This week's Metasploit release includes a module for CVE-2023-23752
by h00die. Did you know about the improper API access vulnerability in Joomla installations, specifically Joomla versions between 4.0.0 and 4.2.7, inclusive? This vulnerability allows unauthenticated users access to web service endpoints which contain sensitive information such as user and config information. This module can be used to exploit the users and config/application endpoints.
This week's Metasploit release includes a bug fix by our own adfoster-r7 addressing an issue related to the local exploit suggester crashing against older windows targets. This issue was tracked down to the bits_ntlm_token_impersonation
module when it's checking the BITS/WinRM version via PowerShell. A patch has been added to prevent it crashing against older and newer Windows targets.
Authors: Tianji Lab and h00die
Type: Auxiliary
Pull request: #17895 contributed by h00die
AttackerKB reference: CVE-2023-23752
Description: This adds a scanner that pulls user and config information from Joomla installations that permit access to endpoints containing sensitive information. This affects versions 4.0.0
through 4.2.7
inclusive.
weblogic_deserialize_rawobject
, weblogic_deserialize_marshalledobject
, and weblogic_deserialize_badattr_extcomp
exploit modules.post/windows/gather/resolve_sid
exploits/linux/misc/zyxel_multiple_devices_zhttp_lan_rce
module with CVE identifier CVE-2023-28769.free()
instead of FreeMibTable()
to free memory allocated by GetIpForwardTable2()
which led to a crash when compiled with MinGW.directory?()
due to the "
being escaped in the command testing for the existence of the path.post/windows/gather/resolve_sid
module to fail on 64-bit systems. When the module failed, the session was lost.cleanup
method for modules.You can always find more documentation on our docsite at docs.metasploit.com.
As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git
user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
binary installers (which also include the commercial edition).