Skip to content

Commit eb71ce1

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent fea1713 commit eb71ce1

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82926,6 +82926,69 @@
8292682926
"session_types": false,
8292782927
"needs_cleanup": null
8292882928
},
82929+
"exploit_linux/http/selenium_greed_firefox_rce_cve_2022_28108": {
82930+
"name": "Selenium geckodriver RCE",
82931+
"fullname": "exploit/linux/http/selenium_greed_firefox_rce_cve_2022_28108",
82932+
"aliases": [
82933+
82934+
],
82935+
"rank": 600,
82936+
"disclosure_date": "2022-04-18",
82937+
"type": "exploit",
82938+
"author": [
82939+
"Jon Stratton",
82940+
"Takahiro Yokoyama"
82941+
],
82942+
"description": "Selenium Server (Grid) <= 4.27.0 (latest version at the time of this writing)\n allows CSRF because it permits non-JSON content types\n such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.",
82943+
"references": [
82944+
"CVE-2022-28108",
82945+
"URL-https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/",
82946+
"URL-https://github.com/JonStratton/selenium-node-takeover-kit/tree/master",
82947+
"EDB-49915"
82948+
],
82949+
"platform": "Linux",
82950+
"arch": "",
82951+
"rport": 4444,
82952+
"autofilter_ports": [
82953+
80,
82954+
8080,
82955+
443,
82956+
8000,
82957+
8888,
82958+
8880,
82959+
8008,
82960+
3000,
82961+
8443
82962+
],
82963+
"autofilter_services": [
82964+
"http",
82965+
"https"
82966+
],
82967+
"targets": [
82968+
"Linux Command"
82969+
],
82970+
"mod_time": "2025-01-08 13:04:08 +0000",
82971+
"path": "/modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb",
82972+
"is_install_path": true,
82973+
"ref_name": "linux/http/selenium_greed_firefox_rce_cve_2022_28108",
82974+
"check": true,
82975+
"post_auth": false,
82976+
"default_credential": false,
82977+
"notes": {
82978+
"Stability": [
82979+
"crash-safe"
82980+
],
82981+
"SideEffects": [
82982+
"artifacts-on-disk",
82983+
"ioc-in-logs"
82984+
],
82985+
"Reliability": [
82986+
"repeatable-session"
82987+
]
82988+
},
82989+
"session_types": false,
82990+
"needs_cleanup": null
82991+
},
8292982992
"exploit_linux/http/smt_ipmi_close_window_bof": {
8293082993
"name": "Supermicro Onboard IPMI close_window.cgi Buffer Overflow",
8293182994
"fullname": "exploit/linux/http/smt_ipmi_close_window_bof",

0 commit comments

Comments
 (0)