Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.
Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Whether written by our own internal team or by a third party like ExCraft, you can trust they have been thoroughly tested and validated by our experts.
The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:
What are the most critical attacks from the attacker’s perspective?
What new vulnerabilities are more likely to be exploited in real attacks?
What exploits are the most valuable for Core Impact?
Once an exploit is approved, its priority order considers the following variables:
Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed.
Target Environment Setup: OS, application prevalence, version and special configurations needed.
Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc.
Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation.
Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges.
Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.
Stay Informed of New Core Certified Exploits
Subscribe to receive regular email updates on new exploits available for Core Impact
Browse the Core Certified Exploit Library
We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications.
Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.
Title
Description
Date Added
CVE Link
Exploit Platform
Exploit Type
Product Name
Loytec L-Studio 3.0 Arbitrary File Upload
Loytec L-Studio 3.0 Remote Code Execution
Windows
Exploits / Remote Code Execution
SCADA
Microsoft Exchange Proxylogon Remote Code Execution Vulnerability Exploit Update
A combination of a server-side request forgery vulnerability and an arbitrary file write vulnerability, allows unauthenticated attackers to execute commands with SYSTEM privileges in Microsoft Exchange Server.
This update adds several parameters for module flexibility; more log verbosity on errors and fixes a bug when using autodiscover to retrieve email SID.
A SQL injection vulnerability in Fortra FileCatalyst Workflow versions 5.1.6 build 135 and earlier allows remote attackers, including anonymous ones, to exploit a SQL injection via the JOBID parameter.
This could lead to unauthorized SQL commands execution such as table deletion or admin user creation. This module without authentication creates an administrative user, proceeds to authenticate with this newly created user to assess if the system is vulnerable.
Progress Telerik Report Server XmlSerializer NET Deserialization Vulnerability Remote Code Execution Exploit
An Authentication bypass and a .NET deserialization vulnerability allows unauthenticated remote attackers to execute system commands in Progress Telerik Report Server.
Exploits / Authentication Weakness / Known Vulnerabilities
Impact
SolarWinds Serv-U FTP Server Path Traversal Vulnerability Exploit
An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable server. Successful exploitation would allow an attacker to read files from the underlying operating system, which may include sensitive information such as user data (which may include encrypted passwords)
Microsoft Windows CSC Service Elevation of Privilege Vulnerability Exploit
The Client Side Caching Driver (csc.sys) present in Microsoft Windows is vulnerable to a memory corruption, which can result in arbitrary memory write. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges.
Ivanti Connect Secure WEB COMPONENT Unauthenticated Remote Code Execution
CVE-2024-21887
An authenticated user can exploit a command injection vulnerability in the web components of Ivanti Connect Secure and Policy Secure (9.x and 22.x) to execute arbitrary commands.
CVE-2023-46805 is an authentication bypass vulnerability in the web component of Ivanti Connect Secure. This vulnerability allows an attacker to bypass control checks and access restricted resources. It affects all supported versions of Ivanti ICS and Policy Secure 9.x and 22.x
Oracle WebLogic Server WLS Core Components T3 Remote Code Execution Exploit Update
An update for the module Oracle WebLogic WLS Core Components T3 Remote Code Execution Exploit that fixes a problem while using it in a pivoted context.
In PHP, when using Apache and PHP-CGI on Windows and if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow remote attackers to pass options to PHP binary being run, leading to execute system commands in the context of the affected application.
A java unsafe reflection vulnerability present in Gremlin scripting feature of Apache HugeGraph allows remote attackers to execute system commands in the context of the affected application.
Microsoft Windows InitializeXamlDiagnosticsEx Local Privilege Escalation Exploit
An authorized attacker with regular user privileges may be able to inject a malicious file and then convince a user to execute a UWP application.An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
A directory traversal vulnerability in the WebResourceServiceImpl class of org.sonatype.nexus.internal.webresources allows unauthenticated remote attackers to download any file, including system files outside of Sonatype Nexus Repository Manager application scope.
An unmarshal reflection vulnerability in GlobalProtect feature of Palo Alto Networks PAN-OS software allows unauthenticated remote attackers to create empty arbitrary directories and files in the operating system. If device telemetry is enabled, then remote OS command injection is possible via the dt_curl python module.
A Server-side Template Injection vulnerability in CrushFTP allows unauthenticated remote attackers to leak server variables values and read arbitrary files in the operating system. This allows authentication bypass of currently logged in users via leak of session tokens by sessions.obj file or log files reading. If the leaked session token is from a CrushFTP administrator user then remote code execution is possible via arbitrary class instantiation vulnerability on the admin panel (dynamic SQL driver loading).
Microsoft Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Exploit
The Cloud Files Mini Filter Driver (cldflt.sys) present in Microsoft Windows is vulnerable to a buffer overflow, which can result in out-of-bounds memory write to paged pool memory. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges.