Skip to content

Commit bd5d470

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 2a7f40d commit bd5d470

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed

db/modules_metadata_base.json

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26365,6 +26365,49 @@
2636526365
"needs_cleanup": false,
2636626366
"actions": []
2636726367
},
26368+
"auxiliary_gather/thinmanager_traversal_download": {
26369+
"name": "ThinManager Path Traversal (CVE-2023-27856) Arbitrary File Download",
26370+
"fullname": "auxiliary/gather/thinmanager_traversal_download",
26371+
"aliases": [],
26372+
"rank": 300,
26373+
"disclosure_date": "2023-04-05",
26374+
"type": "auxiliary",
26375+
"author": [
26376+
"Michael Heinzl",
26377+
"Tenable"
26378+
],
26379+
"description": "This module exploits a path traversal vulnerability (CVE-2023-27856) in ThinManager <= v13.0.1 to retrieve arbitrary files from the system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.",
26380+
"references": [
26381+
"CVE-2023-27856",
26382+
"URL-https://www.tenable.com/security/research/tra-2023-13",
26383+
"URL-https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640"
26384+
],
26385+
"platform": "",
26386+
"arch": "",
26387+
"rport": 2031,
26388+
"autofilter_ports": [],
26389+
"autofilter_services": [],
26390+
"targets": null,
26391+
"mod_time": "2025-06-04 19:18:43 +0000",
26392+
"path": "/modules/auxiliary/gather/thinmanager_traversal_download.rb",
26393+
"is_install_path": true,
26394+
"ref_name": "gather/thinmanager_traversal_download",
26395+
"check": true,
26396+
"post_auth": false,
26397+
"default_credential": false,
26398+
"notes": {
26399+
"Stability": [
26400+
"crash-safe"
26401+
],
26402+
"Reliability": [],
26403+
"SideEffects": [
26404+
"ioc-in-logs"
26405+
]
26406+
},
26407+
"session_types": false,
26408+
"needs_cleanup": false,
26409+
"actions": []
26410+
},
2636826411
"auxiliary_gather/tplink_archer_c7_traversal": {
2636926412
"name": "Archer C7 Directory Traversal Vulnerability",
2637026413
"fullname": "auxiliary/gather/tplink_archer_c7_traversal",

0 commit comments

Comments
 (0)