Skip to content

Commit c877366

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 0c921ea commit c877366

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110604,6 +110604,69 @@
110604110604
"session_types": false,
110605110605
"needs_cleanup": true
110606110606
},
110607+
"exploit_multi/http/magento_sessionreaper": {
110608+
"name": "Magento SessionReaper",
110609+
"fullname": "exploit/multi/http/magento_sessionreaper",
110610+
"aliases": [],
110611+
"rank": 600,
110612+
"disclosure_date": "2025-10-22",
110613+
"type": "exploit",
110614+
"author": [
110615+
"Blaklis",
110616+
"Tomais Williamson",
110617+
"Valentin Lobstein <[email protected]>"
110618+
],
110619+
"description": "This module exploits CVE-2025-54236 (SessionReaper), a critical vulnerability in\n Magento/Adobe Commerce that allows unauthenticated remote code execution.\n\n The vulnerability stems from improper handling of nested deserialization in the\n payment method context, combined with an unauthenticated file upload endpoint.\n\n The exploit chain consists of three steps:\n 1. Upload a malicious PHP session file containing a Guzzle/FW1 deserialization\n payload via the unauthenticated /customer/address_file/upload endpoint\n 2. Trigger deserialization by sending a crafted JSON payload to the REST API\n endpoint /rest/default/V1/guest-carts/{cart_id}/order that modifies the\n session savePath to point to the uploaded file\n 3. Execute the uploaded PHP code to gain remote code execution\n\n This vulnerability affects Magento 2.x instances configured to use file-based\n session storage. Patched versions will return a 400 Bad Request response instead\n of processing the malicious payload.",
110620+
"references": [
110621+
"CVE-2025-54236",
110622+
"URL-https://slcyber.io/research-center/why-nested-deserialization-is-still-harmful-magento-rce-cve-2025-54236/",
110623+
"URL-https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397"
110624+
],
110625+
"platform": "Linux,PHP,Unix,Windows",
110626+
"arch": "php, cmd",
110627+
"rport": 80,
110628+
"autofilter_ports": [
110629+
80,
110630+
8080,
110631+
443,
110632+
8000,
110633+
8888,
110634+
8880,
110635+
8008,
110636+
3000,
110637+
8443
110638+
],
110639+
"autofilter_services": [
110640+
"http",
110641+
"https"
110642+
],
110643+
"targets": [
110644+
"PHP In-Memory",
110645+
"Unix/Linux Command Shell",
110646+
"Windows Command Shell"
110647+
],
110648+
"mod_time": "2025-11-26 19:10:55 +0000",
110649+
"path": "/modules/exploits/multi/http/magento_sessionreaper.rb",
110650+
"is_install_path": true,
110651+
"ref_name": "multi/http/magento_sessionreaper",
110652+
"check": true,
110653+
"post_auth": false,
110654+
"default_credential": false,
110655+
"notes": {
110656+
"Reliability": [
110657+
"repeatable-session"
110658+
],
110659+
"Stability": [
110660+
"crash-safe"
110661+
],
110662+
"SideEffects": [
110663+
"ioc-in-logs",
110664+
"artifacts-on-disk"
110665+
]
110666+
},
110667+
"session_types": false,
110668+
"needs_cleanup": true
110669+
},
110607110670
"exploit_multi/http/magento_unserialize": {
110608110671
"name": "Magento 2.0.6 Unserialize Remote Code Execution",
110609110672
"fullname": "exploit/multi/http/magento_unserialize",

0 commit comments

Comments
 (0)