Skip to content
This repository was archived by the owner on Aug 3, 2022. It is now read-only.

Security: metasploit/framework2

Security

docs/SECURITY

This file contains a list of all known security issues affecting the Framework.
If you run into something which is not listed here, please contact us at 
msfdev [at] metasploit.com.


[security tips]

	- We recommend that you use a robust, secure terminal emulator when
	utilizing the command-line interfaces. Please see the references at the
	bottom of this document for more information.
	
	- We do not recommend that the msfweb component be used on untrusted
	networks. Actually, we don't recommend that you use msfweb at all, it is
	more of a proof-of-concept than a real tool.
	
	- We do not recommend that you install msfpayload.cgi on a web server that
	is exposed to an untrusted network. It is possible to configure it in such a
	way that it does not open any vulnerabilities, but we leave this as an
	exercise to the user (Hint: symlink to cgi-bin and remove potentially
	hazardous payloads).
	
[msfconsole]

	- The console does not perform terminal escape sequence filtering, this
	could allow a hostile network service to do Bad Things (TM) to your terminal
	emulator when the exploit or check commands are used. We suggest that you
	use a terminal emulator which limits the functionality available through
	hostile escape sequences. Please see the bottom of this document for more
	references on this subject.

	
[msfcli]

	- The command line interface does not perform terminal escape sequence
	filtering, this could allow a hostile network service to do Bad Things (TM)
	to your terminal emulator when the exploit or check commands are used. We
	suggest that you use a terminal emulator which limits the functionality
	available through hostile escape sequences. Please see the bottom of this
	document for more references on this subject.
 
	
[msfweb]

	- The msfweb interface does not adequately filter certain arguments,
	allowing a hostile web site operator to perform a cross-site scripting
	attack on the msfweb user.
	
	- The msfweb interface does not provide any access control functionality. If
	the service is configured to listen on a different interface (default is
	loopback), a malicious attacker could abuse this to exploit remote systems
	and potentially access local files. The local file access attack can be
	accomplished by malicious arguments to the payloads which use a local file
	as input and then exploiting a (fake) service to obtain the file contents.


[msfpayload.cgi]

	- The msfpayload.cgi script does not adequately filter certain arguments,
	allowing a hostile web site operator to perform a cross-site scripting
	attack against users of the web site hosting this script. 
	
	- The msfpayload.cgi script can be used to obtain information about files on
	the system on which it is installed. This can be accomplished through the
	user of certain payloads which accept a local file path as input.
	
	

Terminal Emulator Security Issues
	http://www.digitaldefense.net/labs/papers/Termulation.txt

There aren’t any published security advisories