Skip to content

Commit b74860a

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent f5aafdc commit b74860a

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed

db/modules_metadata_base.json

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61683,6 +61683,65 @@
6168361683
"session_types": false,
6168461684
"needs_cleanup": null
6168561685
},
61686+
"exploit_linux/http/bentoml_runner_server_rce_cve_2025_32375": {
61687+
"name": "BentoML's runner server RCE",
61688+
"fullname": "exploit/linux/http/bentoml_runner_server_rce_cve_2025_32375",
61689+
"aliases": [],
61690+
"rank": 600,
61691+
"disclosure_date": "2025-04-09",
61692+
"type": "exploit",
61693+
"author": [
61694+
"SeaWind",
61695+
"Takahiro Yokoyama"
61696+
],
61697+
"description": "There was an insecure deserialization in BentoML's runner server prior to version 1.4.8.\n By setting specific headers and parameters in the POST request, it is possible to execute unauthorized arbitrary code in the context of the user running the server,\n which will grant initial access and information disclosure.",
61698+
"references": [
61699+
"CVE-2025-32375",
61700+
"URL-https://github.com/advisories/GHSA-7v4r-c989-xh26"
61701+
],
61702+
"platform": "",
61703+
"arch": "",
61704+
"rport": 3000,
61705+
"autofilter_ports": [
61706+
80,
61707+
8080,
61708+
443,
61709+
8000,
61710+
8888,
61711+
8880,
61712+
8008,
61713+
3000,
61714+
8443
61715+
],
61716+
"autofilter_services": [
61717+
"http",
61718+
"https"
61719+
],
61720+
"targets": [
61721+
"Python payload",
61722+
"Linux Command"
61723+
],
61724+
"mod_time": "2025-04-22 21:57:05 +0000",
61725+
"path": "/modules/exploits/linux/http/bentoml_runner_server_rce_cve_2025_32375.rb",
61726+
"is_install_path": true,
61727+
"ref_name": "linux/http/bentoml_runner_server_rce_cve_2025_32375",
61728+
"check": true,
61729+
"post_auth": false,
61730+
"default_credential": false,
61731+
"notes": {
61732+
"Stability": [
61733+
"crash-safe"
61734+
],
61735+
"SideEffects": [
61736+
"ioc-in-logs"
61737+
],
61738+
"Reliability": [
61739+
"repeatable-session"
61740+
]
61741+
},
61742+
"session_types": false,
61743+
"needs_cleanup": null
61744+
},
6168661745
"exploit_linux/http/beyondtrust_pra_rs_unauth_rce": {
6168761746
"name": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) unauthenticated Remote Code Execution",
6168861747
"fullname": "exploit/linux/http/beyondtrust_pra_rs_unauth_rce",

0 commit comments

Comments
 (0)