Skip to content

Commit 4130c61

Browse files
committed
automatic module_metadata_base.json update
1 parent bed067d commit 4130c61

File tree

1 file changed

+12
-11
lines changed

1 file changed

+12
-11
lines changed

db/modules_metadata_base.json

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -60575,11 +60575,11 @@
6057560575
"session_types": false,
6057660576
"needs_cleanup": null
6057760577
},
60578-
"exploit_linux/http/grandstream_gxv3175_settimezone_unauth_cmd_exec": {
60579-
"name": "Grandstream GXV3175 'settimezone' Unauthenticated Command Execution",
60580-
"fullname": "exploit/linux/http/grandstream_gxv3175_settimezone_unauth_cmd_exec",
60578+
"exploit_linux/http/grandstream_gxv31xx_settimezone_unauth_cmd_exec": {
60579+
"name": "Grandstream GXV31XX 'settimezone' Unauthenticated Command Execution",
60580+
"fullname": "exploit/linux/http/grandstream_gxv31xx_settimezone_unauth_cmd_exec",
6058160581
"aliases": [
60582-
60582+
"exploit/linux/http/grandstream_gxv3175_settimezone_unauth_cmd_exec"
6058360583
],
6058460584
"rank": 500,
6058560585
"disclosure_date": "2016-09-01",
@@ -60589,14 +60589,14 @@
6058960589
"Brendan Scarvell",
6059060590
"bcoles <[email protected]>"
6059160591
],
60592-
"description": "This module exploits a command injection vulnerability in Grandstream GXV3175\n IP multimedia phones. The 'settimezone' action does not validate input in the\n 'timezone' parameter allowing injection of arbitrary commands.\n\n A buffer overflow in the 'phonecookie' cookie parsing allows authentication\n to be bypassed by providing an alphanumeric cookie 93 characters in length.\n\n This module was tested successfully on Grandstream GXV3175v2\n hardware revision V2.6A with firmware version 1.0.1.19.",
60592+
"description": "This module exploits a command injection vulnerability in Grandstream GXV31XX\n IP multimedia phones. The 'settimezone' action does not validate input in the\n 'timezone' parameter allowing injection of arbitrary commands.\n\n A buffer overflow in the 'phonecookie' cookie parsing allows authentication\n to be bypassed by providing an alphanumeric cookie 93 characters in length.\n\n This module was tested successfully on Grandstream models:\n GXV3175v2 hardware revision V2.6A with firmware version 1.0.1.19; and\n GXV3140 hardware revision V0.4B with firmware version 1.0.1.27.",
6059360593
"references": [
6059460594
"CVE-2019-10655",
6059560595
"URL-https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920",
6059660596
"URL-https://github.com/dirtyfilthy/gxv3175-remote-code-exec/blob/master/modules/exploits/linux/http/grandstream_gxv3175_cmd_exec.rb"
6059760597
],
60598-
"platform": "Linux",
60599-
"arch": "armle",
60598+
"platform": "Linux,Unix",
60599+
"arch": "",
6060060600
"rport": 80,
6060160601
"autofilter_ports": [
6060260602
80,
@@ -60614,12 +60614,13 @@
6061460614
"https"
6061560615
],
6061660616
"targets": [
60617-
"Automatic"
60617+
"Linux (cmd)",
60618+
"Linux (ARMLE)"
6061860619
],
60619-
"mod_time": "2022-01-19 00:04:15 +0000",
60620-
"path": "/modules/exploits/linux/http/grandstream_gxv3175_settimezone_unauth_cmd_exec.rb",
60620+
"mod_time": "2022-01-29 19:38:57 +0000",
60621+
"path": "/modules/exploits/linux/http/grandstream_gxv31xx_settimezone_unauth_cmd_exec.rb",
6062160622
"is_install_path": true,
60622-
"ref_name": "linux/http/grandstream_gxv3175_settimezone_unauth_cmd_exec",
60623+
"ref_name": "linux/http/grandstream_gxv31xx_settimezone_unauth_cmd_exec",
6062360624
"check": true,
6062460625
"post_auth": false,
6062560626
"default_credential": false,

0 commit comments

Comments
 (0)