Skip to content

Commit 024af65

Browse files
committed
automatic module_metadata_base.json update
1 parent 36322ff commit 024af65

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67943,6 +67943,66 @@
6794367943
"session_types": false,
6794467944
"needs_cleanup": null
6794567945
},
67946+
"exploit_linux/http/apache_hugegraph_gremlin_rce": {
67947+
"name": "Apache HugeGraph Gremlin RCE",
67948+
"fullname": "exploit/linux/http/apache_hugegraph_gremlin_rce",
67949+
"aliases": [
67950+
67951+
],
67952+
"rank": 600,
67953+
"disclosure_date": "2024-04-22",
67954+
"type": "exploit",
67955+
"author": [
67956+
"6right",
67957+
"jheysel-r7"
67958+
],
67959+
"description": "This module exploits CVE-2024-27348 which is a Remote Code Execution (RCE) vulnerability that exists in\n Apache HugeGraph Server in versions before 1.3.0. An attacker can bypass the sandbox restrictions and achieve\n RCE through Gremlin, resulting in complete control over the server",
67960+
"references": [
67961+
"URL-https://blog.securelayer7.net/remote-code-execution-in-apache-hugegraph/",
67962+
"CVE-2024-27348"
67963+
],
67964+
"platform": "Linux,Unix",
67965+
"arch": "cmd",
67966+
"rport": 8080,
67967+
"autofilter_ports": [
67968+
80,
67969+
8080,
67970+
443,
67971+
8000,
67972+
8888,
67973+
8880,
67974+
8008,
67975+
3000,
67976+
8443
67977+
],
67978+
"autofilter_services": [
67979+
"http",
67980+
"https"
67981+
],
67982+
"targets": [
67983+
"Automatic Target"
67984+
],
67985+
"mod_time": "2024-08-13 08:48:33 +0000",
67986+
"path": "/modules/exploits/linux/http/apache_hugegraph_gremlin_rce.rb",
67987+
"is_install_path": true,
67988+
"ref_name": "linux/http/apache_hugegraph_gremlin_rce",
67989+
"check": true,
67990+
"post_auth": false,
67991+
"default_credential": false,
67992+
"notes": {
67993+
"Stability": [
67994+
"crash-safe"
67995+
],
67996+
"SideEffects": [
67997+
"artifacts-on-disk"
67998+
],
67999+
"Reliability": [
68000+
"repeatable-session"
68001+
]
68002+
},
68003+
"session_types": false,
68004+
"needs_cleanup": null
68005+
},
6794668006
"exploit_linux/http/apache_nifi_h2_rce": {
6794768007
"name": "Apache NiFi H2 Connection String Remote Code Execution",
6794868008
"fullname": "exploit/linux/http/apache_nifi_h2_rce",

0 commit comments

Comments
 (0)