Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Nov 29, 2024
1 parent c4b7954 commit 5999a26
Showing 1 changed file with 61 additions and 0 deletions.
61 changes: 61 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -6188,6 +6188,67 @@

]
},
"auxiliary_admin/http/wp_post_smtp_acct_takeover": {
"name": "Wordpress POST SMTP Account Takeover",
"fullname": "auxiliary/admin/http/wp_post_smtp_acct_takeover",
"aliases": [

],
"rank": 300,
"disclosure_date": "2024-01-10",
"type": "auxiliary",
"author": [
"h00die",
"Ulysses Saicha"
],
"description": "The POST SMTP WordPress plugin prior to 2.8.7 is affected by a privilege\n escalation where an unauthenticated user is able to reset the password\n of an arbitrary user. This is done by requesting a password reset, then\n viewing the latest email logs to find the associated password reset email.",
"references": [
"CVE-2023-6875",
"URL-https://github.com/UlyssesSaicha/CVE-2023-6875/tree/main"
],
"platform": "",
"arch": "",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2024-11-28 13:18:47 +0000",
"path": "/modules/auxiliary/admin/http/wp_post_smtp_acct_takeover.rb",
"is_install_path": true,
"ref_name": "admin/http/wp_post_smtp_acct_takeover",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [

]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_admin/http/wp_symposium_sql_injection": {
"name": "WordPress Symposium Plugin SQL Injection",
"fullname": "auxiliary/admin/http/wp_symposium_sql_injection",
Expand Down

0 comments on commit 5999a26

Please sign in to comment.