Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Witten by our own internal team, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed.
  • Target Environment Setup: OS, application prevalence, version and special configurations needed.
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc.
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Jenkins CLI Arbitrary File Read Exploit This vulnerability allows unauthenticated attackers to read arbitrary files on the Jenkins controller file system by exploiting a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents. This could expose sensitive information and compromise the integrity of the system. This exploit does not install any agent. Windows, Linux Exploits / Remote Impact
Microsoft Windows Internet Shortcut SmartScreen Bypass Exploit Microsoft Windows Internet Shortcut is prone to a vulnerability that may allow remote attackers to bypass the SmartScreen security feature. The specific flaw exists within the handling of Internet Shortcut (.URL) files. The issue results from the lack of a security check on chained Internet Shortcut files. An attacker can leverage this vulnerability to execute code in the context of the current user. Windows Exploits / Client Side Impact
Microsoft Outlook Moniker Link UNC Path Information Disclosure Exploit This exploit leverages an Information Disclosure vulnerability in Microsoft Outlook. By sending a mail crafting a malicious path, an attacker can coerce authentication to an untrusted server and steal NTLM hashes. This exploit does not install an agent, it manages to obtain the NTML hash of a legitimate user. Windows Exploits / Client Side / Authentication Coercion Impact
Microsoft Windows Event Logging Service DoS This module triggers a memory corruption vulnerability in the Event Log Service by sending a malformed packet. It can be used by a remote attacker to stop recording events of important software so will left no traces. For example, if an attacker installs an agent on a domain-joined workstation. He can remotely stop the domain controller's Event Log service. Windows Denial of Service / Remote Impact
Apache Struts 2 File Upload Path Traversal Remote Code Execution Exploit An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
Wordpress Post Smtp Mailer Plugin Authorization Bypass Exploit Wordpress POST SMPT Plugin is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. Windows, Linux Exploits / Remote Code Execution Impact
Microsoft WordPad LinkedObject UNC Path Information Disclosure Exploit This exploit leverages an Information Disclosure vulnerability in Microsoft WordPad. The vulnerability is associated with legacy functionality to convert an OLE 1 storage object (OLESTREAM) to the new IStorage format. By crafting a file with a malicious OLE 1 LinkedObject, an attacker can coerce authentication to an untrusted server and steal NTLM hashes. This exploit does not install an agent, it manages to obtain the NTML hash of a legitimate user. Windows Exploits / Client Side / Authentication Coercion Impact
Atlassian Confluence text-inline OGNL Injection Vulnerability Exploit This module exploits a OGNL injection vulnerability present in the text-inline.vm file of Atlassian Confluence. The deployed agent will run with the confluence user privileges in linux and with NT AUTHORITY\\NETWORK SERVICE in windows. Windows, Linux Exploits / Remote Code Execution Impact
Microsoft Windows AFD AfdSendMessage Privilege Escalation Exploit The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to a double-fetch that causes an integer overflow, which can result in out-of-bounds memory write to non-paged pool memory. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by calling to the WSASendMsg function with crafted parameters. Windows Exploits / Local / Privilege Escalation Impact
Wordpress Ultimate Member Plugin Unauthenticated Remote Code Execution Exploit Wordpress Ultimate Member Plugin allows to unauthenticated users to add admin members on a website. Windows Exploits / Remote Code Execution Impact
IBM Performance Tools for i QAVCPP Local Privilege Escalation Exploit An improper privilege management vulnerability in IBM Performance Tools for i allows authenticated local attackers with command line access to gain all object access to the host operating system. The vulnerability can be exploited by abusing the QPFR/QAVCPP program. Exploits / Local / Privilege Escalation Impact
Ivanti Secure Access VPN Client Privilege Escalation Exploit An attacker who successfully exploited the vulnerability could elevate to get all the privileges enabled. Windows Exploits / Local / Privilege Escalation Impact
Windows System Drive Remapping Local Privilege Escalation Exploit An attacker who successfully exploited the vulnerability could elevate the integrity level from medium to high with Administrator privileges in two stages. First Stage: The first stage bug is a DLL Hijacking caused by the Drive Remapping of ROOT drive, allowing a MEDIUM INTEGRITY process to be elevated to limited HIGH PRIVILEGES, but without reach the complete privileges to be full Administrator. Windows Exploits / Local / Privilege Escalation Impact
