automatic module_metadata_base.json update

This commit is contained in:
jenkins-metasploit
2025-05-15 11:20:07 +00:00
parent d12b6fe3ba
commit 00da2fb32f
+14 -3
View File
@@ -61283,7 +61283,7 @@
"Joxean Koret",
"juan vazquez <juan.vazquez@metasploit.com>"
],
"description": "This module exploits a command injection vulnerability found in the eScan Web Management\n Console. The vulnerability exists while processing CheckPass login requests. An attacker\n with a valid username can use a malformed password to execute arbitrary commands. With\n mwconf privileges, the runasroot utility can be abused to get root privileges. This module\n has been tested successfully on eScan 5.5-2 on Ubuntu 12.04.",
"description": "This module exploits a command injection vulnerability found in the eScan Web Management\n Console. The vulnerability exists while processing CheckPass login requests. An attacker\n with a valid username can use a malformed password to execute arbitrary commands. With\n mwconf privileges, the runasroot utility can be abused to get root privileges. This module\n has been tested successfully on eScan 5.5-2 on Ubuntu 12.04.",
"references": [
"URL-http://www.joxeankoret.com/download/breaking_av_software-pdf.tar.gz"
],
@@ -61308,14 +61308,25 @@
"targets": [
"eScan 5.5-2 / Linux"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2025-05-10 18:15:04 +0000",
"path": "/modules/exploits/linux/antivirus/escan_password_exec.rb",
"is_install_path": true,
"ref_name": "linux/antivirus/escan_password_exec",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {},
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": true
},