Skip to content

Commit 00cc93f

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 561eef9 commit 00cc93f

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155135,6 +155135,66 @@
155135155135
"session_types": false,
155136155136
"needs_cleanup": null
155137155137
},
155138+
"exploit_windows/http/magicinfo_traversal": {
155139+
"name": "Samsung MagicINFO 9 Server Remote Code Execution (CVE-2024-7399)",
155140+
"fullname": "exploit/windows/http/magicinfo_traversal",
155141+
"aliases": [],
155142+
"rank": 600,
155143+
"disclosure_date": "2025-04-30",
155144+
"type": "exploit",
155145+
"author": [
155146+
"Michael Heinzl",
155147+
"SSD Secure Disclosure"
155148+
],
155149+
"description": "Remote Code Execution in Samsung MagicINFO 9 Server <= 21.1050.0.\n Remote code execution can be obtained by exploiting the path traversal vulnerability (CVE-2024-7399) in the SWUpdateFileUploader servlet,\n which can be queried by an unauthenticated user to upload a JSP shell.\n By default, the application listens on TCP ports 7001 (HTTP) and 7002 (HTTPS) on all network interfaces and runs in the context of NT AUTHORITY\\SYSTEM.",
155150+
"references": [
155151+
"URL-https://ssd-disclosure.com/ssd-advisory-samsung-magicinfo-unauthenticated-rce/",
155152+
"URL-https://security.samsungtv.com/securityUpdates",
155153+
"CVE-2024-7399"
155154+
],
155155+
"platform": "Windows",
155156+
"arch": "cmd",
155157+
"rport": 7002,
155158+
"autofilter_ports": [
155159+
80,
155160+
8080,
155161+
443,
155162+
8000,
155163+
8888,
155164+
8880,
155165+
8008,
155166+
3000,
155167+
8443
155168+
],
155169+
"autofilter_services": [
155170+
"http",
155171+
"https"
155172+
],
155173+
"targets": [
155174+
"Java Server Page"
155175+
],
155176+
"mod_time": "2025-05-15 22:13:08 +0000",
155177+
"path": "/modules/exploits/windows/http/magicinfo_traversal.rb",
155178+
"is_install_path": true,
155179+
"ref_name": "windows/http/magicinfo_traversal",
155180+
"check": true,
155181+
"post_auth": false,
155182+
"default_credential": false,
155183+
"notes": {
155184+
"Stability": [
155185+
"crash-safe"
155186+
],
155187+
"Reliability": [
155188+
"repeatable-session"
155189+
],
155190+
"SideEffects": [
155191+
"ioc-in-logs",
155192+
"artifacts-on-disk"
155193+
]
155194+
},
155195+
"session_types": false,
155196+
"needs_cleanup": true
155197+
},
155138155198
"exploit_windows/http/mailenable_auth_header": {
155139155199
"name": "MailEnable Authorization Header Buffer Overflow",
155140155200
"fullname": "exploit/windows/http/mailenable_auth_header",

0 commit comments

Comments
 (0)