Skip to content

Commit ed64b57

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 34f3957 commit ed64b57

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71949,6 +71949,69 @@
7194971949
"session_types": false,
7195071950
"needs_cleanup": true
7195171951
},
71952+
"exploit_linux/http/craftcms_ftp_template": {
71953+
"name": "Craft CMS Twig Template Injection RCE via FTP Templates Path",
71954+
"fullname": "exploit/linux/http/craftcms_ftp_template",
71955+
"aliases": [
71956+
71957+
],
71958+
"rank": 600,
71959+
"disclosure_date": "2024-12-19",
71960+
"type": "exploit",
71961+
"author": [
71962+
"jheysel-r7",
71963+
"Valentin Lobstein",
71964+
"AssetNote"
71965+
],
71966+
"description": "This module exploits a Twig template injection vulnerability in Craft CMS by abusing the --templatesPath argument.\n The vulnerability allows arbitrary template loading via FTP, leading to Remote Code Execution (RCE).",
71967+
"references": [
71968+
"CVE-2024-56145",
71969+
"URL-https://github.com/Chocapikk/CVE-2024-56145",
71970+
"URL-https://www.assetnote.io/resources/research/how-an-obscure-php-footgun-led-to-rce-in-craft-cms"
71971+
],
71972+
"platform": "Linux,Unix",
71973+
"arch": "cmd",
71974+
"rport": 80,
71975+
"autofilter_ports": [
71976+
80,
71977+
8080,
71978+
443,
71979+
8000,
71980+
8888,
71981+
8880,
71982+
8008,
71983+
3000,
71984+
8443
71985+
],
71986+
"autofilter_services": [
71987+
"http",
71988+
"https"
71989+
],
71990+
"targets": [
71991+
"Unix/Linux Command Shell"
71992+
],
71993+
"mod_time": "2025-01-15 09:22:44 +0000",
71994+
"path": "/modules/exploits/linux/http/craftcms_ftp_template.rb",
71995+
"is_install_path": true,
71996+
"ref_name": "linux/http/craftcms_ftp_template",
71997+
"check": true,
71998+
"post_auth": false,
71999+
"default_credential": false,
72000+
"notes": {
72001+
"Stability": [
72002+
"crash-safe"
72003+
],
72004+
"SideEffects": [
72005+
"artifacts-on-disk",
72006+
"ioc-in-logs"
72007+
],
72008+
"Reliability": [
72009+
"repeatable-session"
72010+
]
72011+
},
72012+
"session_types": false,
72013+
"needs_cleanup": null
72014+
},
7195272015
"exploit_linux/http/craftcms_unauth_rce_cve_2023_41892": {
7195372016
"name": "Craft CMS unauthenticated Remote Code Execution (RCE)",
7195472017
"fullname": "exploit/linux/http/craftcms_unauth_rce_cve_2023_41892",

0 commit comments

Comments
 (0)