Rapid 7 - Metasploit Wrap-up
Enhancements and features (2)
- #18548 from zeroSteiner - Updates the
admin/http/tomcat_ghostcatmodule to follow newer library conventions. - #18552 from adfoster-r7 - Adds support for Ruby 3.3.0-preview3.
Bugs fixed (5)
- #18448 from HynekPetrak - Fixes and updates the
auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypassmodule to use renamedNEW_USERNAMEandNEW_PASSWORDoptions. - #18538 from adfoster-r7 - Fixes an intermittent
stream closed in another threadcrash when booting msfconsole. - #18547 from adfoster-r7 - This fixes an issue in the platform detection used by the SSH login modules that was causing certain Windows environments to be incorrectly fingerprinted.
- #18558 from zeroSteiner - Fixes a crash in the
post/windows/gather/enum_chromemodule which can be used to decrypt passwords stored by the user in Chrome. - #18564 from zeroSteiner - Fixes a module crash when running the
auxiliary/server/capture/httpmodule.
Documentation
You can find the latest Metasploit documentation on our docsite at docs.metasploit.com.
Get it
As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
binary installers (which also include the commercial edition).
from Rapid7 Cybersecurity Blog https://blog.rapid7.com/2023/11/23/metasploit-wrapup-74/
Comments
Post a Comment