Skip to content

Commit 0cd62c5

Browse files
committed
automatic module_metadata_base.json update
1 parent 10acd86 commit 0cd62c5

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed

db/modules_metadata_base.json

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98354,6 +98354,70 @@
9835498354
"session_types": false,
9835598355
"needs_cleanup": null
9835698356
},
98357+
"exploit_multi/http/avideo_wwbnindex_unauth_rce": {
98358+
"name": "AVideo WWBNIndex Plugin Unauthenticated RCE",
98359+
"fullname": "exploit/multi/http/avideo_wwbnindex_unauth_rce",
98360+
"aliases": [
98361+
98362+
],
98363+
"rank": 600,
98364+
"disclosure_date": "2024-04-09",
98365+
"type": "exploit",
98366+
"author": [
98367+
"Valentin Lobstein"
98368+
],
98369+
"description": "This module exploits an unauthenticated remote code execution (RCE) vulnerability\n in the WWBNIndex plugin of the AVideo platform. The vulnerability exists within the\n `submitIndex.php` file, where user-supplied input is passed directly to the `require()`\n function without proper sanitization. By exploiting this, an attacker can leverage the\n PHP filter chaining technique to execute arbitrary PHP code on the server. This allows\n for the execution of commands and control over the affected system. The exploit is\n particularly dangerous because it does not require authentication, making it possible\n for any remote attacker to exploit this vulnerability.",
98370+
"references": [
98371+
"CVE-2024-31819",
98372+
"URL-https://github.com/WWBN/AVideo",
98373+
"URL-https://chocapikk.com/posts/2024/cve-2024-31819"
98374+
],
98375+
"platform": "Linux,PHP,Unix,Windows",
98376+
"arch": "php, cmd",
98377+
"rport": 443,
98378+
"autofilter_ports": [
98379+
80,
98380+
8080,
98381+
443,
98382+
8000,
98383+
8888,
98384+
8880,
98385+
8008,
98386+
3000,
98387+
8443
98388+
],
98389+
"autofilter_services": [
98390+
"http",
98391+
"https"
98392+
],
98393+
"targets": [
98394+
"Automatic",
98395+
"PHP In-Memory",
98396+
"Unix In-Memory",
98397+
"Windows In-Memory"
98398+
],
98399+
"mod_time": "2024-05-15 22:13:53 +0000",
98400+
"path": "/modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb",
98401+
"is_install_path": true,
98402+
"ref_name": "multi/http/avideo_wwbnindex_unauth_rce",
98403+
"check": true,
98404+
"post_auth": false,
98405+
"default_credential": false,
98406+
"notes": {
98407+
"Stability": [
98408+
"crash-safe"
98409+
],
98410+
"Reliability": [
98411+
"repeatable-session"
98412+
],
98413+
"SideEffects": [
98414+
"ioc-in-logs",
98415+
"artifacts-on-disk"
98416+
]
98417+
},
98418+
"session_types": false,
98419+
"needs_cleanup": null
98420+
},
9835798421
"exploit_multi/http/axis2_deployer": {
9835898422
"name": "Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)",
9835998423
"fullname": "exploit/multi/http/axis2_deployer",

0 commit comments

Comments
 (0)