Skip to content

Commit dbefbe0

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 3e1bca0 commit dbefbe0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

db/modules_metadata_base.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8878,7 +8878,7 @@
88788878
],
88798879
"description": "This module exploits a path traversal vulnerability (CVE-2023-27855 ) in ThinManager <= v13.0.1 to upload arbitrary files to the target system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.",
88808880
"references": [
8881-
"CVE-2023-27855 ",
8881+
"CVE-2023-27855",
88828882
"URL-https://www.tenable.com/security/research/tra-2023-13",
88838883
"URL-https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640"
88848884
],
@@ -8888,7 +8888,7 @@
88888888
"autofilter_ports": [],
88898889
"autofilter_services": [],
88908890
"targets": null,
8891-
"mod_time": "2025-05-15 21:55:58 +0000",
8891+
"mod_time": "2025-06-06 10:06:21 +0000",
88928892
"path": "/modules/auxiliary/admin/networking/thinmanager_traversal_upload.rb",
88938893
"is_install_path": true,
88948894
"ref_name": "admin/networking/thinmanager_traversal_upload",

0 commit comments

Comments
 (0)