|
43307 | 43307 |
|
43308 | 43308 | ],
|
43309 | 43309 | "targets": null,
|
43310 |
| - "mod_time": "2018-09-15 18:54:45 +0000", |
| 43310 | + "mod_time": "2021-01-27 10:14:52 +0000", |
43311 | 43311 | "path": "/modules/auxiliary/scanner/ssh/ssh_enumusers.rb",
|
43312 | 43312 | "is_install_path": true,
|
43313 | 43313 | "ref_name": "scanner/ssh/ssh_enumusers",
|
|
71067 | 71067 | },
|
71068 | 71068 | "needs_cleanup": null
|
71069 | 71069 | },
|
| 71070 | + "exploit_multi/fileformat/archive_tar_arb_file_write": { |
| 71071 | + "name": "PEAR Archive_Tar < 1.4.11 Arbitrary File Write", |
| 71072 | + "fullname": "exploit/multi/fileformat/archive_tar_arb_file_write", |
| 71073 | + "aliases": [ |
| 71074 | + |
| 71075 | + ], |
| 71076 | + "rank": 600, |
| 71077 | + "disclosure_date": "2020-11-17", |
| 71078 | + "type": "exploit", |
| 71079 | + "author": [ |
| 71080 | + "gwillcox-r7", |
| 71081 | + "xorathustra" |
| 71082 | + ], |
| 71083 | + "description": "This module takes advantages of Archive_Tar < 1.4.11's lack of validation of file stream wrappers contained\n within filenames to write an arbitrary file containing user controlled content to an arbitrary file\n on disk. Note that the file will be written to disk with the permissions of the user that PHP is\n running as, so it may not be possible to overwrite some files if the PHP user is not appropriately\n privileged.", |
| 71084 | + "references": [ |
| 71085 | + "URL-https://github.com/pear/Archive_Tar/issues/33", |
| 71086 | + "URL-https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949", |
| 71087 | + "CVE-2020-28949" |
| 71088 | + ], |
| 71089 | + "platform": "PHP", |
| 71090 | + "arch": "php", |
| 71091 | + "rport": null, |
| 71092 | + "autofilter_ports": [ |
| 71093 | + |
| 71094 | + ], |
| 71095 | + "autofilter_services": [ |
| 71096 | + |
| 71097 | + ], |
| 71098 | + "targets": [ |
| 71099 | + "Archive_Tar < 1.4.11" |
| 71100 | + ], |
| 71101 | + "mod_time": "2021-01-19 09:25:56 +0000", |
| 71102 | + "path": "/modules/exploits/multi/fileformat/archive_tar_arb_file_write.rb", |
| 71103 | + "is_install_path": true, |
| 71104 | + "ref_name": "multi/fileformat/archive_tar_arb_file_write", |
| 71105 | + "check": false, |
| 71106 | + "post_auth": false, |
| 71107 | + "default_credential": false, |
| 71108 | + "notes": { |
| 71109 | + }, |
| 71110 | + "needs_cleanup": null |
| 71111 | + }, |
71070 | 71112 | "exploit_multi/fileformat/evince_cbt_cmd_injection": {
|
71071 | 71113 | "name": "Evince CBT File Command Injection",
|
71072 | 71114 | "fullname": "exploit/multi/fileformat/evince_cbt_cmd_injection",
|
|
76376 | 76418 | },
|
76377 | 76419 | "needs_cleanup": null
|
76378 | 76420 | },
|
| 76421 | + "exploit_multi/http/microfocus_ucmdb_unauth_deser": { |
| 76422 | + "name": "Micro Focus UCMDB Java Deserialization Unauthenticated Remote Code Execution", |
| 76423 | + "fullname": "exploit/multi/http/microfocus_ucmdb_unauth_deser", |
| 76424 | + "aliases": [ |
| 76425 | + |
| 76426 | + ], |
| 76427 | + "rank": 600, |
| 76428 | + "disclosure_date": "2020-10-28", |
| 76429 | + "type": "exploit", |
| 76430 | + "author": [ |
| 76431 | + "Pedro Ribeiro < [email protected]>" |
| 76432 | + ], |
| 76433 | + "description": "This module exploits two vulnerabilities, that when chained allow an attacker\n to achieve unauthenticated remote code execution in Micro Focus UCMDB.\n UCMDB included in versions 2020.05 and below of Operations Bridge Manager are affected,\n but this module can probably also be used to exploit Operations Bridge Manager\n (containeirized) and Application Performance Management.\n Check the advisory and module documentation for details.\n The first vulnerability is a hardcoded password for the \"diagnostics\" user, which\n allows us to login to UCMDB. The second vulnerability is a run-of-the-mill Java\n deserialization, which can be exploited with ysoserial's CommonsBeanutils1 payload.\n Both Windows and Linux installations are vulnerable.", |
