Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Nov 21, 2024
1 parent d9d7f1a commit b79c003
Showing 1 changed file with 64 additions and 0 deletions.
64 changes: 64 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -41980,6 +41980,70 @@

]
},
"auxiliary_scanner/http/strapi_3_password_reset": {
"name": "Strapi CMS Unauthenticated Password Reset",
"fullname": "auxiliary/scanner/http/strapi_3_password_reset",
"aliases": [

],
"rank": 300,
"disclosure_date": "2022-02-09",
"type": "auxiliary",
"author": [
"WackyH4cker",
"h00die"
],
"description": "This module abuses the mishandling of a password reset request for\n Strapi CMS version 3.0.0-beta.17.4 to change the password of the admin user.\n\n Successfully tested against Strapi CMS version 3.0.0-beta.17.4.",
"references": [
"URL-https://vulners.com/cve/CVE-2019-18818",
"URL-https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.4",
"URL-https://github.com/strapi/strapi/pull/4443",
"CVE-2019-18818",
"EDB-50716"
],
"platform": "",
"arch": "",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2024-11-16 15:47:54 +0000",
"path": "/modules/auxiliary/scanner/http/strapi_3_password_reset.rb",
"is_install_path": true,
"ref_name": "scanner/http/strapi_3_password_reset",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [

],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_scanner/http/support_center_plus_directory_traversal": {
"name": "ManageEngine Support Center Plus Directory Traversal",
"fullname": "auxiliary/scanner/http/support_center_plus_directory_traversal",
Expand Down

0 comments on commit b79c003

Please sign in to comment.