Skip to content

Commit b6ed7f0

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 899840c commit b6ed7f0

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

db/modules_metadata_base.json

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8833,7 +8833,7 @@
88338833
"Michael Heinzl",
88348834
"Tenable"
88358835
],
8836-
"description": "This module exploits a path traversal vulnerability (CVE-2023-2915) in ThinManager <= v13.1.0 to delete arbitrary files from the system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.",
8836+
"description": "This module exploits a path traversal vulnerability (CVE-2023-2915) in\n ThinManager <= v13.1.0 to delete arbitrary files from the system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.",
88378837
"references": [
88388838
"CVE-2023-2915",
88398839
"URL-https://www.tenable.com/security/research/tra-2023-28",
@@ -8845,7 +8845,7 @@
88458845
"autofilter_ports": [],
88468846
"autofilter_services": [],
88478847
"targets": null,
8848-
"mod_time": "2025-06-05 02:57:40 +0000",
8848+
"mod_time": "2025-06-09 09:17:11 +0000",
88498849
"path": "/modules/auxiliary/admin/networking/thinmanager_traversal_delete.rb",
88508850
"is_install_path": true,
88518851
"ref_name": "admin/networking/thinmanager_traversal_delete",
@@ -8876,7 +8876,7 @@
88768876
"Michael Heinzl",
88778877
"Tenable"
88788878
],
8879-
"description": "This module exploits a path traversal vulnerability (CVE-2023-27855 ) in ThinManager <= v13.0.1 to upload arbitrary files to the target system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.",
8879+
"description": "This module exploits a path traversal vulnerability (CVE-2023-27855) in\n ThinManager <= v13.0.1 to upload arbitrary files to the target system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.",
88808880
"references": [
88818881
"CVE-2023-27855",
88828882
"URL-https://www.tenable.com/security/research/tra-2023-13",
@@ -8888,7 +8888,7 @@
88888888
"autofilter_ports": [],
88898889
"autofilter_services": [],
88908890
"targets": null,
8891-
"mod_time": "2025-06-06 10:06:21 +0000",
8891+
"mod_time": "2025-06-09 09:17:11 +0000",
88928892
"path": "/modules/auxiliary/admin/networking/thinmanager_traversal_upload.rb",
88938893
"is_install_path": true,
88948894
"ref_name": "admin/networking/thinmanager_traversal_upload",
@@ -8920,9 +8920,9 @@
89208920
"Michael Heinzl",
89218921
"Tenable"
89228922
],
8923-
"description": "This module exploits a path traversal vulnerability (CVE-2023-2917) in ThinManager <= v13.1.0 to upload arbitrary files to the target system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.",
8923+
"description": "This module exploits a path traversal vulnerability (CVE-2023-2917) in\n ThinManager <= v13.1.0 to upload arbitrary files to the target system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.",
89248924
"references": [
8925-
"CVE-2023-2917 ",
8925+
"CVE-2023-2917",
89268926
"URL-https://www.tenable.com/security/research/tra-2023-28",
89278927
"URL-https://support.rockwellautomation.com/app/answers/answer_view/a_id/1140471"
89288928
],
@@ -8932,7 +8932,7 @@
89328932
"autofilter_ports": [],
89338933
"autofilter_services": [],
89348934
"targets": null,
8935-
"mod_time": "2025-05-15 21:55:27 +0000",
8935+
"mod_time": "2025-06-09 09:17:11 +0000",
89368936
"path": "/modules/auxiliary/admin/networking/thinmanager_traversal_upload2.rb",
89378937
"is_install_path": true,
89388938
"ref_name": "admin/networking/thinmanager_traversal_upload2",
@@ -26506,7 +26506,7 @@
2650626506
"Michael Heinzl",
2650726507
"Tenable"
2650826508
],
26509-
"description": "This module exploits a path traversal vulnerability (CVE-2023-27856) in ThinManager <= v13.0.1 to retrieve arbitrary files from the system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.",
26509+
"description": "This module exploits a path traversal vulnerability (CVE-2023-27856) in\n ThinManager <= v13.0.1 to retrieve arbitrary files from the system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.",
2651026510
"references": [
2651126511
"CVE-2023-27856",
2651226512
"URL-https://www.tenable.com/security/research/tra-2023-13",
@@ -26518,7 +26518,7 @@
2651826518
"autofilter_ports": [],
2651926519
"autofilter_services": [],
2652026520
"targets": null,
26521-
"mod_time": "2025-06-04 19:18:43 +0000",
26521+
"mod_time": "2025-06-09 09:17:11 +0000",
2652226522
"path": "/modules/auxiliary/gather/thinmanager_traversal_download.rb",
2652326523
"is_install_path": true,
2652426524
"ref_name": "gather/thinmanager_traversal_download",

0 commit comments

Comments
 (0)