Skip to content

Commit d0000af

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent bd42b23 commit d0000af

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76214,6 +76214,67 @@
7621476214
"session_types": false,
7621576215
"needs_cleanup": null
7621676216
},
76217+
"exploit_linux/http/invokeai_rce_cve_2024_12029": {
76218+
"name": "InvokeAI RCE",
76219+
"fullname": "exploit/linux/http/invokeai_rce_cve_2024_12029",
76220+
"aliases": [
76221+
76222+
],
76223+
"rank": 600,
76224+
"disclosure_date": "2025-02-07",
76225+
"type": "exploit",
76226+
"author": [
76227+
"jackfromeast",
76228+
"Takahiro Yokoyama"
76229+
],
76230+
"description": "InvokeAI has a critical vulnerability leading to remote code execution in the /api/v2/models/install API through unsafe model deserialization.\n The API allows users to specify a model URL, which is downloaded and loaded server-side using torch.load without proper validation.\n This functionality allows attackers to embed malicious code in model files that execute upon loading.",
76231+
"references": [
76232+
"CVE-2024-12029",
76233+
"URL-https://huntr.com/bounties/9b790f94-1b1b-4071-bc27-78445d1a87a3"
76234+
],
76235+
"platform": "Linux",
76236+
"arch": "",
76237+
"rport": 9090,
76238+
"autofilter_ports": [
76239+
80,
76240+
8080,
76241+
443,
76242+
8000,
76243+
8888,
76244+
8880,
76245+
8008,
76246+
3000,
76247+
8443
76248+
],
76249+
"autofilter_services": [
76250+
"http",
76251+
"https"
76252+
],
76253+
"targets": [
76254+
"Linux Command"
76255+
],
76256+
"mod_time": "2025-02-18 21:21:19 +0000",
76257+
"path": "/modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb",
76258+
"is_install_path": true,
76259+
"ref_name": "linux/http/invokeai_rce_cve_2024_12029",
76260+
"check": true,
76261+
"post_auth": false,
76262+
"default_credential": false,
76263+
"notes": {
76264+
"Stability": [
76265+
"crash-safe"
76266+
],
76267+
"SideEffects": [
76268+
"artifacts-on-disk",
76269+
"ioc-in-logs"
76270+
],
76271+
"Reliability": [
76272+
"repeatable-session"
76273+
]
76274+
},
76275+
"session_types": false,
76276+
"needs_cleanup": null
76277+
},
7621776278
"exploit_linux/http/ipfire_bashbug_exec": {
7621876279
"name": "IPFire Bash Environment Variable Injection (Shellshock)",
7621976280
"fullname": "exploit/linux/http/ipfire_bashbug_exec",

0 commit comments

Comments
 (0)