Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Jul 30, 2024
1 parent ba7c7b6 commit e600f19
Showing 1 changed file with 64 additions and 50 deletions.
114 changes: 64 additions & 50 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -106749,56 +106749,6 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/openmediavault_cmd_exec": {
"name": "OpenMediaVault Cron Remote Command Execution",
"fullname": "exploit/multi/http/openmediavault_cmd_exec",
"aliases": [

],
"rank": 600,
"disclosure_date": "2013-10-30",
"type": "exploit",
"author": [
"Brandon Perry <[email protected]>"
],
"description": "OpenMediaVault allows an authenticated user to create cron jobs as arbitrary users on the system.\n An attacker can abuse this to run arbitrary commands as any user available on the system (including root).",
"references": [
"CVE-2013-3632",
"URL-https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats"
],
"platform": "Linux,Unix",
"arch": "cmd",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic"
],
"mod_time": "2022-01-23 15:28:32 +0000",
"path": "/modules/exploits/multi/http/openmediavault_cmd_exec.rb",
"is_install_path": true,
"ref_name": "multi/http/openmediavault_cmd_exec",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/openmrs_deserialization": {
"name": "OpenMRS Java Deserialization RCE",
"fullname": "exploit/multi/http/openmrs_deserialization",
Expand Down Expand Up @@ -128735,6 +128685,70 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_unix/webapp/openmediavault_auth_cron_rce": {
"name": "OpenMediaVault rpc.php Authenticated Cron Remote Code Execution",
"fullname": "exploit/unix/webapp/openmediavault_auth_cron_rce",
"aliases": [
"exploit/multi/http/openmediavault_cmd_exec"
],
"rank": 600,
"disclosure_date": "2013-10-30",
"type": "exploit",
"author": [
"h00die-gr3y <[email protected]>",
"Brandon Perry <[email protected]>"
],
"description": "OpenMediaVault allows an authenticated user to create cron jobs as root on the system.\n An attacker can abuse this by sending a POST request via rpc.php to schedule and execute\n a cron entry that runs arbitrary commands as root on the system.\n All OpenMediaVault versions including the latest release 7.4.2-2 are vulnerable.",
"references": [
"CVE-2013-3632",
"PACKETSTORM-178526",
"URL-https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats",
"URL-https://attackerkb.com/topics/zl1kmXbAce/cve-2013-3632"
],
"platform": "Linux,Unix",
"arch": "cmd, x86, x64, armle, aarch64",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command",
"Linux Dropper"
],
"mod_time": "2024-07-29 14:02:29 +0000",
"path": "/modules/exploits/unix/webapp/openmediavault_auth_cron_rce.rb",
"is_install_path": true,
"ref_name": "unix/webapp/openmediavault_auth_cron_rce",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_unix/webapp/openmediavault_rpc_rce": {
"name": "OpenMediaVault rpc.php Authenticated PHP Code Injection",
"fullname": "exploit/unix/webapp/openmediavault_rpc_rce",
Expand Down

0 comments on commit e600f19

Please sign in to comment.