From 7fb0c043607340fdd683e1604edabc01583ac012 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Thu, 29 Nov 2018 12:08:37 -0800 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 58 +++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index f39ce1a251..b5718b1328 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -51510,6 +51510,64 @@ "notes": { } }, + "exploit_linux/http/spark_unauth_rce": { + "name": "Apache Spark Unauthenticated Command Execution", + "full_name": "exploit/linux/http/spark_unauth_rce", + "rank": 600, + "disclosure_date": "2017-12-12", + "type": "exploit", + "author": [ + "aRe00t", + "Green-m " + ], + "description": "This module exploits an unauthenticated command execution vulnerability in Apache Spark with standalone cluster mode through REST API.\n It uses the function CreateSubmissionRequest to submit a malious java class and trigger it.", + "references": [ + "URL-https://www.jianshu.com/p/a080cb323832", + "URL-https://github.com/vulhub/vulhub/tree/master/spark/unacc" + ], + "is_server": false, + "is_client": true, + "platform": "Java", + "arch": "java", + "rport": 6066, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Automatic" + ], + "mod_time": "2018-11-29 10:05:47 +0000", + "path": "/modules/exploits/linux/http/spark_unauth_rce.rb", + "is_install_path": true, + "ref_name": "linux/http/spark_unauth_rce", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "SideEffects": [ + "artifacts-on-disk", + "ioc-in-logs" + ], + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ] + } + }, "exploit_linux/http/supervisor_xmlrpc_exec": { "name": "Supervisor XML-RPC Authenticated Remote Code Execution", "full_name": "exploit/linux/http/supervisor_xmlrpc_exec",