@@ -122426,62 +122426,6 @@
122426122426 "needs_cleanup": true,
122427122427 "actions": []
122428122428 },
122429- "exploit_multi/local/obsidian_plugin_persistence": {
122430- "name": "Obsidian Plugin Persistence",
122431- "fullname": "exploit/multi/local/obsidian_plugin_persistence",
122432- "aliases": [],
122433- "rank": 600,
122434- "disclosure_date": "2022-09-16",
122435- "type": "exploit",
122436- "author": [
122437- "h00die",
122438- "Thomas Byrne"
122439- ],
122440- "description": "This module searches for Obsidian vaults for a user, and uploads a malicious\n community plugin to the vault. The vaults must be opened with community\n plugins enabled (NOT restricted mode), but the plugin will be enabled\n automatically.\n\n Tested against Obsidian 1.7.7 on Kali, Ubuntu 22.04, and Windows 10.",
122441- "references": [
122442- "URL-https://docs.obsidian.md/Plugins/Getting+started/Build+a+plugin",
122443- "URL-https://github.com/obsidianmd/obsidian-sample-plugin/tree/master",
122444- "URL-https://forum.obsidian.md/t/can-obsidian-plugins-have-malware/34491",
122445- "URL-https://help.obsidian.md/Extending+Obsidian/Plugin+security",
122446- "URL-https://thomas-byrne.co.uk/research/obsidian-malicious-plugins/obsidian-research/"
122447- ],
122448- "platform": "Linux,OSX,Windows",
122449- "arch": "cmd",
122450- "rport": null,
122451- "autofilter_ports": [],
122452- "autofilter_services": [],
122453- "targets": [
122454- "Auto",
122455- "Linux",
122456- "OSX",
122457- "Windows"
122458- ],
122459- "mod_time": "2024-12-14 17:38:29 +0000",
122460- "path": "/modules/exploits/multi/local/obsidian_plugin_persistence.rb",
122461- "is_install_path": true,
122462- "ref_name": "multi/local/obsidian_plugin_persistence",
122463- "check": true,
122464- "post_auth": false,
122465- "default_credential": false,
122466- "notes": {
122467- "Reliability": [
122468- "repeatable-session"
122469- ],
122470- "Stability": [
122471- "crash-safe"
122472- ],
122473- "SideEffects": [
122474- "artifacts-on-disk",
122475- "config-changes"
122476- ]
122477- },
122478- "session_types": [
122479- "shell",
122480- "meterpreter"
122481- ],
122482- "needs_cleanup": null,
122483- "actions": []
122484- },
122485122429 "exploit_multi/local/periodic_script_persistence": {
122486122430 "name": "Periodic Script Persistence",
122487122431 "fullname": "exploit/multi/local/periodic_script_persistence",
@@ -125383,6 +125327,64 @@
125383125327 "needs_cleanup": true,
125384125328 "actions": []
125385125329 },
125330+ "exploit_multi/persistence/obsidian_plugin": {
125331+ "name": "Obsidian Plugin Persistence",
125332+ "fullname": "exploit/multi/persistence/obsidian_plugin",
125333+ "aliases": [
125334+ "exploits/multi/local/obsidian_plugin_persistence"
125335+ ],
125336+ "rank": 600,
125337+ "disclosure_date": "2022-09-16",
125338+ "type": "exploit",
125339+ "author": [
125340+ "h00die",
125341+ "Thomas Byrne"
125342+ ],
125343+ "description": "This module searches for Obsidian vaults for a user, and uploads a malicious\n community plugin to the vault. The vaults must be opened with community\n plugins enabled (NOT restricted mode), but the plugin will be enabled\n automatically.\n\n Tested against Obsidian 1.7.7 on Kali, Ubuntu 22.04, and Windows 10.",
125344+ "references": [
125345+ "URL-https://docs.obsidian.md/Plugins/Getting+started/Build+a+plugin",
125346+ "URL-https://github.com/obsidianmd/obsidian-sample-plugin/tree/master",
125347+ "URL-https://forum.obsidian.md/t/can-obsidian-plugins-have-malware/34491",
125348+ "URL-https://help.obsidian.md/Extending+Obsidian/Plugin+security",
125349+ "URL-https://thomas-byrne.co.uk/research/obsidian-malicious-plugins/obsidian-research/"
125350+ ],
125351+ "platform": "Linux,OSX,Windows",
125352+ "arch": "cmd",
125353+ "rport": null,
125354+ "autofilter_ports": [],
125355+ "autofilter_services": [],
125356+ "targets": [
125357+ "Auto",
125358+ "Linux",
125359+ "OSX",
125360+ "Windows"
125361+ ],
125362+ "mod_time": "2025-09-06 15:05:21 +0000",
125363+ "path": "/modules/exploits/multi/persistence/obsidian_plugin.rb",
125364+ "is_install_path": true,
125365+ "ref_name": "multi/persistence/obsidian_plugin",
125366+ "check": true,
125367+ "post_auth": false,
125368+ "default_credential": false,
125369+ "notes": {
125370+ "Reliability": [
125371+ "repeatable-session"
125372+ ],
125373+ "Stability": [
125374+ "crash-safe"
125375+ ],
125376+ "SideEffects": [
125377+ "artifacts-on-disk",
125378+ "config-changes"
125379+ ]
125380+ },
125381+ "session_types": [
125382+ "shell",
125383+ "meterpreter"
125384+ ],
125385+ "needs_cleanup": null,
125386+ "actions": []
125387+ },
125386125388 "exploit_multi/php/ignition_laravel_debug_rce": {
125387125389 "name": "Unauthenticated remote code execution in Ignition",
125388125390 "fullname": "exploit/multi/php/ignition_laravel_debug_rce",
0 commit comments