forked from rapid7/metasploit-framework
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge remote-tracking branch 'upstream/master'
- Loading branch information
Showing
5 changed files
with
100 additions
and
93 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -102029,17 +102029,19 @@ | |
"author": [ | ||
"h00die-gr3y <[email protected]>", | ||
"jheysel-r7", | ||
"Steve Ikeoka" | ||
"Steve Ikeoka", | ||
"Valentin Lobstein a.k.a chocapikk" | ||
], | ||
"description": "GeoServer is an open-source software server written in Java that provides\n the ability to view, edit, and share geospatial data.\n It is designed to be a flexible, efficient solution for distributing geospatial data\n from a variety of sources such as Geographic Information System (GIS) databases,\n web-based data, and personal datasets.\n In the GeoServer versions < 2.23.6, >= 2.24.0, < 2.24.4 and >= 2.25.0, < 2.25.1,\n multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users\n through specially crafted input against a default GeoServer installation due to unsafely\n evaluating property names as XPath expressions.\n An attacker can abuse this by sending a POST request with a malicious xpath expression\n to execute arbitrary commands as root on the system.", | ||
"references": [ | ||
"CVE-2024-36401", | ||
"URL-https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv", | ||
"URL-https://github.com/vulhub/vulhub/tree/master/geoserver/CVE-2024-36401", | ||
"URL-https://attackerkb.com/topics/W6IDY2mmp9/cve-2024-36401" | ||
"URL-https://attackerkb.com/topics/W6IDY2mmp9/cve-2024-36401", | ||
"URL-https://github.com/Chocapikk/CVE-2024-36401" | ||
], | ||
"platform": "Linux,Unix", | ||
"arch": "cmd, x86, x64, aarch64, armle", | ||
"platform": "Linux,Unix,Windows", | ||
"arch": "cmd", | ||
"rport": 8080, | ||
"autofilter_ports": [ | ||
80, | ||
|
@@ -102058,10 +102060,9 @@ | |
], | ||
"targets": [ | ||
"Unix Command", | ||
"Linux Dropper", | ||
"Windows Command" | ||
], | ||
"mod_time": "2024-07-16 11:20:35 +0000", | ||
"mod_time": "2024-08-16 09:39:38 +0000", | ||
"path": "/modules/exploits/multi/http/geoserver_unauth_rce_cve_2024_36401.rb", | ||
"is_install_path": true, | ||
"ref_name": "multi/http/geoserver_unauth_rce_cve_2024_36401", | ||
|
@@ -131012,7 +131013,7 @@ | |
"targets": [ | ||
"Automatic" | ||
], | ||
"mod_time": "2020-10-02 17:38:06 +0000", | ||
"mod_time": "2024-08-19 16:28:52 +0000", | ||
"path": "/modules/exploits/unix/webapp/spip_connect_exec.rb", | ||
"is_install_path": true, | ||
"ref_name": "unix/webapp/spip_connect_exec", | ||
|
@@ -131066,7 +131067,7 @@ | |
"Automatic (PHP In-Memory)", | ||
"Automatic (Unix In-Memory)" | ||
], | ||
"mod_time": "2023-02-27 22:34:46 +0000", | ||
"mod_time": "2024-08-19 16:28:52 +0000", | ||
"path": "/modules/exploits/unix/webapp/spip_rce_form.rb", | ||
"is_install_path": true, | ||
"ref_name": "unix/webapp/spip_rce_form", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
# -*- coding: binary -*- | ||
|
||
module Msf | ||
module Exploit::Remote::HTTP::Spip | ||
|
||
include Msf::Exploit::Remote::HttpClient | ||
|
||
def initialize(info = {}) | ||
super | ||
|
||
register_options([ | ||
OptString.new('TARGETURI', [true, 'Path to Spip install', '/']) | ||
]) | ||
end | ||
|
||
# Determine Spip version | ||
# | ||
# @return [Rex::Version] Version as Rex::Version | ||
def spip_version | ||
res = send_request_cgi( | ||
'method' => 'GET', | ||
'uri' => normalize_uri(target_uri.path, "spip.php") | ||
) | ||
|
||
return unless res | ||
|
||
version = nil | ||
|
||
version_string = res.get_html_document.at('head/meta[@name="generator"]/@content')&.text | ||
if version_string =~ /SPIP (.*)/ | ||
version = ::Regexp.last_match(1) | ||
end | ||
|
||
if version.nil? && res.headers['Composed-By'] =~ /SPIP (.*)/ | ||
version = ::Regexp.last_match(1) | ||
end | ||
|
||
if version.nil? | ||
return nil | ||
end | ||
|
||
return Rex::Version.new(version) | ||
end | ||
|
||
end | ||
end |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters