Skip to content

Commit 2e0a738

Browse files
committed
automatic module_metadata_base.json update
1 parent 84431b0 commit 2e0a738

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2643,6 +2643,68 @@
26432643
}
26442644
]
26452645
},
2646+
"auxiliary_admin/http/idsecure_auth_bypass": {
2647+
"name": "Control iD iDSecure Authentication Bypass (CVE-2023-6329)",
2648+
"fullname": "auxiliary/admin/http/idsecure_auth_bypass",
2649+
"aliases": [
2650+
2651+
],
2652+
"rank": 300,
2653+
"disclosure_date": "2023-11-27",
2654+
"type": "auxiliary",
2655+
"author": [
2656+
"Michael Heinzl",
2657+
"Tenable"
2658+
],
2659+
"description": "This module exploits an improper access control vulnerability (CVE-2023-6329) in Control iD iDSecure <= v4.7.43.0. It allows an\n unauthenticated remote attacker to compute valid credentials and to add a new administrative user to the web interface of the product.",
2660+
"references": [
2661+
"CVE-2023-6329",
2662+
"URL-https://www.tenable.com/security/research/tra-2023-36"
2663+
],
2664+
"platform": "",
2665+
"arch": "",
2666+
"rport": 30443,
2667+
"autofilter_ports": [
2668+
80,
2669+
8080,
2670+
443,
2671+
8000,
2672+
8888,
2673+
8880,
2674+
8008,
2675+
3000,
2676+
8443
2677+
],
2678+
"autofilter_services": [
2679+
"http",
2680+
"https"
2681+
],
2682+
"targets": null,
2683+
"mod_time": "2024-08-19 21:17:16 +0000",
2684+
"path": "/modules/auxiliary/admin/http/idsecure_auth_bypass.rb",
2685+
"is_install_path": true,
2686+
"ref_name": "admin/http/idsecure_auth_bypass",
2687+
"check": true,
2688+
"post_auth": true,
2689+
"default_credential": false,
2690+
"notes": {
2691+
"Stability": [
2692+
"crash-safe"
2693+
],
2694+
"Reliability": [
2695+
"repeatable-session"
2696+
],
2697+
"SideEffects": [
2698+
"ioc-in-logs",
2699+
"config-changes"
2700+
]
2701+
},
2702+
"session_types": false,
2703+
"needs_cleanup": false,
2704+
"actions": [
2705+
2706+
]
2707+
},
26462708
"auxiliary_admin/http/iis_auth_bypass": {
26472709
"name": "MS10-065 Microsoft IIS 5 NTFS Stream Authentication Bypass",
26482710
"fullname": "auxiliary/admin/http/iis_auth_bypass",

0 commit comments

Comments
 (0)