| 76434 | + "references": [ |
| 76435 | + "URL-https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md", |
| 76436 | + "CVE-2020-11853", |
| 76437 | + "CVE-2020-11854", |
| 76438 | + "ZDI-20-1287", |
| 76439 | + "ZDI-20-1288" |
| 76440 | + ], |
| 76441 | + "platform": "Unix,Windows", |
| 76442 | + "arch": "", |
| 76443 | + "rport": 8443, |
| 76444 | + "autofilter_ports": [ |
| 76445 | + 80, |
| 76446 | + 8080, |
| 76447 | + 443, |
| 76448 | + 8000, |
| 76449 | + 8888, |
| 76450 | + 8880, |
| 76451 | + 8008, |
| 76452 | + 3000, |
| 76453 | + 8443 |
| 76454 | + ], |
| 76455 | + "autofilter_services": [ |
| 76456 | + "http", |
| 76457 | + "https" |
| 76458 | + ], |
| 76459 | + "targets": [ |
| 76460 | + "Windows", |
| 76461 | + "Linux" |
| 76462 | + ], |
| 76463 | + "mod_time": "2021-01-25 22:25:07 +0000", |
| 76464 | + "path": "/modules/exploits/multi/http/microfocus_ucmdb_unauth_deser.rb", |
| 76465 | + "is_install_path": true, |
| 76466 | + "ref_name": "multi/http/microfocus_ucmdb_unauth_deser", |
| 76467 | + "check": true, |
| 76468 | + "post_auth": false, |
| 76469 | + "default_credential": false, |
| 76470 | + "notes": { |
| 76471 | + }, |
| 76472 | + "needs_cleanup": null |
| 76473 | + }, |
76379 | 76474 | "exploit_multi/http/mma_backdoor_upload": {
|
76380 | 76475 | "name": "Th3 MMA mma.php Backdoor Arbitrary File Upload",
|
76381 | 76476 | "fullname": "exploit/multi/http/mma_backdoor_upload",
|
|
88338 | 88433 | "author": [
|
88339 | 88434 | "unknown"
|
88340 | 88435 | ],
|
88341 |
| - "description": "No module description", |
| 88436 | + "description": "This module exploits a stack-based buffer overflow in Apple QuickTime\n before version 7.3.1. By sending an overly long RTSP response to a\n client, an attacker may be able to execute arbitrary code.", |
88342 | 88437 | "references": [
|
88343 | 88438 | "CVE-2007-6166",
|
88344 | 88439 | "OSVDB-40876",
|
|
88359 | 88454 | "Mac OS X 10.4.8 x86, QuickTime 7.1.3",
|
88360 | 88455 | "Mac OS X 10.5.0 x86, QuickTime 7.2.1"
|
88361 | 88456 | ],
|
88362 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 88457 | + "mod_time": "2021-01-22 23:29:16 +0000", |
88363 | 88458 | "path": "/modules/exploits/osx/rtsp/quicktime_rtsp_content_type.rb",
|
88364 | 88459 | "is_install_path": true,
|
88365 | 88460 | "ref_name": "osx/rtsp/quicktime_rtsp_content_type",
|
@@ -130645,6 +130740,56 @@
|
130645 | 130740 | },
|
130646 | 130741 | "needs_cleanup": null
|
130647 | 130742 | },
|
| 130743 | + "exploit_windows/http/prtg_authenticated_rce": { |
| 130744 | + "name": "PRTG Network Monitor Authenticated RCE", |
| 130745 | + "fullname": "exploit/windows/http/prtg_authenticated_rce", |
| 130746 | + "aliases": [ |
| 130747 | + |
| 130748 | + ], |
| 130749 | + "rank": 600, |
| 130750 | + "disclosure_date": "2018-06-25", |
| 130751 | + "type": "exploit", |
| 130752 | + "author": [ |
| 130753 | + |
| 130754 | + "Julien Bedel < [email protected]>" |
| 130755 | + ], |
| 130756 | + "description": "Notifications can be created by an authenticated user and can execute scripts when triggered.\n Due to a poorly validated input on the script name, it is possible to chain it with a user-supplied command allowing command execution under the context of privileged user.\n The module uses provided credentials to log in to the web interface, then creates and triggers a malicious notification to perform RCE using a Powershell payload.\n It may require a few tries to get a shell because notifications are queued up on the server.\n This vulnerability affects versions prior to 18.2.39. See references for more details about the vulnerability allowing RCE.", |
