Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Dec 10, 2024
1 parent 4c0a403 commit 828725f
Showing 1 changed file with 61 additions and 0 deletions.
61 changes: 61 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -45943,6 +45943,67 @@
}
]
},
"auxiliary_scanner/http/wp_perfect_survey_sqli": {
"name": "WordPress Plugin Perfect Survey 1.5.1 SQLi (Unauthenticated)",
"fullname": "auxiliary/scanner/http/wp_perfect_survey_sqli",
"aliases": [

],
"rank": 300,
"disclosure_date": "2021-10-05",
"type": "auxiliary",
"author": [
"Aaryan Golatkar",
"Ron Jost"
],
"description": "This module exploits a SQL injection vulnerability in the Perfect Survey\n plugin for WordPress (version 1.5.1). An unauthenticated attacker can\n exploit the SQLi to retrieve sensitive information such as usernames,\n emails, and password hashes from the `wp_users` table.",
"references": [
"EDB-50766",
"CVE-2021-24762"
],
"platform": "",
"arch": "",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2024-12-10 14:48:18 +0000",
"path": "/modules/auxiliary/scanner/http/wp_perfect_survey_sqli.rb",
"is_install_path": true,
"ref_name": "scanner/http/wp_perfect_survey_sqli",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [

]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_scanner/http/wp_registrationmagic_sqli": {
"name": "Wordpress RegistrationMagic task_ids Authenticated SQLi",
"fullname": "auxiliary/scanner/http/wp_registrationmagic_sqli",
Expand Down

0 comments on commit 828725f

Please sign in to comment.