Skip to content

Commit 7549339

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent f1dffd3 commit 7549339

File tree

1 file changed

+114
-0
lines changed

1 file changed

+114
-0
lines changed

db/modules_metadata_base.json

Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40870,6 +40870,61 @@
4087040870
"needs_cleanup": false,
4087140871
"actions": []
4087240872
},
40873+
"auxiliary_scanner/http/pretalx_file_read_cve_2023_28459": {
40874+
"name": "Pretalx Arbitrary File Read/Limited File Write",
40875+
"fullname": "auxiliary/scanner/http/pretalx_file_read_cve_2023_28459",
40876+
"aliases": [],
40877+
"rank": 300,
40878+
"disclosure_date": null,
40879+
"type": "auxiliary",
40880+
"author": [
40881+
"Stefan Schiller",
40882+
"msutovsky-r7"
40883+
],
40884+
"description": "This module exploits functionality in Pretalx that export conference schedule as zipped file. The Pretalx will iteratively include any file referenced by any HTML tag and does not properly check the path of the file, which can lead to arbitrary file read. The module requires credentials that allow schedule export, schedule release and approval of proposals. Additionally, module requires conference name and URL for media files.",
40885+
"references": [],
40886+
"platform": "",
40887+
"arch": "",
40888+
"rport": 80,
40889+
"autofilter_ports": [
40890+
80,
40891+
8080,
40892+
443,
40893+
8000,
40894+
8888,
40895+
8880,
40896+
8008,
40897+
3000,
40898+
8443
40899+
],
40900+
"autofilter_services": [
40901+
"http",
40902+
"https"
40903+
],
40904+
"targets": null,
40905+
"mod_time": "2025-08-22 15:26:46 +0000",
40906+
"path": "/modules/auxiliary/scanner/http/pretalx_file_read_cve_2023_28459.rb",
40907+
"is_install_path": true,
40908+
"ref_name": "scanner/http/pretalx_file_read_cve_2023_28459",
40909+
"check": true,
40910+
"post_auth": true,
40911+
"default_credential": false,
40912+
"notes": {
40913+
"Stability": [
40914+
"crash-safe"
40915+
],
40916+
"Reliability": [
40917+
"repeatable-session"
40918+
],
40919+
"SideEffects": [
40920+
"ioc-in-logs",
40921+
"artifacts-on-disk"
40922+
]
40923+
},
40924+
"session_types": false,
40925+
"needs_cleanup": false,
40926+
"actions": []
40927+
},
4087340928
"auxiliary_scanner/http/prev_dir_same_name_file": {
4087440929
"name": "HTTP Previous Directory File Scanner",
4087540930
"fullname": "auxiliary/scanner/http/prev_dir_same_name_file",
@@ -82004,6 +82059,65 @@
8200482059
"session_types": false,
8200582060
"needs_cleanup": null
8200682061
},
82062+
"exploit_linux/http/pretalx_rce_cve_2023_28458": {
82063+
"name": "Pretalx Limited File Write to Remote Code Execution",
82064+
"fullname": "exploit/linux/http/pretalx_rce_cve_2023_28458",
82065+
"aliases": [],
82066+
"rank": 600,
82067+
"disclosure_date": "2023-03-07",
82068+
"type": "exploit",
82069+
"author": [
82070+
"Stefan Schiller",
82071+
"msutovsky-r7"
82072+
],
82073+
"description": "This module exploits CVE-2023-28458, a limited file write in Pretalx, up to version 2.3.1. The module will use the vulnerability to write a malicious site-specific configuration hook forPython. Once hook is written, payload will be executed every time Pretalx user runs any Python code. Pretalx needs to run in debug mode to exploit this.",
82074+
"references": [
82075+
"URL-https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/",
82076+
"CVE-2023-28458"
82077+
],
82078+
"platform": "Linux,Unix",
82079+
"arch": "cmd",
82080+
"rport": 80,
82081+
"autofilter_ports": [
82082+
80,
82083+
8080,
82084+
443,
82085+
8000,
82086+
8888,
82087+
8880,
82088+
8008,
82089+
3000,
82090+
8443
82091+
],
82092+
"autofilter_services": [
82093+
"http",
82094+
"https"
82095+
],
82096+
"targets": [
82097+
"Linux Target"
82098+
],
82099+
"mod_time": "2025-08-22 15:26:46 +0000",
82100+
"path": "/modules/exploits/linux/http/pretalx_rce_cve_2023_28458.rb",
82101+
"is_install_path": true,
82102+
"ref_name": "linux/http/pretalx_rce_cve_2023_28458",
82103+
"check": true,
82104+
"post_auth": true,
82105+
"default_credential": false,
82106+
"notes": {
82107+
"Stability": [
82108+
"crash-safe"
82109+
],
82110+
"Reliability": [
82111+
"repeatable-session"
82112+
],
82113+
"SideEffects": [
82114+
"artifacts-on-disk",
82115+
"ioc-in-logs"
82116+
]
82117+
},
82118+
"session_types": false,
82119+
"needs_cleanup": null
82120+
},
8200782121
"exploit_linux/http/progress_flowmon_unauth_cmd_injection": {
8200882122
"name": "Flowmon Unauthenticated Command Injection",
8200982123
"fullname": "exploit/linux/http/progress_flowmon_unauth_cmd_injection",

0 commit comments

Comments
 (0)