Skip to content

Commit 31b9dcd

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent c99702c commit 31b9dcd

File tree

1 file changed

+57
-0
lines changed

1 file changed

+57
-0
lines changed

db/modules_metadata_base.json

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75362,6 +75362,63 @@
7536275362
"session_types": false,
7536375363
"needs_cleanup": null
7536475364
},
75365+
"exploit_linux/http/ictbroadcast_unauth_cookie": {
75366+
"name": "ICTBroadcast Unauthenticated Remote Code Execution",
75367+
"fullname": "exploit/linux/http/ictbroadcast_unauth_cookie",
75368+
"aliases": [],
75369+
"rank": 600,
75370+
"disclosure_date": "2025-03-19",
75371+
"type": "exploit",
75372+
"author": [
75373+
"Valentin Lobstein"
75374+
],
75375+
"description": "This module exploits an unauthenticated remote code execution (RCE) vulnerability\n in ICTBroadcast. The vulnerability exists in the way session cookies are handled\n and processed, allowing an attacker to inject arbitrary system commands.",
75376+
"references": [
75377+
"URL-https://www.ictbroadcast.com/",
75378+
"CVE-2025-2611"
75379+
],
75380+
"platform": "Linux,Unix",
75381+
"arch": "cmd",
75382+
"rport": 80,
75383+
"autofilter_ports": [
75384+
80,
75385+
8080,
75386+
443,
75387+
8000,
75388+
8888,
75389+
8880,
75390+
8008,
75391+
3000,
75392+
8443
75393+
],
75394+
"autofilter_services": [
75395+
"http",
75396+
"https"
75397+
],
75398+
"targets": [
75399+
"Unix/Linux Command Shell"
75400+
],
75401+
"mod_time": "2025-08-04 17:53:29 +0000",
75402+
"path": "/modules/exploits/linux/http/ictbroadcast_unauth_cookie.rb",
75403+
"is_install_path": true,
75404+
"ref_name": "linux/http/ictbroadcast_unauth_cookie",
75405+
"check": true,
75406+
"post_auth": false,
75407+
"default_credential": false,
75408+
"notes": {
75409+
"Stability": [
75410+
"crash-safe"
75411+
],
75412+
"Reliability": [
75413+
"repeatable-session"
75414+
],
75415+
"SideEffects": [
75416+
"ioc-in-logs"
75417+
]
75418+
},
75419+
"session_types": false,
75420+
"needs_cleanup": null
75421+
},
7536575422
"exploit_linux/http/imperva_securesphere_exec": {
7536675423
"name": "Imperva SecureSphere PWS Command Injection",
7536775424
"fullname": "exploit/linux/http/imperva_securesphere_exec",

0 commit comments

Comments
 (0)