|
26747 | 26747 |
|
26748 | 26748 | ] |
26749 | 26749 | }, |
| 26750 | + "auxiliary_gather/solarwinds_webhelpdesk_backdoor": { |
| 26751 | + "name": "SolarWinds Web Help Desk Backdoor (CVE-2024-28987)", |
| 26752 | + "fullname": "auxiliary/gather/solarwinds_webhelpdesk_backdoor", |
| 26753 | + "aliases": [ |
| 26754 | + |
| 26755 | + ], |
| 26756 | + "rank": 300, |
| 26757 | + "disclosure_date": "2024-08-22", |
| 26758 | + "type": "auxiliary", |
| 26759 | + "author": [ |
| 26760 | + "Michael Heinzl", |
| 26761 | + "Zach Hanley" |
| 26762 | + ], |
| 26763 | + "description": "This module exploits a backdoor in SolarWinds Web Help Desk <= v12.8.3 to retrieve all tickets from the system.", |
| 26764 | + "references": [ |
| 26765 | + "CVE-2024-28987", |
| 26766 | + "URL-https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987", |
| 26767 | + "URL-https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2", |
| 26768 | + "URL-https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/" |
| 26769 | + ], |
| 26770 | + "platform": "", |
| 26771 | + "arch": "", |
| 26772 | + "rport": 8443, |
| 26773 | + "autofilter_ports": [ |
| 26774 | + 80, |
| 26775 | + 8080, |
| 26776 | + 443, |
| 26777 | + 8000, |
| 26778 | + 8888, |
| 26779 | + 8880, |
| 26780 | + 8008, |
| 26781 | + 3000, |
| 26782 | + 8443 |
| 26783 | + ], |
| 26784 | + "autofilter_services": [ |
| 26785 | + "http", |
| 26786 | + "https" |
| 26787 | + ], |
| 26788 | + "targets": null, |
| 26789 | + "mod_time": "2024-10-31 10:56:56 +0000", |
| 26790 | + "path": "/modules/auxiliary/gather/solarwinds_webhelpdesk_backdoor.rb", |
| 26791 | + "is_install_path": true, |
| 26792 | + "ref_name": "gather/solarwinds_webhelpdesk_backdoor", |
| 26793 | + "check": true, |
| 26794 | + "post_auth": false, |
| 26795 | + "default_credential": false, |
| 26796 | + "notes": { |
| 26797 | + "Stability": [ |
| 26798 | + "crash-safe" |
| 26799 | + ], |
| 26800 | + "Reliability": [ |
| 26801 | + |
| 26802 | + ], |
| 26803 | + "SideEffects": [ |
| 26804 | + "ioc-in-logs" |
| 26805 | + ] |
| 26806 | + }, |
| 26807 | + "session_types": false, |
| 26808 | + "needs_cleanup": false, |
| 26809 | + "actions": [ |
| 26810 | + |
| 26811 | + ] |
| 26812 | + }, |
26750 | 26813 | "auxiliary_gather/splunk_raw_server_info": { |
26751 | 26814 | "name": "Splunk __raw Server Info Disclosure ", |
26752 | 26815 | "fullname": "auxiliary/gather/splunk_raw_server_info", |
|
45737 | 45800 |
|
45738 | 45801 | ] |
45739 | 45802 | }, |
| 45803 | + "auxiliary_scanner/http/wp_ti_woocommerce_wishlist_sqli": { |
| 45804 | + "name": "WordPress TI WooCommerce Wishlist SQL Injection (CVE-2024-43917)", |
| 45805 | + "fullname": "auxiliary/scanner/http/wp_ti_woocommerce_wishlist_sqli", |
| 45806 | + "aliases": [ |
| 45807 | + |
| 45808 | + ], |
| 45809 | + "rank": 300, |
| 45810 | + "disclosure_date": "2024-09-25", |
| 45811 | + "type": "auxiliary", |
| 45812 | + "author": [ |
| 45813 | + "Rafie Muhammad", |
| 45814 | + "Valentin Lobstein" |
| 45815 | + ], |
| 45816 | + "description": "The TI WooCommerce Wishlist plugin <= 2.8.2 is vulnerable to an unauthenticated SQL injection, allowing attackers to retrieve sensitive information.", |
| 45817 | + "references": [ |
| 45818 | + "CVE-2024-43917", |
| 45819 | + "WPVDB-e994753e-ce18-48cf-8087-897ec8db2eef", |
| 45820 | + "URL-https://patchstack.com/articles/unpatched-sql-injection-vulnerability-in-ti-woocommerce-wishlist-plugin/" |
| 45821 | + ], |
| 45822 | + "platform": "", |
| 45823 | + "arch": "", |
| 45824 | + "rport": 80, |
| 45825 | + "autofilter_ports": [ |
| 45826 | + 80, |
| 45827 | + 8080, |
| 45828 | + 443, |
| 45829 | + 8000, |
| 45830 | + 8888, |
| 45831 | + 8880, |
| 45832 | + 8008, |
| 45833 | + 3000, |
| 45834 | + 8443 |
| 45835 | + ], |
| 45836 | + "autofilter_services": [ |
| 45837 | + "http", |
| 45838 | + "https" |
| 45839 | + ], |
| 45840 | + "targets": null, |
| 45841 | + "mod_time": "2024-10-31 11:56:55 +0000", |
| 45842 | + "path": "/modules/auxiliary/scanner/http/wp_ti_woocommerce_wishlist_sqli.rb", |
| 45843 | + "is_install_path": true, |
| 45844 | + "ref_name": "scanner/http/wp_ti_woocommerce_wishlist_sqli", |
| 45845 | + "check": false, |
| 45846 | + "post_auth": false, |
| 45847 | + "default_credential": false, |
| 45848 | + "notes": { |
| 45849 | + "Stability": [ |
| 45850 | + "crash-safe" |
| 45851 | + ], |
| 45852 | + "SideEffects": [ |
| 45853 | + "ioc-in-logs" |
| 45854 | + ], |
| 45855 | + "Reliability": [ |
| 45856 | + |
| 45857 | + ] |
| 45858 | + }, |
| 45859 | + "session_types": false, |
| 45860 | + "needs_cleanup": false, |
| 45861 | + "actions": [ |
| 45862 | + { |
| 45863 | + "name": "Retrieve Share Key and Perform SQLi", |
| 45864 | + "description": "Retrieve share key and perform SQL Injection" |
| 45865 | + } |
| 45866 | + ] |
| 45867 | + }, |
45740 | 45868 | "auxiliary_scanner/http/wp_total_upkeep_downloader": { |
45741 | 45869 | "name": "WordPress Total Upkeep Unauthenticated Backup Downloader", |
45742 | 45870 | "fullname": "auxiliary/scanner/http/wp_total_upkeep_downloader", |
|
0 commit comments