Skip to content

Commit f783aab

Browse files
committed
automatic module_metadata_base.json update
1 parent 6c24e0a commit f783aab

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

db/modules_metadata_base.json

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -98936,7 +98936,7 @@
9893698936
"needs_cleanup": true
9893798937
},
9893898938
"exploit_multi/http/apache_ofbiz_forgot_password_directory_traversal": {
98939-
"name": "Apache OFBiz Forgot Password Directory Traversal",
98939+
"name": "Apache OFBiz forgotPassword/ProgramExport RCE",
9894098940
"fullname": "exploit/multi/http/apache_ofbiz_forgot_password_directory_traversal",
9894198941
"aliases": [
9894298942

@@ -98948,11 +98948,12 @@
9894898948
"Mr-xn",
9894998949
"jheysel-r7"
9895098950
],
98951-
"description": "Apache OFBiz versions prior to 18.12.13 are vulnerable to a path traversal vulnerability. The vulnerable\n endpoint /webtools/control/forgotPassword allows an attacker to access the ProgramExport endpoint which in\n turn allows for remote code execution in the context of the user running the application.",
98951+
"description": "Apache OFBiz versions prior to 18.12.13 are vulnerable to a path traversal vulnerability (CVE-2024-32113). The\n vulnerable endpoint /webtools/control/forgotPassword allows an attacker to access the ProgramExport endpoint\n which in turn allows for remote code execution in the context of the user running the application. This was\n patched in 18.12.14.\n\n It was then discovered that the use of the path traversal vulnerability is not required in order to access\n the vulnerable endpoint ProgramExport. CVE-2024-38856 was given for this Incorrect Authorization vulnerability\n and was patched in 18.12.15.\n\n This module was originally written the exploit CVE-2024-32113, but upon the discovery of CVE-2024-38856 the\n module updated to not exploit the path traversal vulnerability allowing for exploitation on 18.12.14 as well.",
9895298952
"references": [
9895398953
"URL-https://github.com/Mr-xn/CVE-2024-32113",
9895498954
"URL-https://xz.aliyun.com/t/14733?time__1311=mqmx9Qwx0WDsd5YK0%3Dai%3Dmd7KbxGupD&alichlgref=https%3A%2F%2Fgithub.com%2FMr-xn%2FCVE-2024-32113",
98955-
"CVE-2024-32113"
98955+
"CVE-2024-32113",
98956+
"CVE-2024-38856"
9895698957
],
9895798958
"platform": "Linux,Windows",
9895898959
"arch": "cmd",
@@ -98976,7 +98977,7 @@
9897698977
"Linux Command",
9897798978
"Windows Command"
9897898979
],
98979-
"mod_time": "2024-06-14 16:59:55 +0000",
98980+
"mod_time": "2024-08-16 12:17:56 +0000",
9898098981
"path": "/modules/exploits/multi/http/apache_ofbiz_forgot_password_directory_traversal.rb",
9898198982
"is_install_path": true,
9898298983
"ref_name": "multi/http/apache_ofbiz_forgot_password_directory_traversal",

0 commit comments

Comments
 (0)