Skip to content

Commit cc48f38

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 96a8314 commit cc48f38

File tree

1 file changed

+120
-0
lines changed

1 file changed

+120
-0
lines changed

db/modules_metadata_base.json

Lines changed: 120 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180658,6 +180658,126 @@
180658180658
"session_types": false,
180659180659
"needs_cleanup": null
180660180660
},
180661+
"exploit_windows/http/sitecore_xp_cve_2025_34510": {
180662+
"name": "Sitecore XP CVE-2025-34510 Post-Authentication Remote Code Execution",
180663+
"fullname": "exploit/windows/http/sitecore_xp_cve_2025_34510",
180664+
"aliases": [],
180665+
"rank": 600,
180666+
"disclosure_date": "2025-06-17",
180667+
"type": "exploit",
180668+
"author": [
180669+
"Piotr Bazydlo",
180670+
"msutovsky-r7"
180671+
],
180672+
"description": "This module exploits CVE-2025-34510, path traversal leading to remote code execution. The module exploits also CVE-2025-34509 - hardcoded credentials of ServicesAPI account - to gain foothold.",
180673+
"references": [
180674+
"CVE-2025-34510",
180675+
"URL-https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform",
180676+
"URL-https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667"
180677+
],
180678+
"platform": "Windows",
180679+
"arch": "x86, x64",
180680+
"rport": 443,
180681+
"autofilter_ports": [
180682+
80,
180683+
8080,
180684+
443,
180685+
8000,
180686+
8888,
180687+
8880,
180688+
8008,
180689+
3000,
180690+
8443
180691+
],
180692+
"autofilter_services": [
180693+
"http",
180694+
"https"
180695+
],
180696+
"targets": [
180697+
"Windows"
180698+
],
180699+
"mod_time": "2025-09-11 11:04:34 +0000",
180700+
"path": "/modules/exploits/windows/http/sitecore_xp_cve_2025_34510.rb",
180701+
"is_install_path": true,
180702+
"ref_name": "windows/http/sitecore_xp_cve_2025_34510",
180703+
"check": true,
180704+
"post_auth": false,
180705+
"default_credential": false,
180706+
"notes": {
180707+
"Stability": [
180708+
"crash-safe"
180709+
],
180710+
"Reliability": [
180711+
"repeatable-session"
180712+
],
180713+
"SideEffects": [
180714+
"ioc-in-logs",
180715+
"artifacts-on-disk"
180716+
]
180717+
},
180718+
"session_types": false,
180719+
"needs_cleanup": null
180720+
},
180721+
"exploit_windows/http/sitecore_xp_cve_2025_34511": {
180722+
"name": "Sitecore XP CVE-2025-34511 Post-Authentication File Upload",
180723+
"fullname": "exploit/windows/http/sitecore_xp_cve_2025_34511",
180724+
"aliases": [],
180725+
"rank": 600,
180726+
"disclosure_date": "2025-06-17",
180727+
"type": "exploit",
180728+
"author": [
180729+
"Piotr Bazydlo",
180730+
"msutovsky-r7"
180731+
],
180732+
"description": "This module exploits CVE-2025-34511, a file upload vulnerability in PowerShell extensions. The module exploits also CVE-2025-34509 - hardcoded credentials of ServicesAPI account - to gain foothold.",
180733+
"references": [
180734+
"CVE-2025-34511",
180735+
"URL-https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform",
180736+
"URL-https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667"
180737+
],
180738+
"platform": "Windows",
180739+
"arch": "x86, x64",
180740+
"rport": 443,
180741+
"autofilter_ports": [
180742+
80,
180743+
8080,
180744+
443,
180745+
8000,
180746+
8888,
180747+
8880,
180748+
8008,
180749+
3000,
180750+
8443
180751+
],
180752+
"autofilter_services": [
180753+
"http",
180754+
"https"
180755+
],
180756+
"targets": [
180757+
"Windows"
180758+
],
180759+
"mod_time": "2025-09-11 11:04:34 +0000",
180760+
"path": "/modules/exploits/windows/http/sitecore_xp_cve_2025_34511.rb",
180761+
"is_install_path": true,
180762+
"ref_name": "windows/http/sitecore_xp_cve_2025_34511",
180763+
"check": true,
180764+
"post_auth": false,
180765+
"default_credential": false,
180766+
"notes": {
180767+
"Stability": [
180768+
"crash-safe"
180769+
],
180770+
"Reliability": [
180771+
"repeatable-session"
180772+
],
180773+
"SideEffects": [
180774+
"ioc-in-logs",
180775+
"artifacts-on-disk"
180776+
]
180777+
},
180778+
"session_types": false,
180779+
"needs_cleanup": null
180780+
},
180661180781
"exploit_windows/http/smartermail_rce": {
180662180782
"name": "SmarterTools SmarterMail less than build 6985 - .NET Deserialization Remote Code Execution",
180663180783
"fullname": "exploit/windows/http/smartermail_rce",

0 commit comments

Comments
 (0)