automatic module_metadata_base.json update
parent
c648d2c9e6
commit
fa065a436f
|
@ -60007,6 +60007,51 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_multi/http/horde_form_file_upload": {
|
||||
"name": "Horde Form File Upload Vulnerability",
|
||||
"full_name": "exploit/multi/http/horde_form_file_upload",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2019-03-24",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Ratiosec"
|
||||
],
|
||||
"description": "Horde Groupware Webmail contains a flaw that allows an authenticated remote\n attacker to execute arbitrary PHP code. The exploitation requires the Turba\n subcomponent to be installed.\n\n This module was tested on Horde versions 5.2.22 and 5.2.17 running Horde Form subcomponent < 2.0.19.",
|
||||
"references": [
|
||||
"CVE-2019-9858",
|
||||
"URL-https://www.ratiosec.com/2019/horde-groupware-webmail-authenticated-arbitrary-file-injection-to-rce/"
|
||||
],
|
||||
"platform": "PHP",
|
||||
"arch": "php",
|
||||
"rport": 80,
|
||||
"autofilter_ports": [
|
||||
80,
|
||||
8080,
|
||||
443,
|
||||
8000,
|
||||
8888,
|
||||
8880,
|
||||
8008,
|
||||
3000,
|
||||
8443
|
||||
],
|
||||
"autofilter_services": [
|
||||
"http",
|
||||
"https"
|
||||
],
|
||||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2019-04-09 13:43:54 +0000",
|
||||
"path": "/modules/exploits/multi/http/horde_form_file_upload.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/horde_form_file_upload",
|
||||
"check": false,
|
||||
"post_auth": true,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_multi/http/horde_href_backdoor": {
|
||||
"name": "Horde 3.3.12 Backdoor Arbitrary PHP Code Execution",
|
||||
"full_name": "exploit/multi/http/horde_href_backdoor",
|
||||
|
|
Loading…
Reference in New Issue