Skip to content

Commit 949ce3e

Browse files
committed
automatic module_metadata_base.json update
1 parent 5b4e3f0 commit 949ce3e

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed

db/modules_metadata_base.json

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41857,6 +41857,74 @@
4185741857

4185841858
]
4185941859
},
41860+
"auxiliary_scanner/http/telerik_report_server_auth_bypass": {
41861+
"name": "Telerik Report Server Auth Bypass",
41862+
"fullname": "auxiliary/scanner/http/telerik_report_server_auth_bypass",
41863+
"aliases": [
41864+
41865+
],
41866+
"rank": 300,
41867+
"disclosure_date": "2024-06-04",
41868+
"type": "auxiliary",
41869+
"author": [
41870+
"SinSinology",
41871+
"Spencer McIntyre"
41872+
],
41873+
"description": "This module exploits an authentication bypass vulnerability in Telerik Report Server versions 10.0.24.305 and\n prior which allows an unauthenticated attacker to create a new account with administrative privileges. The\n vulnerability leverages the initial setup page which is still accessible once the setup process has completed.\n\n If either USERNAME or PASSWORD are not specified, then a random value will be selected. The module will fail if\n the specified USERNAME already exists.",
41874+
"references": [
41875+
"CVE-2024-4358",
41876+
"URL-https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/"
41877+
],
41878+
"platform": "",
41879+
"arch": "",
41880+
"rport": 83,
41881+
"autofilter_ports": [
41882+
80,
41883+
8080,
41884+
443,
41885+
8000,
41886+
8888,
41887+
8880,
41888+
8008,
41889+
3000,
41890+
8443
41891+
],
41892+
"autofilter_services": [
41893+
"http",
41894+
"https"
41895+
],
41896+
"targets": null,
41897+
"mod_time": "2024-06-07 11:27:42 +0000",
41898+
"path": "/modules/auxiliary/scanner/http/telerik_report_server_auth_bypass.rb",
41899+
"is_install_path": true,
41900+
"ref_name": "scanner/http/telerik_report_server_auth_bypass",
41901+
"check": true,
41902+
"post_auth": false,
41903+
"default_credential": false,
41904+
"notes": {
41905+
"Stability": [
41906+
"crash-safe"
41907+
],
41908+
"SideEffects": [
41909+
"ioc-in-logs"
41910+
],
41911+
"Reliability": [
41912+
41913+
]
41914+
},
41915+
"session_types": false,
41916+
"needs_cleanup": false,
41917+
"actions": [
41918+
{
41919+
"name": "CHECK",
41920+
"description": "Check for the vulnerability"
41921+
},
41922+
{
41923+
"name": "EXPLOIT",
41924+
"description": "Exploit the vulnerability"
41925+
}
41926+
]
41927+
},
4186041928
"auxiliary_scanner/http/thinvnc_traversal": {
4186141929
"name": "ThinVNC Directory Traversal",
4186241930
"fullname": "auxiliary/scanner/http/thinvnc_traversal",

0 commit comments

Comments
 (0)