Skip to content

Commit c7c7338

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 7ead96a commit c7c7338

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82797,6 +82797,69 @@
8279782797
"session_types": false,
8279882798
"needs_cleanup": null
8279982799
},
82800+
"exploit_linux/http/selenium_greed_chrome_rce_cve_2022_28108": {
82801+
"name": "Selenium chrome RCE",
82802+
"fullname": "exploit/linux/http/selenium_greed_chrome_rce_cve_2022_28108",
82803+
"aliases": [
82804+
82805+
],
82806+
"rank": 600,
82807+
"disclosure_date": "2022-04-18",
82808+
"type": "exploit",
82809+
"author": [
82810+
"randomstuff (Gabriel Corona)",
82811+
"Wiz Research",
82812+
"Takahiro Yokoyama"
82813+
],
82814+
"description": "Selenium Server (Grid) before 4.0.0-alpha-7 allows CSRF because it permits non-JSON content types\n such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.",
82815+
"references": [
82816+
"CVE-2022-28108",
82817+
"URL-https://www.wiz.io/blog/seleniumgreed-cryptomining-exploit-attack-flow-remediation-steps",
82818+
"URL-https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/"
82819+
],
82820+
"platform": "Linux",
82821+
"arch": "",
82822+
"rport": 4444,
82823+
"autofilter_ports": [
82824+
80,
82825+
8080,
82826+
443,
82827+
8000,
82828+
8888,
82829+
8880,
82830+
8008,
82831+
3000,
82832+
8443
82833+
],
82834+
"autofilter_services": [
82835+
"http",
82836+
"https"
82837+
],
82838+
"targets": [
82839+
"Linux Command"
82840+
],
82841+
"mod_time": "2025-01-07 10:47:04 +0000",
82842+
"path": "/modules/exploits/linux/http/selenium_greed_chrome_rce_cve_2022_28108.rb",
82843+
"is_install_path": true,
82844+
"ref_name": "linux/http/selenium_greed_chrome_rce_cve_2022_28108",
82845+
"check": true,
82846+
"post_auth": false,
82847+
"default_credential": false,
82848+
"notes": {
82849+
"Stability": [
82850+
"crash-safe"
82851+
],
82852+
"SideEffects": [
82853+
"artifacts-on-disk",
82854+
"ioc-in-logs"
82855+
],
82856+
"Reliability": [
82857+
"repeatable-session"
82858+
]
82859+
},
82860+
"session_types": false,
82861+
"needs_cleanup": null
82862+
},
8280082863
"exploit_linux/http/smt_ipmi_close_window_bof": {
8280182864
"name": "Supermicro Onboard IPMI close_window.cgi Buffer Overflow",
8280282865
"fullname": "exploit/linux/http/smt_ipmi_close_window_bof",

0 commit comments

Comments
 (0)