automatic module_metadata_base.json update
parent
2b22a5e9a3
commit
4e209e4153
|
@ -45203,6 +45203,58 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_linux/http/cisco_rv32x_rce": {
|
||||
"name": "Cisco RV320 and RV325 Unauthenticated Remote Code Execution",
|
||||
"full_name": "exploit/linux/http/cisco_rv32x_rce",
|
||||
"rank": 300,
|
||||
"disclosure_date": "2018-09-09",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"RedTeam Pentesting GmbH",
|
||||
"Philip Huppert",
|
||||
"Benjamin Grap"
|
||||
],
|
||||
"description": "This exploit module combines an information disclosure (CVE-2019-1653)\n and a command injection vulnerability (CVE-2019-1652) together to gain\n unauthenticated remote code execution on Cisco RV320 and RV325 small business\n routers. Can be exploited via the WAN interface of the router. Either via HTTPS\n on port 443 or HTTP on port 8007 on some older firmware versions.",
|
||||
"references": [
|
||||
"CVE-2019-1653",
|
||||
"CVE-2019-1652",
|
||||
"EDB-46243",
|
||||
"BID-106728",
|
||||
"BID-106732",
|
||||
"URL-https://www.redteam-pentesting.de/en/advisories/rt-sa-2018-002/-cisco-rv320-unauthenticated-configuration-export",
|
||||
"URL-https://www.redteam-pentesting.de/en/advisories/rt-sa-2018-004/-cisco-rv320-command-injection"
|
||||
],
|
||||
"platform": "Linux",
|
||||
"arch": "",
|
||||
"rport": 8007,
|
||||
"autofilter_ports": [
|
||||
80,
|
||||
8080,
|
||||
443,
|
||||
8000,
|
||||
8888,
|
||||
8880,
|
||||
8008,
|
||||
3000,
|
||||
8443
|
||||
],
|
||||
"autofilter_services": [
|
||||
"http",
|
||||
"https"
|
||||
],
|
||||
"targets": [
|
||||
"LINUX MIPS64"
|
||||
],
|
||||
"mod_time": "2019-03-20 14:21:40 +0000",
|
||||
"path": "/modules/exploits/linux/http/cisco_rv32x_rce.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/http/cisco_rv32x_rce",
|
||||
"check": true,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_linux/http/crypttech_cryptolog_login_exec": {
|
||||
"name": "Crypttech CryptoLog Remote Code Execution",
|
||||
"full_name": "exploit/linux/http/crypttech_cryptolog_login_exec",
|
||||
|
|
Loading…
Reference in New Issue