Skip to content

Commit 32559a3

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent ffdfa07 commit 32559a3

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75433,6 +75433,67 @@
7543375433
"session_types": false,
7543475434
"needs_cleanup": null
7543575435
},
75436+
"exploit_linux/http/ispconfig_lang_edit_php_code_injection": {
75437+
"name": "ISPConfig language_edit.php PHP Code Injection",
75438+
"fullname": "exploit/linux/http/ispconfig_lang_edit_php_code_injection",
75439+
"aliases": [],
75440+
"rank": 600,
75441+
"disclosure_date": "2023-10-24",
75442+
"type": "exploit",
75443+
"author": [
75444+
"syfi",
75445+
"Egidio Romano"
75446+
],
75447+
"description": "This module exploits a PHP code injection vulnerability in ISPConfig's\n language_edit.php file. The vulnerability occurs when the `admin_allow_langedit`\n setting is enabled, allowing authenticated administrators to inject arbitrary\n PHP code through the language editor interface.\n\n This module will automatically check if the required `admin_allow_langedit`\n permission is enabled, and attempt to enable it if it's disabled (requires\n admin credentials with system configuration access).\n\n The exploit works by injecting a PHP payload into a language file, which\n is then executed when the file is accessed. The payload is base64 encoded\n and written using PHP's file_put_contents function.",
75448+
"references": [
75449+
"CVE-2023-46818",
75450+
"URL-https://github.com/SyFi/CVE-2023-46818",
75451+
"URL-https://karmainsecurity.com/KIS-2023-13",
75452+
"URL-https://karmainsecurity.com/pocs/CVE-2023-46818.php"
75453+
],
75454+
"platform": "PHP",
75455+
"arch": "php",
75456+
"rport": 80,
75457+
"autofilter_ports": [
75458+
80,
75459+
8080,
75460+
443,
75461+
8000,
75462+
8888,
75463+
8880,
75464+
8008,
75465+
3000,
75466+
8443
75467+
],
75468+
"autofilter_services": [
75469+
"http",
75470+
"https"
75471+
],
75472+
"targets": [
75473+
"Automatic PHP"
75474+
],
75475+
"mod_time": "2025-07-07 11:54:28 +0000",
75476+
"path": "/modules/exploits/linux/http/ispconfig_lang_edit_php_code_injection.rb",
75477+
"is_install_path": true,
75478+
"ref_name": "linux/http/ispconfig_lang_edit_php_code_injection",
75479+
"check": true,
75480+
"post_auth": true,
75481+
"default_credential": false,
75482+
"notes": {
75483+
"Stability": [
75484+
"crash-safe"
75485+
],
75486+
"Reliability": [
75487+
"repeatable-session"
75488+
],
75489+
"SideEffects": [
75490+
"ioc-in-logs",
75491+
"config-changes"
75492+
]
75493+
},
75494+
"session_types": false,
75495+
"needs_cleanup": null
75496+
},
7543675497
"exploit_linux/http/ivanti_connect_secure_rce_cve_2023_46805": {
7543775498
"name": "Ivanti Connect Secure Unauthenticated Remote Code Execution",
7543875499
"fullname": "exploit/linux/http/ivanti_connect_secure_rce_cve_2023_46805",

0 commit comments

Comments
 (0)