Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed May 7, 2024
1 parent 946cc3b commit 0b9d465
Showing 1 changed file with 60 additions and 0 deletions.
60 changes: 60 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -20834,6 +20834,66 @@

]
},
"auxiliary_gather/crushftp_fileread_cve_2024_4040": {
"name": "CrushFTP Unauthenticated Arbitrary File Read",
"fullname": "auxiliary/gather/crushftp_fileread_cve_2024_4040",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"remmons-r7"
],
"description": "This module leverages an unauthenticated server-side template injection vulnerability in CrushFTP < 10.7.1 and\n < 11.1.0 (as well as legacy 9.x versions). Attackers can submit template injection payloads to the web API without\n authentication. When attacker payloads are reflected in the server's responses, the payloads are evaluated. The\n primary impact of the injection is arbitrary file read as root, which can result in authentication bypass, remote\n code execution, and NetNTLMv2 theft (when the host OS is Windows and SMB egress traffic is permitted).",
"references": [
"CVE-2024-4040",
"URL-https://attackerkb.com/topics/20oYjlmfXa/cve-2024-4040/rapid7-analysis"
],
"platform": "",
"arch": "",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2024-05-03 12:01:48 +0000",
"path": "/modules/auxiliary/gather/crushftp_fileread_cve_2024_4040.rb",
"is_install_path": true,
"ref_name": "gather/crushftp_fileread_cve_2024_4040",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [

]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_gather/cve_2021_27850_apache_tapestry_hmac_key": {
"name": "Apache Tapestry HMAC secret key leak",
"fullname": "auxiliary/gather/cve_2021_27850_apache_tapestry_hmac_key",
Expand Down

0 comments on commit 0b9d465

Please sign in to comment.