - Fix stack trace when searching for app types 7252 - Fix js_os_detect to correctly detect Internet Explorer 7 8239 - Fix error when runnin phpldapadminquery exploit
This addresses CVE-2014-0160 (the OpenSSL Heartbleed bug). All components previously vulnerable have been upgraded or recompiled against OpenSSL 1.0.1g, including: Nginx Nmap OpenSSL PostgreSQL RubyAfter applying this update, we strongly recommend re-generating your SSL keys and certificates. Please see security advisory for the heartbleed vulnerability for instructions and more information.This update also includes 7 new exploit modules and 10 auxiliary/post modules since Metasploit 4.9.0.Exploit modules ibstat $PATH Privilege Escalation by Kostas Lintovois, Kristian Erik Hermansen, and Sagi Shahar exploits CVE-2013-4011 Fritz!Box Webcm Unauthenticated Command Injection by Fabian Braeunlein, Michael Messner, and unknown exploits OSVDB-103289 LifeSize UVC Authenticated RCE via Ping by Brandon Perry Linksys E-Series TheMoon Remote Command Injection by juan vazquez, Johannes Ullrich, Michael Messner, Rew, and infodox exploits OSVDB-103321 SePortal SQLi Remote Code Execution by jsass and xistence exploits CVE-2008-5191 WinRAR Filename Spoofing by juan vazquez and chr1x exploits OSVDB-62610 JIRA Issues Collector Directory Traversal by juan vazquez and Philippe Arteau exploits CVE-2014-2314Auxiliary and post modules OpenSSL Heartbeat Information Leak by juan vazquez, Antti, Christian Mehlmauer, FiloSottile, Jared Stafford, Matti, Neel Mehta, Riku, and wvu exploits CVE-2014-0160 Katello (Red Hat Satellite) users/update_roles Missing Authorization by Ramon de C Valle exploits CVE-2013-2143 AlienVault Authenticated SQL Injection Arbitrary File Read by Brandon Perry EMC CTA v10.0 Unauthenticated XXE Arbitrary File Read by Brandon Perry DNS Amplification Scanner by xistence HTTP Header Detection by Christian Mehlmauer and rick2600 JBoss Status Servlet Information Gathering by Matteo Cantoni exploits CVE-2008-3273 Oracle Demantra Arbitrary File Retrieval with Authentication Bypass by Oliver Gruskovnjak exploits CVE-2013-5880 HP LaserJet Printer SNMP Enumeration by Matteo Cantoni Firefox Gather Cookies from Privileged Javascript Shell by joevNotable Changes and Resolved Issues 8780 - Msf::Auxiliary::Nmap - ActiveRecord::ConnectionNotEstablished Error PostgreSQL upgraded to 9.3.4 Nginx upgraded to 1.4.7 OpenSSL upgraded to 1.0.1g