Improved
Pro: Updates the quick pentest and pro exploit tasks logs to contain the current workspace and minimum rank information.
Pro: Add a new code example for interacting with the module search API.
Pro: Adds additional startup logging information to the Metasploit engine service, as well as improving nginx startup error handling and additional logging for capturing unhandled startup errors. Windows environments will now correctly mark metasploitProSvc as not running if an unexpected crash has occurred.
Pro: Update diagnostics reporting tool to include inactive systemctl units.
PR 19360 - Adds a new
LAUNCH_ITEM
option to theexploits/osx/local/persistence
module. The allowed values areLaunchAgent
orLaunchDaemon
. One of the advantages of persisting as aLaunchDaemon
is that they run before user login and with elevated permissions. Additionally this pull request adds the ability for the module to target Apple Silicon devices.PR 19529 - This updates the
pipe_dcerpc_auditor
module to use the new pattern for handling port settings which offers users greater control over their targeting.PR 19597 - Fix symlink and junction detection on Python windows Meterpreter.
PR 19600 - Updates the post windows modules
gather/credentials/seamonkey
,gather/credentials/chrome
, andgather/enum_chrome
as being superseded bywindows/gather/enum_browsers
.
Payload Enhancements
- PR 19604 - This adds a new method for injecting code into running processes on Windows Kernel version 10.x.
Fixed
Pro: Fixes a crash when calling the
pro.module_search
RPC API.PR 19553 - This fixes a bug in modules that use Kerberos authentication where when the
KrbOfferedEncryptionTypes
datastore option was set, it would be ignored instead of used to select a compatible ticket from the cache.
Modules
PR 19404 - This adds a module for exploiting ESC8. It includes an SMB capture server to repackage and forward authentication from the SMB capture server to an NTLM-authenticating HTTP server. The module then uses the HTTP Client to request and download certificates.
PR 19488 - This adds a new auxiliary module to exploit an unauthenticated SQL injection vulnerability in the Ultimate Member plugin for WordPress versions 2.1.3 to 2.8.2. The vulnerability allows an unauthenticated attacker to extract sensitive data via the sorting parameter.
PR 19489 - This adds a new exploit module for the SQL injection vulnerability in the WordPress wp-automatic plugin, affecting versions prior to 3.92.1. The vulnerability allows unauthenticated attackers to inject SQL commands, enabling them to create a malicious administrator account. Using the newly created admin account, the attacker can upload a plugin and achieve remote code execution.
PR 19499 - This adds a new module which exploits a backdoor in SolarWinds Web Help Desk (CVE-2024-28987) versions
<= v12.8.3
which enables attackers to retrieve all tickets currently logged in the application.PR 19506 - Adds a new post-exploitation
post/windows/gather/enum_browsers
module which extracts sensitive browser data from both Chromium-based and Gecko-based browsers on the target system. It supports the decryption of passwords and cookies using Windows Data Protection API (DPAPI) and can extract additional data such as browsing history, keyword search history, download history, autofill data, credit card information, browser cache and installed extensions.PR 19517 - This adds a new auxiliary module that exploits an unauthenticated SQL injection vulnerability in the TI WooCommerce Wishlist plugin for WordPress (versions
<= 2.8.2
). The vulnerability allows attackers to execute SQL queries via the order parameter which can be used to dump usernames and their hashed passwords.PR 19518 - Add support for RISC-V 32-bit / 64-bit Little Endian payloads. Includes Linux Execute Command payloads and Linux Reboot payloads for testing.
PR 19527 - Updates the
exploit/multi/http/wp_givewp_rce
module with a patch bypass. This module is now compatible with GiveWP version3.16.1
.PR 19528 - Adds a new exec payload leveraging Python.
PR 19557 - Adds a module to chain CVE-2024-5910, a password reset vulnerability with CVE-2024-9464, an authenticated command-injection vulnerability to gain code execution on PaloAlto Expedition servers between versions after 1.2 and before 1.2.92 with or without knowledge of the credentials.