Skip to content

Commit 99a616e

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 5fbf46b commit 99a616e

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed

db/modules_metadata_base.json

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86512,6 +86512,52 @@
8651286512
"needs_cleanup": null,
8651386513
"actions": []
8651486514
},
86515+
"exploit_linux/local/udev_persistence": {
86516+
"name": "udev persistence",
86517+
"fullname": "exploit/linux/local/udev_persistence",
86518+
"aliases": [],
86519+
"rank": 500,
86520+
"disclosure_date": "1999-01-01",
86521+
"type": "exploit",
86522+
"author": [
86523+
"Julien Voisin"
86524+
],
86525+
"description": "This module will add a script in /lib/udev/rules.d/ in order to execute a payload written on disk.\n It'll be executed with root privileges everytime a network interface other than l0 comes up.",
86526+
"references": [
86527+
"URL-https://www.aon.com/en/insights/cyber-labs/unveiling-sedexp",
86528+
"URL-https://ch4ik0.github.io/en/posts/leveraging-Linux-udev-for-persistence/"
86529+
],
86530+
"platform": "Linux,Unix",
86531+
"arch": "cmd",
86532+
"rport": null,
86533+
"autofilter_ports": [],
86534+
"autofilter_services": [],
86535+
"targets": [
86536+
"Automatic"
86537+
],
86538+
"mod_time": "2025-06-04 12:56:51 +0000",
86539+
"path": "/modules/exploits/linux/local/udev_persistence.rb",
86540+
"is_install_path": true,
86541+
"ref_name": "linux/local/udev_persistence",
86542+
"check": false,
86543+
"post_auth": false,
86544+
"default_credential": false,
86545+
"notes": {
86546+
"Stability": [],
86547+
"Reliability": [
86548+
"event-dependent"
86549+
],
86550+
"SideEffects": [
86551+
"artifacts-on-disk"
86552+
]
86553+
},
86554+
"session_types": [
86555+
"shell",
86556+
"meterpreter"
86557+
],
86558+
"needs_cleanup": null,
86559+
"actions": []
86560+
},
8651586561
"exploit_linux/local/ueb_bpserverd_privesc": {
8651686562
"name": "Unitrends Enterprise Backup bpserverd Privilege Escalation",
8651786563
"fullname": "exploit/linux/local/ueb_bpserverd_privesc",

0 commit comments

Comments
 (0)