Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Dec 3, 2024
1 parent 2d1af7d commit e5cfc08
Showing 1 changed file with 52 additions and 0 deletions.
52 changes: 52 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -92480,6 +92480,58 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/misc/fortimanager_rce_cve_2024_47575": {
"name": "Fortinet FortiManager Unauthenticated RCE",
"fullname": "exploit/linux/misc/fortimanager_rce_cve_2024_47575",
"aliases": [

],
"rank": 600,
"disclosure_date": "2024-10-23",
"type": "exploit",
"author": [
"sfewer-r7"
],
"description": "This module exploits a missing authentication vulnerability affecting FortiManager and FortiManager\n Cloud devices to achieve unauthenticated RCE with root privileges.\n\n The vulnerable FortiManager versions are:\n * 7.6.0\n * 7.4.0 through 7.4.4\n * 7.2.0 through 7.2.7\n * 7.0.0 through 7.0.12\n * 6.4.0 through 6.4.14\n * 6.2.0 through 6.2.12\n\n The vulnerable FortiManager Cloud versions are:\n * 7.4.1 through 7.4.4\n * 7.2.1 through 7.2.7\n * 7.0.1 through 7.0.12\n * 6.4 (all versions).",
"references": [
"CVE-2024-47575",
"URL-https://attackerkb.com/topics/OFBGprmpIE/cve-2024-47575/rapid7-analysis",
"URL-https://bishopfox.com/blog/a-look-at-fortijump-cve-2024-47575",
"URL-https://fortiguard.fortinet.com/psirt/FG-IR-24-423"
],
"platform": "Linux,Unix",
"arch": "cmd",
"rport": 541,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": [
"Default"
],
"mod_time": "2024-12-02 18:16:43 +0000",
"path": "/modules/exploits/linux/misc/fortimanager_rce_cve_2024_47575.rb",
"is_install_path": true,
"ref_name": "linux/misc/fortimanager_rce_cve_2024_47575",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/misc/gld_postfix": {
"name": "GLD (Greylisting Daemon) Postfix Buffer Overflow",
"fullname": "exploit/linux/misc/gld_postfix",
Expand Down

0 comments on commit e5cfc08

Please sign in to comment.