File tree Expand file tree Collapse file tree 1 file changed +60
-0
lines changed Expand file tree Collapse file tree 1 file changed +60
-0
lines changed Original file line number Diff line number Diff line change @@ -165455,6 +165455,66 @@
165455
165455
"session_types": false,
165456
165456
"needs_cleanup": true
165457
165457
},
165458
+ "exploit_windows/http/lg_simple_editor_rce_uploadvideo": {
165459
+ "name": "LG Simple Editor Command Injection (CVE-2023-40504)",
165460
+ "fullname": "exploit/windows/http/lg_simple_editor_rce_uploadvideo",
165461
+ "aliases": [
165462
+
165463
+ ],
165464
+ "rank": 600,
165465
+ "disclosure_date": "2023-08-04",
165466
+ "type": "exploit",
165467
+ "author": [
165468
+ "rgod",
165469
+ "Michael Heinzl"
165470
+ ],
165471
+ "description": "Unauthenticated Command Injection in LG Simple Editor <= v3.21.0.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\\SYSTEM.",
165472
+ "references": [
165473
+ "URL-https://www.zerodayinitiative.com/advisories/ZDI-23-1208/",
165474
+ "CVE-2023-40504"
165475
+ ],
165476
+ "platform": "Windows",
165477
+ "arch": "cmd",
165478
+ "rport": 8080,
165479
+ "autofilter_ports": [
165480
+ 80,
165481
+ 8080,
165482
+ 443,
165483
+ 8000,
165484
+ 8888,
165485
+ 8880,
165486
+ 8008,
165487
+ 3000,
165488
+ 8443
165489
+ ],
165490
+ "autofilter_services": [
165491
+ "http",
165492
+ "https"
165493
+ ],
165494
+ "targets": [
165495
+ "Windows_Fetch"
165496
+ ],
165497
+ "mod_time": "2024-08-13 20:29:30 +0000",
165498
+ "path": "/modules/exploits/windows/http/lg_simple_editor_rce_uploadvideo.rb",
165499
+ "is_install_path": true,
165500
+ "ref_name": "windows/http/lg_simple_editor_rce_uploadvideo",
165501
+ "check": true,
165502
+ "post_auth": false,
165503
+ "default_credential": false,
165504
+ "notes": {
165505
+ "Stability": [
165506
+ "crash-safe"
165507
+ ],
165508
+ "Reliability": [
165509
+ "repeatable-session"
165510
+ ],
165511
+ "SideEffects": [
165512
+ "ioc-in-logs"
165513
+ ]
165514
+ },
165515
+ "session_types": false,
165516
+ "needs_cleanup": null
165517
+ },
165458
165518
"exploit_windows/http/mailenable_auth_header": {
165459
165519
"name": "MailEnable Authorization Header Buffer Overflow",
165460
165520
"fullname": "exploit/windows/http/mailenable_auth_header",
You can’t perform that action at this time.
0 commit comments