Skip to content

Commit 36505c7

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent be30a06 commit 36505c7

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78139,6 +78139,68 @@
7813978139
"session_types": false,
7814078140
"needs_cleanup": null
7814178141
},
78142+
"exploit_linux/http/moodle_rce": {
78143+
"name": "Moodle Remote Code Execution (CVE-2024-43425)",
78144+
"fullname": "exploit/linux/http/moodle_rce",
78145+
"aliases": [
78146+
78147+
],
78148+
"rank": 600,
78149+
"disclosure_date": "2024-08-27",
78150+
"type": "exploit",
78151+
"author": [
78152+
"Michael Heinzl",
78153+
"RedTeam Pentesting GmbH"
78154+
],
78155+
"description": "This module exploits a command injection vulnerability in Moodle (CVE-2024-43425) to obtain remote code execution.\n Affected versions include 4.4 to 4.4.1, 4.3 to 4.3.5, 4.2 to 4.2.8, 4.1 to 4.1.11, and earlier unsupported versions.",
78156+
"references": [
78157+
"URL-https://blog.redteam-pentesting.de/2024/moodle-rce/",
78158+
"URL-https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-009/",
78159+
"URL-https://moodle.org/mod/forum/discuss.php?d=461193",
78160+
"CVE-2024-43425"
78161+
],
78162+
"platform": "Linux",
78163+
"arch": "cmd",
78164+
"rport": 80,
78165+
"autofilter_ports": [
78166+
80,
78167+
8080,
78168+
443,
78169+
8000,
78170+
8888,
78171+
8880,
78172+
8008,
78173+
3000,
78174+
8443
78175+
],
78176+
"autofilter_services": [
78177+
"http",
78178+
"https"
78179+
],
78180+
"targets": [
78181+
"Linux Command"
78182+
],
78183+
"mod_time": "2024-11-13 03:40:22 +0000",
78184+
"path": "/modules/exploits/linux/http/moodle_rce.rb",
78185+
"is_install_path": true,
78186+
"ref_name": "linux/http/moodle_rce",
78187+
"check": false,
78188+
"post_auth": true,
78189+
"default_credential": false,
78190+
"notes": {
78191+
"Stability": [
78192+
"crash-safe"
78193+
],
78194+
"Reliability": [
78195+
"event-dependent"
78196+
],
78197+
"SideEffects": [
78198+
"ioc-in-logs"
78199+
]
78200+
},
78201+
"session_types": false,
78202+
"needs_cleanup": null
78203+
},
7814278204
"exploit_linux/http/multi_ncc_ping_exec": {
7814378205
"name": "D-Link/TRENDnet NCC Service Command Injection",
7814478206
"fullname": "exploit/linux/http/multi_ncc_ping_exec",

0 commit comments

Comments
 (0)