This week’s Metasploit release contains 2 new modules released as part of the Rapid7 F5 BIG-IP and iControl REST Vulnerabilities research article.
These discoveries were made by our very own Ron Bowes, who developed an exploit module for authenticated RCE against F5 devices running in appliance mode to achieve a Meterpreter session as the root user.
Ron Bowes has also developed an F5 Metasploit module exploiting CVE-2022-41622, a CSRF vulnerability in F5 Big-IP versions 17.0.0.1 and below - which leads to an arbitrary file overwrite as root. With this module, a user can choose to overwrite various system files to achieve a Meterpreter session as the root user.
For more information, see Rapid7’s blog post which detail the vulnerabilities.
Community contributor h00die contributed an enhancement to msfvenom
. This adds the ducky-script-psh
format to msfvenom
:
msfvenom -p windows/meterpreter/reverse_tcp -f ducky-script-psh lhost=127.0.0.1 lport=444
This allows users to create payloads that are compatible with Bad USB devices such as the Flipper Zero.
root
user.www-user
user.ducky-script-psh
format to msfvenom so it can create payloads that are compatible with Bad USB devices such as the Flipper Zero.linux/gather/enum_psk
module, and adds documentationmodules/post/linux/gather/enum_network
and modules/post/linux/gather/tor_hiddenservices
to extract hostname details in a similar fashion to other moduleslinux/gather/tor_hiddenservices
to ensure that the locate
command is present before running the moduleAs always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git
user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
binary installers (which also include the commercial edition).