Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add module notes for Reliability and Stability #12535

Merged
merged 1 commit into from
Nov 7, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 7 additions & 5 deletions modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb
Original file line number Diff line number Diff line change
Expand Up @@ -62,11 +62,13 @@ def initialize(info = {})
[ 'URL', 'https://www.securitytracker.com/id/1037403' ],
[ 'URL', 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c' ]
],
'DefaultTarget' => 0,
'Notes' =>
{
'AKA' => ['chocobo_root.c']
}
'Notes' =>
{
'AKA' => ['chocobo_root.c'],
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_OS_DOWN ]
},
'DefaultTarget' => 0
))
register_options [
OptInt.new('TIMEOUT', [ true, 'Race timeout (seconds)', '600' ]),
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,11 @@ def initialize(info = {})
[ 'URL', 'https://github.com/xairy/kernel-exploits/blob/master/CVE-2017-7308/poc.c' ],
[ 'URL', 'https://github.com/bcoles/kernel-exploits/blob/cve-2017-7308/CVE-2017-7308/poc.c' ]
],
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_OS_DOWN ],
},
'DefaultTarget' => 0))
register_options [
OptEnum.new('COMPILE', [ true, 'Compile on target', 'Auto', %w(Auto True False) ])
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,9 @@ def initialize(info = {})
],
'Notes' =>
{
'AKA' => ['unsanitary.sh']
'AKA' => ['unsanitary.sh'],
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0))
register_options [
Expand Down
18 changes: 8 additions & 10 deletions modules/exploits/linux/local/bpf_sign_extension_priv_esc.rb
Original file line number Diff line number Diff line change
Expand Up @@ -79,16 +79,14 @@ def initialize(info = {})
[ 'URL', 'http://openwall.com/lists/oss-security/2017/12/21/2'],
[ 'URL', 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f' ]
],
'DefaultTarget' => 0,
'Notes' =>
{
'AKA' =>
[
'get-rekt-linux-hardened.c',
'upstream44.c'
]
}
))
'Notes' =>
{
'AKA' => ['get-rekt-linux-hardened.c', 'upstream44.c'],
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_OS_DOWN ],
},
'DefaultTarget' => 0
))
register_options [
OptEnum.new('COMPILE', [ true, 'Compile on target', 'Auto', %w[Auto True False] ])
]
Expand Down
5 changes: 5 additions & 0 deletions modules/exploits/linux/local/ktsuss_suid_priv_esc.rb
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,11 @@ def initialize(info = {})
'PrependSetuid' => true,
'PrependFork' => true
},
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0))
register_options [
OptString.new('KTSUSS_PATH', [true, 'Path to staprun executable', '/usr/bin/ktsuss'])
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,6 @@ def initialize(info = {})
['URL', 'https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19'],
['URL', 'https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2']
],
'DefaultTarget' => 0,
'DefaultOptions' =>
{
'AppendExit' => true,
Expand All @@ -71,11 +70,13 @@ def initialize(info = {})
'WfsDelay' => 60,
'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp'
},
'Notes' =>
'Notes' =>
{
'AKA' => ['subuid_shell.c']
}
))
'AKA' => ['subuid_shell.c'],
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0))
register_options [
OptEnum.new('COMPILE', [true, 'Compile on target', 'Auto', %w[Auto True False]])
]
Expand Down
8 changes: 7 additions & 1 deletion modules/exploits/linux/local/omniresolve_suid_priv_esc.rb
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,13 @@ def initialize(info = {})
[
[ 'CVE', '2019-11660' ],
[ 'URL', 'https://softwaresupport.softwaregrp.com/doc/KM03525630' ]
]
],
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0
))

