From 1b6efbbcd6199d1705cde2b0863798fd32ddf0a8 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 28 Nov 2023 12:49:11 -0600 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 61 +++++++++++++++++++++++++++++++++++ 1 file changed, 61 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 05f51f56883d..4b822895f782 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -104195,6 +104195,67 @@ "session_types": false, "needs_cleanup": null }, + "exploit_multi/http/wp_royal_elementor_addons_rce": { + "name": "WordPress Royal Elementor Addons RCE", + "fullname": "exploit/multi/http/wp_royal_elementor_addons_rce", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2023-11-23", + "type": "exploit", + "author": [ + "Fioravante Souza", + "Valentin Lobstein" + ], + "description": "Exploit for the unauthenticated file upload vulnerability in WordPress Royal Elementor Addons and Templates plugin (< 1.3.79).", + "references": [ + "CVE-2023-5360", + "URL-https://vulners.com/nuclei/NUCLEI:CVE-2023-5360", + "WPVDB-281518ff-7816-4007-b712-63aed7828b34" + ], + "platform": "Linux,PHP,Unix,Windows", + "arch": "php, cmd", + "rport": 443, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Automatic" + ], + "mod_time": "2023-11-28 08:15:27 +0000", + "path": "/modules/exploits/multi/http/wp_royal_elementor_addons_rce.rb", + "is_install_path": true, + "ref_name": "multi/http/wp_royal_elementor_addons_rce", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "ioc-in-logs" + ] + }, + "session_types": false, + "needs_cleanup": null + }, "exploit_multi/http/wp_simple_file_list_rce": { "name": "WordPress Simple File List Unauthenticated Remote Code Execution", "fullname": "exploit/multi/http/wp_simple_file_list_rce",