Skip to content

Commit dd3b931

Browse files
committed
automatic module_metadata_base.json update
1 parent 0b0f9cd commit dd3b931

File tree

1 file changed

+68
-2
lines changed

1 file changed

+68
-2
lines changed

db/modules_metadata_base.json

Lines changed: 68 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114538,6 +114538,72 @@
114538114538
"session_types": false,
114539114539
"needs_cleanup": true
114540114540
},
114541+
"exploit_multi/http/wp_givewp_rce": {
114542+
"name": "GiveWP Unauthenticated Donation Process Exploit",
114543+
"fullname": "exploit/multi/http/wp_givewp_rce",
114544+
"aliases": [
114545+
114546+
],
114547+
"rank": 600,
114548+
"disclosure_date": "2024-08-25",
114549+
"type": "exploit",
114550+
"author": [
114551+
"Villu Orav",
114552+
"EQSTSeminar",
114553+
"Julien Ahrens",
114554+
"Valentin Lobstein"
114555+
],
114556+
"description": "The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP Object Injection (POI) attack granting an unauthenticated arbitrary code execution.",
114557+
"references": [
114558+
"CVE-2024-5932",
114559+
"URL-https://github.com/EQSTSeminar/CVE-2024-5932",
114560+
"URL-https://www.rcesecurity.com/2024/08/wordpress-givewp-pop-to-rce-cve-2024-5932",
114561+
"URL-https://www.wordfence.com/blog/2024/08/4998-bounty-awarded-and-100000-wordpress-sites-protected-against-unauthenticated-remote-code-execution-vulnerability-patched-in-givewp-wordpress-plugin"
114562+
],
114563+
"platform": "Linux,Unix,Windows",
114564+
"arch": "cmd",
114565+
"rport": 80,
114566+
"autofilter_ports": [
114567+
80,
114568+
8080,
114569+
443,
114570+
8000,
114571+
8888,
114572+
8880,
114573+
8008,
114574+
3000,
114575+
8443
114576+
],
114577+
"autofilter_services": [
114578+
"http",
114579+
"https"
114580+
],
114581+
"targets": [
114582+
"Unix/Linux Command Shell",
114583+
"Windows Command Shell"
114584+
],
114585+
"mod_time": "2024-08-28 19:21:27 +0000",
114586+
"path": "/modules/exploits/multi/http/wp_givewp_rce.rb",
114587+
"is_install_path": true,
114588+
"ref_name": "multi/http/wp_givewp_rce",
114589+
"check": true,
114590+
"post_auth": false,
114591+
"default_credential": false,
114592+
"notes": {
114593+
"Stability": [
114594+
"crash-safe"
114595+
],
114596+
"Reliability": [
114597+
"repeatable-session"
114598+
],
114599+
"SideEffects": [
114600+
"ioc-in-logs",
114601+
"artifacts-on-disk"
114602+
]
114603+
},
114604+
"session_types": false,
114605+
"needs_cleanup": null
114606+
},
114541114607
"exploit_multi/http/wp_hash_form_rce": {
114542114608
"name": "WordPress Hash Form Plugin RCE",
114543114609
"fullname": "exploit/multi/http/wp_hash_form_rce",
@@ -254687,7 +254753,7 @@
254687254753
"author": [
254688254754
"Carlos Perez <[email protected]>"
254689254755
],
254690-
"description": "This module attempts to determine whether the system is running\n inside of a virtual environment and if so, which one. This\n module supports detection of Hyper-V, VMWare, VirtualBox, Xen,\n and QEMU/KVM.",
254756+
"description": "This module attempts to determine whether the system is running\n inside of a virtual environment and if so, which one. This\n module supports detection of Hyper-V, VMWare, VirtualBox, Xen,\n Bhyve and QEMU/KVM.",
254691254757
"references": [
254692254758

254693254759
],
@@ -254697,7 +254763,7 @@
254697254763
"autofilter_ports": null,
254698254764
"autofilter_services": null,
254699254765
"targets": null,
254700-
"mod_time": "2023-08-22 12:36:48 +0000",
254766+
"mod_time": "2024-08-22 23:19:09 +0000",
254701254767
"path": "/modules/post/linux/gather/checkvm.rb",
254702254768
"is_install_path": true,
254703254769
"ref_name": "linux/gather/checkvm",

0 commit comments

Comments
 (0)