Last updated at Tue, 16 Jan 2024 02:02:07 GMT

Keep on Bluekeepin’ on

TomSellers added a new option to the increasingly useful Bluekeep Scanner module that allows execution of a DoS attack when running the module. This adds a new level of effectiveness in proving the severity of this vulnerability.
As part of this update, TomSellers moved and refactored a lot of the RDP specific framework code into a new mixin. Not only did this provide a lot of cleanup, but it also makes it much easier to utilize this code in future modules that take advantage of RDP. Please feel free to utilize this work when crafting your next RDP-utilizing module.

Tika look at this

Community member h00die has added a module for exploiting an RCE vulnerability in the Apache Tika OCR functionality. This simple, yet effective, module takes advantage of unprotected system commands that are executed when Apache Tika executes its OCR endpoint by passing in the commands you want to execute in the body of the request. If you find a vulnerable version of this software on an engagement you could easily “Tika mas-ALL-a their boxes over”. See David Yesland's write-up on exploiting the vulnerability here.

New modules (2)

Enhancements and features

PR #12158 by acammack-r7 - Blacklist pingback payloads for exploits utilizing the on_new_session callback to perform post-exploitation cleanup.

PR #12159 by bwatters-r7 - Add EXITFUNC support to pingback payloads.

PR #12170 by TomSellers - Add a denial of service action to the existing BlueKeep (CVE-2019-0708) scanner module auxiliary/scanner/rdp/cve_2019_0708_bluekeep.

PR #12171 by TomSellers - Move code from the BlueKeep (CVE-2019-0708) scanner into an Msf::Exploit::Remote::RDP mixin for consolidation and reuse.

Bugs fixed

PR #12152 by wvu-r7 - Fix an EOFError while scanning for the BlueKeep vulnerability.

PR #12175 by green-m - Fix a NoMethodError crash in the exploit/linux/http/hadoop_unauth_exec module.

Get it

As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:

We recently announced the release of Metasploit 5. You can get it by cloning
the Metasploit Framework repo (master branch). To install fresh without using git,
you can use the open-source-only Nightly Installers or the binary installers
(which also include the commercial editions).