Skip to content

Commit c9421a6

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 3c4d0aa commit c9421a6

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73898,6 +73898,68 @@
7389873898
"session_types": false,
7389973899
"needs_cleanup": null
7390073900
},
73901+
"exploit_linux/http/dtale_rce_cve_2025_0655": {
73902+
"name": "D-Tale RCE",
73903+
"fullname": "exploit/linux/http/dtale_rce_cve_2025_0655",
73904+
"aliases": [
73905+
73906+
],
73907+
"rank": 600,
73908+
"disclosure_date": "2025-02-05",
73909+
"type": "exploit",
73910+
"author": [
73911+
"taiphung217",
73912+
"Takahiro Yokoyama"
73913+
],
73914+
"description": "This exploit effectively serves as a bypass for CVE-2024-3408.\n An attacker can override global state to enable custom filters, which then facilitates remote code execution.\n Specifically, this vulnerability leverages the ability to manipulate global application settings to activate the enable_custom_filters feature, typically restricted to trusted environments.\n Once enabled, the /test-filter endpoint of the Custom Filters functionality can be exploited to execute arbitrary system commands.",
73915+
"references": [
73916+
"CVE-2024-3408",
73917+
"CVE-2025-0655",
73918+
"URL-https://huntr.com/bounties/f63af7bd-5438-4b36-a39b-4c90466cff13"
73919+
],
73920+
"platform": "Linux",
73921+
"arch": "",
73922+
"rport": 40000,
73923+
"autofilter_ports": [
73924+
80,
73925+
8080,
73926+
443,
73927+
8000,
73928+
8888,
73929+
8880,
73930+
8008,
73931+
3000,
73932+
8443
73933+
],
73934+
"autofilter_services": [
73935+
"http",
73936+
"https"
73937+
],
73938+
"targets": [
73939+
"Linux Command"
73940+
],
73941+
"mod_time": "2025-03-03 20:52:55 +0000",
73942+
"path": "/modules/exploits/linux/http/dtale_rce_cve_2025_0655.rb",
73943+
"is_install_path": true,
73944+
"ref_name": "linux/http/dtale_rce_cve_2025_0655",
73945+
"check": true,
73946+
"post_auth": false,
73947+
"default_credential": false,
73948+
"notes": {
73949+
"Stability": [
73950+
"crash-safe"
73951+
],
73952+
"SideEffects": [
73953+
"artifacts-on-disk",
73954+
"ioc-in-logs"
73955+
],
73956+
"Reliability": [
73957+
"repeatable-session"
73958+
]
73959+
},
73960+
"session_types": false,
73961+
"needs_cleanup": null
73962+
},
7390173963
"exploit_linux/http/efw_chpasswd_exec": {
7390273964
"name": "Endian Firewall Proxy Password Change Command Injection",
7390373965
"fullname": "exploit/linux/http/efw_chpasswd_exec",

0 commit comments

Comments
 (0)