Skip to content

Commit 76977ae

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 32aa0d8 commit 76977ae

File tree

1 file changed

+58
-56
lines changed

1 file changed

+58
-56
lines changed

db/modules_metadata_base.json

Lines changed: 58 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -122426,62 +122426,6 @@
122426122426
"needs_cleanup": true,
122427122427
"actions": []
122428122428
},
122429-
"exploit_multi/local/obsidian_plugin_persistence": {
122430-
"name": "Obsidian Plugin Persistence",
122431-
"fullname": "exploit/multi/local/obsidian_plugin_persistence",
122432-
"aliases": [],
122433-
"rank": 600,
122434-
"disclosure_date": "2022-09-16",
122435-
"type": "exploit",
122436-
"author": [
122437-
"h00die",
122438-
"Thomas Byrne"
122439-
],
122440-
"description": "This module searches for Obsidian vaults for a user, and uploads a malicious\n community plugin to the vault. The vaults must be opened with community\n plugins enabled (NOT restricted mode), but the plugin will be enabled\n automatically.\n\n Tested against Obsidian 1.7.7 on Kali, Ubuntu 22.04, and Windows 10.",
122441-
"references": [
122442-
"URL-https://docs.obsidian.md/Plugins/Getting+started/Build+a+plugin",
122443-
"URL-https://github.com/obsidianmd/obsidian-sample-plugin/tree/master",
122444-
"URL-https://forum.obsidian.md/t/can-obsidian-plugins-have-malware/34491",
122445-
"URL-https://help.obsidian.md/Extending+Obsidian/Plugin+security",
122446-
"URL-https://thomas-byrne.co.uk/research/obsidian-malicious-plugins/obsidian-research/"
122447-
],
122448-
"platform": "Linux,OSX,Windows",
122449-
"arch": "cmd",
122450-
"rport": null,
122451-
"autofilter_ports": [],
122452-
"autofilter_services": [],
122453-
"targets": [
122454-
"Auto",
122455-
"Linux",
122456-
"OSX",
122457-
"Windows"
122458-
],
122459-
"mod_time": "2024-12-14 17:38:29 +0000",
122460-
"path": "/modules/exploits/multi/local/obsidian_plugin_persistence.rb",
122461-
"is_install_path": true,
122462-
"ref_name": "multi/local/obsidian_plugin_persistence",
122463-
"check": true,
122464-
"post_auth": false,
122465-
"default_credential": false,
122466-
"notes": {
122467-
"Reliability": [
122468-
"repeatable-session"
122469-
],
122470-
"Stability": [
122471-
"crash-safe"
122472-
],
122473-
"SideEffects": [
122474-
"artifacts-on-disk",
122475-
"config-changes"
122476-
]
122477-
},
122478-
"session_types": [
122479-
"shell",
122480-
"meterpreter"
122481-
],
122482-
"needs_cleanup": null,
122483-
"actions": []
122484-
},
122485122429
"exploit_multi/local/periodic_script_persistence": {
122486122430
"name": "Periodic Script Persistence",
122487122431
"fullname": "exploit/multi/local/periodic_script_persistence",
@@ -125383,6 +125327,64 @@
125383125327
"needs_cleanup": true,
125384125328
"actions": []
125385125329
},
125330+
"exploit_multi/persistence/obsidian_plugin": {
125331+
"name": "Obsidian Plugin Persistence",
125332+
"fullname": "exploit/multi/persistence/obsidian_plugin",
125333+
"aliases": [
125334+
"exploits/multi/local/obsidian_plugin_persistence"
125335+
],
125336+
"rank": 600,
125337+
"disclosure_date": "2022-09-16",
125338+
"type": "exploit",
125339+
"author": [
125340+
"h00die",
125341+
"Thomas Byrne"
125342+
],
125343+
"description": "This module searches for Obsidian vaults for a user, and uploads a malicious\n community plugin to the vault. The vaults must be opened with community\n plugins enabled (NOT restricted mode), but the plugin will be enabled\n automatically.\n\n Tested against Obsidian 1.7.7 on Kali, Ubuntu 22.04, and Windows 10.",
125344+
"references": [
125345+
"URL-https://docs.obsidian.md/Plugins/Getting+started/Build+a+plugin",
125346+
"URL-https://github.com/obsidianmd/obsidian-sample-plugin/tree/master",
125347+
"URL-https://forum.obsidian.md/t/can-obsidian-plugins-have-malware/34491",
125348+
"URL-https://help.obsidian.md/Extending+Obsidian/Plugin+security",
125349+
"URL-https://thomas-byrne.co.uk/research/obsidian-malicious-plugins/obsidian-research/"
125350+
],
125351+
"platform": "Linux,OSX,Windows",
125352+
"arch": "cmd",
125353+
"rport": null,
125354+
"autofilter_ports": [],
125355+
"autofilter_services": [],
125356+
"targets": [
125357+
"Auto",
125358+
"Linux",
125359+
"OSX",
125360+
"Windows"
125361+
],
125362+
"mod_time": "2025-09-06 15:05:21 +0000",
125363+
"path": "/modules/exploits/multi/persistence/obsidian_plugin.rb",
125364+
"is_install_path": true,
125365+
"ref_name": "multi/persistence/obsidian_plugin",
125366+
"check": true,
125367+
"post_auth": false,
125368+
"default_credential": false,
125369+
"notes": {
125370+
"Reliability": [
125371+
"repeatable-session"
125372+
],
125373+
"Stability": [
125374+
"crash-safe"
125375+
],
125376+
"SideEffects": [
125377+
"artifacts-on-disk",
125378+
"config-changes"
125379+
]
125380+
},
125381+
"session_types": [
125382+
"shell",
125383+
"meterpreter"
125384+
],
125385+
"needs_cleanup": null,
125386+
"actions": []
125387+
},
125386125388
"exploit_multi/php/ignition_laravel_debug_rce": {
125387125389
"name": "Unauthenticated remote code execution in Ignition",
125388125390
"fullname": "exploit/multi/php/ignition_laravel_debug_rce",

0 commit comments

Comments
 (0)