Skip to content

Commit 8849329

Browse files
committed
automatic module_metadata_base.json update
1 parent daf0ce9 commit 8849329

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed

db/modules_metadata_base.json

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98721,6 +98721,70 @@
9872198721
"session_types": false,
9872298722
"needs_cleanup": null
9872398723
},
98724+
"exploit_multi/http/atlassian_confluence_rce_cve_2024_21683": {
98725+
"name": "Atlassian Confluence Administrator Code Macro Remote Code Execution",
98726+
"fullname": "exploit/multi/http/atlassian_confluence_rce_cve_2024_21683",
98727+
"aliases": [
98728+
98729+
],
98730+
"rank": 600,
98731+
"disclosure_date": "2024-05-21",
98732+
"type": "exploit",
98733+
"author": [
98734+
"Ankita Sawlani",
98735+
"Huong Kieu",
98736+
"W01fh4cker",
98737+
"remmons-r7"
98738+
],
98739+
"description": "This module exploits an authenticated administrator-level vulnerability in Atlassian Confluence,\n tracked as CVE-2024-21683. The vulnerability exists due to the Rhino script engine parser evaluating\n tainted data from uploaded text files. This facilitates arbitrary code execution. This exploit will\n authenticate, validate user privileges, extract the underlying host OS information, then trigger\n remote code execution. All versions of Confluence prior to 7.17 are affected, as are many versions\n up to 8.9.0.",
98740+
"references": [
98741+
"CVE-2024-21683",
98742+
"URL-https://jira.atlassian.com/browse/CONFSERVER-95832",
98743+
"URL-https://realalphaman.substack.com/p/quick-note-about-cve-2024-21683-authenticated",
98744+
"URL-https://github.com/W01fh4cker/CVE-2024-21683-RCE"
98745+
],
98746+
"platform": "Linux,Unix,Windows",
98747+
"arch": "cmd",
98748+
"rport": 8090,
98749+
"autofilter_ports": [
98750+
80,
98751+
8080,
98752+
443,
98753+
8000,
98754+
8888,
98755+
8880,
98756+
8008,
98757+
3000,
98758+
8443
98759+
],
98760+
"autofilter_services": [
98761+
"http",
98762+
"https"
98763+
],
98764+
"targets": [
98765+
"Default"
98766+
],
98767+
"mod_time": "2024-07-10 20:45:53 +0000",
98768+
"path": "/modules/exploits/multi/http/atlassian_confluence_rce_cve_2024_21683.rb",
98769+
"is_install_path": true,
98770+
"ref_name": "multi/http/atlassian_confluence_rce_cve_2024_21683",
98771+
"check": true,
98772+
"post_auth": true,
98773+
"default_credential": false,
98774+
"notes": {
98775+
"Stability": [
98776+
"crash-safe"
98777+
],
98778+
"Reliability": [
98779+
"repeatable-session"
98780+
],
98781+
"SideEffects": [
98782+
"ioc-in-logs"
98783+
]
98784+
},
98785+
"session_types": false,
98786+
"needs_cleanup": null
98787+
},
9872498788
"exploit_multi/http/atlassian_confluence_unauth_backup": {
9872598789
"name": "Atlassian Confluence Unauth JSON setup-restore Improper Authorization leading to RCE (CVE-2023-22518)",
9872698790
"fullname": "exploit/multi/http/atlassian_confluence_unauth_backup",

0 commit comments

Comments
 (0)