Skip to content

Commit 6a26428

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 9caa2be commit 6a26428

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81125,6 +81125,66 @@
8112581125
"session_types": false,
8112681126
"needs_cleanup": true
8112781127
},
81128+
"exploit_linux/http/pandora_itsm_auth_rce_cve_2025_4653": {
81129+
"name": "Pandora ITSM authenticated command injection leading to RCE via the backup function",
81130+
"fullname": "exploit/linux/http/pandora_itsm_auth_rce_cve_2025_4653",
81131+
"aliases": [],
81132+
"rank": 600,
81133+
"disclosure_date": "2025-06-10",
81134+
"type": "exploit",
81135+
"author": [
81136+
"h00die-gr3y <[email protected]>"
81137+
],
81138+
"description": "Pandora ITSM is a platform for Service Management & Support including a Helpdesk for support\n and customer service teams, aligned with ITIL processes.\n This module exploits a command injection vulnerability in the `name` backup setting at the\n application setup page of Pandora ITSM. This can be triggered by generating a backup with a\n malicious payload injected at the `name` parameter.\n You need to have admin access at the Pandora ITSM Web application in order to execute this RCE.\n This access can be achieved by knowing the admin credentials to access the web application or\n leveraging a default password vulnerability in Pandora ITSM that allows an attacker to access\n the Pandora FMS ITSM database, create a new admin user and gain administrative access to the\n Pandora ITSM Web application. This attack can be remotely executed over the WAN as long as the\n MySQL services are exposed to the outside world.\n This issue affects all ITSM Enterprise editions up to `5.0.105` and is patched at `5.0.106`.",
81139+
"references": [
81140+
"CVE-2025-4653",
81141+
"URL-https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
81142+
"URL-https://github.com/h00die-gr3y/h00die-gr3y/security/advisories/GHSA-m4f8-9c8x-8f3f",
81143+
"URL-https://attackerkb.com/topics/wgCb1QQm1t/cve-2025-4653"
81144+
],
81145+
"platform": "Linux,Unix",
81146+
"arch": "cmd",
81147+
"rport": 443,
81148+
"autofilter_ports": [
81149+
80,
81150+
8080,
81151+
443,
81152+
8000,
81153+
8888,
81154+
8880,
81155+
8008,
81156+
3000,
81157+
8443
81158+
],
81159+
"autofilter_services": [
81160+
"http",
81161+
"https"
81162+
],
81163+
"targets": [
81164+
"Unix/Linux Command"
81165+
],
81166+
"mod_time": "2025-08-06 08:22:06 +0000",
81167+
"path": "/modules/exploits/linux/http/pandora_itsm_auth_rce_cve_2025_4653.rb",
81168+
"is_install_path": true,
81169+
"ref_name": "linux/http/pandora_itsm_auth_rce_cve_2025_4653",
81170+
"check": true,
81171+
"post_auth": true,
81172+
"default_credential": false,
81173+
"notes": {
81174+
"Stability": [
81175+
"crash-safe"
81176+
],
81177+
"SideEffects": [
81178+
"artifacts-on-disk",
81179+
"ioc-in-logs"
81180+
],
81181+
"Reliability": [
81182+
"repeatable-session"
81183+
]
81184+
},
81185+
"session_types": false,
81186+
"needs_cleanup": null
81187+
},
8112881188
"exploit_linux/http/pandora_ping_cmd_exec": {
8112981189
"name": "Pandora FMS Ping Authenticated Remote Code Execution",
8113081190
"fullname": "exploit/linux/http/pandora_ping_cmd_exec",

0 commit comments

Comments
 (0)