automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-07-10 12:43:02 -07:00
parent 10cd6c99d9
commit 5f092c03a1
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 32 additions and 1 deletions

View File

@ -31963,7 +31963,7 @@
"name": "IBM QRadar SIEM Unauthenticated Remote Code Execution",
"full_name": "exploit/linux/http/ibm_qradar_unauth_rce",
"rank": 600,
"disclosure_date": "2018-05-28",
"disclosure_date": "2018-05-28 00:00:00 +0000",
"type": "exploit",
"author": [
"Pedro Ribeiro <pedrib@gmail.com>"
@ -41012,6 +41012,37 @@
"is_install_path": true,
"ref_name": "multi/http/mobilecartly_upload_exec"
},
"exploit_multi/http/monstra_fileupload_exec": {
"name": "Monstra CMS Authenticated Arbitrary File Upload",
"full_name": "exploit/multi/http/monstra_fileupload_exec",
"rank": 600,
"disclosure_date": "2017-12-18",
"type": "exploit",
"author": [
"Ishaq Mohammed <shaikhishaq201@gmail.com>",
"Touhid M.Shaikh <touhidshaikh22@gmail.com>"
],
"description": "MonstraCMS 3.0.4 allows users to upload Arbitrary files which leads to remote command execution on the remote server.\n An attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file.\n This module was tested against MonstraCMS 3.0.4.",
"references": [
"CVE-2017-18048",
"EDB-43348",
"URL-https://blogs.securiteam.com/index.php/archives/3559",
"URL-https://securityprince.blogspot.com/2017/12/monstra-cms-304-arbitrary-file-upload.html?m=1",
"URL-https://www.youtube.com/watch?v=-ziZ6DELbzw"
],
"is_server": true,
"is_client": false,
"platform": "PHP",
"arch": "php",
"rport": "80",
"targets": [
"Monstra CMS 3.0.4"
],
"mod_time": "2018-07-10 14:13:57 +0000",
"path": "/modules/exploits/multi/http/monstra_fileupload_exec.rb",
"is_install_path": true,
"ref_name": "multi/http/monstra_fileupload_exec"
},
"exploit_multi/http/moodle_cmd_exec": {
"name": "Moodle Remote Command Execution",
"full_name": "exploit/multi/http/moodle_cmd_exec",