automatic module_metadata_base.json update

4.x
Metasploit 2019-04-09 12:05:58 -07:00
parent c648d2c9e6
commit fa065a436f
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 45 additions and 0 deletions

View File

@ -60007,6 +60007,51 @@
"notes": {
}
},
"exploit_multi/http/horde_form_file_upload": {
"name": "Horde Form File Upload Vulnerability",
"full_name": "exploit/multi/http/horde_form_file_upload",
"rank": 600,
"disclosure_date": "2019-03-24",
"type": "exploit",
"author": [
"Ratiosec"
],
"description": "Horde Groupware Webmail contains a flaw that allows an authenticated remote\n attacker to execute arbitrary PHP code. The exploitation requires the Turba\n subcomponent to be installed.\n\n This module was tested on Horde versions 5.2.22 and 5.2.17 running Horde Form subcomponent < 2.0.19.",
"references": [
"CVE-2019-9858",
"URL-https://www.ratiosec.com/2019/horde-groupware-webmail-authenticated-arbitrary-file-injection-to-rce/"
],
"platform": "PHP",
"arch": "php",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic"
],
"mod_time": "2019-04-09 13:43:54 +0000",
"path": "/modules/exploits/multi/http/horde_form_file_upload.rb",
"is_install_path": true,
"ref_name": "multi/http/horde_form_file_upload",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
}
},
"exploit_multi/http/horde_href_backdoor": {
"name": "Horde 3.3.12 Backdoor Arbitrary PHP Code Execution",
"full_name": "exploit/multi/http/horde_href_backdoor",