automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-07-06 12:46:25 -07:00
parent b5fb970aec
commit ac20372d00
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 67 additions and 2 deletions

View File

@ -35408,6 +35408,39 @@
"is_install_path": true,
"ref_name": "linux/misc/gld_postfix"
},
"exploit_linux/misc/hid_discoveryd_command_blink_on_unauth_rce": {
"name": "HID discoveryd command_blink_on Unauthenticated RCE",
"full_name": "exploit/linux/misc/hid_discoveryd_command_blink_on_unauth_rce",
"rank": 600,
"disclosure_date": "2016-03-28",
"type": "exploit",
"author": [
"Ricky \"HeadlessZeke\" Lawshae",
"coldfusion39",
"Brendan Coles"
],
"description": "This module exploits an unauthenticated remote command execution\n vulnerability in the discoveryd service exposed by HID VertX and Edge\n door controllers.\n\n This module was tested successfully on a HID Edge model EH400\n with firmware version 2.3.1.603 (Build 04/23/2012).",
"references": [
"ZDI-16-223",
"URL-https://blog.trendmicro.com/let-get-door-remote-root-vulnerability-hid-door-controllers/",
"URL-http://nosedookie.blogspot.com/2011/07/identifying-and-querying-hid-vertx.html",
"URL-https://exfil.co/2016/05/09/exploring-the-hid-eh400/",
"URL-https://github.com/lixmk/Concierge",
"URL-https://github.com/coldfusion39/VertXploit"
],
"is_server": false,
"is_client": false,
"platform": "Linux",
"arch": "armle",
"rport": "4070",
"targets": [
"Automatic"
],
"mod_time": "2018-06-03 05:41:10 +0000",
"path": "/modules/exploits/linux/misc/hid_discoveryd_command_blink_on_unauth_rce.rb",
"is_install_path": true,
"ref_name": "linux/misc/hid_discoveryd_command_blink_on_unauth_rce"
},
"exploit_linux/misc/hikvision_rtsp_bof": {
"name": "Hikvision DVR RTSP Request Remote Code Execution",
"full_name": "exploit/linux/misc/hikvision_rtsp_bof",
@ -39745,6 +39778,34 @@
"is_install_path": true,
"ref_name": "multi/http/gitlab_shell_exec"
},
"exploit_multi/http/gitlist_arg_injection": {
"name": "GitList v0.6.0 Argument Injection Vulnerability",
"full_name": "exploit/multi/http/gitlist_arg_injection",
"rank": 600,
"disclosure_date": "2018-04-26",
"type": "exploit",
"author": [
"Kacper Szurek",
"Shelby Pace"
],
"description": "This module exploits an argument injection vulnerability in GitList v0.6.0.\n The vulnerability arises from GitList improperly validating input using the php function\n 'escapeshellarg'.",
"references": [
"EDB-44548",
"URL-https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html"
],
"is_server": true,
"is_client": false,
"platform": "PHP",
"arch": "php",
"rport": "80",
"targets": [
"GitList v0.6.0"
],
"mod_time": "2018-07-06 14:25:58 +0000",
"path": "/modules/exploits/multi/http/gitlist_arg_injection.rb",
"is_install_path": true,
"ref_name": "multi/http/gitlist_arg_injection"
},
"exploit_multi/http/gitorious_graph": {
"name": "Gitorious Arbitrary Command Execution",
"full_name": "exploit/multi/http/gitorious_graph",
@ -101138,7 +101199,9 @@
"platform": "Linux,OSX,Windows",
"arch": "",
"rport": "",
"targets": null,
"targets": [
],
"mod_time": "2018-06-21 16:46:15 +0000",
"path": "/modules/post/multi/manage/open.rb",
"is_install_path": true,
@ -101214,7 +101277,9 @@
"platform": "Linux,OSX,Windows",
"arch": "",
"rport": "",
"targets": null,
"targets": [
],
"mod_time": "2018-06-21 16:46:00 +0000",
"path": "/modules/post/multi/manage/screensaver.rb",
"is_install_path": true,