Skip to content

Commit 3e882a3

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent e59a248 commit 3e882a3

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86902,6 +86902,66 @@
8690286902
"session_types": false,
8690386903
"needs_cleanup": null
8690486904
},
86905+
"exploit_linux/http/wazuh_auth_rce_cve_2025_24016": {
86906+
"name": "Wazuh server remote code execution caused by an unsafe deserialization vulnerability.",
86907+
"fullname": "exploit/linux/http/wazuh_auth_rce_cve_2025_24016",
86908+
"aliases": [],
86909+
"rank": 600,
86910+
"disclosure_date": "2025-02-10",
86911+
"type": "exploit",
86912+
"author": [
86913+
"h00die-gr3y <[email protected]>",
86914+
"DanielFi https://github.com/DanielFi"
86915+
],
86916+
"description": "Wazuh is a free and open source platform used for threat prevention, detection, and response.\n Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability\n allows for remote code execution on Wazuh servers. DistributedAPI parameters are serialized\n as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`).\n If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can\n forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code.\n The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh\n servers in the cluster) or, in certain configurations, even by a compromised agent.",
86917+
"references": [
86918+
"CVE-2025-24016",
86919+
"URL-https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh",
86920+
"URL-https://attackerkb.com/topics/piW0q4r5Uy/cve-2025-24016"
86921+
],
86922+
"platform": "Linux,Unix",
86923+
"arch": "cmd",
86924+
"rport": 55000,
86925+
"autofilter_ports": [
86926+
80,
86927+
8080,
86928+
443,
86929+
8000,
86930+
8888,
86931+
8880,
86932+
8008,
86933+
3000,
86934+
8443
86935+
],
86936+
"autofilter_services": [
86937+
"http",
86938+
"https"
86939+
],
86940+
"targets": [
86941+
"Unix/Linux Command"
86942+
],
86943+
"mod_time": "2025-07-30 20:24:56 +0000",
86944+
"path": "/modules/exploits/linux/http/wazuh_auth_rce_cve_2025_24016.rb",
86945+
"is_install_path": true,
86946+
"ref_name": "linux/http/wazuh_auth_rce_cve_2025_24016",
86947+
"check": true,
86948+
"post_auth": true,
86949+
"default_credential": false,
86950+
"notes": {
86951+
"Stability": [
86952+
"crash-safe"
86953+
],
86954+
"SideEffects": [
86955+
"artifacts-on-disk",
86956+
"ioc-in-logs"
86957+
],
86958+
"Reliability": [
86959+
"repeatable-session"
86960+
]
86961+
},
86962+
"session_types": false,
86963+
"needs_cleanup": null
86964+
},
8690586965
"exploit_linux/http/wd_mycloud_multiupload_upload": {
8690686966
"name": "Western Digital MyCloud multi_uploadify File Upload Vulnerability",
8690786967
"fullname": "exploit/linux/http/wd_mycloud_multiupload_upload",

0 commit comments

Comments
 (0)