Skip to content

Commit e600f19

Browse files
committed
automatic module_metadata_base.json update
1 parent ba7c7b6 commit e600f19

File tree

1 file changed

+64
-50
lines changed

1 file changed

+64
-50
lines changed

db/modules_metadata_base.json

Lines changed: 64 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -106749,56 +106749,6 @@
106749106749
"session_types": false,
106750106750
"needs_cleanup": null
106751106751
},
106752-
"exploit_multi/http/openmediavault_cmd_exec": {
106753-
"name": "OpenMediaVault Cron Remote Command Execution",
106754-
"fullname": "exploit/multi/http/openmediavault_cmd_exec",
106755-
"aliases": [
106756-
106757-
],
106758-
"rank": 600,
106759-
"disclosure_date": "2013-10-30",
106760-
"type": "exploit",
106761-
"author": [
106762-
"Brandon Perry <[email protected]>"
106763-
],
106764-
"description": "OpenMediaVault allows an authenticated user to create cron jobs as arbitrary users on the system.\n An attacker can abuse this to run arbitrary commands as any user available on the system (including root).",
106765-
"references": [
106766-
"CVE-2013-3632",
106767-
"URL-https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats"
106768-
],
106769-
"platform": "Linux,Unix",
106770-
"arch": "cmd",
106771-
"rport": 80,
106772-
"autofilter_ports": [
106773-
80,
106774-
8080,
106775-
443,
106776-
8000,
106777-
8888,
106778-
8880,
106779-
8008,
106780-
3000,
106781-
8443
106782-
],
106783-
"autofilter_services": [
106784-
"http",
106785-
"https"
106786-
],
106787-
"targets": [
106788-
"Automatic"
106789-
],
106790-
"mod_time": "2022-01-23 15:28:32 +0000",
106791-
"path": "/modules/exploits/multi/http/openmediavault_cmd_exec.rb",
106792-
"is_install_path": true,
106793-
"ref_name": "multi/http/openmediavault_cmd_exec",
106794-
"check": false,
106795-
"post_auth": true,
106796-
"default_credential": false,
106797-
"notes": {
106798-
},
106799-
"session_types": false,
106800-
"needs_cleanup": null
106801-
},
106802106752
"exploit_multi/http/openmrs_deserialization": {
106803106753
"name": "OpenMRS Java Deserialization RCE",
106804106754
"fullname": "exploit/multi/http/openmrs_deserialization",
@@ -128735,6 +128685,70 @@
128735128685
"session_types": false,
128736128686
"needs_cleanup": true
128737128687
},
128688+
"exploit_unix/webapp/openmediavault_auth_cron_rce": {
128689+
"name": "OpenMediaVault rpc.php Authenticated Cron Remote Code Execution",
128690+
"fullname": "exploit/unix/webapp/openmediavault_auth_cron_rce",
128691+
"aliases": [
128692+
"exploit/multi/http/openmediavault_cmd_exec"
128693+
],
128694+
"rank": 600,
128695+
"disclosure_date": "2013-10-30",
128696+
"type": "exploit",
128697+
"author": [
128698+
"h00die-gr3y <[email protected]>",
128699+
"Brandon Perry <[email protected]>"
128700+
],
128701+
"description": "OpenMediaVault allows an authenticated user to create cron jobs as root on the system.\n An attacker can abuse this by sending a POST request via rpc.php to schedule and execute\n a cron entry that runs arbitrary commands as root on the system.\n All OpenMediaVault versions including the latest release 7.4.2-2 are vulnerable.",
128702+
"references": [
128703+
"CVE-2013-3632",
128704+
"PACKETSTORM-178526",
128705+
"URL-https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats",
128706+
"URL-https://attackerkb.com/topics/zl1kmXbAce/cve-2013-3632"
128707+
],
128708+
"platform": "Linux,Unix",
128709+
"arch": "cmd, x86, x64, armle, aarch64",
128710+
"rport": 80,
128711+
"autofilter_ports": [
128712+
80,
128713+
8080,
128714+
443,
128715+
8000,
128716+
8888,
128717+
8880,
128718+
8008,
128719+
3000,
128720+
8443
128721+
],
128722+
"autofilter_services": [
128723+
"http",
128724+
"https"
128725+
],
128726+
"targets": [
128727+
"Unix Command",
128728+
"Linux Dropper"
128729+
],
128730+
"mod_time": "2024-07-29 14:02:29 +0000",
128731+
"path": "/modules/exploits/unix/webapp/openmediavault_auth_cron_rce.rb",
128732+
"is_install_path": true,
128733+
"ref_name": "unix/webapp/openmediavault_auth_cron_rce",
128734+
"check": true,
128735+
"post_auth": true,
128736+
"default_credential": false,
128737+
"notes": {
128738+
"Stability": [
128739+
"crash-safe"
128740+
],
128741+
"Reliability": [
128742+
"repeatable-session"
128743+
],
128744+
"SideEffects": [
128745+
"ioc-in-logs",
128746+
"artifacts-on-disk"
128747+
]
128748+
},
128749+
"session_types": false,
128750+
"needs_cleanup": null
128751+
},
128738128752
"exploit_unix/webapp/openmediavault_rpc_rce": {
128739128753
"name": "OpenMediaVault rpc.php Authenticated PHP Code Injection",
128740128754
"fullname": "exploit/unix/webapp/openmediavault_rpc_rce",

0 commit comments

Comments
 (0)