Authors: Siebene and vultza
Type: Auxiliary
Pull request: #19614 contributed by vultza
Path: gather/onedev_arbitrary_file_read
AttackerKB reference: CVE-2024-45309
Description: This adds an exploit module for an unauthenticated arbitrary file read vulnerability, tracked as CVE-2024-45309, which affects OneDev versions <= 11.0.8.
Authors: Jon Stratton and Takahiro Yokoyama
Type: Auxiliary
Pull request: #19781 contributed by Takahiro-Yoko
Path: gather/selenium_file_read
Description: This adds an auxiliary module to perform arbitrary file read on vulnerable Selenium installations using Firefox, Chrome or Edge backends.
Author: h00die-gr3y [email protected]
Type: Exploit
Pull request: #19770 contributed by h00die-gr3y
Path: linux/http/netis_unauth_rce_cve_2024_48456_and_48457
AttackerKB reference: CVE-2024-48457
Description: This adds an exploit module for Netis Routers including rebranded routers from GLCtec and Stone. The module chains 3 CVEs together to accomplish unauthenticated RCE. The first, CVE-2024-48456, is a command injection vulnerability in the change admin password page which allows an attacker to change the admin password to one of their choosing. The next vulnerability, CVE-2024-48457, is an authenticated RCE which can be chained with the first vuln nicely. The last CVE-2024-48455 allows for unauthenticated information disclosure revealing sensitive configuration information of the router which can be used by the attacker to determine if the router is running specific vulnerable firmware.
Authors: Takahiro Yokoyama, Wiz Research, and randomstuff (Gabriel Corona)
Type: Exploit
Pull request: #19769 contributed by Takahiro-Yoko
Path: linux/http/selenium_greed_chrome_rce_cve_2022_28108
AttackerKB reference: CVE-2022-28108
Description: This adds an exploit module for Selenium Server (Grid) allowing unauthenticated command injection using Chrome backend.
Authors: Jon Stratton and Takahiro Yokoyama
Type: Exploit
Pull request: #19771 contributed by Takahiro-Yoko
Path: linux/http/selenium_greed_firefox_rce_cve_2022_28108
AttackerKB reference: CVE-2022-28108
Description: This adds an exploit module for Selenium Server (Grid) <= 4.27.0 vulnerable to a Command Injection vulnerability using Firefox as backend.
recv()
loop.You can find the latest Metasploit documentation on our docsite at docs.metasploit.com.
As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:
If you are a git
user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
commercial edition Metasploit Pro
Be the first to learn about the latest vulnerabilities and cybersecurity news.
Subscribe Now