Security
Headlines
HeadlinesLatestCVEs

Tag

#js

Linksys E1500 Directory Traversal

This Metasploit module exploits a directory traversal vulnerability which is present in different Linksys home routers, like the E1500.

Packet Storm
#vulnerability#web#cisco#js#git#auth
JBoss Scanner

This Metasploit module scans a JBoss instance for a few vulnerabilities.

WordPress Total Upkeep Unauthenticated Backup Downloader

This Metasploit module exploits an unauthenticated database backup vulnerability in WordPress plugin Boldgrid-Backup also known as Total Upkeep version < 1.14.10. First, env-info.php is read to get server information. Next, restore-info.json is read to retrieve the last backup file. That backup is then downloaded, and any sql files will be parsed looking for the wp_users INSERT statement to grab user creds.

Oracle Demantra Database Credentials Leak

This Metasploit module exploits a database credentials leak found in Oracle Demantra 12.2.1 in combination with an authentication bypass. This way an unauthenticated user can retrieve the database name, username and password on any vulnerable machine.

Drupal Views Module Users Enumeration

This Metasploit module exploits an information disclosure vulnerability in the Views module of Drupal, brute-forcing the first 10 usernames from a to z. Drupal 6 with Views module less than or equal to 6.x-2.11 are vulnerable. Drupal does not consider disclosure of usernames as a weakness.

Elasticsearch Memory Disclosure

This Metasploit module exploits a memory disclosure vulnerability in Elasticsearch 7.10.0 to 7.13.3 (inclusive). A user with the ability to submit arbitrary queries to Elasticsearch can generate an error message containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details. This vulnerabilitys output is similar to heartbleed.

Oracle Demantra Arbitrary File Retrieval With Authentication Bypass

This Metasploit module exploits a file download vulnerability found in Oracle Demantra 12.2.1 in combination with an authentication bypass. By combining these exposures, an unauthenticated user can retrieve any file on the system by referencing the full file path to any file a vulnerable machine.

Chromecast Wifi Enumeration

This Metasploit module enumerates wireless access points through Chromecast.

Etcd Keys API Information Gathering

This Metasploit module queries the etcd API to recursively retrieve all of the stored key value pairs. Etcd by default does not utilize authentication.

Control ID IDSecure Authentication Bypass

This Metasploit module exploits an improper access control vulnerability (CVE-2023-6329) in Control iD iDSecure less than or equal to v4.7.43.0. It allows an unauthenticated remote attacker to compute valid credentials and to add a new administrative user to the web interface of the product.