Skip to content

Commit 38b3dad

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 641ab52 commit 38b3dad

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133630,6 +133630,66 @@
133630133630
"session_types": false,
133631133631
"needs_cleanup": null
133632133632
},
133633+
"exploit_unix/http/freepbx_custom_extension_rce": {
133634+
"name": "FreePBX endpoint SQLi to RCE",
133635+
"fullname": "exploit/unix/http/freepbx_custom_extension_rce",
133636+
"aliases": [],
133637+
"rank": 600,
133638+
"disclosure_date": "2025-12-11",
133639+
"type": "exploit",
133640+
"author": [
133641+
"Noah King",
133642+
"msutovsky-r7"
133643+
],
133644+
"description": "FreePBX is an open-source IP PBX management tool that provides a modern phone system for businesses that use\n VoIP to make and receive phone calls. Versions before 16.0.44 and 17.0.23 are vulnerable to CVE-2025-66039,\n while versions before 16.0.92 and 17.0.6 are vulnerable to CVE-2025-61675. The former represents an\n authentication bypass: when FreePBX uses Webserver Authorization Mode (an option the admin can enable), it\n allows an attacker to authenticate as any user. The latter CVE describes multiple SQL injections; this module\n exploits the SQL injection in the custom extension component. The module chains these vulnerabilities into an\n unauthenticated SQL injection attack and gains remote code execution by injecting an SQL record into th\n cron_jobs table. The cron_jobs database contains cron tasks that FreePBX executes in the context of the\n operating system.",
133645+
"references": [
133646+
"CVE-2025-66039",
133647+
"CVE-2025-61675",
133648+
"URL-https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/"
133649+
],
133650+
"platform": "Linux",
133651+
"arch": "cmd",
133652+
"rport": 80,
133653+
"autofilter_ports": [
133654+
80,
133655+
8080,
133656+
443,
133657+
8000,
133658+
8888,
133659+
8880,
133660+
8008,
133661+
3000,
133662+
8443
133663+
],
133664+
"autofilter_services": [
133665+
"http",
133666+
"https"
133667+
],
133668+
"targets": [
133669+
"Unix Command"
133670+
],
133671+
"mod_time": "2026-01-28 20:15:25 +0000",
133672+
"path": "/modules/exploits/unix/http/freepbx_custom_extension_rce.rb",
133673+
"is_install_path": true,
133674+
"ref_name": "unix/http/freepbx_custom_extension_rce",
133675+
"check": true,
133676+
"post_auth": true,
133677+
"default_credential": false,
133678+
"notes": {
133679+
"Stability": [
133680+
"crash-safe"
133681+
],
133682+
"Reliability": [
133683+
"repeatable-session"
133684+
],
133685+
"SideEffects": [
133686+
"artifacts-on-disk",
133687+
"ioc-in-logs"
133688+
]
133689+
},
133690+
"session_types": false,
133691+
"needs_cleanup": null
133692+
},
133633133693
"exploit_unix/http/freepbx_firmware_file_upload": {
133634133694
"name": "FreePBX firmware file upload",
133635133695
"fullname": "exploit/unix/http/freepbx_firmware_file_upload",

0 commit comments

Comments
 (0)