Skip to content

Commit 517bf54

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 984f0db commit 517bf54

File tree

1 file changed

+121
-0
lines changed

1 file changed

+121
-0
lines changed

db/modules_metadata_base.json

Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79530,6 +79530,68 @@
7953079530
"session_types": false,
7953179531
"needs_cleanup": true
7953279532
},
79533+
"exploit_linux/http/netalertx_rce_cve_2024_46506": {
79534+
"name": "Unauthenticated RCE in NetAlertX",
79535+
"fullname": "exploit/linux/http/netalertx_rce_cve_2024_46506",
79536+
"aliases": [
79537+
79538+
],
79539+
"rank": 600,
79540+
"disclosure_date": "2025-01-30",
79541+
"type": "exploit",
79542+
"author": [
79543+
"Chebuya (Rhino Security Labs)",
79544+
"Takahiro Yokoyama"
79545+
],
79546+
"description": "An attacker can update NetAlertX settings with no authentication, which results in RCE.",
79547+
"references": [
79548+
"CVE-2024-46506",
79549+
"URL-https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/"
79550+
],
79551+
"platform": "Linux",
79552+
"arch": "",
79553+
"rport": 20211,
79554+
"autofilter_ports": [
79555+
80,
79556+
8080,
79557+
443,
79558+
8000,
79559+
8888,
79560+
8880,
79561+
8008,
79562+
3000,
79563+
8443
79564+
],
79565+
"autofilter_services": [
79566+
"http",
79567+
"https"
79568+
],
79569+
"targets": [
79570+
"Linux Command"
79571+
],
79572+
"mod_time": "2025-02-11 11:25:24 +0000",
79573+
"path": "/modules/exploits/linux/http/netalertx_rce_cve_2024_46506.rb",
79574+
"is_install_path": true,
79575+
"ref_name": "linux/http/netalertx_rce_cve_2024_46506",
79576+
"check": true,
79577+
"post_auth": false,
79578+
"default_credential": false,
79579+
"notes": {
79580+
"Stability": [
79581+
"crash-safe"
79582+
],
79583+
"SideEffects": [
79584+
"config-changes",
79585+
"artifacts-on-disk",
79586+
"ioc-in-logs"
79587+
],
79588+
"Reliability": [
79589+
"repeatable-session"
79590+
]
79591+
},
79592+
"session_types": false,
79593+
"needs_cleanup": null
79594+
},
7953379595
"exploit_linux/http/netgear_dgn1000_setup_unauth_exec": {
7953479596
"name": "Netgear DGN1000 Setup.cgi Unauthenticated RCE",
7953579597
"fullname": "exploit/linux/http/netgear_dgn1000_setup_unauth_exec",
@@ -192323,6 +192385,65 @@
192323192385
"session_types": false,
192324192386
"needs_cleanup": null
192325192387
},
192388+
"exploit_windows/scada/mypro_mgr_cmd": {
192389+
"name": "mySCADA myPRO Manager Unauthenticated Command Injection (CVE-2024-47407)",
192390+
"fullname": "exploit/windows/scada/mypro_mgr_cmd",
192391+
"aliases": [
192392+
192393+
],
192394+
"rank": 600,
192395+
"disclosure_date": "2024-11-21",
192396+
"type": "exploit",
192397+
"author": [
192398+
"Michael Heinzl"
192399+
],
192400+
"description": "Unauthenticated Command Injection in MyPRO Manager <= v1.2 from mySCADA.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of the myscada9 administrative user that is automatically added by the product.",
192401+
"references": [
192402+
"URL-https://www.cisa.gov/news-events/ics-advisories/icsa-24-326-07",
192403+
"CVE-2024-47407"
192404+
],
192405+
"platform": "Windows",
192406+
"arch": "cmd",
192407+
"rport": 34022,
192408+
"autofilter_ports": [
192409+
80,
192410+
8080,
192411+
443,
192412+
8000,
192413+
8888,
192414+
8880,
192415+
8008,
192416+
3000,
192417+
8443
192418+
],
192419+
"autofilter_services": [
192420+
"http",
192421+
"https"
192422+
],
192423+
"targets": [
192424+
"Windows_Fetch"
192425+
],
192426+
"mod_time": "2025-01-29 20:18:05 +0000",
192427+
"path": "/modules/exploits/windows/scada/mypro_mgr_cmd.rb",
192428+
"is_install_path": true,
192429+
"ref_name": "windows/scada/mypro_mgr_cmd",
192430+
"check": true,
192431+
"post_auth": false,
192432+
"default_credential": false,
192433+
"notes": {
192434+
"Stability": [
192435+
"crash-safe"
192436+
],
192437+
"Reliability": [
192438+
"repeatable-session"
192439+
],
192440+
"SideEffects": [
192441+
"ioc-in-logs"
192442+
]
192443+
},
192444+
"session_types": false,
192445+
"needs_cleanup": null
192446+
},
192326192447
"exploit_windows/scada/procyon_core_server": {
192327192448
"name": "Procyon Core Server HMI Coreservice.exe Stack Buffer Overflow",
192328192449
"fullname": "exploit/windows/scada/procyon_core_server",

0 commit comments

Comments
 (0)