automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2019-02-06 16:11:00 -08:00
parent 0dbad5d2e3
commit ca17b283ad
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 49 additions and 0 deletions

View File

@ -59658,6 +59658,55 @@
"notes": {
}
},
"exploit_multi/fileformat/evince_cbt_cmd_injection": {
"name": "Evince CBT File Command Injection",
"full_name": "exploit/multi/fileformat/evince_cbt_cmd_injection",
"rank": 600,
"disclosure_date": "2017-07-13",
"type": "exploit",
"author": [
"Felix Wilhelm",
"Sebastian Krahmer",
"Matlink",
"bcoles <bcoles@gmail.com>"
],
"description": "This module exploits a command injection vulnerability in Evince\n before version 3.24.1 when opening comic book `.cbt` files.\n\n Some file manager software, such as Nautilus and Atril, may allow\n automatic exploitation without user interaction due to thumbnailer\n preview functionality.\n\n Note that limited space is available for the payload (<256 bytes).\n Reverse Bash and Reverse Netcat payloads should be sufficiently small.\n\n This module has been tested successfully on evince versions:\n\n 3.4.0-3.1 + nautilus 3.4.2-1+build1 on Kali 1.0.6;\n 3.18.2-1ubuntu4.3 + atril 1.12.2-1ubuntu0.3 on Ubuntu 16.04.",
"references": [
"BID-99597",
"CVE-2017-1000083",
"EDB-45824",
"URL-https://seclists.org/oss-sec/2017/q3/128",
"URL-https://bugzilla.gnome.org/show_bug.cgi?id=784630",
"URL-https://bugzilla.suse.com/show_bug.cgi?id=1046856",
"URL-https://bugs.launchpad.net/ubuntu/+source/atril/+bug/1735418",
"URL-https://bugs.launchpad.net/ubuntu/+source/atril/+bug/1800662",
"URL-https://access.redhat.com/security/cve/cve-2017-1000083",
"URL-https://security-tracker.debian.org/tracker/CVE-2017-1000083"
],
"is_server": true,
"is_client": false,
"platform": "Unix",
"arch": "cmd",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Automatic"
],
"mod_time": "2019-02-03 06:18:31 +0000",
"path": "/modules/exploits/multi/fileformat/evince_cbt_cmd_injection.rb",
"is_install_path": true,
"ref_name": "multi/fileformat/evince_cbt_cmd_injection",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_multi/fileformat/ghostscript_failed_restore": {
"name": "Ghostscript Failed Restore Command Execution",
"full_name": "exploit/multi/fileformat/ghostscript_failed_restore",