| 130757 | + "references": [ |
| 130758 | + "CVE-2018-9276", |
| 130759 | + "URL-https://www.codewatch.org/blog/?p=453" |
| 130760 | + ], |
| 130761 | + "platform": "Windows", |
| 130762 | + "arch": "x86, x64", |
| 130763 | + "rport": 80, |
| 130764 | + "autofilter_ports": [ |
| 130765 | + 80, |
| 130766 | + 8080, |
| 130767 | + 443, |
| 130768 | + 8000, |
| 130769 | + 8888, |
| 130770 | + 8880, |
| 130771 | + 8008, |
| 130772 | + 3000, |
| 130773 | + 8443 |
| 130774 | + ], |
| 130775 | + "autofilter_services": [ |
| 130776 | + "http", |
| 130777 | + "https" |
| 130778 | + ], |
| 130779 | + "targets": [ |
| 130780 | + "Automatic Targeting" |
| 130781 | + ], |
| 130782 | + "mod_time": "2021-01-21 18:32:05 +0000", |
| 130783 | + "path": "/modules/exploits/windows/http/prtg_authenticated_rce.rb", |
| 130784 | + "is_install_path": true, |
| 130785 | + "ref_name": "windows/http/prtg_authenticated_rce", |
| 130786 | + "check": true, |
| 130787 | + "post_auth": true, |
| 130788 | + "default_credential": true, |
| 130789 | + "notes": { |
| 130790 | + }, |
| 130791 | + "needs_cleanup": null |
| 130792 | + }, |
130648 | 130793 | "exploit_windows/http/psoproxy91_overflow": {
|
130649 | 130794 | "name": "PSO Proxy v0.91 Stack Buffer Overflow",
|
130650 | 130795 | "fullname": "exploit/windows/http/psoproxy91_overflow",
|
@@ -175680,7 +175825,7 @@
|
175680 | 175825 | "autofilter_ports": null,
|
175681 | 175826 | "autofilter_services": null,
|
175682 | 175827 | "targets": null,
|
175683 |
| - "mod_time": "2020-06-11 13:09:25 +0000", |
| 175828 | + "mod_time": "2021-01-22 22:00:30 +0000", |
175684 | 175829 | "path": "/modules/post/multi/recon/local_exploit_suggester.rb",
|
175685 | 175830 | "is_install_path": true,
|
175686 | 175831 | "ref_name": "multi/recon/local_exploit_suggester",
|
@@ -180692,6 +180837,40 @@
|
180692 | 180837 | },
|
180693 | 180838 | "needs_cleanup": null
|
180694 | 180839 | },
|
| 180840 | + "post_windows/gather/forensics/fanny_bmp_check": { |
| 180841 | + "name": "FannyBMP or DementiaWheel Detection Registry Check", |
| 180842 | + "fullname": "post/windows/gather/forensics/fanny_bmp_check", |
| 180843 | + "aliases": [ |
| 180844 | + |
| 180845 | + ], |
| 180846 | + "rank": 300, |
| 180847 | + "disclosure_date": null, |
| 180848 | + "type": "post", |
| 180849 | + "author": [ |
| 180850 | + "William M." |
| 180851 | + ], |
| 180852 | + "description": "This module searches for the Fanny.bmp worm related reg keys.\n fannybmp is a worm that exploited zero day vulns\n (more specifically, the LNK Exploit CVE-2010-2568).\n Which allowed it to spread even if USB Autorun was turned off.\n This is the same exploit that was used in StuxNet.", |
| 180853 | + "references": [ |
| 180854 | + "URL-https://securelist.com/a-fanny-equation-i-am-your-father-stuxnet/68787", |
| 180855 | + "CVE-2010-2568" |
| 180856 | + ], |
| 180857 | + "platform": "Windows", |
| 180858 | + "arch": "", |
| 180859 | + "rport": null, |
| 180860 | + "autofilter_ports": null, |
| 180861 | + "autofilter_services": null, |
| 180862 | + "targets": null, |
| 180863 | + "mod_time": "2021-01-25 13:56:04 +0000", |
| 180864 | + "path": "/modules/post/windows/gather/forensics/fanny_bmp_check.rb", |
| 180865 | + "is_install_path": true, |
| 180866 | + "ref_name": "windows/gather/forensics/fanny_bmp_check", |
| 180867 | + "check": false, |
| 180868 | + "post_auth": false, |
| 180869 | + "default_credential": false, |
| 180870 | + "notes": { |
| 180871 | + }, |
| 180872 | + "needs_cleanup": null |
| 180873 | + }, |
180695 | 180874 | "post_windows/gather/forensics/imager": {
|
180696 | 180875 | "name": "Windows Gather Forensic Imaging",
|
180697 | 180876 | "fullname": "post/windows/gather/forensics/imager",
|
|
0 commit comments