metasploit-payloads 2.0.63 → 2.0.67

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.dex +0 -0
  4. data/data/android/meterpreter.jar +0 -0
  5. data/data/android/metstage.jar +0 -0
  6. data/data/android/shell.jar +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  10. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  14. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  18. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  22. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  26. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  29. data/data/meterpreter/ext_server_stdapi.jar +0 -0
  30. data/data/meterpreter/ext_server_stdapi.php +4 -2
  31. data/data/meterpreter/ext_server_stdapi.py +8 -2
  32. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  35. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  36. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  37. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  38. data/data/meterpreter/meterpreter.py +9 -6
  39. data/data/meterpreter/metsrv.x64.dll +0 -0
  40. data/data/meterpreter/metsrv.x86.dll +0 -0
  41. data/data/meterpreter/screenshot.x64.dll +0 -0
  42. data/data/meterpreter/screenshot.x86.dll +0 -0
  43. data/lib/metasploit-payloads/version.rb +1 -1
  44. data.tar.gz.sig +0 -0
  45. metadata +2 -2
  46. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 70fb6b8c214c2032e3f506341d7f9b069e93639b6abf7afbd3fd279ea087d9e6
4
- data.tar.gz: a2541c9ad2051533ee66ea252f3fa1d84774f7dbea2dbe823fa45b50e8add977
3
+ metadata.gz: 90c2a75643ab01b1891d8b9448ff7cc5dd2299b7704758fd27e19e52a391b7c6
4
+ data.tar.gz: 7252b2cbea153b4ec9b83afb29c31977ebb09d193803b6f8130c09c779acfdb5
5
5
  SHA512:
6
- metadata.gz: 8938435f3345901ff7d6401ae487ae12117f09035c8fd4cc74d733eebb56a1d731b045321b5ad6aaac42ade9a884e284ab36358589857bd195443ae8e5ae9db1
7
- data.tar.gz: ac0be6bedfaf25d2b3c102f42f020625d110d63d559b8361ae2b1f8199ad1df214e489bd3dbb0e251ec4c10d50e6df61a4839f929b868ba74a1cc0214677d1b5
6
+ metadata.gz: e01f9397aa045bdcae9200b15e6dcbbac096af8c16548dd3e9eac7ffc34ac2b26c097f5704d1c113f27b2574ef26c1a99bbd9c60fdaef1aa71aca4719de950c3
7
+ data.tar.gz: 7d63434137f517b4fda170529e674d5391386869b2c962d5ad89857ee0b6846afbadf005da82cb880a236eb1be5bc989ac7f0893f703dd4a96d29300f050c167
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -628,8 +628,10 @@ function stdapi_fs_ls($req, &$pkt) {
628
628
  packet_add_tlv($pkt, create_tlv(TLV_TYPE_FILE_NAME, $file));
629
629
  packet_add_tlv($pkt, create_tlv(TLV_TYPE_FILE_PATH, $path . DIRECTORY_SEPARATOR . $file));
630
630
  $st_buf = add_stat_buf($path . DIRECTORY_SEPARATOR . $file);
631
- if ($st_buf)
632
- packet_add_tlv($pkt, $st_buf);
631
+ if (!$st_buf) {
632
+ $st_buf = create_tlv(TLV_TYPE_STAT_BUF32, '');
633
+ }
634
+ packet_add_tlv($pkt, $st_buf);
633
635
  }
634
636
  }
635
637
  closedir($dir_handle);
@@ -1163,7 +1163,9 @@ def stdapi_sys_process_execute(request, response):
1163
1163
  if len(cmd) == 0:
1164
1164
  return ERROR_FAILURE, response
1165
1165
  if os.path.isfile('/bin/sh') and (flags & PROCESS_EXECUTE_FLAG_SUBSHELL):
1166
- args = ['/bin/sh', '-c', cmd, raw_args]
1166
+ if raw_args:
1167
+ cmd = cmd + ' ' + raw_args
1168
+ args = ['/bin/sh', '-c', cmd]
1167
1169
  else:
1168
1170
  args = [cmd]
1169
1171
  args.extend(shlex.split(raw_args))
@@ -1492,7 +1494,11 @@ def stdapi_fs_ls(request, response):
1492
1494
  file_path = os.path.join(path, file_name)
1493
1495
  response += tlv_pack(TLV_TYPE_FILE_NAME, file_name)
1494
1496
  response += tlv_pack(TLV_TYPE_FILE_PATH, file_path)
1495
- response += tlv_pack(TLV_TYPE_STAT_BUF, get_stat_buffer(file_path))
1497
+ try:
1498
+ st_buf = get_stat_buffer(file_path)
1499
+ except OSError:
1500
+ st_buf = bytes()
1501
+ response += tlv_pack(TLV_TYPE_STAT_BUF, st_buf)
1496
1502
  return ERROR_SUCCESS, response
1497
1503
 
1498
1504
  @register_function
@@ -680,10 +680,13 @@ class MeterpreterProcess(MeterpreterChannel):
680
680
  return self.proc_h.poll() is None
681
681
 
682
682
  def read(self, length):
683
- data = ''
683
+ data = bytes()
684
+ stderr_reader = self.proc_h.stderr_reader
684
685
  stdout_reader = self.proc_h.stdout_reader
685
- if stdout_reader.is_read_ready():
686
- data = stdout_reader.read(length)
686
+ if stderr_reader.is_read_ready() and length > 0:
687
+ data += stderr_reader.read(length)
688
+ if stdout_reader.is_read_ready() and (length - len(data)) > 0:
689
+ data += stdout_reader.read(length - len(data))
687
690
  return data
688
691
 
689
692
  def write(self, data):
@@ -1329,9 +1332,9 @@ class PythonMeterpreter(object):
1329
1332
  if channel_id in self.interact_channels:
1330
1333
  proc_h = channel.proc_h
1331
1334
  if proc_h.stderr_reader.is_read_ready():
1332
- data = proc_h.stderr_reader.read()
1333
- elif proc_h.stdout_reader.is_read_ready():
1334
- data = proc_h.stdout_reader.read()
1335
+ data += proc_h.stderr_reader.read()
1336
+ if proc_h.stdout_reader.is_read_ready():
1337
+ data += proc_h.stdout_reader.read()
1335
1338
  if not channel.is_alive():
1336
1339
  self.handle_dead_resource_channel(channel_id)
1337
1340
  channel.close()
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.63'
3
+ VERSION = '2.0.67'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.63
4
+ version: 2.0.67
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-12-08 00:00:00.000000000 Z
99
+ date: 2022-01-17 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file