Last updated at Tue, 16 Jan 2024 01:38:17 GMT

Hi everyone! For those in the U.S., hope you all had a great MLK weekend. We have a pretty light release due to the holiday, but we still have some cool stuff in the house. Check it out!

First thing, Metasploit contributor Brendan Coles strikes again with a privilege escalation module against Linux. The exploit is designed to gain root privileges on Linux using setuid executables compiled with AddressSanitizer. It's by no means the latest hot vulnerability in town, but you may still find this handy in older Linux systems.

The next thing is more of a foolproof feature that was developed thanks to GSOC (Google Summer of Code). Well, more specifically, we should thank Alberto Rafael Rodriguez Iglesias and William Vu working together to finally land this in master. What this provides is a post module that acts as a shell, and it simulates simple commands that may not exist on some Linux systems sometimes. For example: cat, ls, whoami, etc. So, you never have to worry about it.


New modules

Exploit modules (1 new)

Auxiliary and post modules (4 new)

Get it

As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:

We recently-announced the release of Metasploit 5. You can get it by cloning the Metasploit Framework repo (master branch). To install fresh without using git,you can use the open-source-only Nightly Installers or the binary installers (which also include the commercial editions). PLEASE NOTE that the binary installers, and Metasploit Framework versions included in distros such as Kali, Parrot, etc., are based off the Metasploit 4 branch for the time being. Migration is underway, so you can look forward to getting Metasploit 5 in the binary installers and in third-party software distributions soon.