automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2019-02-12 13:19:19 -08:00
parent cdc0728c44
commit 3ccbaee0b1
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 52 additions and 0 deletions

View File

@ -7312,6 +7312,58 @@
"notes": {
}
},
"auxiliary_admin/wemo/crockpot": {
"name": "Belkin Wemo-Enabled Crock-Pot Remote Control",
"full_name": "auxiliary/admin/wemo/crockpot",
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"wvu <wvu@metasploit.com>"
],
"description": "This module acts as a simple remote control for Belkin Wemo-enabled\n Crock-Pots by implementing a subset of the functionality provided by the\n Wemo App.\n\n No vulnerabilities are exploited by this Metasploit module in any way.",
"references": [
"URL-https://www.crock-pot.com/wemo-landing-page.html",
"URL-https://www.belkin.com/us/support-article?articleNum=101177",
"URL-http://www.wemo.com/"
],
"is_server": false,
"is_client": false,
"platform": "",
"arch": "",
"rport": 49152,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2019-02-12 13:29:52 +0000",
"path": "/modules/auxiliary/admin/wemo/crockpot.rb",
"is_install_path": true,
"ref_name": "admin/wemo/crockpot",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"physical-effects"
]
}
},
"auxiliary_admin/zend/java_bridge": {
"name": "Zend Server Java Bridge Design Flaw Remote Code Execution",
"full_name": "auxiliary/admin/zend/java_bridge",