Skip to content

Commit f91c95b

Browse files
committed
automatic module_metadata_base.json update
1 parent d11c2be commit f91c95b

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1866,6 +1866,69 @@
18661866

18671867
]
18681868
},
1869+
"auxiliary_admin/http/cisco_ssm_onprem_account": {
1870+
"name": "Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419)",
1871+
"fullname": "auxiliary/admin/http/cisco_ssm_onprem_account",
1872+
"aliases": [
1873+
1874+
],
1875+
"rank": 300,
1876+
"disclosure_date": "2024-07-20",
1877+
"type": "auxiliary",
1878+
"author": [
1879+
"Michael Heinzl",
1880+
"Mohammed Adel"
1881+
],
1882+
"description": "This module exploits an improper access control vulnerability in Cisco Smart Software Manager (SSM) On-Prem <= 8-202206. An unauthenticated remote attacker\n can change the password of any existing user, including administrative users.",
1883+
"references": [
1884+
"CVE-2024-20419",
1885+
"URL-https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy#vp",
1886+
"URL-https://www.0xpolar.com/blog/CVE-2024-20419"
1887+
],
1888+
"platform": "",
1889+
"arch": "",
1890+
"rport": 8443,
1891+
"autofilter_ports": [
1892+
80,
1893+
8080,
1894+
443,
1895+
8000,
1896+
8888,
1897+
8880,
1898+
8008,
1899+
3000,
1900+
8443
1901+
],
1902+
"autofilter_services": [
1903+
"http",
1904+
"https"
1905+
],
1906+
"targets": null,
1907+
"mod_time": "2024-09-23 14:16:26 +0000",
1908+
"path": "/modules/auxiliary/admin/http/cisco_ssm_onprem_account.rb",
1909+
"is_install_path": true,
1910+
"ref_name": "admin/http/cisco_ssm_onprem_account",
1911+
"check": true,
1912+
"post_auth": true,
1913+
"default_credential": false,
1914+
"notes": {
1915+
"Stability": [
1916+
"crash-safe"
1917+
],
1918+
"Reliability": [
1919+
"repeatable-session"
1920+
],
1921+
"SideEffects": [
1922+
"ioc-in-logs",
1923+
"config-changes"
1924+
]
1925+
},
1926+
"session_types": false,
1927+
"needs_cleanup": false,
1928+
"actions": [
1929+
1930+
]
1931+
},
18691932
"auxiliary_admin/http/cnpilot_r_cmd_exec": {
18701933
"name": "Cambium cnPilot r200/r201 Command Execution as 'root'",
18711934
"fullname": "auxiliary/admin/http/cnpilot_r_cmd_exec",

0 commit comments

Comments
 (0)