|
22967 | 22967 | "needs_cleanup": false, |
22968 | 22968 | "actions": [] |
22969 | 22969 | }, |
| 22970 | + "auxiliary_gather/freepbx_custom_extension_injection": { |
| 22971 | + "name": "FreePBX Custom Extension SQL Injection", |
| 22972 | + "fullname": "auxiliary/gather/freepbx_custom_extension_injection", |
| 22973 | + "aliases": [], |
| 22974 | + "rank": 300, |
| 22975 | + "disclosure_date": "2025-12-11", |
| 22976 | + "type": "auxiliary", |
| 22977 | + "author": [ |
| 22978 | + "Noah King", |
| 22979 | + "msutovsky-r7" |
| 22980 | + ], |
| 22981 | + "description": "FreePBX versions prior to 16.0.44,16.0.92 and 17.0.23,17.0.6 are vulnerable to multiple CVEs, specifically CVE-2025-66039 and CVE-2025-61675, in the context of this module. The versions before 16.0.44 and 17.0.23 are vulnerable to CVE-2025-66039, while versions before 16.0.92 and 17.0.6 are vulnerable to CVE-2025-61675. The former represents an authentication bypass: when FreePBX uses Webserver Authorization Mode (an option the admin can enable), it allows an attacker to authenticate as any user. The latter CVE describes multiple SQL injections; this module exploits the SQL injection in the custom extension component. The module chains these vulnerabilities into an unauthenticated SQL injection attack that creates a new administrative user.", |
| 22982 | + "references": [ |
| 22983 | + "CVE-2025-66039", |
| 22984 | + "CVE-2025-61675", |
| 22985 | + "URL-https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/" |
| 22986 | + ], |
| 22987 | + "platform": "", |
| 22988 | + "arch": "", |
| 22989 | + "rport": 80, |
| 22990 | + "autofilter_ports": [ |
| 22991 | + 80, |
| 22992 | + 8080, |
| 22993 | + 443, |
| 22994 | + 8000, |
| 22995 | + 8888, |
| 22996 | + 8880, |
| 22997 | + 8008, |
| 22998 | + 3000, |
| 22999 | + 8443 |
| 23000 | + ], |
| 23001 | + "autofilter_services": [ |
| 23002 | + "http", |
| 23003 | + "https" |
| 23004 | + ], |
| 23005 | + "targets": null, |
| 23006 | + "mod_time": "2026-01-28 11:14:24 +0000", |
| 23007 | + "path": "/modules/auxiliary/gather/freepbx_custom_extension_injection.rb", |
| 23008 | + "is_install_path": true, |
| 23009 | + "ref_name": "gather/freepbx_custom_extension_injection", |
| 23010 | + "check": true, |
| 23011 | + "post_auth": true, |
| 23012 | + "default_credential": false, |
| 23013 | + "notes": { |
| 23014 | + "Stability": [ |
| 23015 | + "crash-safe" |
| 23016 | + ], |
| 23017 | + "Reliability": [], |
| 23018 | + "SideEffects": [ |
| 23019 | + "ioc-in-logs" |
| 23020 | + ] |
| 23021 | + }, |
| 23022 | + "session_types": false, |
| 23023 | + "needs_cleanup": false, |
| 23024 | + "actions": [] |
| 23025 | + }, |
22970 | 23026 | "auxiliary_gather/geoserver_wms_getmap_xxe_file_read": { |
22971 | 23027 | "name": "GeoServer WMS GetMap XXE Arbitrary File Read", |
22972 | 23028 | "fullname": "auxiliary/gather/geoserver_wms_getmap_xxe_file_read", |
@@ -133574,6 +133630,66 @@ |
133574 | 133630 | "session_types": false, |
133575 | 133631 | "needs_cleanup": null |
133576 | 133632 | }, |
| 133633 | + "exploit_unix/http/freepbx_firmware_file_upload": { |
| 133634 | + "name": "FreePBX firmware file upload", |
| 133635 | + "fullname": "exploit/unix/http/freepbx_firmware_file_upload", |
| 133636 | + "aliases": [], |
| 133637 | + "rank": 600, |
| 133638 | + "disclosure_date": "2025-12-11", |
| 133639 | + "type": "exploit", |
| 133640 | + "author": [ |
| 133641 | + "Noah King", |
| 133642 | + "msutovsky-r7" |
| 133643 | + ], |
| 133644 | + "description": "The FreePBX versions prior to 16.0.44,16.0.92 and 17.0.6,17.0.23 are vulnerable to multiple CVEs, specifically CVE-2025-66039 and CVE-2025-61678, in the context of this module. The versions before 16.0.44 and 17.0.23 are vulnerable to CVE-2025-66039, while versions before 16.0.92 and 17.0.6 are vulnerable to CVE-2025-61678. The former represents an authentication bypass: when FreePBX uses Webserver Authorization Mode (an option the admin can enable), it allows an attacker to authenticate as any user. The latter allows unrestricted file uploads via firmware upload, including path traversal. These vulnerabilities allow unauthenticated remote code execution by bypassing authentication and placing a webshell in the web server's directory.", |
| 133645 | + "references": [ |
| 133646 | + "CVE-2025-66039", |
| 133647 | + "CVE-2025-61678", |
| 133648 | + "URL-https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/" |
| 133649 | + ], |
| 133650 | + "platform": "PHP", |
| 133651 | + "arch": "php", |
| 133652 | + "rport": 80, |
| 133653 | + "autofilter_ports": [ |
| 133654 | + 80, |
| 133655 | + 8080, |
| 133656 | + 443, |
| 133657 | + 8000, |
| 133658 | + 8888, |
| 133659 | + 8880, |
| 133660 | + 8008, |
| 133661 | + 3000, |
| 133662 | + 8443 |
| 133663 | + ], |
| 133664 | + "autofilter_services": [ |
| 133665 | + "http", |
| 133666 | + "https" |
| 133667 | + ], |
| 133668 | + "targets": [ |
| 133669 | + "PHP" |
| 133670 | + ], |
| 133671 | + "mod_time": "2026-01-28 06:08:47 +0000", |
| 133672 | + "path": "/modules/exploits/unix/http/freepbx_firmware_file_upload.rb", |
| 133673 | + "is_install_path": true, |
| 133674 | + "ref_name": "unix/http/freepbx_firmware_file_upload", |
| 133675 | + "check": true, |
| 133676 | + "post_auth": true, |
| 133677 | + "default_credential": false, |
| 133678 | + "notes": { |
| 133679 | + "Stability": [ |
| 133680 | + "crash-safe" |
| 133681 | + ], |
| 133682 | + "Reliability": [ |
| 133683 | + "repeatable-session" |
| 133684 | + ], |
| 133685 | + "SideEffects": [ |
| 133686 | + "artifacts-on-disk", |
| 133687 | + "ioc-in-logs" |
| 133688 | + ] |
| 133689 | + }, |
| 133690 | + "session_types": false, |
| 133691 | + "needs_cleanup": true |
| 133692 | + }, |
133577 | 133693 | "exploit_unix/http/freepbx_unauth_sqli_to_rce": { |
133578 | 133694 | "name": "FreePBX ajax.php unauthenticated SQLi to RCE", |
133579 | 133695 | "fullname": "exploit/unix/http/freepbx_unauth_sqli_to_rce", |
|
0 commit comments