diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 22e61cb49e..40218fc594 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -26150,6 +26150,50 @@ "notes": { } }, + "auxiliary_scanner/http/springcloud_traversal": { + "name": "Spring Cloud Config Server Directory Traversal", + "full_name": "auxiliary/scanner/http/springcloud_traversal", + "rank": 300, + "disclosure_date": "2019-04-17", + "type": "auxiliary", + "author": [ + "Vern", + "Dhiraj Mishra" + ], + "description": "This module exploits an unauthenticated directory traversal vulnerability\n which exists in Spring Cloud Config versions 2.1.x prior to 2.1.2,\n versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6. Spring\n Cloud Config listens by default on port 8888.", + "references": [ + "CVE-2019-3799", + "URL-https://pivotal.io/security/cve-2019-3799" + ], + "platform": "", + "arch": "", + "rport": 8888, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": null, + "mod_time": "2019-04-26 07:15:39 +0000", + "path": "/modules/auxiliary/scanner/http/springcloud_traversal.rb", + "is_install_path": true, + "ref_name": "scanner/http/springcloud_traversal", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + } + }, "auxiliary_scanner/http/squid_pivot_scanning": { "name": "Squid Proxy Port Scanner", "full_name": "auxiliary/scanner/http/squid_pivot_scanning",