@@ -106749,56 +106749,6 @@
106749
106749
"session_types": false,
106750
106750
"needs_cleanup": null
106751
106751
},
106752
- "exploit_multi/http/openmediavault_cmd_exec": {
106753
- "name": "OpenMediaVault Cron Remote Command Execution",
106754
- "fullname": "exploit/multi/http/openmediavault_cmd_exec",
106755
- "aliases": [
106756
-
106757
- ],
106758
- "rank": 600,
106759
- "disclosure_date": "2013-10-30",
106760
- "type": "exploit",
106761
- "author": [
106762
- "Brandon Perry <
[email protected] >"
106763
- ],
106764
- "description": "OpenMediaVault allows an authenticated user to create cron jobs as arbitrary users on the system.\n An attacker can abuse this to run arbitrary commands as any user available on the system (including root).",
106765
- "references": [
106766
- "CVE-2013-3632",
106767
- "URL-https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats"
106768
- ],
106769
- "platform": "Linux,Unix",
106770
- "arch": "cmd",
106771
- "rport": 80,
106772
- "autofilter_ports": [
106773
- 80,
106774
- 8080,
106775
- 443,
106776
- 8000,
106777
- 8888,
106778
- 8880,
106779
- 8008,
106780
- 3000,
106781
- 8443
106782
- ],
106783
- "autofilter_services": [
106784
- "http",
106785
- "https"
106786
- ],
106787
- "targets": [
106788
- "Automatic"
106789
- ],
106790
- "mod_time": "2022-01-23 15:28:32 +0000",
106791
- "path": "/modules/exploits/multi/http/openmediavault_cmd_exec.rb",
106792
- "is_install_path": true,
106793
- "ref_name": "multi/http/openmediavault_cmd_exec",
106794
- "check": false,
106795
- "post_auth": true,
106796
- "default_credential": false,
106797
- "notes": {
106798
- },
106799
- "session_types": false,
106800
- "needs_cleanup": null
106801
- },
106802
106752
"exploit_multi/http/openmrs_deserialization": {
106803
106753
"name": "OpenMRS Java Deserialization RCE",
106804
106754
"fullname": "exploit/multi/http/openmrs_deserialization",
@@ -128735,6 +128685,70 @@
128735
128685
"session_types": false,
128736
128686
"needs_cleanup": true
128737
128687
},
128688
+ "exploit_unix/webapp/openmediavault_auth_cron_rce": {
128689
+ "name": "OpenMediaVault rpc.php Authenticated Cron Remote Code Execution",
128690
+ "fullname": "exploit/unix/webapp/openmediavault_auth_cron_rce",
128691
+ "aliases": [
128692
+ "exploit/multi/http/openmediavault_cmd_exec"
128693
+ ],
128694
+ "rank": 600,
128695
+ "disclosure_date": "2013-10-30",
128696
+ "type": "exploit",
128697
+ "author": [
128698
+ "h00die-gr3y <
[email protected] >",
128699
+ "Brandon Perry <
[email protected] >"
128700
+ ],
128701
+ "description": "OpenMediaVault allows an authenticated user to create cron jobs as root on the system.\n An attacker can abuse this by sending a POST request via rpc.php to schedule and execute\n a cron entry that runs arbitrary commands as root on the system.\n All OpenMediaVault versions including the latest release 7.4.2-2 are vulnerable.",
128702
+ "references": [
128703
+ "CVE-2013-3632",
128704
+ "PACKETSTORM-178526",
128705
+ "URL-https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats",
128706
+ "URL-https://attackerkb.com/topics/zl1kmXbAce/cve-2013-3632"
128707
+ ],
128708
+ "platform": "Linux,Unix",
128709
+ "arch": "cmd, x86, x64, armle, aarch64",
128710
+ "rport": 80,
128711
+ "autofilter_ports": [
128712
+ 80,
128713
+ 8080,
128714
+ 443,
128715
+ 8000,
128716
+ 8888,
128717
+ 8880,
128718
+ 8008,
128719
+ 3000,
128720
+ 8443
128721
+ ],
128722
+ "autofilter_services": [
128723
+ "http",
128724
+ "https"
128725
+ ],
128726
+ "targets": [
128727
+ "Unix Command",
128728
+ "Linux Dropper"
128729
+ ],
128730
+ "mod_time": "2024-07-29 14:02:29 +0000",
128731
+ "path": "/modules/exploits/unix/webapp/openmediavault_auth_cron_rce.rb",
128732
+ "is_install_path": true,
128733
+ "ref_name": "unix/webapp/openmediavault_auth_cron_rce",
128734
+ "check": true,
128735
+ "post_auth": true,
128736
+ "default_credential": false,
128737
+ "notes": {
128738
+ "Stability": [
128739
+ "crash-safe"
128740
+ ],
128741
+ "Reliability": [
128742
+ "repeatable-session"
128743
+ ],
128744
+ "SideEffects": [
128745
+ "ioc-in-logs",
128746
+ "artifacts-on-disk"
128747
+ ]
128748
+ },
128749
+ "session_types": false,
128750
+ "needs_cleanup": null
128751
+ },
128738
128752
"exploit_unix/webapp/openmediavault_rpc_rce": {
128739
128753
"name": "OpenMediaVault rpc.php Authenticated PHP Code Injection",
128740
128754
"fullname": "exploit/unix/webapp/openmediavault_rpc_rce",
0 commit comments