Skip to content

Commit d81c4ee

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 76ab21a commit d81c4ee

File tree

1 file changed

+110
-30
lines changed

1 file changed

+110
-30
lines changed

db/modules_metadata_base.json

Lines changed: 110 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -9851,7 +9851,7 @@
98519851
98529852
"juan vazquez <[email protected]>"
98539853
],
9854-
"description": "This module exploits a SQL injection vulnerability found in Advantech WebAccess 7.1. The\n vulnerability exists in the DBVisitor.dll component, and can be abused through malicious\n requests to the ChartThemeConfig web service. This module can be used to extract the site\n and project usernames and hashes.",
9854+
"description": "This module exploits a SQL injection vulnerability found in Advantech WebAccess 7.1. The\n vulnerability exists in the DBVisitor.dll component, and can be abused through malicious\n requests to the ChartThemeConfig web service. This module can be used to extract the site\n and project usernames and hashes.",
98559855
"references": [
98569856
"CVE-2014-0763",
98579857
"ZDI-14-077",
@@ -9878,14 +9878,22 @@
98789878
"https"
98799879
],
98809880
"targets": null,
9881-
"mod_time": "2020-09-22 02:56:51 +0000",
9881+
"mod_time": "2025-05-26 20:49:19 +0000",
98829882
"path": "/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb",
98839883
"is_install_path": true,
98849884
"ref_name": "admin/scada/advantech_webaccess_dbvisitor_sqli",
98859885
"check": true,
98869886
"post_auth": false,
98879887
"default_credential": false,
9888-
"notes": {},
9888+
"notes": {
9889+
"Stability": [
9890+
"crash-safe"
9891+
],
9892+
"SideEffects": [
9893+
"ioc-in-logs"
9894+
],
9895+
"Reliability": []
9896+
},
98899897
"session_types": false,
98909898
"needs_cleanup": false,
98919899
"actions": []
@@ -9901,7 +9909,7 @@
99019909
"Unknown",
99029910
"juan vazquez <[email protected]>"
99039911
],
9904-
"description": "This module abuses a directory traversal in GE Proficy Cimplicity, specifically on the\n gefebt.exe component used by the WebView, in order to retrieve arbitrary files with SYSTEM\n privileges. This module has been tested successfully on GE Proficy Cimplicity 7.5.",
9912+
"description": "This module abuses a directory traversal in GE Proficy Cimplicity, specifically on the\n gefebt.exe component used by the WebView, in order to retrieve arbitrary files with SYSTEM\n privileges. This module has been tested successfully on GE Proficy Cimplicity 7.5.",
99059913
"references": [
99069914
"CVE-2013-0653",
99079915
"OSVDB-89490",
@@ -9914,14 +9922,22 @@
99149922
"autofilter_ports": [],
99159923
"autofilter_services": [],
99169924
"targets": null,
9917-
"mod_time": "2020-10-02 17:38:06 +0000",
9925+
"mod_time": "2025-05-26 20:49:19 +0000",
99189926
"path": "/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb",
99199927
"is_install_path": true,
99209928
"ref_name": "admin/scada/ge_proficy_substitute_traversal",
99219929
"check": false,
99229930
"post_auth": false,
99239931
"default_credential": false,
9924-
"notes": {},
9932+
"notes": {
9933+
"Stability": [
9934+
"crash-safe"
9935+
],
9936+
"SideEffects": [
9937+
"ioc-in-logs"
9938+
],
9939+
"Reliability": []
9940+
},
99259941
"session_types": false,
99269942
"needs_cleanup": false,
99279943
"actions": []
@@ -9937,7 +9953,7 @@
99379953
"K. Reid Wightman <[email protected]>",
99389954
99399955
],
9940-
