Skip to content

Commit ca013ca

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 0600de2 commit ca013ca

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95686,6 +95686,66 @@
9568695686
"session_types": false,
9568795687
"needs_cleanup": true
9568895688
},
95689+
"exploit_multi/http/clinic_pms_sqli_to_rce": {
95690+
"name": "Clinic's Patient Management System 1.0 - Unauthenticated RCE",
95691+
"fullname": "exploit/multi/http/clinic_pms_sqli_to_rce",
95692+
"aliases": [],
95693+
"rank": 600,
95694+
"disclosure_date": "2025-01-04",
95695+
"type": "exploit",
95696+
"author": [
95697+
"msutovsky-r7",
95698+
"Ashish Kumar"
95699+
],
95700+
"description": "This module exploits an SQL injection in login portal, which allows to log in as admin. Next, it allows the attacker to upload malicious files through user modification to achieve RCE.",
95701+
"references": [
95702+
"CVE-2022-2297",
95703+
"CVE-2025-3096",
95704+
"URL-https://www.cve.org/CVERecord?id=CVE-2022-40471"
95705+
],
95706+
"platform": "PHP",
95707+
"arch": "php",
95708+
"rport": 80,
95709+
"autofilter_ports": [
95710+
80,
95711+
8080,
95712+
443,
95713+
8000,
95714+
8888,
95715+
8880,
95716+
8008,
95717+
3000,
95718+
8443
95719+
],
95720+
"autofilter_services": [
95721+
"http",
95722+
"https"
95723+
],
95724+
"targets": [
95725+
"Clinic Patient Management System 2.0"
95726+
],
95727+
"mod_time": "2025-05-21 09:05:41 +0000",
95728+
"path": "/modules/exploits/multi/http/clinic_pms_sqli_to_rce.rb",
95729+
"is_install_path": true,
95730+
"ref_name": "multi/http/clinic_pms_sqli_to_rce",
95731+
"check": true,
95732+
"post_auth": false,
95733+
"default_credential": false,
95734+
"notes": {
95735+
"Stability": [
95736+
"crash-safe"
95737+
],
95738+
"Reliability": [
95739+
"repeatable-session"
95740+
],
95741+
"SideEffects": [
95742+
"artifacts-on-disk",
95743+
"ioc-in-logs"
95744+
]
95745+
},
95746+
"session_types": false,
95747+
"needs_cleanup": true
95748+
},
9568995749
"exploit_multi/http/clipbucket_fileupload_exec": {
9569095750
"name": "ClipBucket beats_uploader Unauthenticated Arbitrary File Upload",
9569195751
"fullname": "exploit/multi/http/clipbucket_fileupload_exec",

0 commit comments

Comments
 (0)