Skip to content

Commit a0de825

Browse files
committed
automatic module_metadata_base.json update
1 parent b8137d5 commit a0de825

File tree

1 file changed

+66
-0
lines changed

1 file changed

+66
-0
lines changed

db/modules_metadata_base.json

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139299,6 +139299,72 @@
139299139299
"session_types": false,
139300139300
"needs_cleanup": true
139301139301
},
139302+
"exploit_windows/http/manageengine_servicedesk_plus_cve_2021_44077": {
139303+
"name": "ManageEngine ServiceDesk Plus CVE-2021-44077",
139304+
"fullname": "exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077",
139305+
"aliases": [
139306+
139307+
],
139308+
"rank": 600,
139309+
"disclosure_date": "2021-09-16",
139310+
"type": "exploit",
139311+
"author": [
139312+
139313+
"Y4er"
139314+
],
139315+
"description": "This module exploits CVE-2021-44077, an unauthenticated remote code\n execution vulnerability in ManageEngine ServiceDesk Plus, to upload an\n EXE (msiexec.exe) and execute it as the SYSTEM account.\n\n Note that build 11305 is vulnerable to the authentication bypass but\n not the file upload. The module will check for an exploitable build.",
139316+
"references": [
139317+
"CVE-2021-44077",
139318+
"URL-https://pitstop.manageengine.com/portal/en/community/topic/security-advisory-authentication-bypass-vulnerability-in-servicedesk-plus-versions-11138-and-above",
139319+
"URL-https://pitstop.manageengine.com/portal/en/community/topic/security-advisory-for-cve-2021-44077-unauthenticated-rce-vulnerability-in-servicedesk-plus-versions-up-to-11305-22-11-2021",
139320+
"URL-https://www.cisa.gov/uscert/ncas/alerts/aa21-336a",
139321+
"URL-https://unit42.paloaltonetworks.com/tiltedtemple-manageengine-servicedesk-plus/",
139322+
"URL-https://attackerkb.com/topics/qv2aD8YfMN/cve-2021-44077/rapid7-analysis",
139323+
"URL-https://xz.aliyun.com/t/10631"
139324+
],
139325+
"platform": "Windows",
139326+
"arch": "x86, x64",
139327+
"rport": 8080,
139328+
"autofilter_ports": [
139329+
80,
139330+
8080,
139331+
443,
139332+
8000,
139333+
8888,
139334+
8880,
139335+
8008,
139336+
3000,
139337+
8443
139338+
],
139339+
"autofilter_services": [
139340+
"http",
139341+
"https"
139342+
],
139343+
"targets": [
139344+
"Windows Dropper"
139345+
],
139346+
"mod_time": "2021-12-09 17:27:35 +0000",
139347+
"path": "/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb",
139348+
"is_install_path": true,
139349+
"ref_name": "windows/http/manageengine_servicedesk_plus_cve_2021_44077",
139350+
"check": true,
139351+
"post_auth": false,
139352+
"default_credential": false,
139353+
"notes": {
139354+
"Stability": [
139355+
"crash-safe"
139356+
],
139357+
"Reliability": [
139358+
"repeatable-session"
139359+
],
139360+
"SideEffects": [
139361+
"ioc-in-logs",
139362+
"artifacts-on-disk"
139363+
]
139364+
},
139365+
"session_types": false,
139366+
"needs_cleanup": null
139367+
},
139302139368
"exploit_windows/http/maxdb_webdbm_database": {
139303139369
"name": "MaxDB WebDBM Database Parameter Overflow",
139304139370
"fullname": "exploit/windows/http/maxdb_webdbm_database",

0 commit comments

Comments
 (0)