Skip to content

Commit 704a8f1

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 7972017 commit 704a8f1

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109035,6 +109035,66 @@
109035109035
"session_types": false,
109036109036
"needs_cleanup": null
109037109037
},
109038+
"exploit_multi/http/lighthouse_studio_unauth_rce_cve_2025_34300": {
109039+
"name": "Template Injection Vulnerability in Sawtooth Software's Lighthouse Studio (CVE-2025-34300)",
109040+
"fullname": "exploit/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300",
109041+
"aliases": [],
109042+
"rank": 600,
109043+
"disclosure_date": "2025-07-16",
109044+
"type": "exploit",
109045+
"author": [
109046+
"Maksim Rogov",
109047+
"Adam Kues"
109048+
],
109049+
"description": "This module exploits a template injection vulnerability in the\n Sawtooth Software Lighthouse Studio's `ciwweb.pl` web application.\n The application fails to properly sanitize user input within survey templates,\n allowing unauthenticated attackers to inject and execute arbitrary Perl commands\n on the target system.\n\n This vulnerability affects Lighthouse Studio versions prior to 9.16.14.\n Successful exploitation may result in remote code execution under the privileges\n of the web server, potentially exposing sensitive data or disrupting survey operations.\n\n An attacker can execute arbitrary system commands in the context of the user running the web server.",
109050+
"references": [
109051+
"CVE-2025-34300",
109052+
"URL-https://slcyber.io/assetnote-security-research-center/rce-in-the-most-popular-survey-software-youve-never-heard-of/"
109053+
],
109054+
"platform": "Multi",
109055+
"arch": "cmd",
109056+
"rport": 80,
109057+
"autofilter_ports": [
109058+
80,
109059+
8080,
109060+
443,
109061+
8000,
109062+
8888,
109063+
8880,
109064+
8008,
109065+
3000,
109066+
8443
109067+
],
109068+
"autofilter_services": [
109069+
"http",
109070+
"https"
109071+
],
109072+
"targets": [
109073+
"Unix Command",
109074+
"Windows Command"
109075+
],
109076+
"mod_time": "2025-07-26 03:15:00 +0000",
109077+
"path": "/modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb",
109078+
"is_install_path": true,
109079+
"ref_name": "multi/http/lighthouse_studio_unauth_rce_cve_2025_34300",
109080+
"check": true,
109081+
"post_auth": false,
109082+
"default_credential": false,
109083+
"notes": {
109084+
"Stability": [
109085+
"crash-safe"
109086+
],
109087+
"SideEffects": [
109088+
"ioc-in-logs",
109089+
"artifacts-on-disk"
109090+
],
109091+
"Reliability": [
109092+
"repeatable-session"
109093+
]
109094+
},
109095+
"session_types": false,
109096+
"needs_cleanup": null
109097+
},
109038109098
"exploit_multi/http/log1cms_ajax_create_folder": {
109039109099
"name": "Log1 CMS writeInfo() PHP Code Injection",
109040109100
"fullname": "exploit/multi/http/log1cms_ajax_create_folder",

0 commit comments

Comments
 (0)