Linux Looney Tunables GLIBC Local Privilege Escalation Exploit A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. Linux Exploits / Local / Privilege Escalation Impact
AMD Radeon Graphics Elevation of Privilege Vulnerability Exploit This module exploits an improper privilege management in the AMD Radeon Graphics driver that allows an authenticated attacker to craft an IOCTL request to gain I/O control over virtual addresses resulting in a potential arbitrary code execution. Windows Exploits / Local / Privilege Escalation Impact
Oracle WebLogic Server WLS Core Components T3 Remote Code Execution Exploit Oracle WebLogic Server is prone to a remote vulnerability that allows attackers to take advantage of a Java deserialization vulnerability. By exploiting known methods, the module establishes a remote connection to the RMI Registry and loads a UnicastRef Object. This manipulation allows for the execution of system commands, enabling remote code execution on the targeted host. The bypass technique involves changing the RMI interface type to java.rmi.activation.Activator. Windows, Linux Exploits / Remote Impact
SysAid on-prem UserEntry accountID Path Traversal Remote Code Execution Vulnerability Exploit This module exploits a path traversal vulnerability present in the accountID parameter of the doPost method of com.ilient.server.UserEntry class to deploy an agent. The vulnerability is used to upload a WAR file inside a subdirectory of the web server's root directory to deploy an agent. The deployed agent will run with the same privileges than the SysAid webapp. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
SysAid on-prem UserEntry accountID Path Traversal Remote Code Execution Vulnerability Webapp Exploit This module exploits a path traversal vulnerability present in the accountID parameter of the doPost method of com.ilient.server.UserEntry class to deploy an agent. The vulnerability is used to upload a WAR file inside a subdirectory of the web server's root directory to deploy an agent. The deployed agent will run with the same privileges than the SysAid webapp. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability Exploit (CVE-2023-36802) This module exploits an elevation of privilege vulnerability exists due to the MS KS Server kernel module allow accessing memory out of bounds. The vulnerability could allows an attacker to run code with elevated privileges. Windows Exploits / Local / Privilege Escalation Impact
Atlassian Confluence setup-restore.action Improper Authorization Vulnerability Remote Code Execution Exploit This module uses an improper authorization vulnerability in Atlassian Confluence to replace the database contents and create a new admin user in the target system. The created admin account is then used to upload a Servlet plugin JAR file to deploy an agent. The deployed agent will run with the same privileges than the Confluence instance. Windows, Linux Exploits / Remote Impact
Atlassian Confluence setup-restore.action Improper Authorization Vulnerability Checker This module connects to the remote host and attempts to determine by sending specially crafted requests, if the target is vulnerable or not to CVE-2023-22518 based on the inspection of the target's response. Windows, Linux Information gathering / Vulnerability checkers Impact
F5 BIG-IP TMUI AJP Smuggling Vulnerability Remote Code Execution Exploit This module exploits an AJP request smuggling vulnerability present in the Traffic Management User Interface (TMUI) of F5 BIG-IP to deploy an agent. The deployed agent will run with root privileges. Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
F5 BIG-IP TMUI AJP Smuggling Vulnerability Remote Code Execution Webapp Exploit This module exploits an AJP request smuggling vulnerability present in the Traffic Management User Interface (TMUI) of F5 BIG-IP to deploy an agent. The deployed agent will run with root privileges. Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
Apache ActiveMQ Openwire Java Library Deserialization Vulnerability Remote Code Execution Exploit This module exploits a Java deserialization vulnerability via Openwire protocol by sending a crafted payload as a throwable class type. The deployed agent will run with the same user account privileges as the Apache ActiveMQ application. Linux, Windows Exploits / Remote Code Execution Impact
Atlassian Confluence SafeParametersInterceptor Broken Access Control Vulnerability Remote Code Execution Exploit This module uses broken access control vulnerability via SafeParametersInterceptor class in Atlassian Confluence to create a new admin user in the target system using the provided credentials. If no credentials are provided, it will generate a random one. This admin account is then used to upload a Servlet plugin JAR file to deploy an agent. The deployed agent will run with the same privileges than the Confluence instance. Windows, Linux Exploits / Remote Impact