From 828725f54cfcbf9a2ecaa74e81a6e6daa22dcbf7 Mon Sep 17 00:00:00 2001 From: jenkins-metasploit Date: Tue, 10 Dec 2024 14:51:01 +0000 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 61 +++++++++++++++++++++++++++++++++++ 1 file changed, 61 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index c7b7f253de56..c966fd127d0b 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -45943,6 +45943,67 @@ } ] }, + "auxiliary_scanner/http/wp_perfect_survey_sqli": { + "name": "WordPress Plugin Perfect Survey 1.5.1 SQLi (Unauthenticated)", + "fullname": "auxiliary/scanner/http/wp_perfect_survey_sqli", + "aliases": [ + + ], + "rank": 300, + "disclosure_date": "2021-10-05", + "type": "auxiliary", + "author": [ + "Aaryan Golatkar", + "Ron Jost" + ], + "description": "This module exploits a SQL injection vulnerability in the Perfect Survey\n plugin for WordPress (version 1.5.1). An unauthenticated attacker can\n exploit the SQLi to retrieve sensitive information such as usernames,\n emails, and password hashes from the `wp_users` table.", + "references": [ + "EDB-50766", + "CVE-2021-24762" + ], + "platform": "", + "arch": "", + "rport": 80, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": null, + "mod_time": "2024-12-10 14:48:18 +0000", + "path": "/modules/auxiliary/scanner/http/wp_perfect_survey_sqli.rb", + "is_install_path": true, + "ref_name": "scanner/http/wp_perfect_survey_sqli", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "SideEffects": [ + "ioc-in-logs" + ], + "Reliability": [ + + ] + }, + "session_types": false, + "needs_cleanup": false, + "actions": [ + + ] + }, "auxiliary_scanner/http/wp_registrationmagic_sqli": { "name": "Wordpress RegistrationMagic task_ids Authenticated SQLi", "fullname": "auxiliary/scanner/http/wp_registrationmagic_sqli",