Skip to content

Commit 74d828c

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 7d70005 commit 74d828c

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed

db/modules_metadata_base.json

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61545,6 +61545,65 @@
6154561545
"session_types": false,
6154661546
"needs_cleanup": null
6154761547
},
61548+
"exploit_linux/http/bentoml_rce_cve_2025_27520": {
61549+
"name": "BentoML RCE",
61550+
"fullname": "exploit/linux/http/bentoml_rce_cve_2025_27520",
61551+
"aliases": [],
61552+
"rank": 600,
61553+
"disclosure_date": "2025-04-04",
61554+
"type": "exploit",
61555+
"author": [
61556+
"c2an1",
61557+
"Takahiro Yokoyama"
61558+
],
61559+
"description": "A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in v1.4.2 of BentoML.\n It allows any unauthenticated user to execute arbitrary code on the server.",
61560+
"references": [
61561+
"CVE-2025-27520",
61562+
"URL-https://github.com/advisories/GHSA-33xw-247w-6hmc"
61563+
],
61564+
"platform": "",
61565+
"arch": "",
61566+
"rport": 3000,
61567+
"autofilter_ports": [
61568+
80,
61569+
8080,
61570+
443,
61571+
8000,
61572+
8888,
61573+
8880,
61574+
8008,
61575+
3000,
61576+
8443
61577+
],
61578+
"autofilter_services": [
61579+
"http",
61580+
"https"
61581+
],
61582+
"targets": [
61583+
"Python payload",
61584+
"Linux Command"
61585+
],
61586+
"mod_time": "2025-04-16 22:05:04 +0000",
61587+
"path": "/modules/exploits/linux/http/bentoml_rce_cve_2025_27520.rb",
61588+
"is_install_path": true,
61589+
"ref_name": "linux/http/bentoml_rce_cve_2025_27520",
61590+
"check": true,
61591+
"post_auth": false,
61592+
"default_credential": false,
61593+
"notes": {
61594+
"Stability": [
61595+
"crash-safe"
61596+
],
61597+
"SideEffects": [
61598+
"ioc-in-logs"
61599+
],
61600+
"Reliability": [
61601+
"repeatable-session"
61602+
]
61603+
},
61604+
"session_types": false,
61605+
"needs_cleanup": null
61606+
},
6154861607
"exploit_linux/http/beyondtrust_pra_rs_unauth_rce": {
6154961608
"name": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) unauthenticated Remote Code Execution",
6155061609
"fullname": "exploit/linux/http/beyondtrust_pra_rs_unauth_rce",

0 commit comments

Comments
 (0)