diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 2e0f289a0c39..1c95c6e16c2b 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -165455,6 +165455,66 @@ "session_types": false, "needs_cleanup": true }, + "exploit_windows/http/lg_simple_editor_rce_uploadvideo": { + "name": "LG Simple Editor Command Injection (CVE-2023-40504)", + "fullname": "exploit/windows/http/lg_simple_editor_rce_uploadvideo", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2023-08-04", + "type": "exploit", + "author": [ + "rgod", + "Michael Heinzl" + ], + "description": "Unauthenticated Command Injection in LG Simple Editor <= v3.21.0.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\\SYSTEM.", + "references": [ + "URL-https://www.zerodayinitiative.com/advisories/ZDI-23-1208/", + "CVE-2023-40504" + ], + "platform": "Windows", + "arch": "cmd", + "rport": 8080, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Windows_Fetch" + ], + "mod_time": "2024-08-13 20:29:30 +0000", + "path": "/modules/exploits/windows/http/lg_simple_editor_rce_uploadvideo.rb", + "is_install_path": true, + "ref_name": "windows/http/lg_simple_editor_rce_uploadvideo", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "ioc-in-logs" + ] + }, + "session_types": false, + "needs_cleanup": null + }, "exploit_windows/http/mailenable_auth_header": { "name": "MailEnable Authorization Header Buffer Overflow", "fullname": "exploit/windows/http/mailenable_auth_header",