Skip to content

Commit 4a59d3d

Browse files
committed
automatic module_metadata_base.json update
1 parent ea45d83 commit 4a59d3d

File tree

1 file changed

+128
-0
lines changed

1 file changed

+128
-0
lines changed

db/modules_metadata_base.json

Lines changed: 128 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26747,6 +26747,69 @@
2674726747

2674826748
]
2674926749
},
26750+
"auxiliary_gather/solarwinds_webhelpdesk_backdoor": {
26751+
"name": "SolarWinds Web Help Desk Backdoor (CVE-2024-28987)",
26752+
"fullname": "auxiliary/gather/solarwinds_webhelpdesk_backdoor",
26753+
"aliases": [
26754+
26755+
],
26756+
"rank": 300,
26757+
"disclosure_date": "2024-08-22",
26758+
"type": "auxiliary",
26759+
"author": [
26760+
"Michael Heinzl",
26761+
"Zach Hanley"
26762+
],
26763+
"description": "This module exploits a backdoor in SolarWinds Web Help Desk <= v12.8.3 to retrieve all tickets from the system.",
26764+
"references": [
26765+
"CVE-2024-28987",
26766+
"URL-https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987",
26767+
"URL-https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2",
26768+
"URL-https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/"
26769+
],
26770+
"platform": "",
26771+
"arch": "",
26772+
"rport": 8443,
26773+
"autofilter_ports": [
26774+
80,
26775+
8080,
26776+
443,
26777+
8000,
26778+
8888,
26779+
8880,
26780+
8008,
26781+
3000,
26782+
8443
26783+
],
26784+
"autofilter_services": [
26785+
"http",
26786+
"https"
26787+
],
26788+
"targets": null,
26789+
"mod_time": "2024-10-31 10:56:56 +0000",
26790+
"path": "/modules/auxiliary/gather/solarwinds_webhelpdesk_backdoor.rb",
26791+
"is_install_path": true,
26792+
"ref_name": "gather/solarwinds_webhelpdesk_backdoor",
26793+
"check": true,
26794+
"post_auth": false,
26795+
"default_credential": false,
26796+
"notes": {
26797+
"Stability": [
26798+
"crash-safe"
26799+
],
26800+
"Reliability": [
26801+
26802+
],
26803+
"SideEffects": [
26804+
"ioc-in-logs"
26805+
]
26806+
},
26807+
"session_types": false,
26808+
"needs_cleanup": false,
26809+
"actions": [
26810+
26811+
]
26812+
},
2675026813
"auxiliary_gather/splunk_raw_server_info": {
2675126814
"name": "Splunk __raw Server Info Disclosure ",
2675226815
"fullname": "auxiliary/gather/splunk_raw_server_info",
@@ -45737,6 +45800,71 @@
4573745800

4573845801
]
4573945802
},
45803+
"auxiliary_scanner/http/wp_ti_woocommerce_wishlist_sqli": {
45804+
"name": "WordPress TI WooCommerce Wishlist SQL Injection (CVE-2024-43917)",
45805+
"fullname": "auxiliary/scanner/http/wp_ti_woocommerce_wishlist_sqli",
45806+
"aliases": [
45807+
45808+
],
45809+
"rank": 300,
45810+
"disclosure_date": "2024-09-25",
45811+
"type": "auxiliary",
45812+
"author": [
45813+
"Rafie Muhammad",
45814+
"Valentin Lobstein"
45815+
],
45816+
"description": "The TI WooCommerce Wishlist plugin <= 2.8.2 is vulnerable to an unauthenticated SQL injection, allowing attackers to retrieve sensitive information.",
45817+
"references": [
45818+
"CVE-2024-43917",
45819+
"WPVDB-e994753e-ce18-48cf-8087-897ec8db2eef",
45820+
"URL-https://patchstack.com/articles/unpatched-sql-injection-vulnerability-in-ti-woocommerce-wishlist-plugin/"
45821+
],
45822+
"platform": "",
45823+
"arch": "",
45824+
"rport": 80,
45825+
"autofilter_ports": [
45826+
80,
45827+
8080,
45828+
443,
45829+
8000,
45830+
8888,
45831+
8880,
45832+
8008,
45833+
3000,
45834+
8443
45835+
],
45836+
"autofilter_services": [
45837+
"http",
45838+
"https"
45839+
],
45840+
"targets": null,
45841+
"mod_time": "2024-10-31 11:56:55 +0000",
45842+
"path": "/modules/auxiliary/scanner/http/wp_ti_woocommerce_wishlist_sqli.rb",
45843+
"is_install_path": true,
45844+
"ref_name": "scanner/http/wp_ti_woocommerce_wishlist_sqli",
45845+
"check": false,
45846+
"post_auth": false,
45847+
"default_credential": false,
45848+
"notes": {
45849+
"Stability": [
45850+
"crash-safe"
45851+
],
45852+
"SideEffects": [
45853+
"ioc-in-logs"
45854+
],
45855+
"Reliability": [
45856+
45857+
]
45858+
},
45859+
"session_types": false,
45860+
"needs_cleanup": false,
45861+
"actions": [
45862+
{
45863+
"name": "Retrieve Share Key and Perform SQLi",
45864+
"description": "Retrieve share key and perform SQL Injection"
45865+
}
45866+
]
45867+
},
4574045868
"auxiliary_scanner/http/wp_total_upkeep_downloader": {
4574145869
"name": "WordPress Total Upkeep Unauthenticated Backup Downloader",
4574245870
"fullname": "auxiliary/scanner/http/wp_total_upkeep_downloader",

0 commit comments

Comments
 (0)