Skip to content

Commit 2bd4f11

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 0e5cf3f commit 2bd4f11

File tree

1 file changed

+129
-0
lines changed

1 file changed

+129
-0
lines changed

db/modules_metadata_base.json

Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111404,6 +111404,71 @@
111404111404
"session_types": false,
111405111405
"needs_cleanup": null
111406111406
},
111407+
"exploit_multi/http/primefaces_weak_encryption_rce": {
111408+
"name": "Primefaces Remote Code Execution Exploit",
111409+
"fullname": "exploit/multi/http/primefaces_weak_encryption_rce",
111410+
"aliases": [
111411+
111412+
],
111413+
"rank": 600,
111414+
"disclosure_date": "2016-02-15",
111415+
"type": "exploit",
111416+
"author": [
111417+
"Bjoern Schuette",
111418+
"h00die"
111419+
],
111420+
"description": "This module exploits a Java Expression Language remote code execution flaw in the Primefaces JSF framework.\n Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack,\n due to the use of weak crypto and default encryption password and salt.\n\n Tested against Docker image with Tomcat 7.0 with the Primefaces 5.2 showcase application. See\n documentation for working payloads.",
111421+
"references": [
111422+
"CVE-2017-1000486",
111423+
"URL-https://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html",
111424+
"URL-https://web.archive.org/web/20180515174733/https://cryptosense.com/blog/weak-encryption-flaw-in-primefaces",
111425+
"URL-https://schuette.se/2018/01/17/cve-2017-1000486-in-your-primeface/",
111426+
"URL-https://github.com/primefaces/primefaces/issues/1152",
111427+
"URL-https://github.com/pimps/CVE-2017-1000486/tree/master",
111428+
"EDB-43733"
111429+
],
111430+
"platform": "BSD,Linux,OSX,Unix,Windows",
111431+
"arch": "cmd",
111432+
"rport": 80,
111433+
"autofilter_ports": [
111434+
80,
111435+
8080,
111436+
443,
111437+
8000,
111438+
8888,
111439+
8880,
111440+
8008,
111441+
3000,
111442+
8443
111443+
],
111444+
"autofilter_services": [
111445+
"http",
111446+
"https"
111447+
],
111448+
"targets": [
111449+
"Universal"
111450+
],
111451+
"mod_time": "2024-12-06 16:00:58 +0000",
111452+
"path": "/modules/exploits/multi/http/primefaces_weak_encryption_rce.rb",
111453+
"is_install_path": true,
111454+
"ref_name": "multi/http/primefaces_weak_encryption_rce",
111455+
"check": true,
111456+
"post_auth": true,
111457+
"default_credential": false,
111458+
"notes": {
111459+
"Stability": [
111460+
"crash-safe"
111461+
],
111462+
"Reliability": [
111463+
"repeatable-session"
111464+
],
111465+
"SideEffects": [
111466+
111467+
]
111468+
},
111469+
"session_types": false,
111470+
"needs_cleanup": null
111471+
},
111407111472
"exploit_multi/http/processmaker_exec": {
111408111473
"name": "ProcessMaker Open Source Authenticated PHP Code Execution",
111409111474
"fullname": "exploit/multi/http/processmaker_exec",
@@ -117460,6 +117525,70 @@
117460117525
"session_types": false,
117461117526
"needs_cleanup": true
117462117527
},
117528+
"exploit_multi/http/wp_reallysimplessl_2fa_bypass_rce": {
117529+
"name": "WordPress Really Simple SSL Plugin Authentication Bypass to RCE",
117530+
"fullname": "exploit/multi/http/wp_reallysimplessl_2fa_bypass_rce",
117531+
"aliases": [
117532+
117533+
],
117534+
"rank": 600,
117535+
"disclosure_date": "2024-11-14",
117536+
"type": "exploit",
117537+
"author": [
117538+
"Valentin Lobstein",
117539+
"István Márton"
117540+
],
117541+
"description": "This module exploits an authentication bypass vulnerability in the WordPress Really Simple SSL plugin\n (versions 9.0.0 to 9.1.1.1). The vulnerability allows bypassing two-factor authentication (2FA) and\n uploading a plugin to achieve remote code execution (RCE). Note: For the system to be vulnerable,\n 2FA must be enabled on the target site; otherwise, the exploit will not work.",
117542+
"references": [
117543+
"CVE-2024-10924",
117544+
"URL-https://github.com/RandomRobbieBF/CVE-2024-10924",
117545+
"URL-https://www.wordfence.com/threat-intel/vulnerabilities/detail/really-simple-security-free-pro-and-pro-multisite-900-9111-authentication-bypass"
117546+
],
117547+
"platform": "Linux,PHP,Unix,Windows",
117548+
"arch": "php, cmd",
117549+
"rport": 80,
117550+
"autofilter_ports": [
117551+
80,
117552+
8080,
117553+
443,
117554+
8000,
117555+
8888,
117556+
8880,
117557+
8008,
117558+
3000,
117559+
8443
117560+
],
117561+
"autofilter_services": [
117562+
"http",
117563+
"https"
117564+
],
117565+
"targets": [
117566+
"PHP In-Memory",
117567+
"Unix In-Memory",
117568+
"Windows In-Memory"
117569+
],
117570+
"mod_time": "2024-12-06 22:46:57 +0000",
117571+
"path": "/modules/exploits/multi/http/wp_reallysimplessl_2fa_bypass_rce.rb",
117572+
"is_install_path": true,
117573+
"ref_name": "multi/http/wp_reallysimplessl_2fa_bypass_rce",
117574+
"check": true,
117575+
"post_auth": false,
117576+
"default_credential": false,
117577+
"notes": {
117578+
"Stability": [
117579+
"crash-safe"
117580+
],
117581+
"SideEffects": [
117582+
"artifacts-on-disk",
117583+
"ioc-in-logs"
117584+
],
117585+
"Reliability": [
117586+
"repeatable-session"
117587+
]
117588+
},
117589+
"session_types": false,
117590+
"needs_cleanup": true
117591+
},
117463117592
"exploit_multi/http/wp_responsive_thumbnail_slider_upload": {
117464117593
"name": "WordPress Responsive Thumbnail Slider Arbitrary File Upload",
117465117594
"fullname": "exploit/multi/http/wp_responsive_thumbnail_slider_upload",

0 commit comments

Comments
 (0)