Skip to content

Commit f8ada15

Browse files
committed
automatic module_metadata_base.json update
1 parent 6e696e2 commit f8ada15

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114954,6 +114954,69 @@
114954114954
"session_types": false,
114955114955
"needs_cleanup": null
114956114956
},
114957+
"exploit_multi/http/wp_litespeed_cookie_theft": {
114958+
"name": "Wordpress LiteSpeed Cache plugin cookie theft",
114959+
"fullname": "exploit/multi/http/wp_litespeed_cookie_theft",
114960+
"aliases": [
114961+
114962+
],
114963+
"rank": 600,
114964+
"disclosure_date": "2024-09-04",
114965+
"type": "exploit",
114966+
"author": [
114967+
"Rafie Muhammad",
114968+
"jheysel-r7"
114969+
],
114970+
"description": "This module exploits an unauthenticated account takeover vulnerability in LiteSpeed Cache, a Wordpress plugin\n that currently has around 6 million active installations. In LiteSpeed Cache versions prior to 6.5.0.1, when\n the Debug Logging feature is enabled, the plugin will log admin cookies to the /wp-content/debug.log endpoint\n which is accessible without authentication. The Debug Logging feature in the plugin is not enabled by default.\n The admin cookies found in the debug.log can be used to upload and execute a malicious plugin containing a payload.",
114971+
"references": [
114972+
"URL-https://patchstack.com/articles/critical-account-takeover-vulnerability-patched-in-litespeed-cache-plugin/",
114973+
"CVE-2024-44000"
114974+
],
114975+
"platform": "Linux,PHP,Unix,Windows",
114976+
"arch": "php, cmd",
114977+
"rport": 80,
114978+
"autofilter_ports": [
114979+
80,
114980+
8080,
114981+
443,
114982+
8000,
114983+
8888,
114984+
8880,
114985+
8008,
114986+
3000,
114987+
8443
114988+
],
114989+
"autofilter_services": [
114990+
"http",
114991+
"https"
114992+
],
114993+
"targets": [
114994+
"PHP In-Memory",
114995+
"Unix In-Memory",
114996+
"Windows In-Memory"
114997+
],
114998+
"mod_time": "2024-09-16 09:46:57 +0000",
114999+
"path": "/modules/exploits/multi/http/wp_litespeed_cookie_theft.rb",
115000+
"is_install_path": true,
115001+
"ref_name": "multi/http/wp_litespeed_cookie_theft",
115002+
"check": true,
115003+
"post_auth": false,
115004+
"default_credential": false,
115005+
"notes": {
115006+
"Stability": [
115007+
"crash-safe"
115008+
],
115009+
"SideEffects": [
115010+
"artifacts-on-disk",
115011+
"ioc-in-logs"
115012+
],
115013+
"Reliability": [
115014+
"repeatable-session"
115015+
]
115016+
},
115017+
"session_types": false,
115018+
"needs_cleanup": true
115019+
},
114957115020
"exploit_multi/http/wp_ninja_forms_unauthenticated_file_upload": {
114958115021
"name": "WordPress Ninja Forms Unauthenticated File Upload",
114959115022
"fullname": "exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload",

0 commit comments

Comments
 (0)