"description": "The Schneider Modicon with Unity series of PLCs use Modbus function\n code 90 (0x5a) to perform administrative commands without authentication.\n This module allows a remote user to change the state of the PLC between\n STOP and RUN, allowing an attacker to end process control by the PLC.\n\n This module is based on the original 'modiconstop.rb' Basecamp module from\n DigitalBond.",
9956+
"description": "The Schneider Modicon with Unity series of PLCs use Modbus function\n code 90 (0x5a) to perform administrative commands without authentication.\n This module allows a remote user to change the state of the PLC between\n STOP and RUN, allowing an attacker to end process control by the PLC.\n\n This module is based on the original 'modiconstop.rb' Basecamp module from\n DigitalBond.",
99419957
"references": [
99429958
"URL-http://www.digitalbond.com/tools/basecamp/metasploit-modules/"
99439959
],
@@ -9947,14 +9963,22 @@
99479963
"autofilter_ports": [],
99489964
"autofilter_services": [],
99499965
"targets": null,
9950-
"mod_time": "2020-10-02 17:38:06 +0000",
9966+
"mod_time": "2025-05-26 20:49:19 +0000",
99519967
"path": "/modules/auxiliary/admin/scada/modicon_command.rb",
99529968
"is_install_path": true,
99539969
"ref_name": "admin/scada/modicon_command",
99549970
"check": false,
99559971
"post_auth": false,
99569972
"default_credential": false,
9957-
"notes": {},
9973+
"notes": {
9974+
"Stability": [
9975+
"crash-safe"
9976+
],
9977+
"SideEffects": [
9978+
"ioc-in-logs"
9979+
],
9980+
"Reliability": []
9981+
},
99589982
"session_types": false,
99599983
"needs_cleanup": false,
99609984
"actions": []
@@ -9970,7 +9994,7 @@
99709994
"K. Reid Wightman <[email protected]>",
99719995
99729996
],
9973-
"description": "The Schneider Modicon Quantum series of Ethernet cards store usernames and\n passwords for the system in files that may be retrieved via backdoor access.\n\n This module is based on the original 'modiconpass.rb' Basecamp module from\n DigitalBond.",
9997+
"description": "The Schneider Modicon Quantum series of Ethernet cards store usernames and\n passwords for the system in files that may be retrieved via backdoor access.\n\n This module is based on the original 'modiconpass.rb' Basecamp module from\n DigitalBond.",
99749998
"references": [
99759999
"URL-http://www.digitalbond.com/tools/basecamp/metasploit-modules/"
997610000
],
@@ -9985,14 +10009,22 @@
998510009
"ftp"
998610010
],
998710011
"targets": null,
9988-
"mod_time": "2025-05-21 10:45:08 +0000",
10012+
"mod_time": "2025-05-26 20:49:19 +0000",
998910013
"path": "/modules/auxiliary/admin/scada/modicon_password_recovery.rb",
999010014
"is_install_path": true,
999110015
"ref_name": "admin/scada/modicon_password_recovery",
999210016
"check": true,
999310017
"post_auth": true,
999410018
"default_credential": false,
9995-
"notes": {},
10019+
"notes": {
10020+
"Stability": [
10021+
"crash-safe"
10022+
],
10023+
"SideEffects": [
10024+
"ioc-in-logs"
10025+
],
10026+
"Reliability": []
10027+
},
999610028
"session_types": false,
999710029
"needs_cleanup": false,
999810030
"actions": []
@@ -10008,7 +10040,7 @@
1000810040
"K. Reid Wightman <[email protected]>",
1000910041
1001010042
],
10011-
"description": "The Schneider Modicon with Unity series of PLCs use Modbus function\n code 90 (0x5a) to send and receive ladder logic. The protocol is\n unauthenticated, and allows a rogue host to retrieve the existing\n logic and to upload new logic.\n\n Two modes are supported: \"SEND\" and \"RECV,\" which behave as one might\n expect -- use 'set mode ACTIONAME' to use either mode of operation.\n\n In either mode, FILENAME must be set to a valid path to an existing\n file (for SENDing) or a new file (for RECVing), and the directory must\n already exist. The default, 'modicon_ladder.apx' is a blank\n ladder logic file which can be used for testing.\n\n This module is based on the original 'modiconstux.rb' Basecamp module from\n DigitalBond.",
