Skip to content

Commit 12d59e0

Browse files
committed
automatic module_metadata_base.json update
1 parent f274c46 commit 12d59e0

File tree

1 file changed

+123
-0
lines changed

1 file changed

+123
-0
lines changed

db/modules_metadata_base.json

Lines changed: 123 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22786,6 +22786,129 @@
2278622786

2278722787
]
2278822788
},
22789+
"auxiliary_gather/jasmin_ransomware_dir_traversal": {
22790+
"name": "Jasmin Ransomware Web Server Unauthenticated Directory Traversal",
22791+
"fullname": "auxiliary/gather/jasmin_ransomware_dir_traversal",
22792+
"aliases": [
22793+
22794+
],
22795+
"rank": 300,
22796+
"disclosure_date": "2023-04-08",
22797+
"type": "auxiliary",
22798+
"author": [
22799+
"chebuya",
22800+
"h00die"
22801+
],
22802+
"description": "The Jasmin Ransomware web server contains an unauthenticated directory traversal vulnerability\n within the download functionality. As of April 15, 2024 this was still unpatched, so all\n versions are vulnerable. The last patch was in 2021, so it will likely not ever be patched.",
22803+
"references": [
22804+
"CVE-2024-30851",
22805+
"URL-https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc",
22806+
"URL-https://github.com/codesiddhant/Jasmin-Ransomware"
22807+
],
22808+
"platform": "",
22809+
"arch": "",
22810+
"rport": 80,
22811+
"autofilter_ports": [
22812+
80,
22813+
8080,
22814+
443,
22815+
8000,
22816+
8888,
22817+
8880,
22818+
8008,
22819+
3000,
22820+
8443
22821+
],
22822+
"autofilter_services": [
22823+
"http",
22824+
"https"
22825+
],
22826+
"targets": null,
22827+
"mod_time": "2024-05-04 16:06:48 +0000",
22828+
"path": "/modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb",
22829+
"is_install_path": true,
22830+
"ref_name": "gather/jasmin_ransomware_dir_traversal",
22831+
"check": true,
22832+
"post_auth": false,
22833+
"default_credential": false,
22834+
"notes": {
22835+
"Stability": [
22836+
"crash-safe"
22837+
],
22838+
"Reliability": [
22839+
22840+
],
22841+
"SideEffects": [
22842+
22843+
]
22844+
},
22845+
"session_types": false,
22846+
"needs_cleanup": false,
22847+
"actions": [
22848+
22849+
]
22850+
},
22851+
"auxiliary_gather/jasmin_ransomware_sqli": {
22852+
"name": "Jasmin Ransomware Web Server Unauthenticated SQL Injection",
22853+
"fullname": "auxiliary/gather/jasmin_ransomware_sqli",
22854+
"aliases": [
22855+
22856+
],
22857+
"rank": 300,
22858+
"disclosure_date": "2023-04-08",
22859+
"type": "auxiliary",
22860+
"author": [
22861+
"chebuya",
22862+
"h00die"
22863+
],
22864+
"description": "The Jasmin Ransomware web server contains an unauthenticated SQL injection vulnerability\n within the login functionality. As of April 15, 2024 this was still unpatched, so all\n versions are vulnerable. The last patch was in 2021, so it will likely not ever be patched.\n\n Retrieving the victim's data may take a long amount of time. It is much quicker to\n get the logins, then just login to the site.",
22865+
"references": [
22866+
"URL-https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc",
22867+
"URL-https://github.com/codesiddhant/Jasmin-Ransomware"
22868+
],
22869+
"platform": "",
22870+
"arch": "",
22871+
"rport": 80,
22872+
"autofilter_ports": [
22873+
80,
22874+
8080,
22875+
443,
22876+
8000,
22877+
8888,
22878+
8880,
22879+
8008,
22880+
3000,
22881+
8443
22882+
],
22883+
"autofilter_services": [
22884+
"http",
22885+
"https"
22886+
],
22887+
"targets": null,
22888+
"mod_time": "2024-05-04 16:06:48 +0000",
22889+
"path": "/modules/auxiliary/gather/jasmin_ransomware_sqli.rb",
22890+
"is_install_path": true,
22891+
"ref_name": "gather/jasmin_ransomware_sqli",
22892+
"check": true,
22893+
"post_auth": false,
22894+
"default_credential": false,
22895+
"notes": {
22896+
"Stability": [
22897+
"crash-safe"
22898+
],
22899+
"Reliability": [
22900+
22901+
],
22902+
"SideEffects": [
22903+
22904+
]
22905+
},
22906+
"session_types": false,
22907+
"needs_cleanup": false,
22908+
"actions": [
22909+
22910+
]
22911+
},
2278922912
"auxiliary_gather/java_rmi_registry": {
2279022913
"name": "Java RMI Registry Interfaces Enumeration",
2279122914
"fullname": "auxiliary/gather/java_rmi_registry",

0 commit comments

Comments
 (0)