Skip to content

Commit 0a1cbf1

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 05f2012 commit 0a1cbf1

File tree

1 file changed

+169
-0
lines changed

1 file changed

+169
-0
lines changed

db/modules_metadata_base.json

Lines changed: 169 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46724,6 +46724,117 @@
4672446724
"needs_cleanup": false,
4672546725
"actions": []
4672646726
},
46727+
"auxiliary_scanner/http/xorcom_completepbx_diagnostics_file_read": {
46728+
"name": "Xorcom CompletePBX Arbitrary File Read and Deletion via systemDataFileName",
46729+
"fullname": "auxiliary/scanner/http/xorcom_completepbx_diagnostics_file_read",
46730+
"aliases": [],
46731+
"rank": 300,
46732+
"disclosure_date": "2025-03-02",
46733+
"type": "auxiliary",
46734+
"author": [
46735+
"Valentin Lobstein"
46736+
],
46737+
"description": "This module exploits an authenticated path traversal vulnerability in\n Xorcom CompletePBX <= 5.2.35. The issue occurs due to improper validation of the\n `systemDataFileName` parameter in the `diagnostics` module, allowing authenticated attackers\n to retrieve arbitrary files from the system.\n\n Additionally, the exploitation of this vulnerability results in the **deletion** of the\n requested file from the target system.\n\n The vulnerability is identified as CVE-2025-30005.",
46738+
"references": [
46739+
"CVE-2025-30005",
46740+
"URL-https://xorcom.com/new-completepbx-release-5-2-36-1/",
46741+
"URL-https://chocapikk.com/posts/2025/completepbx/"
46742+
],
46743+
"platform": "",
46744+
"arch": "",
46745+
"rport": 80,
46746+
"autofilter_ports": [
46747+
80,
46748+
8080,
46749+
443,
46750+
8000,
46751+
8888,
46752+
8880,
46753+
8008,
46754+
3000,
46755+
8443
46756+
],
46757+
"autofilter_services": [
46758+
"http",
46759+
"https"
46760+
],
46761+
"targets": null,
46762+
"mod_time": "2025-07-16 22:59:48 +0000",
46763+
"path": "/modules/auxiliary/scanner/http/xorcom_completepbx_diagnostics_file_read.rb",
46764+
"is_install_path": true,
46765+
"ref_name": "scanner/http/xorcom_completepbx_diagnostics_file_read",
46766+
"check": true,
46767+
"post_auth": true,
46768+
"default_credential": false,
46769+
"notes": {
46770+
"Stability": [
46771+
"crash-safe",
46772+
"os-resource-loss"
46773+
],
46774+
"SideEffects": [
46775+
"ioc-in-logs"
46776+
],
46777+
"Reliability": []
46778+
},
46779+
"session_types": false,
46780+
"needs_cleanup": false,
46781+
"actions": []
46782+
},
46783+
"auxiliary_scanner/http/xorcom_completepbx_file_disclosure": {
46784+
"name": "Xorcom CompletePBX Authenticated File Disclosure via Backup Download",
46785+
"fullname": "auxiliary/scanner/http/xorcom_completepbx_file_disclosure",
46786+
"aliases": [],
46787+
"rank": 300,
46788+
"disclosure_date": "2025-03-02",
46789+
"type": "auxiliary",
46790+
"author": [
46791+
"Valentin Lobstein"
46792+
],
46793+
"description": "This module exploits an authenticated file disclosure vulnerability in CompletePBX <= 5.2.35.\n The issue resides in the backup download function, where user input is not properly validated,\n allowing an attacker to access arbitrary files on the system as root.\n\n The vulnerability is triggered by setting the `backup` parameter to a Base64-encoded\n absolute file path, prefixed by a comma `,`. This results in the server exposing the\n file contents directly.",
46794+
"references": [
46795+
"CVE-2025-2292",
46796+
"URL-https://xorcom.com/new-completepbx-release-5-2-36-1/",
