automatic module_metadata_base.json update
parent
10cd6c99d9
commit
5f092c03a1
|
@ -31963,7 +31963,7 @@
|
|||
"name": "IBM QRadar SIEM Unauthenticated Remote Code Execution",
|
||||
"full_name": "exploit/linux/http/ibm_qradar_unauth_rce",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2018-05-28",
|
||||
"disclosure_date": "2018-05-28 00:00:00 +0000",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Pedro Ribeiro <pedrib@gmail.com>"
|
||||
|
@ -41012,6 +41012,37 @@
|
|||
"is_install_path": true,
|
||||
"ref_name": "multi/http/mobilecartly_upload_exec"
|
||||
},
|
||||
"exploit_multi/http/monstra_fileupload_exec": {
|
||||
"name": "Monstra CMS Authenticated Arbitrary File Upload",
|
||||
"full_name": "exploit/multi/http/monstra_fileupload_exec",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2017-12-18",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Ishaq Mohammed <shaikhishaq201@gmail.com>",
|
||||
"Touhid M.Shaikh <touhidshaikh22@gmail.com>"
|
||||
],
|
||||
"description": "MonstraCMS 3.0.4 allows users to upload Arbitrary files which leads to remote command execution on the remote server.\n An attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file.\n This module was tested against MonstraCMS 3.0.4.",
|
||||
"references": [
|
||||
"CVE-2017-18048",
|
||||
"EDB-43348",
|
||||
"URL-https://blogs.securiteam.com/index.php/archives/3559",
|
||||
"URL-https://securityprince.blogspot.com/2017/12/monstra-cms-304-arbitrary-file-upload.html?m=1",
|
||||
"URL-https://www.youtube.com/watch?v=-ziZ6DELbzw"
|
||||
],
|
||||
"is_server": true,
|
||||
"is_client": false,
|
||||
"platform": "PHP",
|
||||
"arch": "php",
|
||||
"rport": "80",
|
||||
"targets": [
|
||||
"Monstra CMS 3.0.4"
|
||||
],
|
||||
"mod_time": "2018-07-10 14:13:57 +0000",
|
||||
"path": "/modules/exploits/multi/http/monstra_fileupload_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/monstra_fileupload_exec"
|
||||
},
|
||||
"exploit_multi/http/moodle_cmd_exec": {
|
||||
"name": "Moodle Remote Command Execution",
|
||||
"full_name": "exploit/multi/http/moodle_cmd_exec",
|
||||
|
|
Loading…
Reference in New Issue