Skip to content

Commit 8634876

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent b523404 commit 8634876

File tree

1 file changed

+65
-17
lines changed

1 file changed

+65
-17
lines changed

db/modules_metadata_base.json

Lines changed: 65 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -55787,7 +55787,7 @@
5578755787
"author": [
5578855788
"dflah_ <[email protected]>"
5578955789
],
55790-
"description": "This module attempts to authenticate to an Asterisk Manager service. Please note\n that by default, Asterisk Call Management (port 5038) only listens locally, but\n this can be manually configured in file /etc/asterisk/manager.conf by the admin\n on the victim machine.",
55790+
"description": "This module attempts to authenticate to an Asterisk Manager service. Please note\n that by default, Asterisk Call Management (port 5038) only listens locally, but\n this can be manually configured in file /etc/asterisk/manager.conf by the admin\n on the victim machine.",
5579155791
"references": [
5579255792
"URL-http://www.asterisk.org/astdocs/node201.html"
5579355793
],
@@ -55797,14 +55797,22 @@
5579755797
"autofilter_ports": [],
5579855798
"autofilter_services": [],
5579955799
"targets": null,
55800-
"mod_time": "2017-07-24 06:26:21 +0000",
55800+
"mod_time": "2025-05-07 00:47:05 +0000",
5580155801
"path": "/modules/auxiliary/voip/asterisk_login.rb",
5580255802
"is_install_path": true,
5580355803
"ref_name": "voip/asterisk_login",
5580455804
"check": false,
5580555805
"post_auth": true,
5580655806
"default_credential": false,
55807-
"notes": {},
55807+
"notes": {
55808+
"Stability": [
55809+
"crash-safe"
55810+
],
55811+
"SideEffects": [
55812+
"account-lockouts"
55813+
],
55814+
"Reliability": []
55815+
},
5580855816
"session_types": false,
5580955817
"needs_cleanup": false,
5581055818
"actions": []
@@ -55819,7 +55827,7 @@
5581955827
"author": [
5582055828
"fozavci"
5582155829
],
55822-
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM) 10 does not properly implement access control, which allows remote attackers to\n modify user information. This module exploits the vulnerability to configure unauthorized\n call forwarding.",
55830+
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM) 10 does not properly implement access control, which allows remote attackers to\n modify user information. This module exploits the vulnerability to configure unauthorized\n call forwarding.",
5582355831
"references": [
5582455832
"CVE-2014-3300",
5582555833
"BID-68331"
@@ -55843,14 +55851,22 @@
5584355851
"https"
5584455852
],
5584555853
"targets": null,
55846-
"mod_time": "2017-07-24 06:26:21 +0000",
55854+
"mod_time": "2025-05-07 00:47:05 +0000",
5584755855
"path": "/modules/auxiliary/voip/cisco_cucdm_call_forward.rb",
5584855856
"is_install_path": true,
5584955857
"ref_name": "voip/cisco_cucdm_call_forward",
5585055858
"check": false,
5585155859
"post_auth": false,
5585255860
"default_credential": false,
55853-
"notes": {},
55861+
"notes": {
55862+
"Stability": [
55863+
"service-resource-loss"
55864+
],
55865+
"SideEffects": [
55866+
"ioc-in-logs"
55867+
],
55868+
"Reliability": []
55869+
},
5585455870
"session_types": false,
5585555871
"needs_cleanup": false,
5585655872
"actions": [
@@ -55874,7 +55890,7 @@
5587455890
"author": [
5587555891
"fozavci"
5587655892
],
55877-
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM), before version 10, doesn't implement access control properly, which allows remote\n attackers to modify user information. This module exploits the vulnerability to make\n unauthorized speed dial entity manipulations.",
55893+
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM), before version 10, doesn't implement access control properly, which allows remote\n attackers to modify user information. This module exploits the vulnerability to make\n unauthorized speed dial entity manipulations.",
5587855894
"references": [
5587955895
"CVE-2014-3300",
5588055896
"BID-68331"
