Metasploit Wrap-Up 12/19/2025 #1698
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This Metasploit weekly wrap-up describes concrete exploitation capabilities and framework behavior changes, focusing on improvements to the React2Shell exploit payloads, a new N-able N-Central auth-bypass+XXE scanner, and a Grav CMS Twig SSTI sandbox-bypass RCE module. It also documents core framework enhancements to how vulnerabilities/services are reported and how default payloads are selected.
React2Shell payload improvements and framework-wide payload selection
Metas...
🔧 Technical Details
Chaining unauthenticated session bypass with XXE for arbitrary file read
The N-able N-Central technique chains an authentication bypass with XXE to provide unauthenticated arbitrary file disclosure. First, exploit a logic flaw (CVE-2025-9316) to obtain a server-accepted session without credentials (e.g., causing the app to issue valid cookies or accept unauthenticated requests as authenticated). Then, with that session, target an XML-parsing endpoint vulnerable to XXE (CVE-2025-11700). Send XML declaring an external entity that points to a local file such as
file:///etc/passwd:&xxe;, the file’s contents are injected into the response, giving the attacker remote, unauthenticated file read. This pattern can be generalized: use any pre-auth or weak-auth logic bug to reach otherwise restri...🤖 Agent Actions
Summary:
xxe-xee-xml-external-entity.md, detailing how CVE-2025-9316 + CVE-2025-11700 are combined in N-able N-Central, complete with SOAP request snippets, the malicious DTD pattern, operational guidance, and new references to the Rapid7 wrap-up and the released Metasploit module.ssti-server-side-template-injection/README.md, showing how attackers edit the formprocessblock, submit Twig payloads that register undefined-function callbacks, and land cross-platform shells; added the corresponding references for the blog and Metasploit exploit.web-vulnerabilities-methodology.mdwith a note reminding testers to chain pre-auth workflow flaws with XXE/SSTI surfaces and appended a references section citing the Rapid7 blog so the checklist now points back to the new guidance.Tests: Not run (not applicable).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).