10043+
"description": "The Schneider Modicon with Unity series of PLCs use Modbus function\n code 90 (0x5a) to send and receive ladder logic. The protocol is\n unauthenticated, and allows a rogue host to retrieve the existing\n logic and to upload new logic.\n\n Two modes are supported: \"SEND\" and \"RECV,\" which behave as one might\n expect -- use 'set mode ACTIONAME' to use either mode of operation.\n\n In either mode, FILENAME must be set to a valid path to an existing\n file (for SENDing) or a new file (for RECVing), and the directory must\n already exist. The default, 'modicon_ladder.apx' is a blank\n ladder logic file which can be used for testing.\n\n This module is based on the original 'modiconstux.rb' Basecamp module from\n DigitalBond.",
1001210044
"references": [
1001310045
"URL-http://www.digitalbond.com/tools/basecamp/metasploit-modules/"
1001410046
],
@@ -10018,14 +10050,22 @@
1001810050
"autofilter_ports": [],
1001910051
"autofilter_services": [],
1002010052
"targets": null,
10021-
"mod_time": "2022-03-10 18:03:35 +0000",
10053+
"mod_time": "2025-05-26 20:49:19 +0000",
1002210054
"path": "/modules/auxiliary/admin/scada/modicon_stux_transfer.rb",
1002310055
"is_install_path": true,
1002410056
"ref_name": "admin/scada/modicon_stux_transfer",
1002510057
"check": false,
1002610058
"post_auth": false,
1002710059
"default_credential": false,
10028-
"notes": {},
10060+
"notes": {
10061+
"Stability": [
10062+
"crash-safe"
10063+
],
10064+
"SideEffects": [
10065+
"ioc-in-logs"
10066+
],
10067+
"Reliability": []
10068+
},
1002910069
"session_types": false,
1003010070
"needs_cleanup": false,
1003110071
"actions": []
@@ -10041,7 +10081,7 @@
1004110081
"Patrick DeSantis <[email protected]>",
1004210082
"K. Reid Wightman <[email protected]>"
1004310083
],
10044-
"description": "The Moxa protocol listens on 4800/UDP and will respond to broadcast\n or direct traffic. The service is known to be used on Moxa devices\n in the NPort, OnCell, and MGate product lines. Many devices with\n firmware versions older than 2017 or late 2016 allow admin credentials\n and SNMP read and read/write community strings to be retrieved without\n authentication.\n\n This module is the work of Patrick DeSantis of Cisco Talos and K. Reid\n Wightman.\n\n Tested on: Moxa NPort 6250 firmware v1.13, MGate MB3170 firmware 2.5,\n and NPort 5110 firmware 2.6.",
10084+
"description": "The Moxa protocol listens on 4800/UDP and will respond to broadcast\n or direct traffic. The service is known to be used on Moxa devices\n in the NPort, OnCell, and MGate product lines. Many devices with\n firmware versions older than 2017 or late 2016 allow admin credentials\n and SNMP read and read/write community strings to be retrieved without\n authentication.\n\n This module is the work of Patrick DeSantis of Cisco Talos and K. Reid\n Wightman.\n\n Tested on: Moxa NPort 6250 firmware v1.13, MGate MB3170 firmware 2.5,\n and NPort 5110 firmware 2.6.",
1004510085
"references": [
1004610086
"CVE-2016-9361",
1004710087
"BID-85965",
@@ -10055,14 +10095,22 @@
1005510095
"autofilter_ports": [],
1005610096
"autofilter_services": [],
1005710097
"targets": null,
10058-
"mod_time": "2020-10-02 17:38:06 +0000",
10098+
