Archive directory traversals, now with your daily allowance of JSP

In a year already full of hot vulnerabilities, CVE-2021-21972 in VMware's vCenter Server may already seem like old news. It's not, though! Thanks to wvu-r7 for grabbing this unauthenticated file upload combined with archive directory traversal to upload some sweet web shells. Also, thanks to smcintyre-r7 for reviewing and testing.

Keeping track of your favorite modules

If Metasploit's more than 3,500 modules ever feel like too much to track, kalba-security has added the favorites command to msfconsole. This new command allows users to save their favorite modules in a list viewable with show favorites. Thanks to space-r7 for helping get this over the line!

Google Summer of Code 2021

We are happy to announce that Metasploit Framework has been accepted for the 2021 iteration of Google Summer of Code! This year we are primarily looking for projects that increase visibility into the data that Metasploit collects or that make using exploitation APIs smoother. For more details on project ideas and how to apply, check out our GSoC wiki page.

New Modules (3)

Enhancements and features

  • #14201 from kalba-security implements a new msfconsole command, favorite, which allows users to save favorite / commonly-used modules to a list for easy retrieval later.
  • #14732 from zeroSteiner adds a new Java deserialization mixin and modifies existing Java deserialization exploit modules to use the new mixin. Additionally, this fixes both the generation of the ysoserial payloads and the payloads themselves with improvements to the generation script, find_ysoserial_offsets.rb and pinning the ysoserial version that's used in the generation process.

Bugs Fixed

  • #14792 from gwillcox-r7 updates 11 modules targeting Windows systems that were improperly checking the environment architecture which led to broken WOW64 detection in some cases.
  • #14871 from dwelch-r7 ensures that the BinData library is always available for use within modules
  • #14874 from dwelch-r7 fixes autoloading when utilizing Msf::RPC::Client in external tooling.

Get it

As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:

If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
binary installers (which also include the commercial edition).