Improved
Pro: Updates Metasploit Pro's bruteforce capabilities to now support LDAP login scanning.
Pro: We upgraded the version of Nmap to version 7.95. On Windows systems, this upgrade also replaces the WinPcap dependency with Npcap. Users that are connecting to a Windows environment to perform their Metasploit Pro updates or installs (either via RDP, SSH, or similar) might have their connections to the server temporarily disconnect during this update - this is required to support the latest network scanning capabilities in Metasploit Pro.
Pro: Metasploit's error reporting diagnostics have been improved on Windows environments.
PR 19368 - This adjusts the
exploit/multi/http/geoserver_unauth_rce_cve_2024_36401
to dynamically pull and test thefeature_type
list to establish an RCE. This will make the module more robust towards installations with differentfeature_type
configurations.PR 19409 - This adds additional fingerprinting checks to the existing
post/linux/gather/checkvm
module to more accurately identify VMs.PR 19415 - Changes the output of the
ldap_esc_vulnerable_cert_finder
to be more useful, including display changes favoring useful templates and including an explanation of why a template may be vulnerable.
Payload Enhancements
- PR 19435 - Adds a new
php/minify
encoder which minifies PHP payloads by removing spaces after keywords and before block openings. It removes comments, empty lines, new lines and leading and trailing spaces.
Fixed
Pro: Fixes an issue that caused project descriptions with special characters to be rendered incorrectly on the home page.
Pro: Fixes an issue in the bruteforce capabilities screen that stopped payload settings from being applied.
Pro: Fixes an issue when attempting to delete a workspace.
Pro: Fixes an issue when attempting to configure Sonar when Pro is running as part of an air-gapped installation.
PR 19376 - This fixes the
php/base64
encoder which was previously generating php payloads that were failing when being being run due to the way single quotes were being inserted into the payload.PR 19381 - This fixes the
gitlab_login
scanner so that it uses the proper datastore options Username and Password which are the standard for login scanners. Before this fix the scanner was usingHttpUsername
andHttpPassword
and ignoring the datastore optionsUsername
andPassword
.PR 19411 - Fixes a crash in Metasploit's RPC layer when calling
module.results
when a nil module result was present.PR 19421 - This updates the
windows/fileformat/adobe_pdf_embedded_exe exploit
to define that it's compatible with bothARCH_X86
andARCH_X64
payloads due to it just generating an EXE.PR 19438 - Fixes an error in the
ldap_login
module if login was successful.
Modules
PR 19363 - This adds two exploit modules and one auxiliary module for ray. The two exploit modules allow to remotely execute arbitrary commands on the targeted system through command injection. The auxiliary module allows to read files on the remote system through a local file inclusion vulnerability.
PR 19380 - Adds an auxiliary module targeting CVE-2023-6329, an improper access control vulnerability, which allows an unauthenticated user to compute valid credentials and to add a new administrative user to the web interface of Control iD
iDSecure <= v4.7.43.0
.PR 19386 - Adds an exploit targeting CVE-2024-7593, an improper access control vulnerability in Ivanti Virtual Traffic Manager (vTM). It allows an unauthenticated remote attacker to add a new administrative user to the web interface of the product before 22.7R2.
PR 19393 - Adds a patch bypass for CVE-2024-32113 (the original vulnerability this exploited). The patch released in 18.12.14 disallows the Path Traversal vulnerability to be exploited however it was later disclosed that the vulnerable endpoint was accessible all along, without the need for the Path Traversal. And so CVE-2024-38856 was issued as a Incorrect Authorization which was patched in 18.12.15.
PR 19395 - Adds a post module to gather passwords and saved session information stored in the Electerm program.
PR 19422 - Adds a new module targeting all versions of pgAdmin up to 8.4 which leverages a Remote Code Execution (RCE) CVE-2024-3116 flaw through the validate binary path API.
PR 19424 - Adds a new module
exploits/multi/http/wp_givewp_rce
which targets CVE-2024-5932 - a critical RCE vulnerability in the WordPress GiveWP plugin (up to version 3.14.1).