"mod_time": "2025-05-26 20:49:19 +0000",
1005910099
"path": "/modules/auxiliary/admin/scada/moxa_credentials_recovery.rb",
1006010100
"is_install_path": true,
1006110101
"ref_name": "admin/scada/moxa_credentials_recovery",
1006210102
"check": true,
1006310103
"post_auth": false,
1006410104
"default_credential": false,
10065-
"notes": {},
10105+
"notes": {
10106+
"Stability": [
10107+
"crash-safe"
10108+
],
10109+
"SideEffects": [
10110+
"ioc-in-logs"
10111+
],
10112+
"Reliability": []
10113+
},
1006610114
"session_types": false,
1006710115
"needs_cleanup": false,
1006810116
"actions": []
@@ -10079,7 +10127,7 @@
1007910127
"K. Reid Wightman <[email protected]>",
1008010128
1008110129
],
10082-
"description": "The EtherNet/IP CIP protocol allows a number of unauthenticated commands to a PLC which\n implements the protocol. This module implements the CPU STOP command, as well as\n the ability to crash the Ethernet card in an affected device.\n\n This module is based on the original 'ethernetip-multi.rb' Basecamp module\n from DigitalBond.",
10130+
"description": "The EtherNet/IP CIP protocol allows a number of unauthenticated commands to a PLC which\n implements the protocol. This module implements the CPU STOP command, as well as\n the ability to crash the Ethernet card in an affected device.\n\n This module is based on the original 'ethernetip-multi.rb' Basecamp module\n from DigitalBond.",
1008310131
"references": [
1008410132
"URL-http://www.digitalbond.com/tools/basecamp/metasploit-modules/"
1008510133
],
@@ -10089,14 +10137,22 @@
1008910137
"autofilter_ports": [],
1009010138
"autofilter_services": [],
1009110139
"targets": null,
10092-
"mod_time": "2024-01-07 15:02:53 +0000",
10140+
"mod_time": "2025-05-26 20:49:19 +0000",
1009310141
"path": "/modules/auxiliary/admin/scada/multi_cip_command.rb",
1009410142
"is_install_path": true,
1009510143
"ref_name": "admin/scada/multi_cip_command",
1009610144
"check": false,
1009710145
"post_auth": false,
1009810146
"default_credential": false,
10099-
"notes": {},
10147+
"notes": {
10148+
"Stability": [
10149+
"crash-service-down"
10150+
],
10151+
"SideEffects": [
10152+
"ioc-in-logs"
10153+
],
10154+
"Reliability": []
10155+
},
1010010156
"session_types": false,
1010110157
"needs_cleanup": false,
1010210158
"actions": []
@@ -10168,7 +10224,7 @@
1016810224
"author": [
1016910225
"Luis Rosa <[email protected]>"
1017010226
],
10171-
"description": "Unitronics Vision PLCs allow remote administrative functions to control\n the PLC using authenticated PCOM commands.\n\n This module supports START, STOP and RESET operations.",
10227+
"description": "Unitronics Vision PLCs allow remote administrative functions to control\n the PLC using authenticated PCOM commands.\n\n This module supports START, STOP and RESET operations.",
1017210228
"references": [
1017310229
"URL-https://unitronicsplc.com/Download/SoftwareUtilities/Unitronics%20PCOM%20Protocol.pdf"
1017410230
],
@@ -10178,14 +10234,22 @@
1017810234
"autofilter_ports": [],
1017910235
"autofilter_services": [],
1018010236
"targets": null,
10181-
"mod_time": "2021-01-29 16:19:13 +0000",
10237+
"mod_time": "2025-05-26 20:49:19 +0000",
1018210238
"path": "/modules/auxiliary/admin/scada/pcom_command.rb",
1018310239
"is_install_path": true,
1018410240
"ref_name": "admin/scada/pcom_command",
1018510241
"check": false,
1018610242
"post_auth": false,
1018710243
"default_credential": false,
10188-
"notes": {},
10244+
"notes": {
10245+
"Stability": [
10246+
"crash-service-restarts"
10247+
],
10248+
"SideEffects": [
