|
26365 | 26365 | "needs_cleanup": false, |
26366 | 26366 | "actions": [] |
26367 | 26367 | }, |
| 26368 | + "auxiliary_gather/thinmanager_traversal_download": { |
| 26369 | + "name": "ThinManager Path Traversal (CVE-2023-27856) Arbitrary File Download", |
| 26370 | + "fullname": "auxiliary/gather/thinmanager_traversal_download", |
| 26371 | + "aliases": [], |
| 26372 | + "rank": 300, |
| 26373 | + "disclosure_date": "2023-04-05", |
| 26374 | + "type": "auxiliary", |
| 26375 | + "author": [ |
| 26376 | + "Michael Heinzl", |
| 26377 | + "Tenable" |
| 26378 | + ], |
| 26379 | + "description": "This module exploits a path traversal vulnerability (CVE-2023-27856) in ThinManager <= v13.0.1 to retrieve arbitrary files from the system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.", |
| 26380 | + "references": [ |
| 26381 | + "CVE-2023-27856", |
| 26382 | + "URL-https://www.tenable.com/security/research/tra-2023-13", |
| 26383 | + "URL-https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640" |
| 26384 | + ], |
| 26385 | + "platform": "", |
| 26386 | + "arch": "", |
| 26387 | + "rport": 2031, |
| 26388 | + "autofilter_ports": [], |
| 26389 | + "autofilter_services": [], |
| 26390 | + "targets": null, |
| 26391 | + "mod_time": "2025-06-04 19:18:43 +0000", |
| 26392 | + "path": "/modules/auxiliary/gather/thinmanager_traversal_download.rb", |
| 26393 | + "is_install_path": true, |
| 26394 | + "ref_name": "gather/thinmanager_traversal_download", |
| 26395 | + "check": true, |
| 26396 | + "post_auth": false, |
| 26397 | + "default_credential": false, |
| 26398 | + "notes": { |
| 26399 | + "Stability": [ |
| 26400 | + "crash-safe" |
| 26401 | + ], |
| 26402 | + "Reliability": [], |
| 26403 | + "SideEffects": [ |
| 26404 | + "ioc-in-logs" |
| 26405 | + ] |
| 26406 | + }, |
| 26407 | + "session_types": false, |
| 26408 | + "needs_cleanup": false, |
| 26409 | + "actions": [] |
| 26410 | + }, |
26368 | 26411 | "auxiliary_gather/tplink_archer_c7_traversal": { |
26369 | 26412 | "name": "Archer C7 Directory Traversal Vulnerability", |
26370 | 26413 | "fullname": "auxiliary/gather/tplink_archer_c7_traversal", |
|
0 commit comments