National Cyber Warfare Foundation (NCWF)

Metasploit Weekly Wrap-Up 09 06 2024


0 user ratings
2024-09-06 17:59:21
milo
Red Team (CNA)

 - archive -- 

Honey, I shrunk the PHP payloads


This release contains more PHP payload improvements from Julien Voisen. Last week we landed a PR from Julien that added a datastore option to the php/base64 encoder that when enabled, will use zlib to compress the payload which significantly reduced the size, bringing



Honey, I shrunk the PHP payloads


Metasploit Weekly Wrap-Up 09/06/2024

This release contains more PHP payload improvements from Julien Voisen. Last week we landed a PR from Julien that added a datastore option to the php/base64 encoder that when enabled, will use zlib to compress the payload which significantly reduced the size, bringing a payload of 4040 bytes down to a mere 1617 bytes. This week's release includes a php/minify encoder which removes all unnecessary characters from the payload including comments, empty lines, leading spaces, trailing spaces, spaces after keywords and spaces before block openings. Using the php/minify encoder can take a payload of size 4052 bytes down to 2839 bytes. We'd like to thank Julien for their continued commitment to improving PHP payloads!


New module content (1)


PHP Minify Encoder


Author: Julien Voisin

Type: Encoder

Pull request: #19435 contributed by jvoisin

Path: php/minify


Description: This encoder minifies PHP payloads by removing spaces after keywords and before block openings. It removes comments, empty lines, new lines and leading and trailing spaces.


Enhancements and features (2)



  • #19368 from h00die-gr3y - This adjusts the exploit/multi/http/geoserver_unauth_rce_cve_2024_36401 to dynamically pull and test the feature_type list to establish an RCE. This will make the module more robust towards installations with different feature_type configurations.

  • #19401 from jvoisin - Add a mixin to get SPIP version and make use of it.


Bugs fixed (2)



  • #19381 from Takahiro-Yoko - This fixes the gitlab_login scanner so that it uses the proper datastore options Username and Password which are the standard for login scanners. Before this fix the scanner was using HttpUsername and HttpPassword and ignoring the datastore options Username and Password.

  • #19438 from cgranleese-r7 - Fixes a nil error if login is successful with ldap_login module.


Documentation


You can find the latest Metasploit documentation on our docsite at docs.metasploit.com.


Get it


As always, you can update to the latest Metasploit Framework with msfupdate

and you can get more details on the changes since the last blog post from

GitHub:



If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.

To install fresh without using git, you can use the open-source-only Nightly Installers or the

commercial edition Metasploit Pro


Metasploit Weekly Wrap-Up 09/06/2024




Source: Rapid7
Source Link: https://blog.rapid7.com/2024/09/06/metasploit-weekly-wrap-up-42/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.