National Cyber Warfare Foundation (NCWF) Forums


Metasploit Weekly Wrap-Up 06 07 2024


0 user ratings
2024-06-09 20:02:48
milo
Red Team (CNA)

 - archive -- 

New OSX payloads:ARMed and Dangerous


In addition to an RCE leveraging CVE-2024-5084 to gain RCE through a WordPress Hash form, this release features the addition of several new binary OSX stageless payloads with aarch64 support: Execute Command, Shell Bind TCP, and Shell Reverse TCP.


The new osx/aarch64/shell_



New OSX payloads:ARMed and Dangerous


Metasploit Weekly Wrap-Up 06/07/2024

In addition to an RCE leveraging CVE-2024-5084 to gain RCE through a WordPress Hash form, this release features the addition of several new binary OSX stageless payloads with aarch64 support: Execute Command, Shell Bind TCP, and Shell Reverse TCP.


The new osx/aarch64/shell_bind_tcp payload opens a listening port on the target machine, which allows the attacker to connect to this open port to spawn a command shell using the user provided command using the execve system call on Apple silicon laptops.


The new osx/aarch64/shell_reverse_tcp payload that can connect back to the configured attacker’s RHOST and RPORT to spawn a command shell using the execve system call on Apple silicon laptops.

The new osx/aarch64/exec payload can execute arbitrary user provided commands using the execve system call on Apple silicon laptops, for example:


msf6 payload(osx/aarch64/exec) > generate -f macho cmd="/bin/bash -c 'echo 123 && echo abc && whoami && echo 🔥'" -o shell
[*] Writing 50072 bytes to shell…

And executing:


$ chmod +x ./shell
$ ./shell
123
abc
user
🔥

New module content (4)


WordPress Hash Form Plugin RCE


Authors: Francesco Carlucci and Valentin Lobstein

Type: Exploit

Pull request: #19208 contributed by Chocapikk

Path: multi/http/wp_hash_form_rce

AttackerKB reference: CVE-2024-5084


Description: This adds an exploit module that leverages a vulnerability in the WordPress Hash Form – Drag & Drop Form Builder plugin (CVE-2024-5084) to achieve remote code execution. Versions up to and including 1.1.0 are vulnerable. This allows unauthenticated attackers to upload arbitrary files, including PHP scripts, due to missing file type validation in the file_upload_action function.


OSX aarch64 Execute Command


Author: alanfoster

Type: Payload (Single)

Pull request: #18646 contributed by AlanFoster

Path: osx/aarch64/exec


Description: Add osx aarch64 exec payload.


OS X x64 Shell Bind TCP


Author: alanfoster

Type: Payload (Single)

Pull request: #18776 contributed by AlanFoster

Path: osx/aarch64/shell_bind_tcp


Description: Add osx aarch64 bind tcp payload.


OSX aarch64 Shell Reverse TCP


Author: alanfoster

Type: Payload (Single)

Pull request: #18652 contributed by AlanFoster

Path: osx/aarch64/shell_reverse_tcp


Description: Add osx aarch64 shell reverse tcp payload.


Enhancements and features (0)


None


Bugs fixed (3)



  • #19209 from zgoldman-r7 - Updates multiple file format exploits to show the default settings to users when running show options.

  • #19211 from sjanusz-r7 - Fixes an issue were the database management logic would default a model's updated_at value to incorrectly be set to the created_at value.

  • #19217 from zgoldman-r7 - Fixes path tab completion for modules when using Ruby 3.2+.

  • #19227 from bcoles - Fixed an issue in Moodle::Login.moodle_login that reported a false negative when logging in with user's credentials.


Documentation


You can find the latest Metasploit documentation on our docsite at docs.metasploit.com.


Get it


As always, you can update to the latest Metasploit Framework with msfupdate

and you can get more details on the changes since the last blog post from

GitHub:



If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.

To install fresh without using git, you can use the open-source-only Nightly Installers or the

commercial edition Metasploit Pro




Source: Rapid7
Source Link: https://blog.rapid7.com/2024/06/07/metasploit-weekly-wrap-up-06-07-2024/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.