Skip to content

Commit 5394ff4

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 58dfd4d commit 5394ff4

File tree

1 file changed

+65
-0
lines changed

1 file changed

+65
-0
lines changed

db/modules_metadata_base.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170889,6 +170889,71 @@
170889170889
"session_types": false,
170890170890
"needs_cleanup": null
170891170891
},
170892+
"exploit_windows/http/commvault_rce_cve_2025_57790_cve_2025_57791": {
170893+
"name": "Commvault Command-Line Argument Injection to Traversal Remote Code Execution",
170894+
"fullname": "exploit/windows/http/commvault_rce_cve_2025_57790_cve_2025_57791",
170895+
"aliases": [],
170896+
"rank": 600,
170897+
"disclosure_date": "2025-08-19",
170898+
"type": "exploit",
170899+
"author": [
170900+
"Sonny Macdonald",
170901+
"Piotr Bazydlo",
170902+
"remmons-r7"
170903+
],
170904+
"description": "This module exploits an unauthenticated remote code execution exploit chain for Commvault,\n tracked as CVE-2025-57790 and CVE-2025-57791. A command-line injection permits unauthenticated\n access to the 'localadmin' account, which then facilitates code execution via expression\n language injection. CVE-2025-57788 is also leveraged to leak the target host name, which is\n necessary knowledge to exploit the remote code execution chain. This module executes in\n the context of 'NETWORK SERVICE' on Windows.",
170905+
"references": [
170906+
"CVE-2025-57790",
170907+
"CVE-2025-57791",
170908+
"CVE-2025-57788",
170909+
"URL-https://documentation.commvault.com/securityadvisories/CV_2025_08_1.html",
170910+
"URL-https://documentation.commvault.com/securityadvisories/CV_2025_08_2.html",
170911+
"URL-https://blog.eclecticiq.com/china-nexus-threat-actor-actively-exploiting-ivanti-endpoint-manager-mobile-cve-2025-4428-vulnerability"
170912+
],
170913+
"platform": "Windows",
170914+
"arch": "cmd",
170915+
"rport": 443,
170916+
"autofilter_ports": [
170917+
80,
170918+
8080,
170919+
443,
170920+
8000,
170921+
8888,
170922+
8880,
170923+
8008,
170924+
3000,
170925+
8443
170926+
],
170927+
"autofilter_services": [
170928+
"http",
170929+
"https"
170930+
],
170931+
"targets": [
170932+
"Default"
170933+
],
170934+
"mod_time": "2025-09-15 11:19:49 +0000",
170935+
"path": "/modules/exploits/windows/http/commvault_rce_cve_2025_57790_cve_2025_57791.rb",
170936+
"is_install_path": true,
170937+
"ref_name": "windows/http/commvault_rce_cve_2025_57790_cve_2025_57791",
170938+
"check": true,
170939+
"post_auth": false,
170940+
"default_credential": false,
170941+
"notes": {
170942+
"Stability": [
170943+
"crash-safe"
170944+
],
170945+
"Reliability": [
170946+
"repeatable-session"
170947+
],
170948+
"SideEffects": [
170949+
"ioc-in-logs",
170950+
"artifacts-on-disk",
170951+
"config-changes"
170952+
]
170953+
},
170954+
"session_types": false,
170955+
"needs_cleanup": true
170956+
},
170892170957
"exploit_windows/http/cyclope_ess_sqli": {
170893170958
"name": "Cyclope Employee Surveillance Solution v6 SQL Injection",
170894170959
"fullname": "exploit/windows/http/cyclope_ess_sqli",

0 commit comments

Comments
 (0)