Earlier this week we announced the release of Metasploit 6.3 which came with a tonne of new modules and improvements.
The whole team worked super hard on this and we're very excited that everyone can now get their hands on it and all of the new features it has to offer!
I won't go over everything we did here because we have a whole separate blog post dedicated to the 6.3 release that you should check out if you missed it.
We have a new module provided by timwr to exploit Dirty Cow on macOS. This module exploits a race condition in the kernel that gives the opportunity for a user to get code execution as root.
Authors: Numan Türle and Spencer McIntyre
Type: Exploit
Pull request: #17511 contributed by zeroSteiner
AttackerKB reference: CVE-2022-44877
Description: Adds an exploit for CVE-2022-44877 which is an unauthenticated command injection in CentOS Control Web Panel <0.9.8.1147. Successful exploitation results in code execution as the root user.
Authors: Mathias Krause, Ryota Shiga, and h00die
Type: Exploit
Pull request: #17301 contributed by h00die
AttackerKB reference: CVE-2022-1043
Description: This module exploits Linux LPE CVE-2022-1043, a bug in io_uring leading to an additional put_cred() that can be exploited to hijack credentials of other processes.
Authors: Mathias Krause and h00die
Type: Exploit
Pull request: #17300 contributed by h00die
AttackerKB reference: CVE-2022-22942
Description: This PR adds a linux privilege escalation against VMWare virtual machines with kernel 4.14-rc1 - 5.17-rc1 due to a VMWare driver bug.
Authors: Ian Beer, Zhuowei Zhang, and timwr
Type: Exploit
Pull request: #17415 contributed by timwr
AttackerKB reference: CVE-2022-46689
Description: This module is the macOS equivalent of the Dirty Cow vulnerability and allows for an unprivileged user to execute code as root.
Author: npm
Type: Post
Pull request: #17406 contributed by npm-cesium137-io
Description: Post credential capture module Veeam Backup & Recovery and Veeam ONE Monitor versions 9.x - 11.x.
show targets
and show actions
command to display a visual indicator beside the currently selected value.modules/auxiliary/scanner/http/options.rb
module to modernize a few of its options, tidy up the code, and to handle an edge case when a target server might respond with a Tomcat error page.show favorites
have been added, namely favorite -l
and favorites
, to allow for easier listing of modules that users have marked as their favorites.modules/exploits/multi/local
.CIPCTlv
definition for the exploits/windows/local/anyconnect_lpe
module.ENUM_DOMAIN
and ENUM_MACHINE_ACCOUNT_QUOTA
queries and to make some small updates to existing queries.service_a/host.domain.local
to be used and updated to service_b/host.domain.local
dynamically as part of service authentication.modules/exploits/qnx
to run the check
command before attempting to exploit the target.ForceExploit
to true before checking the permissions required for exploitation on the remote target, which is more efficient and quieter over the network.analyze
command crashing when a WinRM session was opened.You can always find more documentation on our docsite at docs.metasploit.com.
As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git
user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
binary installers (which also include the commercial edition).