automatic module_metadata_base.json update
parent
c282547a0b
commit
a98da6f2ba
|
@ -26150,6 +26150,50 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"auxiliary_scanner/http/springcloud_traversal": {
|
||||
"name": "Spring Cloud Config Server Directory Traversal",
|
||||
"full_name": "auxiliary/scanner/http/springcloud_traversal",
|
||||
"rank": 300,
|
||||
"disclosure_date": "2019-04-17",
|
||||
"type": "auxiliary",
|
||||
"author": [
|
||||
"Vern",
|
||||
"Dhiraj Mishra"
|
||||
],
|
||||
"description": "This module exploits an unauthenticated directory traversal vulnerability\n which exists in Spring Cloud Config versions 2.1.x prior to 2.1.2,\n versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6. Spring\n Cloud Config listens by default on port 8888.",
|
||||
"references": [
|
||||
"CVE-2019-3799",
|
||||
"URL-https://pivotal.io/security/cve-2019-3799"
|
||||
],
|
||||
"platform": "",
|
||||
"arch": "",
|
||||
"rport": 8888,
|
||||
"autofilter_ports": [
|
||||
80,
|
||||
8080,
|
||||
443,
|
||||
8000,
|
||||
8888,
|
||||
8880,
|
||||
8008,
|
||||
3000,
|
||||
8443
|
||||
],
|
||||
"autofilter_services": [
|
||||
"http",
|
||||
"https"
|
||||
],
|
||||
"targets": null,
|
||||
"mod_time": "2019-04-26 07:15:39 +0000",
|
||||
"path": "/modules/auxiliary/scanner/http/springcloud_traversal.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "scanner/http/springcloud_traversal",
|
||||
"check": true,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"auxiliary_scanner/http/squid_pivot_scanning": {
|
||||
"name": "Squid Proxy Port Scanner",
|
||||
"full_name": "auxiliary/scanner/http/squid_pivot_scanning",
|
||||
|
|
Loading…
Reference in New Issue