automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2022-03-31 11:00:06 -05:00
parent 1f6c4d634e
commit 5bac9c5119
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 65 additions and 0 deletions

View File

@ -89288,6 +89288,71 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/spring_cloud_function_spel_injection": {
"name": "Spring Cloud Function SpEL Injection",
"fullname": "exploit/multi/http/spring_cloud_function_spel_injection",
"aliases": [
],
"rank": 600,
"disclosure_date": "2022-03-29",
"type": "exploit",
"author": [
"m09u3r",
"hktalent",
"Spencer McIntyre"
],
"description": "Spring Cloud Function versions prior to 3.1.7 and 3.2.3 are vulnerable to remote code execution due to using\n an unsafe evaluation context with user-provided queries. By crafting a request to the application and setting\n the spring.cloud.function.routing-expression header, an unauthenticated attacker can gain remote code\n execution. Both patched and unpatched servers will respond with a 500 server error and a JSON encoded message.",
"references": [
"CVE-2022-22963",
"URL-https://github.com/hktalent/spring-spel-0day-poc",
"URL-https://tanzu.vmware.com/security/cve-2022-22963",
"URL-https://attackerkb.com/assessments/cda33728-908a-4394-9bd5-d4126557d225"
],
"platform": "Linux,Unix",
"arch": "cmd, x86, x64",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command",
"Linux Dropper"
],
"mod_time": "2022-03-31 09:01:08 +0000",
"path": "/modules/exploits/multi/http/spring_cloud_function_spel_injection.rb",
"is_install_path": true,
"ref_name": "multi/http/spring_cloud_function_spel_injection",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/struts2_code_exec_showcase": {
"name": "Apache Struts 2 Struts 1 Plugin Showcase OGNL Code Execution",
"fullname": "exploit/multi/http/struts2_code_exec_showcase",