Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Aug 19, 2024
1 parent afd0f19 commit d6a03b2
Showing 1 changed file with 63 additions and 0 deletions.
63 changes: 63 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -2233,6 +2233,69 @@

]
},
"auxiliary_admin/http/fortra_filecatalyst_workflow_sqli": {
"name": "Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)",
"fullname": "auxiliary/admin/http/fortra_filecatalyst_workflow_sqli",
"aliases": [

],
"rank": 300,
"disclosure_date": "2024-06-25",
"type": "auxiliary",
"author": [
"Tenable",
"Michael Heinzl"
],
"description": "This module exploits a SQL injection vulnerability in Fortra FileCatalyst Workflow <= v5.1.6 Build 135, by adding a new\n administrative user to the web interface of the application.",
"references": [
"CVE-2024-5276",
"URL-https://www.tenable.com/security/research/tra-2024-25",
"URL-https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0"
],
"platform": "",
"arch": "",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2024-08-16 14:12:41 +0000",
"path": "/modules/auxiliary/admin/http/fortra_filecatalyst_workflow_sqli.rb",
"is_install_path": true,
"ref_name": "admin/http/fortra_filecatalyst_workflow_sqli",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"config-changes"
]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_admin/http/gitlab_password_reset_account_takeover": {
"name": "GitLab Password Reset Account Takeover",
"fullname": "auxiliary/admin/http/gitlab_password_reset_account_takeover",
Expand Down

0 comments on commit d6a03b2

Please sign in to comment.