Skip to content

Commit d6a03b2

Browse files
committed
automatic module_metadata_base.json update
1 parent afd0f19 commit d6a03b2

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2233,6 +2233,69 @@
22332233

22342234
]
22352235
},
2236+
"auxiliary_admin/http/fortra_filecatalyst_workflow_sqli": {
2237+
"name": "Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)",
2238+
"fullname": "auxiliary/admin/http/fortra_filecatalyst_workflow_sqli",
2239+
"aliases": [
2240+
2241+
],
2242+
"rank": 300,
2243+
"disclosure_date": "2024-06-25",
2244+
"type": "auxiliary",
2245+
"author": [
2246+
"Tenable",
2247+
"Michael Heinzl"
2248+
],
2249+
"description": "This module exploits a SQL injection vulnerability in Fortra FileCatalyst Workflow <= v5.1.6 Build 135, by adding a new\n administrative user to the web interface of the application.",
2250+
"references": [
2251+
"CVE-2024-5276",
2252+
"URL-https://www.tenable.com/security/research/tra-2024-25",
2253+
"URL-https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0"
2254+
],
2255+
"platform": "",
2256+
"arch": "",
2257+
"rport": 8080,
2258+
"autofilter_ports": [
2259+
80,
2260+
8080,
2261+
443,
2262+
8000,
2263+
8888,
2264+
8880,
2265+
8008,
2266+
3000,
2267+
8443
2268+
],
2269+
"autofilter_services": [
2270+
"http",
2271+
"https"
2272+
],
2273+
"targets": null,
2274+
"mod_time": "2024-08-16 14:12:41 +0000",
2275+
"path": "/modules/auxiliary/admin/http/fortra_filecatalyst_workflow_sqli.rb",
2276+
"is_install_path": true,
2277+
"ref_name": "admin/http/fortra_filecatalyst_workflow_sqli",
2278+
"check": false,
2279+
"post_auth": true,
2280+
"default_credential": false,
2281+
"notes": {
2282+
"Stability": [
2283+
"crash-safe"
2284+
],
2285+
"Reliability": [
2286+
"repeatable-session"
2287+
],
2288+
"SideEffects": [
2289+
"ioc-in-logs",
2290+
"config-changes"
2291+
]
2292+
},
2293+
"session_types": false,
2294+
"needs_cleanup": false,
2295+
"actions": [
2296+
2297+
]
2298+
},
22362299
"auxiliary_admin/http/gitlab_password_reset_account_takeover": {
22372300
"name": "GitLab Password Reset Account Takeover",
22382301
"fullname": "auxiliary/admin/http/gitlab_password_reset_account_takeover",

0 commit comments

Comments
 (0)