automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-12-28 07:22:50 -08:00
parent 29e7c49332
commit 2418dcf6aa
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 50 additions and 0 deletions

View File

@ -69282,6 +69282,56 @@
"notes": {
}
},
"exploit_multi/misc/consul_rexec_exec": {
"name": "Hashicorp Consul Remote Command Execution via Rexec",
"full_name": "exploit/multi/misc/consul_rexec_exec",
"rank": 600,
"disclosure_date": "2018-08-11",
"type": "exploit",
"author": [
"Bharadwaj Machiraju <bharadwaj.machiraju@gmail.com>",
"Francis Alexander <helofrancis@gmail.com>",
"Quentin Kaiser <kaiserquentin@gmail.com>"
],
"description": "This module exploits a feature of Hashicorp Consul named rexec.",
"references": [
"URL-https://www.consul.io/docs/agent/options.html#disable_remote_exec",
"URL-https://www.consul.io/docs/commands/exec.html",
"URL-https://github.com/torque59/Garfield"
],
"is_server": false,
"is_client": false,
"platform": "Linux",
"arch": "",
"rport": 8500,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Linux"
],
"mod_time": "2018-12-24 13:48:07 +0000",
"path": "/modules/exploits/multi/misc/consul_rexec_exec.rb",
"is_install_path": true,
"ref_name": "multi/misc/consul_rexec_exec",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_multi/misc/consul_service_exec": {
"name": "Hashicorp Consul Remote Command Execution via Services API",
"full_name": "exploit/multi/misc/consul_service_exec",