Skip to content

Commit cc4dad3

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 5505bb5 commit cc4dad3

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155562,6 +155562,66 @@
155562155562
"session_types": false,
155563155563
"needs_cleanup": null
155564155564
},
155565+
"exploit_windows/http/sitecore_xp_cve_2025_27218": {
155566+
"name": "Sitecore CVE-2025-27218 BinaryFormatter Deserialization Exploit",
155567+
"fullname": "exploit/windows/http/sitecore_xp_cve_2025_27218",
155568+
"aliases": [],
155569+
"rank": 600,
155570+
"disclosure_date": "2025-01-06",
155571+
"type": "exploit",
155572+
"author": [
155573+
"Dylan Pindur",
155574+
"machang-r7"
155575+
],
155576+
"description": "This module exploits a .NET deserialization vulnerability in Sitecore Experience Manager (XM) and Experience\n Platform (XP) 10.4 by injecting a malicious Base64-encoded BinaryFormatter payload into an HTTP header.",
155577+
"references": [
155578+
"CVE-2025-27218",
155579+
"URL-https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003535",
155580+
"URL-https://attackerkb.com/topics/Dyo4zUm2tv/cve-2025-27218"
155581+
],
155582+
"platform": "Windows",
155583+
"arch": "x86, x64, cmd",
155584+
"rport": 443,
155585+
"autofilter_ports": [
155586+
80,
155587+
8080,
155588+
443,
155589+
8000,
155590+
8888,
155591+
8880,
155592+
8008,
155593+
3000,
155594+
8443
155595+
],
155596+
"autofilter_services": [
155597+
"http",
155598+
"https"
155599+
],
155600+
"targets": [
155601+
"Windows Command",
155602+
"PowerShell Stager"
155603+
],
155604+
"mod_time": "2025-03-27 09:36:10 +0000",
155605+
"path": "/modules/exploits/windows/http/sitecore_xp_cve_2025_27218.rb",
155606+
"is_install_path": true,
155607+
"ref_name": "windows/http/sitecore_xp_cve_2025_27218",
155608+
"check": true,
155609+
"post_auth": false,
155610+
"default_credential": false,
155611+
"notes": {
155612+
"Stability": [
155613+
"crash-safe"
155614+
],
155615+
"Reliability": [
155616+
"repeatable-session"
155617+
],
155618+
"SideEffects": [
155619+
"ioc-in-logs"
155620+
]
155621+
},
155622+
"session_types": false,
155623+
"needs_cleanup": null
155624+
},
155565155625
"exploit_windows/http/smartermail_rce": {
155566155626
"name": "SmarterTools SmarterMail less than build 6985 - .NET Deserialization Remote Code Execution",
155567155627
"fullname": "exploit/windows/http/smartermail_rce",

0 commit comments

Comments
 (0)