Posts tagged Metasploit

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 05/16/2025

New modules for everyone This week’s release is packed with new module content. We have RCE modules for Car Rental System 1.0, Wordpress plugins SureTriggers, User Registration and Membership. We also have a persistence module for LINQPad software and an auxiliary module for POWERCOM UPSMON PRO. We have also added support for 32-bit architectures to our execute-assembly post module, which now supports injection of both 64-bit and 32-bit .NET assembly binaries. New module content (5) POWERCOM UP

2 min Metasploit

Metasploit Wrap-Up 05/09/2025

New Toys and New Techniques This release features a new OPNSense login scanner, a module targeting the Sante PACS path traversal vulnerability, an additional method for stealing Network Access Account credentials via SMB to HTTP relay, and the Erlang/OTP SSH exploit everyone was excited about. New module content (4) Sante PACS Server Path Traversal (CVE-2025-2264) Authors: Michael Heinzl and Tenable Type: Auxiliary Pull request: #20124 [https://github.com/rapid7/metasploit-framework/pull/20124]

3 min Metasploit

Metasploit Wrap-Up 05/02/2025

Meterpreter Extended API Clipboard Monitoring Security is hard, and Open Source Security is a collaborative effort. This week, Metasploit released a fix for a vulnerability that was privately disclosed to us by long-time community member bcoles [https://github.com/bcoles]. The vulnerability in question impacted Metasploit users who were using the clipboard monitoring functionality contained within the extended-API Meterpreter extension (extapi). After a user enables monitoring, they would typica

4 min Metasploit

Metasploit Wrap-Up 04/25/2025

AD CS workflow improvement with new PKCS12 features Given the increasing popularity of AD CS misconfiguration exploitation in recent years, Metasploit has been consistently improving its capabilities in this area. This week’s release introduces a new certs command to the msfconsole, enabling users to manage PKCS12 certificates stored in the database, similar to the klist command [https://docs.metasploit.com/docs/pentesting/active-directory/kerberos/service_authentication.html#ticket-management

2 min Metasploit

Metasploit Wrap-Up 04/18/2025

Smaller Fetch Payloads This week, a significant enhancement was made to the already awesome fetch payload [https://docs.metasploit.com/docs/development/developing-modules/guides/how-to-use-fetch-payloads.html] feature by our very own bwatters-r7 [https://github.com/bwatters-r7]. The improvement introduces a new option, PIPE_FETCH, which optimizes the process by serving both the payload and the command to be executed simultaneously. This enhancement directly addresses the challenge of limited s

3 min Metasploit

Metasploit Weekly Wrap-Up 04/11/2025

Spring Exploits This weekly release of Metasploit Framework includes new RCE exploit modules for several vulnerable applications: Appsmith, a low-code application platform which contains a misconfiguration on PostgreSQL (CVE-2024-55964); Pandora FMS, a monitoring solution, where, once gained access to the administrator panel is possible to inject commands (CVE-2024-12971); Oracle Access Manager, a SSO application containing an unauthenticated deserialization vulnerability (CVE-2021-35587); and p

3 min Metasploit

Metasploit Wrap-Up 04/04/2025

New RCEs Metasploit added four new modules this week, including three that leverage vulnerabilities to obtain remote code execution (RCE) [https://www.rapid7.com/fundamentals/what-is-remote-code-execution-rce/]. Among these three, two leverage deserialization, showing that the exploit primitive is still going strong. The Tomcat vulnerability in particular CVE-2025-24813 [https://attackerkb.com/search?q=CVE-2025-24813&referrer=blog] garnered a lot of attention when it was disclosed; however, to f

2 min Metasploit

Metasploit Wrap-Up 03/28/2025

Windows LPE - Cloud File Mini Filer Driver Heap Overflow This Metasploit release includes an exploit module for CVE-2024-30085, an LPE in cldflt.sys which is known as the Windows Cloud Files Mini Filer Driver. This driver allows users to manage and sync files between a remote server and a local client. The exploit module allows users with an existing session on an affected Windows device to seamlessly escalate their privileges to NT AUTHORITY\SYSTEM. This module has been tested on Windows workst