@@ -55898,14 +55914,22 @@
5589855914
"https"
5589955915
],
5590055916
"targets": null,
55901-
"mod_time": "2017-08-28 20:17:58 +0000",
55917+
"mod_time": "2025-05-07 00:47:05 +0000",
5590255918
"path": "/modules/auxiliary/voip/cisco_cucdm_speed_dials.rb",
5590355919
"is_install_path": true,
5590455920
"ref_name": "voip/cisco_cucdm_speed_dials",
5590555921
"check": false,
5590655922
"post_auth": false,
5590755923
"default_credential": false,
55908-
"notes": {},
55924+
"notes": {
55925+
"Stability": [
55926+
"crash-safe"
55927+
],
55928+
"SideEffects": [
55929+
"ioc-in-logs"
55930+
],
55931+
"Reliability": []
55932+
},
5590955933
"session_types": false,
5591055934
"needs_cleanup": false,
5591155935
"actions": [
@@ -55945,14 +55969,22 @@
5594555969
"autofilter_ports": [],
5594655970
"autofilter_services": [],
5594755971
"targets": null,
55948-
"mod_time": "2019-03-05 04:43:37 +0000",
55972+
"mod_time": "2025-05-07 00:47:05 +0000",
5594955973
"path": "/modules/auxiliary/voip/sip_deregister.rb",
5595055974
"is_install_path": true,
5595155975
"ref_name": "voip/sip_deregister",
5595255976
"check": false,
5595355977
"post_auth": false,
5595455978
"default_credential": false,
55955-
"notes": {},
55979+
"notes": {
55980+
"Stability": [
55981+
"service-resource-loss"
55982+
],
55983+
"SideEffects": [
55984+
"ioc-in-logs"
55985+
],
55986+
"Reliability": []
55987+
},
5595655988
"session_types": false,
5595755989
"needs_cleanup": false,
5595855990
"actions": []
@@ -55976,14 +56008,20 @@
5597656008
"autofilter_ports": [],
5597756009
"autofilter_services": [],
5597856010
"targets": null,
55979-
"mod_time": "2024-01-07 15:02:53 +0000",
56011+
"mod_time": "2025-05-07 00:47:05 +0000",
5598056012
"path": "/modules/auxiliary/voip/sip_invite_spoof.rb",
5598156013
"is_install_path": true,
5598256014
"ref_name": "voip/sip_invite_spoof",
5598356015
"check": false,
5598456016
"post_auth": false,
5598556017
"default_credential": false,
55986-
"notes": {},
56018+
"notes": {
56019+
"Stability": [
56020+
"crash-safe"
56021+
],
56022+
"SideEffects": [],
56023+
"Reliability": []
56024+
},
5598756025
"session_types": false,
5598856026
"needs_cleanup": false,
5598956027
"actions": []
@@ -55999,8 +56037,10 @@
5599956037
"Fakhir Karim Reda <[email protected]>",
5600056038
"zirsalem"
5600156039
],
56002-
"description": "This module allows an unauthenticated attacker to exercise the\n \"Lock\" and \"Unlock\" functionality of Telisca IPS Lock for Cisco IP\n Phones. This module should be run in the VoIP VLAN, and requires\n knowledge of the target phone's name (for example, SEP002497AB1D4B).\n\n Set ACTION to either LOCK or UNLOCK. UNLOCK is the default.",
56003-
"references": [],
56040+
"description": "This module allows an unauthenticated attacker to exercise the\n \"Lock\" and \"Unlock\" functionality of Telisca IPS Lock for Cisco IP\n Phones. This module should be run in the VoIP VLAN, and requires\n knowledge of the target phone's name (for example, SEP002497AB1D4B).\n\n Set ACTION to either LOCK or UNLOCK. UNLOCK is the default.",
56041+
"references": [
56042+
"URL-https://github.com/rapid7/metasploit-framework/pull/6470"
56043+
],
5600456044
"platform": "",
5600556045
"arch": "",
5600656046
"rport": 80,
@@ -56020,14 +56060,22 @@
5602056060
"https"
5602156061
],
5602256062
"targets": null,
56023-
"mod_time": "2022-04-21 13:31:55 +0000",
56063+
"mod_time": "2025-05-07 00:47:05 +0000",
5602456064
"path": "/modules/auxiliary/voip/telisca_ips_lock_control.rb",
5602556065
"is_install_path": true,
5602656066
"ref_name": "voip/telisca_ips_lock_control",
5602756067
"check": false,
5602856068
"post_auth": false,
5602956069
"default_credential": false,
56030-
"notes": {},
56070+
"notes": {
56071+
"Stability": [
56072+
"crash-safe"
56073+
],
56074+
"SideEffects": [
56075+
"ioc-in-logs"
56076+
],
56077+
"Reliability": []
56078+
},
5603156079
"session_types": false,
5603256080
"needs_cleanup": false,
5603356081
"actions": [

0 commit comments

Comments
 (0)