46797+
"URL-https://chocapikk.com/posts/2025/completepbx/"
46798+
],
46799+
"platform": "Linux,Unix",
46800+
"arch": "",
46801+
"rport": 80,
46802+
"autofilter_ports": [
46803+
80,
46804+
8080,
46805+
443,
46806+
8000,
46807+
8888,
46808+
8880,
46809+
8008,
46810+
3000,
46811+
8443
46812+
],
46813+
"autofilter_services": [
46814+
"http",
46815+
"https"
46816+
],
46817+
"targets": null,
46818+
"mod_time": "2025-07-16 22:59:48 +0000",
46819+
"path": "/modules/auxiliary/scanner/http/xorcom_completepbx_file_disclosure.rb",
46820+
"is_install_path": true,
46821+
"ref_name": "scanner/http/xorcom_completepbx_file_disclosure",
46822+
"check": true,
46823+
"post_auth": true,
46824+
"default_credential": false,
46825+
"notes": {
46826+
"Stability": [
46827+
"crash-safe"
46828+
],
46829+
"SideEffects": [
46830+
"ioc-in-logs"
46831+
],
46832+
"Reliability": []
46833+
},
46834+
"session_types": false,
46835+
"needs_cleanup": false,
46836+
"actions": []
46837+
},
4672746838
"auxiliary_scanner/http/xpath": {
4672846839
"name": "HTTP Blind XPATH 1.0 Injector",
4672946840
"fullname": "auxiliary/scanner/http/xpath",
@@ -87125,6 +87236,64 @@
8712587236
"session_types": false,
8712687237
"needs_cleanup": null
8712787238
},
87239+
"exploit_linux/http/xorcom_completepbx_scheduler": {
87240+
"name": "Xorcom CompletePBX Authenticated Command Injection via Task Scheduler",
87241+
"fullname": "exploit/linux/http/xorcom_completepbx_scheduler",
87242+
"aliases": [],
87243+
"rank": 600,
87244+
"disclosure_date": "2025-03-02",
87245+
"type": "exploit",
87246+
"author": [
87247+
"Valentin Lobstein"
87248+
],
87249+
"description": "This module exploits an authenticated command injection vulnerability in Xorcom CompletePBX\n versions <= 5.2.35. The issue resides in the task scheduler functionality, where user-controlled\n input is improperly sanitized, allowing arbitrary command execution with web server privileges.\n\n Only the superadmin user (admin) has the necessary permissions to trigger this exploit.\n Even when creating a new user with maximum privileges, the vulnerability does not work.",
87250+
"references": [
87251+
"CVE-2025-30004",
87252+
"URL-https://xorcom.com/new-completepbx-release-5-2-36-1/",
87253+
"URL-https://chocapikk.com/posts/2025/completepbx/"
87254+
],
87255+
"platform": "Linux,Unix",
87256+
"arch": "cmd",
87257+
"rport": 80,
87258+
"autofilter_ports": [
87259+
80,
87260+
8080,
87261+
443,
87262+
8000,
87263+
8888,
87264+
8880,
87265+
8008,
87266+
3000,
87267+
8443
87268+
],
87269+
"autofilter_services": [
87270+
"http",
87271+
"https"
87272+
],
87273+
"targets": [
87274+
"Unix/Linux Command Shell"
87275+
],
87276+
"mod_time": "2025-07-16 22:59:48 +0000",
87277+
"path": "/modules/exploits/linux/http/xorcom_completepbx_scheduler.rb",
87278+
"is_install_path": true,
87279+
"ref_name": "linux/http/xorcom_completepbx_scheduler",
87280+
"check": true,
87281+
"post_auth": true,
87282+
"default_credential": false,
87283+
"notes": {
87284+
"Stability": [
87285+
"crash-safe"
87286+
],
87287+
"Reliability": [
87288+
"repeatable-session"
87289+
],
87290+
"SideEffects": [
87291+
"ioc-in-logs"
87292+
]
87293+
},
87294+
"session_types": false,
87295+
"needs_cleanup": null
87296+
},
8712887297
"exploit_linux/http/xplico_exec": {
8712987298
"name": "Xplico Remote Code Execution",
8713087299
"fullname": "exploit/linux/http/xplico_exec",

0 commit comments

Comments
 (0)