[Canvas] CANVAS 7.16 released

Immunity CANVAS canvas at immunityinc.com
Fri Dec 1 17:54:03 UTC 2017


########################################################################
#                       *CANVAS Release 7.16*                          #
########################################################################

*Date*: 1 December 2017

*Version*: 7.16

*Download URL*: https://canvas.immunityinc.com/getcanvas

*Release video*: https://vimeo.com/245050926/5b1b88fbab

*Release Notes*:

In this CANVAS release we are bringing you 8 new modules and important
bugfixes.

Our new modules include 2 exploits targeting Microsoft Office
(CVE-2017-8759 and CVE-2017-8570, no CVE for the DDE bug), an exploit
targeting Tomcat, one preauth command injection exploit for Brightmail
and the ntfs3g modprobe exploit. Finally we are including an exploit
targeting Emacs and 2 recon modules (http_method_scanner and webcrawler).


==Changes==

o Bugfixes in several modules
 o autohack
 o report generation
 o File System Browser

o SPIKE proxy is now using tlslite-ng underneath

o DataView Tab has been removed from the UI

==New Modules==

o office_dde

o office_wsdl (CVE-2017-8759, CVE-2017-8570)

o tomcat_file_upload (CVE-2017-12615)

o brightmail_restore (CVE-2017-6327)

o ntfs3g_modprobe (CVE-2017-0358)

o emacs_enriched (CVE-2017-14482)

o http_method_scanner

o webcrawler


*CANVAS Tips 'n' Tricks*:

It is possible to edit the templates used in  Microsoft Office exploits
that utilize OOXML. In office_dde, edit Resources/ddeauto_template.docx.
In office_wsdl, edit Resources/template.csv and template.ppsx. Make sure
to not edit anything related to file links or DDE field codes in those
documents.

office_wsdl must be run as root as the vulnerable WSDL-fetching .NET
code requires it to be fetched from port 80.


########################################################################
########################################################################


More information about the Canvas mailing list