diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index b15c492d03..7376b99f2e 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -69282,6 +69282,56 @@ "notes": { } }, + "exploit_multi/misc/consul_rexec_exec": { + "name": "Hashicorp Consul Remote Command Execution via Rexec", + "full_name": "exploit/multi/misc/consul_rexec_exec", + "rank": 600, + "disclosure_date": "2018-08-11", + "type": "exploit", + "author": [ + "Bharadwaj Machiraju ", + "Francis Alexander ", + "Quentin Kaiser " + ], + "description": "This module exploits a feature of Hashicorp Consul named rexec.", + "references": [ + "URL-https://www.consul.io/docs/agent/options.html#disable_remote_exec", + "URL-https://www.consul.io/docs/commands/exec.html", + "URL-https://github.com/torque59/Garfield" + ], + "is_server": false, + "is_client": false, + "platform": "Linux", + "arch": "", + "rport": 8500, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Linux" + ], + "mod_time": "2018-12-24 13:48:07 +0000", + "path": "/modules/exploits/multi/misc/consul_rexec_exec.rb", + "is_install_path": true, + "ref_name": "multi/misc/consul_rexec_exec", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + } + }, "exploit_multi/misc/consul_service_exec": { "name": "Hashicorp Consul Remote Command Execution via Services API", "full_name": "exploit/multi/misc/consul_service_exec",