Skip to content

Commit 7c997c8

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent a8ec46f commit 7c997c8

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed

db/modules_metadata_base.json

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24716,6 +24716,60 @@
2471624716
}
2471724717
]
2471824718
},
24719+
"auxiliary_gather/listmonk_env_disclosure": {
24720+
"name": "Listmonk Insecure Sprig Template Functions Environment Disclosure",
24721+
"fullname": "auxiliary/gather/listmonk_env_disclosure",
24722+
"aliases": [],
24723+
"rank": 300,
24724+
"disclosure_date": "2025-06-08",
24725+
"type": "auxiliary",
24726+
"author": [
24727+
"Tarek Nakkouch"
24728+
],
24729+
"description": "This module exploits insecure Sprig template functions in Listmonk\n versions prior to v5.0.2. The env and expandenv functions are enabled\n by default, allowing authenticated users with campaign permissions to\n extract sensitive environment variables via campaign preview.",
24730+
"references": [
24731+
"CVE-2025-49136",
24732+
"URL-https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h"
24733+
],
24734+
"platform": "",
24735+
"arch": "",
24736+
"rport": 9000,
24737+
"autofilter_ports": [
24738+
80,
24739+
8080,
24740+
443,
24741+
8000,
24742+
8888,
24743+
8880,
24744+
8008,
24745+
3000,
24746+
8443
24747+
],
24748+
"autofilter_services": [
24749+
"http",
24750+
"https"
24751+
],
24752+
"targets": null,
24753+
"mod_time": "2025-10-08 21:02:24 +0000",
24754+
"path": "/modules/auxiliary/gather/listmonk_env_disclosure.rb",
24755+
"is_install_path": true,
24756+
"ref_name": "gather/listmonk_env_disclosure",
24757+
"check": true,
24758+
"post_auth": true,
24759+
"default_credential": false,
24760+
"notes": {
24761+
"Stability": [
24762+
"crash-safe"
24763+
],
24764+
"SideEffects": [
24765+
"ioc-in-logs"
24766+
],
24767+
"Reliability": []
24768+
},
24769+
"session_types": false,
24770+
"needs_cleanup": false,
24771+
"actions": []
24772+
},
2471924773
"auxiliary_gather/magento_xxe_cve_2024_34102": {
2472024774
"name": "Magento XXE Unserialize Arbitrary File Read",
2472124775
"fullname": "auxiliary/gather/magento_xxe_cve_2024_34102",

0 commit comments

Comments
 (0)