Authors: erruquill and n00bhaxor
Type: Auxiliary
Pull request: #18821 contributed by n00bhaxor
Path: gather/gitlab_tags_rss_feed_email_disclosure
AttackerKB reference: CVE-2023-5612
Description: This adds an auxiliary module that leverages an information disclosure vulnerability (CVE-2023-5612) in Gitlab versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 to retrieve user email addresses via tags feed.
Authors: 1337kid and bwatters-r7
Type: Exploit
Pull request: #18827 contributed by bwatters-r7
Path: multi/http/cve_2023_38836_boidcms
AttackerKB reference: CVE-2023-38836
Description: This PR adds an authenticated RCE against BoidCMS versions 2.0.0 and earlier. The underlying issue in the vulnerability CVE-2023-38836 is that the file upload check allows a php file to be uploaded and executes as a media file if the GIF header is present in the PHP file.
auxiliary/scanner/ssh/ssh_version
module with new checks for supported cryptographic algorithms and version detection capabilities.exploit/multi/http/splunk_privilege_escalation_cve_2023_32707
module to use it.RHOST
we also check (where applicable) that RPORT
or the USERNAME
is set. When a connection is made over an existing SESSION
we can still allow the user to only set SESSION
and not worry about the missing values only required for a new RHOST
connection.search session_type:meterpreter
or search session_type:smb
.pwd
command output for SMB sessions.windows/gather/bloodhound
module to no longer incorrectly validate the OutputDirectory
option.autorunscript
module option within an SMB session.auxiliary/gather/windows_secrets_dump
module while using the SESSION
module option to connect, that caused the client to be disconnected and unable to be reused for subsequent runs/other modules.You can always find more documentation on our docsite at docs.metasploit.com.
As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git
user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
commercial edition Metasploit Pro