Skip to content

Commit 2dd06c3

Browse files
committed
automatic module_metadata_base.json update
1 parent 35da466 commit 2dd06c3

File tree

1 file changed

+51
-0
lines changed

1 file changed

+51
-0
lines changed

db/modules_metadata_base.json

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187119,6 +187119,57 @@
187119187119
"session_types": false,
187120187120
"needs_cleanup": null
187121187121
},
187122+
"exploit_windows/scada/diaenergie_sqli": {
187123+
"name": "DIAEnergie SQL Injection (CVE-2024-4548)",
187124+
"fullname": "exploit/windows/scada/diaenergie_sqli",
187125+
"aliases": [
187126+
187127+
],
187128+
"rank": 600,
187129+
"disclosure_date": "2024-05-06",
187130+
"type": "exploit",
187131+
"author": [
187132+
"Michael Heinzl",
187133+
"Tenable"
187134+
],
187135+
"description": "SQL injection vulnerability in DIAEnergie <= v1.10 from Delta Electronics.\n This vulnerability can be exploited by an unauthenticated remote attacker to gain arbitrary code execution through a SQL injection vulnerability in the CEBC service. The commands will get executed in the context of NT AUTHORITY\\SYSTEM.",
187136+
"references": [
187137+
"URL-https://www.tenable.com/security/research/tra-2024-13",
187138+
"CVE-2024-4548"
187139+
],
187140+
"platform": "Windows",
187141+
"arch": "cmd",
187142+
"rport": 928,
187143+
"autofilter_ports": [
187144+
187145+
],
187146+
"autofilter_services": [
187147+
187148+
],
187149+
"targets": [
187150+
"Windows_Fetch"
187151+
],
187152+
"mod_time": "2024-08-19 22:47:19 +0000",
187153+
"path": "/modules/exploits/windows/scada/diaenergie_sqli.rb",
187154+
"is_install_path": true,
187155+
"ref_name": "windows/scada/diaenergie_sqli",
187156+
"check": true,
187157+
"post_auth": false,
187158+
"default_credential": false,
187159+
"notes": {
187160+
"Stability": [
187161+
"crash-safe"
187162+
],
187163+
"Reliability": [
187164+
"repeatable-session"
187165+
],
187166+
"SideEffects": [
187167+
"ioc-in-logs"
187168+
]
187169+
},
187170+
"session_types": false,
187171+
"needs_cleanup": null
187172+
},
187122187173
"exploit_windows/scada/factorylink_csservice": {
187123187174
"name": "Siemens FactoryLink 8 CSService Logging Path Param Buffer Overflow",
187124187175
"fullname": "exploit/windows/scada/factorylink_csservice",

0 commit comments

Comments
 (0)