Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Dec 2, 2024
1 parent a230a35 commit 891b89d
Showing 1 changed file with 53 additions and 0 deletions.
53 changes: 53 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -92060,6 +92060,59 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/misc/asterisk_ami_originate_auth_rce": {
"name": "Asterisk AMI Originate Authenticated RCE",
"fullname": "exploit/linux/misc/asterisk_ami_originate_auth_rce",
"aliases": [

],
"rank": 500,
"disclosure_date": "2024-08-08",
"type": "exploit",
"author": [
"Brendan Coles <[email protected]>",
"h00die",
"NielsGaljaard"
],
"description": "On Asterisk, prior to versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk\n versions 18.9-cert11 and 20.7-cert2, an AMI user with 'write=originate' may change\n all configuration files in the '/etc/asterisk/' directory. Writing a new extension\n can be created which performs a system command to achieve RCE as the asterisk service\n user (typically asterisk).\n Default parking lot in FreePBX is called \"Default lot\" on the website interface,\n however its actually 'parkedcalls'.\n Tested against Asterisk 19.8.0 and 18.16.0 on Freepbx SNG7-PBX16-64bit-2302-1.",
"references": [
"URL-https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44",
"CVE-2024-42365"
],
"platform": "Unix",
"arch": "",
"rport": 5038,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": [
"Unix Command"
],
"mod_time": "2024-11-28 20:24:25 +0000",
"path": "/modules/exploits/linux/misc/asterisk_ami_originate_auth_rce.rb",
"is_install_path": true,
"ref_name": "linux/misc/asterisk_ami_originate_auth_rce",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs",
"config-changes"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/misc/asus_infosvr_auth_bypass_exec": {
"name": "ASUS infosvr Auth Bypass Command Execution",
"fullname": "exploit/linux/misc/asus_infosvr_auth_bypass_exec",
Expand Down

0 comments on commit 891b89d

Please sign in to comment.