10249+
"ioc-in-logs"
10250+
],
10251+
"Reliability": []
10252+
},
1018910253
"session_types": false,
1019010254
"needs_cleanup": false,
1019110255
"actions": []
@@ -10200,7 +10264,7 @@
1020010264
"author": [
1020110265
"Tijl Deneut <[email protected]>"
1020210266
],
10203-
"description": "PhoenixContact Programmable Logic Controllers are built upon a variant of\n ProConOS. Communicating using a proprietary protocol over ports TCP/1962\n and TCP/41100 or TCP/20547.\n It allows a remote user to read out the PLC Type, Firmware and\n Build number on port TCP/1962.\n And also to read out the CPU State (Running or Stopped) AND start\n or stop the CPU on port TCP/41100 (confirmed ILC 15x and 17x series)\n or on port TCP/20547 (confirmed ILC 39x series)",
10267+
"description": "PhoenixContact Programmable Logic Controllers are built upon a variant of\n ProConOS. Communicating using a proprietary protocol over ports TCP/1962\n and TCP/41100 or TCP/20547.\n It allows a remote user to read out the PLC Type, Firmware and\n Build number on port TCP/1962.\n And also to read out the CPU State (Running or Stopped) AND start\n or stop the CPU on port TCP/41100 (confirmed ILC 15x and 17x series)\n or on port TCP/20547 (confirmed ILC 39x series)",
1020410268
"references": [
1020510269
"URL-https://github.com/tijldeneut/ICSSecurityScripts",
1020610270
"CVE-2014-9195"
@@ -10211,14 +10275,22 @@
1021110275
"autofilter_ports": [],
1021210276
"autofilter_services": [],
1021310277
"targets": null,
10214-
"mod_time": "2020-10-02 17:38:06 +0000",
10278+
"mod_time": "2025-05-26 20:49:19 +0000",
1021510279
"path": "/modules/auxiliary/admin/scada/phoenix_command.rb",
1021610280
"is_install_path": true,
1021710281
"ref_name": "admin/scada/phoenix_command",
1021810282
"check": false,
1021910283
"post_auth": false,
1022010284
"default_credential": false,
10221-
"notes": {},
10285+
"notes": {
10286+
"Stability": [
10287+
"crash-os-down"
10288+
],
10289+
"SideEffects": [
10290+
"ioc-in-logs"
10291+
],
10292+
"Reliability": []
10293+
},
1022210294
"session_types": false,
1022310295
"needs_cleanup": false,
1022410296
"actions": []
@@ -10233,7 +10305,7 @@
1023310305
"author": [
1023410306
"Unknown"
1023510307
],
10236-
"description": "This module allows an unauthenticated user to interact with the Yokogawa\n CENTUM CS3000 BKBCopyD.exe service through the PMODE, RETR and STOR\n operations.",
10308+
"description": "This module allows an unauthenticated user to interact with the Yokogawa\n CENTUM CS3000 BKBCopyD.exe service through the PMODE, RETR and STOR\n operations.",
1023710309
"references": [
1023810310
"CVE-2014-5208",
1023910311
"URL-https://www.rapid7.com/blog/post/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access"
@@ -10244,14 +10316,22 @@
1024410316
"autofilter_ports": [],
1024510317
"autofilter_services": [],
1024610318
"targets": null,
10247-
"mod_time": "2022-03-10 10:28:25 +0000",
10319+
"mod_time": "2025-05-26 20:49:19 +0000",
1024810320
"path": "/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb",
1024910321
"is_install_path": true,
1025010322
"ref_name": "admin/scada/yokogawa_bkbcopyd_client",
1025110323
"check": false,
1025210324
"post_auth": false,
1025310325
"default_credential": false,
10254-
"notes": {},
10326+
"notes": {
10327+
"Stability": [
10328+
"crash-safe"
10329+
],
10330+
"SideEffects": [
10331+
"ioc-in-logs"
10332+
],
10333+
"Reliability": []
10334+
},
1025510335
"session_types": false,
1025610336
"needs_cleanup": false,
1025710337
"actions": [

0 commit comments

Comments
 (0)