register_options(
Expand Down
5 changes: 5 additions & 0 deletions modules/exploits/linux/local/ptrace_traceme_pkexec_helper.rb
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,11 @@ def initialize(info = {})
'Payload' => 'linux/x64/meterpreter/reverse_tcp',
'PrependFork' => true,
},
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DisclosureDate' => 'Jul 4 2019'))
register_advanced_options [
OptBool.new('ForceExploit', [false, 'Override check result', false]),
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,11 @@ def initialize(info = {})
'PrependFork' => true,
'WfsDelay' => 30
},
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0))
register_options [
OptString.new('SERVU_PATH', [true, 'Path to Serv-U executable', '/usr/local/Serv-U/Serv-U'])
Expand Down
5 changes: 5 additions & 0 deletions modules/exploits/linux/local/sock_sendpage.rb
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,11 @@ def initialize(info = {})
[ 'Linux x86', { 'Arch' => ARCH_X86 } ]
],
'DisclosureDate' => 'Aug 13 2009',
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_OS_DOWN ],
},
'DefaultTarget' => 0))
register_options [
OptBool.new('DEBUG_EXPLOIT', [ true, "Make the exploit executable be verbose about what it's doing", false ])
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,11 @@ def initialize(info = {})
],
'SessionTypes' => ['shell', 'meterpreter'],
'Targets' => [['Auto', {}]],
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0))
register_options [
OptString.new('STAPRUN_PATH', [true, 'Path to staprun executable', '/usr/bin/staprun'])
Expand Down
5 changes: 5 additions & 0 deletions modules/exploits/linux/local/ufo_privilege_escalation.rb
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,11 @@ def initialize(info = {})
[ 'URL', 'https://github.com/bcoles/kernel-exploits/commits/cve-2017-1000112' ]
],
'DefaultOptions' => { 'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp' },
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_OS_DOWN ],
},
'DefaultTarget' => 0))
register_options [
OptEnum.new('COMPILE', [ true, 'Compile on target', 'Auto', %w[Auto True False] ])
Expand Down
9 changes: 7 additions & 2 deletions modules/exploits/linux/local/vmware_alsa_config.rb
Original file line number Diff line number Diff line change
Expand Up @@ -55,10 +55,15 @@ def initialize(info = {})
'WfsDelay' => 30,
'Payload' => 'linux/x64/meterpreter_reverse_tcp'
},
'DefaultTarget' => 1,
'Arch' => [ ARCH_X86, ARCH_X64 ],
'SessionTypes' => [ 'shell', 'meterpreter' ],
'Privileged' => true ))
'Privileged' => true,
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 1))
register_advanced_options [
OptBool.new('ForceExploit', [false, 'Override check result', false]),
OptString.new('WritableDir', [true, 'A directory where we can write files', '/tmp']),
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,12 @@ def initialize(info = {})
[ 'URL', 'http://www.magnicomp.com/support/cve/CVE-2017-6516.shtml' ],
[ 'URL', 'https://labs.mwrinfosecurity.com/advisories/magnicomps-sysinfo-root-setuid-local-privilege-escalation-vulnerability/' ],
[ 'URL', 'https://labs.mwrinfosecurity.com/advisories/multiple-vulnerabilities-in-magnicomps-sysinfo-root-setuid/' ]
]
],
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
}
))
register_options(
[
Expand Down
18 changes: 12 additions & 6 deletions modules/exploits/unix/local/setuid_nmap.rb
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ class MetasploitModule < Msf::Exploit::Local
include Msf::Post::File

def initialize(info={})
super( update_info( info, {
super( update_info( info,
'Name' => 'Setuid Nmap Exploit',
'Description' => %q{
Nmap's man page mentions that "Nmap should never be installed with
Expand All @@ -39,15 +39,21 @@ def initialize(info={})
[ 'BSD x86', { 'Arch' => ARCH_X86 } ],
],
'DefaultOptions' => { "PrependSetresuid" => true, "WfsDelay" => 2 },
'DefaultTarget' => 0,
}
'Notes' =>
{
'Reliability' => [ REPEATABLE_SESSION ],
'Stability' => [ CRASH_SAFE ]
},
'DefaultTarget' => 0
))
register_options([
# These are not OptPath becuase it's a *remote* path
OptString.new("WritableDir", [ true, "A directory where we can write files", "/tmp" ]),
OptString.new("Nmap", [ true, "Path to setuid nmap executable", "/usr/bin/nmap" ]),
OptString.new("ExtraArgs", [ false, "Extra arguments to pass to Nmap (e.g. --datadir)", "" ]),
OptString.new("Nmap", [ true, "Path to setuid nmap executable", "/usr/bin/nmap" ]),
OptString.new("ExtraArgs", [ false, "Extra arguments to pass to Nmap (e.g. --datadir)", "" ]),
])
register_advanced_options [
wvu marked this conversation as resolved.
Show resolved Hide resolved
OptString.new('WritableDir', [true, 'A directory where we can write files', '/tmp'])
]
end

def check
Expand Down