Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Oct 31, 2024
1 parent 493a52b commit 04dd014
Showing 1 changed file with 73 additions and 20 deletions.
93 changes: 73 additions & 20 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -115594,16 +115594,20 @@
"type": "exploit",
"author": [
"Villu Orav",
"EQSTSeminar",
"EQSTLab",
"cuokon",
"Julien Ahrens",
"Valentin Lobstein"
],
"description": "The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP Object Injection (POI) attack granting an unauthenticated arbitrary code execution.",
"description": "The GiveWP Donation Plugin and Fundraising Platform for WordPress, in all versions up to and including 3.16.1,\n is vulnerable to a PHP Object Injection (POI) attack that allows unauthenticated arbitrary code execution.\n Although a patch was introduced in version 3.14.2, it was incorrect and can be bypassed.\n This means the vulnerability remains exploitable in subsequent versions due to the ineffective patch.",
"references": [
"CVE-2024-5932",
"URL-https://github.com/EQSTSeminar/CVE-2024-5932",
"URL-https://github.com/EQSTLab/CVE-2024-5932",
"URL-https://www.rcesecurity.com/2024/08/wordpress-givewp-pop-to-rce-cve-2024-5932",
"URL-https://www.wordfence.com/blog/2024/08/4998-bounty-awarded-and-100000-wordpress-sites-protected-against-unauthenticated-remote-code-execution-vulnerability-patched-in-givewp-wordpress-plugin"
"URL-https://www.wordfence.com/blog/2024/08/4998-bounty-awarded-and-100000-wordpress-sites-protected-against-unauthenticated-remote-code-execution-vulnerability-patched-in-givewp-wordpress-plugin",
"CVE-2024-8353",
"URL-https://github.com/EQSTLab/CVE-2024-8353",
"URL-https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/give/givewp-donation-plugin-and-fundraising-platform-3161-unauthenticated-php-object-injection"
],
"platform": "Linux,Unix,Windows",
"arch": "cmd",
Expand All @@ -115627,7 +115631,7 @@
"Unix/Linux Command Shell",
"Windows Command Shell"
],
"mod_time": "2024-08-28 19:21:27 +0000",
"mod_time": "2024-10-30 16:17:36 +0000",
"path": "/modules/exploits/multi/http/wp_givewp_rce.rb",
"is_install_path": true,
"ref_name": "multi/http/wp_givewp_rce",
Expand Down Expand Up @@ -245456,7 +245460,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/meterpreter_bind_named_pipe.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter_bind_named_pipe",
Expand Down Expand Up @@ -245494,7 +245498,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/meterpreter_bind_tcp.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter_bind_tcp",
Expand Down Expand Up @@ -245532,7 +245536,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter_reverse_http",
Expand Down Expand Up @@ -245570,7 +245574,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter_reverse_https",
Expand Down Expand Up @@ -245608,7 +245612,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/meterpreter_reverse_ipv6_tcp.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter_reverse_ipv6_tcp",
Expand Down Expand Up @@ -245646,7 +245650,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter_reverse_tcp",
Expand Down Expand Up @@ -252440,7 +252444,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/x64/meterpreter_bind_named_pipe.rb",
"is_install_path": true,
"ref_name": "windows/x64/meterpreter_bind_named_pipe",
Expand Down Expand Up @@ -252478,7 +252482,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/x64/meterpreter_bind_tcp.rb",
"is_install_path": true,
"ref_name": "windows/x64/meterpreter_bind_tcp",
Expand Down Expand Up @@ -252516,7 +252520,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/x64/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "windows/x64/meterpreter_reverse_http",
Expand Down Expand Up @@ -252554,7 +252558,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/x64/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "windows/x64/meterpreter_reverse_https",
Expand Down Expand Up @@ -252592,7 +252596,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/x64/meterpreter_reverse_ipv6_tcp.rb",
"is_install_path": true,
"ref_name": "windows/x64/meterpreter_reverse_ipv6_tcp",
Expand Down Expand Up @@ -252630,7 +252634,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-01-23 09:45:43 +0000",
"mod_time": "2024-10-30 16:19:59 +0000",
"path": "/modules/payloads/singles/windows/x64/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "windows/x64/meterpreter_reverse_tcp",
Expand Down Expand Up @@ -263247,7 +263251,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-09-27 12:34:07 +0000",
"mod_time": "2024-10-30 15:43:02 +0000",
"path": "/modules/post/windows/gather/credentials/chrome.rb",
"is_install_path": true,
"ref_name": "windows/gather/credentials/chrome",
Expand Down Expand Up @@ -265725,7 +265729,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-09-27 12:34:07 +0000",
"mod_time": "2024-10-30 15:43:02 +0000",
"path": "/modules/post/windows/gather/credentials/seamonkey.rb",
"is_install_path": true,
"ref_name": "windows/gather/credentials/seamonkey",
Expand Down Expand Up @@ -267737,6 +267741,55 @@

]
},
"post_windows/gather/enum_browsers": {
"name": "Advanced Browser Data Extraction for Chromium and Gecko Browsers",
"fullname": "post/windows/gather/enum_browsers",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "post",
"author": [
"Alexander \"xaitax\" Hagenah"
],
"description": "This post-exploitation module extracts sensitive browser data from both Chromium-based and Gecko-based browsers\n on the target system. It supports the decryption of passwords and cookies using Windows Data Protection API (DPAPI)\n and can extract additional data such as browsing history, keyword search history, download history, autofill data,\n credit card information, browser cache and installed extensions.",
"references": [

],
"platform": "Windows",
"arch": "x64, x86",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-10-30 15:43:02 +0000",
"path": "/modules/post/windows/gather/enum_browsers.rb",
"is_install_path": true,
"ref_name": "windows/gather/enum_browsers",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [

],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": [
"meterpreter"
],
"needs_cleanup": null,
"actions": [

]
},
"post_windows/gather/enum_chocolatey_applications": {
"name": "Windows Gather Installed Application Within Chocolatey Enumeration",
"fullname": "post/windows/gather/enum_chocolatey_applications",
Expand Down Expand Up @@ -267811,7 +267864,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-11-20 16:24:47 +0000",
"mod_time": "2024-10-30 15:43:02 +0000",
"path": "/modules/post/windows/gather/enum_chrome.rb",
"is_install_path": true,
"ref_name": "windows/gather/enum_chrome",
Expand Down

0 comments on commit 04dd014

Please sign in to comment.