Skip to content

Commit 23f6420

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent be4a69a commit 23f6420

File tree

1 file changed

+116
-0
lines changed

1 file changed

+116
-0
lines changed

db/modules_metadata_base.json

Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22967,6 +22967,62 @@
2296722967
"needs_cleanup": false,
2296822968
"actions": []
2296922969
},
22970+
"auxiliary_gather/freepbx_custom_extension_injection": {
22971+
"name": "FreePBX Custom Extension SQL Injection",
22972+
"fullname": "auxiliary/gather/freepbx_custom_extension_injection",
22973+
"aliases": [],
22974+
"rank": 300,
22975+
"disclosure_date": "2025-12-11",
22976+
"type": "auxiliary",
22977+
"author": [
22978+
"Noah King",
22979+
"msutovsky-r7"
22980+
],
22981+
"description": "FreePBX versions prior to 16.0.44,16.0.92 and 17.0.23,17.0.6 are vulnerable to multiple CVEs, specifically CVE-2025-66039 and CVE-2025-61675, in the context of this module. The versions before 16.0.44 and 17.0.23 are vulnerable to CVE-2025-66039, while versions before 16.0.92 and 17.0.6 are vulnerable to CVE-2025-61675. The former represents an authentication bypass: when FreePBX uses Webserver Authorization Mode (an option the admin can enable), it allows an attacker to authenticate as any user. The latter CVE describes multiple SQL injections; this module exploits the SQL injection in the custom extension component. The module chains these vulnerabilities into an unauthenticated SQL injection attack that creates a new administrative user.",
22982+
"references": [
22983+
"CVE-2025-66039",
22984+
"CVE-2025-61675",
22985+
"URL-https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/"
22986+
],
22987+
"platform": "",
22988+
"arch": "",
22989+
"rport": 80,
22990+
"autofilter_ports": [
22991+
80,
22992+
8080,
22993+
443,
22994+
8000,
22995+
8888,
22996+
8880,
22997+
8008,
22998+
3000,
22999+
8443
23000+
],
23001+
"autofilter_services": [
23002+
"http",
23003+
"https"
23004+
],
23005+
"targets": null,
23006+
"mod_time": "2026-01-28 11:14:24 +0000",
23007+
"path": "/modules/auxiliary/gather/freepbx_custom_extension_injection.rb",
23008+
"is_install_path": true,
23009+
"ref_name": "gather/freepbx_custom_extension_injection",
23010+
"check": true,
23011+
"post_auth": true,
23012+
"default_credential": false,
23013+
"notes": {
23014+
"Stability": [
23015+
"crash-safe"
23016+
],
23017+
"Reliability": [],
23018+
"SideEffects": [
23019+
"ioc-in-logs"
23020+
]
23021+
},
23022+
"session_types": false,
23023+
"needs_cleanup": false,
23024+
"actions": []
23025+
},
2297023026
"auxiliary_gather/geoserver_wms_getmap_xxe_file_read": {
2297123027
"name": "GeoServer WMS GetMap XXE Arbitrary File Read",
2297223028
"fullname": "auxiliary/gather/geoserver_wms_getmap_xxe_file_read",
@@ -133574,6 +133630,66 @@
133574133630
"session_types": false,
133575133631
"needs_cleanup": null
133576133632
},
133633+
"exploit_unix/http/freepbx_firmware_file_upload": {
133634+
"name": "FreePBX firmware file upload",
133635+
"fullname": "exploit/unix/http/freepbx_firmware_file_upload",
133636+
"aliases": [],
133637+
"rank": 600,
133638+
"disclosure_date": "2025-12-11",
133639+
"type": "exploit",
133640+
"author": [
133641+
"Noah King",
133642+
"msutovsky-r7"
133643+
],
133644+
"description": "The FreePBX versions prior to 16.0.44,16.0.92 and 17.0.6,17.0.23 are vulnerable to multiple CVEs, specifically CVE-2025-66039 and CVE-2025-61678, in the context of this module. The versions before 16.0.44 and 17.0.23 are vulnerable to CVE-2025-66039, while versions before 16.0.92 and 17.0.6 are vulnerable to CVE-2025-61678. The former represents an authentication bypass: when FreePBX uses Webserver Authorization Mode (an option the admin can enable), it allows an attacker to authenticate as any user. The latter allows unrestricted file uploads via firmware upload, including path traversal. These vulnerabilities allow unauthenticated remote code execution by bypassing authentication and placing a webshell in the web server's directory.",
133645+
"references": [
133646+
"CVE-2025-66039",
133647+
"CVE-2025-61678",
133648+
"URL-https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/"
133649+
],
133650+
"platform": "PHP",
133651+
"arch": "php",
133652+
"rport": 80,
133653+
"autofilter_ports": [
133654+
80,
133655+
8080,
133656+
443,
133657+
8000,
133658+
8888,
133659+
8880,
133660+
8008,
133661+
3000,
133662+
8443
133663+
],
133664+
"autofilter_services": [
133665+
"http",
133666+
"https"
133667+
],
133668+
"targets": [
133669+
"PHP"
133670+
],
133671+
"mod_time": "2026-01-28 06:08:47 +0000",
133672+
"path": "/modules/exploits/unix/http/freepbx_firmware_file_upload.rb",
133673+
"is_install_path": true,
133674+
"ref_name": "unix/http/freepbx_firmware_file_upload",
133675+
"check": true,
133676+
"post_auth": true,
133677+
"default_credential": false,
133678+
"notes": {
133679+
"Stability": [
133680+
"crash-safe"
133681+
],
133682+
"Reliability": [
133683+
"repeatable-session"
133684+
],
133685+
"SideEffects": [
133686+
"artifacts-on-disk",
133687+
"ioc-in-logs"
133688+
]
133689+
},
133690+
"session_types": false,
133691+
"needs_cleanup": true
133692+
},
133577133693
"exploit_unix/http/freepbx_unauth_sqli_to_rce": {
133578133694
"name": "FreePBX ajax.php unauthenticated SQLi to RCE",
133579133695
"fullname": "exploit/unix/http/freepbx_unauth_sqli_to_rce",

0 commit comments

Comments
 (0)