2 min Metasploit

Metasploit Wrap-Up 03/21/2025

SMB to LDAP Relay This week, the Metasploit team have added an exciting relay module that has been in the works for a long time. This relay module is used to host an SMB server, and execute an SMB to LDAP relay attack against a Domain controller with an LDAP server when NTLMv1 is being used as the SMB authentication method. PetitPotam can be used to coerce authentication on the victim system and relay it to the Domain Controller.The module automatically takes care of removing the relevant flags

1 min Metasploit

Metasploit Weekly Wrap-Up 03/14/25

New module content (1) InvoiceShelf unauthenticated PHP Deserialization Vulnerability Authors: Mickaël Benassouli, Rémi Matasse, and h00die-gr3y [https://github.com/h00die-gr3y] Type: Exploit Pull request: #19950 [https://github.com/rapid7/metasploit-framework/pull/19950] contributed by h00die-gr3y [https://github.com/h00die-gr3y] Path: linux/http/invoiceshelf_unauth_rce_cve_2024_55556 AttackerKB reference: CVE-2024-55556 [https://attackerkb.com/search?q=CVE-2024-55556&referrer=blog] Descripti

3 min Metasploit

Metasploit Wrap-Up 03/06/2025

New module content (3) Get NAA Credentials Authors: skelsec, smashery, and xpn Type: Auxiliary Pull request: #19712 [https://github.com/rapid7/metasploit-framework/pull/19712] contributed by smashery [https://github.com/smashery] Path: admin/sccm/get_naa_credentials Description: Adds an auxiliary module which performs the retrieval of Network Access Account (NAA) credentials from an System Center Configuration Manager (SCCM) server. Given a computer name and password (which can typically be cr

2 min Metasploit

Metasploit Weekly Wrap-Up: 02/28/2025

New module content (5) mySCADA myPRO Manager Credential Harvester (CVE-2025-24865 and CVE-2025-22896) Author: Michael Heinzl Type: Auxiliary Pull request: #19878 [https://github.com/rapid7/metasploit-framework/pull/19878] contributed by h4x-x0r [https://github.com/h4x-x0r] Path: admin/scada/mypro_mgr_creds AttackerKB reference: CVE-2025-22896 [https://attackerkb.com/search?q=CVE-2025-22896&referrer=blog] Description: This module adds credential harvesting for MySCADA MyPro Manager using CVE-20

2 min Metasploit

Metasploit Weekly Wrap-Up 02/21/2025

BeyondTrust exploit + fetch payload updates This Metasploit release includes an exploit module that chains two vulnerabilities, one exploited in the wild by APT groups and another one, a 0-day discovered by Rapid7 [https://attackerkb.com/topics/vC7mUlftWA/cve-2025-1094?referrer=search] during the vulnerability analysis. This week's release also includes a significant enhancement to Metasploit's fetch payloads, which now support PPC, MIPS and ARM architectures. This allows the payloads to be use

2 min Metasploit

Metasploit Weekly Wrap-Up 02/14/2025

New module content (2) Unauthenticated RCE in NetAlertX Authors: Chebuya (Rhino Security Labs) and Takahiro Yokoyama Type: Exploit Pull request: #19868 [https://github.com/rapid7/metasploit-framework/pull/19868] contributed by Takahiro-Yoko [https://github.com/Takahiro-Yoko] Path: linux/http/netalertx_rce_cve_2024_46506 AttackerKB reference: CVE-2024-46506 [https://attackerkb.com/search?q=CVE-2024-46506&referrer=blog] Description: A new module for an unauthenticated remote code execution bug i

3 min Metasploit

Metasploit Weekly Wrap-Up 02/07/2025

Gathering data and improving workflows This week's release includes 2 new auxiliary modules targeting Argus Surveillance DVR and Ivanti Connect Secure. The former, contributed by Maxwell Francis, and based on the work of John Page, can be used to retrieve arbitrary files on the target's filesystem by exploiting an unauthenticated directory traversal vulnerability. The latter, brought by our very own Martin Šutovský [https://github.com/msutovsky-r7], is a HTTP login scanner for Ivanti Connect Sec

Tags