From 45e105e21944b1640e82e574ac9e53906d0df67d Mon Sep 17 00:00:00 2001 From: Metasploit Date: Fri, 26 Jul 2024 09:26:42 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 59 +++++++++++++++++++++++++++++++++++ 1 file changed, 59 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index d23fda5b9649..24359c6cae1e 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -187237,6 +187237,65 @@ "session_types": false, "needs_cleanup": null }, + "exploit_windows/scada/mypro_cmdexe": { + "name": "mySCADA MyPRO Authenticated Command Injection (CVE-2023-28384)", + "fullname": "exploit/windows/scada/mypro_cmdexe", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2022-09-22", + "type": "exploit", + "author": [ + "Michael Heinzl" + ], + "description": "Authenticated Command Injection in MyPRO <= v8.28.0 from mySCADA.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\\SYSTEM.", + "references": [ + "URL-https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-06", + "CVE-2023-28384" + ], + "platform": "Windows", + "arch": "cmd", + "rport": 80, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Windows_Fetch" + ], + "mod_time": "2024-07-25 23:54:27 +0000", + "path": "/modules/exploits/windows/scada/mypro_cmdexe.rb", + "is_install_path": true, + "ref_name": "windows/scada/mypro_cmdexe", + "check": true, + "post_auth": true, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "ioc-in-logs" + ] + }, + "session_types": false, + "needs_cleanup": null + }, "exploit_windows/scada/procyon_core_server": { "name": "Procyon Core Server HMI Coreservice.exe Stack Buffer Overflow", "fullname": "exploit/windows/scada/procyon_core_server",