Skip to content

Commit 5584a5a

Browse files
committed
automatic module_metadata_base.json update
1 parent c27412a commit 5584a5a

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147792,6 +147792,69 @@
147792147792
"session_types": false,
147793147793
"needs_cleanup": true
147794147794
},
147795+
"exploit_windows/http/ajaxpro_deserialization_rce": {
147796+
"name": "AjaxPro Deserialization Remote Code Execution",
147797+
"fullname": "exploit/windows/http/ajaxpro_deserialization_rce",
147798+
"aliases": [
147799+
147800+
],
147801+
"rank": 600,
147802+
"disclosure_date": "2021-12-03",
147803+
"type": "exploit",
147804+
"author": [
147805+
"Hans-Martin Münch (MOGWAI LABS)",
147806+
"Jemmy Wang"
147807+
],
147808+
"description": "This module leverages an insecure deserialization of data to get\n remote code execution on the target OS in the context of the user\n running the website which utilized AjaxPro.\n\n To achieve code execution, the module will construct some JSON data\n which will be sent to the target. This data will be deserialized by\n the AjaxPro JsonDeserializer and will trigger the execution of the\n payload.\n\n All AjaxPro versions prior to 21.10.30.1 are vulnerable to this\n issue, and a vulnerable method which can be used to trigger the\n deserialization exists in the default AjaxPro namespace.\n\n AjaxPro 21.10.30.1 removed the vulnerable method, but if a custom\n method that accepts a parameter of type that is assignable from\n `ObjectDataProvider` (e.g. `object`) exists, the vulnerability can\n still be exploited.\n\n This module has been tested successfully against official AjaxPro on\n version 7.7.31.1 without any modification, and on version 21.10.30.1\n with a custom vulnerable method added.",
147809+
"references": [
147810+
"CVE-2021-23758",
147811+
"URL-https://mogwailabs.de/en/blog/2022/01/vulnerability-spotlight-rce-in-ajax.net-professional/"
147812+
],
147813+
"platform": "Windows",
147814+
"arch": "cmd, x86, x64",
147815+
"rport": 80,
147816+
"autofilter_ports": [
147817+
80,
147818+
8080,
147819+
443,
147820+
8000,
147821+
8888,
147822+
8880,
147823+
8008,
147824+
3000,
147825+
8443
147826+
],
147827+
"autofilter_services": [
147828+
"http",
147829+
"https"
147830+
],
147831+
"targets": [
147832+
"Windows Command",
147833+
"Windows Dropper"
147834+
],
147835+
"mod_time": "2023-11-03 00:04:20 +0000",
147836+
"path": "/modules/exploits/windows/http/ajaxpro_deserialization_rce.rb",
147837+
"is_install_path": true,
147838+
"ref_name": "windows/http/ajaxpro_deserialization_rce",
147839+
"check": true,
147840+
"post_auth": false,
147841+
"default_credential": false,
147842+
"notes": {
147843+
"Stability": [
147844+
"crash-safe"
147845+
],
147846+
"Reliability": [
147847+
"repeatable-session"
147848+
],
147849+
"SideEffects": [
147850+
"screen-effects",
147851+
"ioc-in-logs",
147852+
"artifacts-on-disk"
147853+
]
147854+
},
147855+
"session_types": false,
147856+
"needs_cleanup": null
147857+
},
147795147858
"exploit_windows/http/altn_securitygateway": {
147796147859
"name": "Alt-N SecurityGateway username Buffer Overflow",
147797147860
"fullname": "exploit/windows/http/altn_securitygateway",

0 commit comments

Comments
 (0)