Skip to content

Commit 4e2dda3

Browse files
committed
automatic module_metadata_base.json update
1 parent f211fcb commit 4e2dda3

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165455,6 +165455,66 @@
165455165455
"session_types": false,
165456165456
"needs_cleanup": true
165457165457
},
165458+
"exploit_windows/http/lg_simple_editor_rce_uploadvideo": {
165459+
"name": "LG Simple Editor Command Injection (CVE-2023-40504)",
165460+
"fullname": "exploit/windows/http/lg_simple_editor_rce_uploadvideo",
165461+
"aliases": [
165462+
165463+
],
165464+
"rank": 600,
165465+
"disclosure_date": "2023-08-04",
165466+
"type": "exploit",
165467+
"author": [
165468+
"rgod",
165469+
"Michael Heinzl"
165470+
],
165471+
"description": "Unauthenticated Command Injection in LG Simple Editor <= v3.21.0.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\\SYSTEM.",
165472+
"references": [
165473+
"URL-https://www.zerodayinitiative.com/advisories/ZDI-23-1208/",
165474+
"CVE-2023-40504"
165475+
],
165476+
"platform": "Windows",
165477+
"arch": "cmd",
165478+
"rport": 8080,
165479+
"autofilter_ports": [
165480+
80,
165481+
8080,
165482+
443,
165483+
8000,
165484+
8888,
165485+
8880,
165486+
8008,
165487+
3000,
165488+
8443
165489+
],
165490+
"autofilter_services": [
165491+
"http",
165492+
"https"
165493+
],
165494+
"targets": [
165495+
"Windows_Fetch"
165496+
],
165497+
"mod_time": "2024-08-13 20:29:30 +0000",
165498+
"path": "/modules/exploits/windows/http/lg_simple_editor_rce_uploadvideo.rb",
165499+
"is_install_path": true,
165500+
"ref_name": "windows/http/lg_simple_editor_rce_uploadvideo",
165501+
"check": true,
165502+
"post_auth": false,
165503+
"default_credential": false,
165504+
"notes": {
165505+
"Stability": [
165506+
"crash-safe"
165507+
],
165508+
"Reliability": [
165509+
"repeatable-session"
165510+
],
165511+
"SideEffects": [
165512+
"ioc-in-logs"
165513+
]
165514+
},
165515+
"session_types": false,
165516+
"needs_cleanup": null
165517+
},
165458165518
"exploit_windows/http/mailenable_auth_header": {
165459165519
"name": "MailEnable Authorization Header Buffer Overflow",
165460165520
"fullname": "exploit/windows/http/mailenable_auth_header",

0 commit comments

Comments
 (0)