Skip to content

Commit db5ace8

Browse files
committed
automatic module_metadata_base.json update
1 parent 636c729 commit db5ace8

File tree

1 file changed

+66
-0
lines changed

1 file changed

+66
-0
lines changed

db/modules_metadata_base.json

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169111,6 +169111,72 @@
169111169111
"session_types": false,
169112169112
"needs_cleanup": null
169113169113
},
169114+
"exploit_windows/http/softing_sis_rce": {
169115+
"name": "Softing Secure Integration Server v1.22 Remote Code Execution",
169116+
"fullname": "exploit/windows/http/softing_sis_rce",
169117+
"aliases": [
169118+
169119+
],
169120+
"rank": 600,
169121+
"disclosure_date": "2022-07-27",
169122+
"type": "exploit",
169123+
"author": [
169124+
"Chris Anastasio (muffin) of Incite Team",
169125+
"Steven Seeley (mr_me) of Incite Team",
169126+
"Imran E. Dawoodjee <[email protected]>"
169127+
],
169128+
"description": "This module chains two vulnerabilities (CVE-2022-1373 and CVE-2022-2334) to achieve authenticated remote code execution against Softing Secure Integration Server v1.22.\n\n In CVE-2022-1373, the restore configuration feature is vulnerable to a directory traversal vulnerablity when processing zip files. When using the \"restore configuration\" feature to upload a zip file containing a path traversal file which is a dll called ..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\Windows\\System32\\wbem\\wbemcomn.dll. This causes the file C:\\Windows\\System32\\wbem\\wbemcomn.dll to be created and executed upon touching the disk.\n\n In CVE-2022-2334, the planted wbemcomn.dll is used in a DLL hijacking attack when Softing Secure Integration Server restarts upon restoring configuration, which allows us to execute arbitrary code on the target system.\n\n The chain demonstrated in Pwn2Own used a signature instead of a password. The signature was acquired by running an ARP spoofing attack against the local network where the Softing SIS server was located. A username is also required for signature authentication.\n\n A custom DLL can be provided to use in the exploit instead of using the default MSF-generated one. Refer to the module documentation for more details.",
169129+
"references": [
169130+
"CVE-2022-1373",
169131+
"CVE-2022-2334",
169132+
"ZDI-22-1154",
169133+
"ZDI-22-1156",
169134+
"URL-https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html",
169135+
"URL-https://ide0x90.github.io/softing-sis-122-rce/"
169136+
],
169137+
"platform": "Windows",
169138+
"arch": "x64",
169139+
"rport": 8099,
169140+
"autofilter_ports": [
169141+
80,
169142+
8080,
169143+
443,
169144+
8000,
169145+
8888,
169146+
8880,
169147+
8008,
169148+
3000,
169149+
8443
169150+
],
169151+
"autofilter_services": [
169152+
"http",
169153+
"https"
169154+
],
169155+
"targets": [
169156+
"Windows x64"
169157+
],
169158+
"mod_time": "2024-04-19 23:05:02 +0000",
169159+
"path": "/modules/exploits/windows/http/softing_sis_rce.rb",
169160+
"is_install_path": true,
169161+
"ref_name": "windows/http/softing_sis_rce",
169162+
"check": true,
169163+
"post_auth": false,
169164+
"default_credential": false,
169165+
"notes": {
169166+
"Stability": [
169167+
"crash-safe"
169168+
],
169169+
"Reliability": [
169170+
"repeatable-session"
169171+
],
169172+
"SideEffects": [
169173+
"artifacts-on-disk",
169174+
"ioc-in-logs"
169175+
]
169176+
},
169177+
"session_types": false,
169178+
"needs_cleanup": true
169179+
},
169114169180
"exploit_windows/http/solarwinds_fsm_userlogin": {
169115169181
"name": "Solarwinds Firewall Security Manager 6.6.5 Client Session Handling Vulnerability",
169116169182
"fullname": "exploit/windows/http/solarwinds_fsm_userlogin",

0 commit comments

Comments
 (0)