Skip to content

Commit ddaa21d

Browse files
committed
automatic module_metadata_base.json update
1 parent 120fa0f commit ddaa21d

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113181,6 +113181,69 @@
113181113181
"session_types": false,
113182113182
"needs_cleanup": true
113183113183
},
113184+
"exploit_multi/http/wp_hash_form_rce": {
113185+
"name": "WordPress Hash Form Plugin RCE",
113186+
"fullname": "exploit/multi/http/wp_hash_form_rce",
113187+
"aliases": [
113188+
113189+
],
113190+
"rank": 600,
113191+
"disclosure_date": "2024-05-23",
113192+
"type": "exploit",
113193+
"author": [
113194+
"Francesco Carlucci",
113195+
"Valentin Lobstein"
113196+
],
113197+
"description": "The Hash Form – Drag & Drop Form Builder plugin for WordPress suffers from a critical vulnerability\n due to missing file type validation in the file_upload_action function. This vulnerability exists\n in all versions up to and including 1.1.0. Unauthenticated attackers can exploit this flaw to upload arbitrary\n files, including PHP scripts, to the server, potentially allowing for remote code execution on the affected\n WordPress site. This module targets multiple platforms by adapting payload delivery and execution based on the\n server environment.",
113198+
"references": [
113199+
"CVE-2024-5084",
113200+
"URL-https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/hash-form/hash-form-drag-drop-form-builder-110-unauthenticated-arbitrary-file-upload-to-remote-code-execution"
113201+
],
113202+
"platform": "Linux,PHP,Unix,Windows",
113203+
"arch": "php, cmd",
113204+
"rport": 80,
113205+
"autofilter_ports": [
113206+
80,
113207+
8080,
113208+
443,
113209+
8000,
113210+
8888,
113211+
8880,
113212+
8008,
113213+
3000,
113214+
8443
113215+
],
113216+
"autofilter_services": [
113217+
"http",
113218+
"https"
113219+
],
113220+
"targets": [
113221+
"PHP In-Memory",
113222+
"Unix/Linux Command Shell",
113223+
"Windows Command Shell"
113224+
],
113225+
"mod_time": "2024-06-05 10:14:48 +0000",
113226+
"path": "/modules/exploits/multi/http/wp_hash_form_rce.rb",
113227+
"is_install_path": true,
113228+
"ref_name": "multi/http/wp_hash_form_rce",
113229+
"check": true,
113230+
"post_auth": false,
113231+
"default_credential": false,
113232+
"notes": {
113233+
"Stability": [
113234+
"crash-safe"
113235+
],
113236+
"Reliability": [
113237+
"repeatable-session"
113238+
],
113239+
"SideEffects": [
113240+
"ioc-in-logs",
113241+
"artifacts-on-disk"
113242+
]
113243+
},
113244+
"session_types": false,
113245+
"needs_cleanup": null
113246+
},
113184113247
"exploit_multi/http/wp_ninja_forms_unauthenticated_file_upload": {
113185113248
"name": "WordPress Ninja Forms Unauthenticated File Upload",
113186113249
"fullname": "exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload",

0 commit comments

Comments
 (0)