Skip to content

Commit 35f7709

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent f2920f8 commit 35f7709

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed

db/modules_metadata_base.json

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106384,6 +106384,65 @@
106384106384
"session_types": false,
106385106385
"needs_cleanup": true
106386106386
},
106387+
"exploit_multi/http/roundcube_auth_rce_cve_2025_49113": {
106388+
"name": "Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization",
106389+
"fullname": "exploit/multi/http/roundcube_auth_rce_cve_2025_49113",
106390+
"aliases": [],
106391+
"rank": 600,
106392+
"disclosure_date": "2025-06-02",
106393+
"type": "exploit",
106394+
"author": [
106395+
"Maksim Rogov",
106396+
"Kirill Firsov"
106397+
],
106398+
"description": "Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution\n by authenticated users because the _from parameter in a URL is not validated\n in program/actions/settings/upload.php, leading to PHP Object Deserialization.\n\n An attacker can execute arbitrary system commands as the web server.",
106399+
"references": [
106400+
"CVE-2025-49113",
106401+
"URL-https://fearsoff.org/research/roundcube"
106402+
],
106403+
"platform": "Linux,Unix",
106404+
"arch": "",
106405+
"rport": 80,
106406+
"autofilter_ports": [
106407+
80,
106408+
8080,
106409+
443,
106410+
8000,
106411+
8888,
106412+
8880,
106413+
8008,
106414+
3000,
106415+
8443
106416+
],
106417+
"autofilter_services": [
106418+
"http",
106419+
"https"
106420+
],
106421+
"targets": [
106422+
"Linux Dropper",
106423+
"Linux Command"
106424+
],
106425+
"mod_time": "2025-06-11 11:05:33 +0000",
106426+
"path": "/modules/exploits/multi/http/roundcube_auth_rce_cve_2025_49113.rb",
106427+
"is_install_path": true,
106428+
"ref_name": "multi/http/roundcube_auth_rce_cve_2025_49113",
106429+
"check": true,
106430+
"post_auth": true,
106431+
"default_credential": false,
106432+
"notes": {
106433+
"Stability": [
106434+
"crash-safe"
106435+
],
106436+
"SideEffects": [
106437+
"ioc-in-logs"
106438+
],
106439+
"Reliability": [
106440+
"repeatable-session"
106441+
]
106442+
},
106443+
"session_types": false,
106444+
"needs_cleanup": true
106445+
},
106387106446
"exploit_multi/http/rudder_server_sqli_rce": {
106388106447
"name": "Rudder Server SQLI Remote Code Execution",
106389106448
"fullname": "exploit/multi/http/rudder_server_sqli_rce",

0 commit comments

Comments
 (0)