Skip to content

Commit 7ad7b95

Browse files
committed
automatic module_metadata_base.json update
1 parent aabd9fe commit 7ad7b95

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed

db/modules_metadata_base.json

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164561,6 +164561,70 @@
164561164561
"session_types": false,
164562164562
"needs_cleanup": true
164563164563
},
164564+
"exploit_windows/http/ivanti_epm_recordgoodapp_sqli_rce": {
164565+
"name": "Ivanti EPM RecordGoodApp SQLi RCE",
164566+
"fullname": "exploit/windows/http/ivanti_epm_recordgoodapp_sqli_rce",
164567+
"aliases": [
164568+
164569+
],
164570+
"rank": 300,
164571+
"disclosure_date": "2024-05-24",
164572+
"type": "exploit",
164573+
"author": [
164574+
"James Horseman",
164575+
"Christophe De La Fuente"
164576+
],
164577+
"description": "Ivanti Endpoint Manager (EPM) 2022 SU5 and prior are vulnerable to unauthenticated SQL injection which can be leveraged to achieve unauthenticated remote code execution.",
164578+
"references": [
164579+
"URL-https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
164580+
"URL-https://www.zerodayinitiative.com/advisories/ZDI-24-507",
164581+
"URL-https://github.com/horizon3ai/CVE-2024-29824",
164582+
"URL-https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29824-deep-dive-ivanti-epm-sql-injection-remote-code-execution-vulnerability/",
164583+
"CVE-2024-29824"
164584+
],
164585+
"platform": "Windows",
164586+
"arch": "cmd",
164587+
"rport": 80,
164588+
"autofilter_ports": [
164589+
80,
164590+
8080,
164591+
443,
164592+
8000,
164593+
8888,
164594+
8880,
164595+
8008,
164596+
3000,
164597+
8443
164598+
],
164599+
"autofilter_services": [
164600+
"http",
164601+
"https"
164602+
],
164603+
"targets": [
164604+
"Automatic Target"
164605+
],
164606+
"mod_time": "2024-06-21 10:13:08 +0000",
164607+
"path": "/modules/exploits/windows/http/ivanti_epm_recordgoodapp_sqli_rce.rb",
164608+
"is_install_path": true,
164609+
"ref_name": "windows/http/ivanti_epm_recordgoodapp_sqli_rce",
164610+
"check": true,
164611+
"post_auth": false,
164612+
"default_credential": false,
164613+
"notes": {
164614+
"Stability": [
164615+
"crash-safe"
164616+
],
164617+
"Reliability": [
164618+
"repeatable-session"
164619+
],
164620+
"SideEffects": [
164621+
"ioc-in-logs",
164622+
"artifacts-on-disk"
164623+
]
164624+
},
164625+
"session_types": false,
164626+
"needs_cleanup": null
164627+
},
164564164628
"exploit_windows/http/jira_collector_traversal": {
164565164629
"name": "JIRA Issues Collector Directory Traversal",
164566164630
"fullname": "exploit/windows/http/jira_collector_traversal",

0 commit comments

Comments
 (0)