automatic module_metadata_base.json update

This commit is contained in:
jenkins-metasploit
2026-05-06 21:23:22 +00:00
parent 98e588e066
commit 2be37dda84
+2 -2
View File
@@ -119629,7 +119629,7 @@
"author": [
"L / l-codes <L / l-codes@qq.com>"
],
"description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable\n installations of Apache Shiro v1.2.4. Note that other versions of Apache Shiro may\n also be exploitable if the encryption key used by Shiro to encrypt rememberMe\n cookies is known.",
"description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable\n installations of Apache Shiro v1.2.4. Note that other versions of Apache Shiro may\n also be exploitable if the encryption key used by Shiro to encrypt rememberMe\n cookies is known.\n\n The gadget chain used for Java deserialization must be present on the target's classpath.",
"references": [
"CVE-2016-4437",
"URL-https://github.com/Medicean/VulApps/tree/master/s/shiro/1"
@@ -119656,7 +119656,7 @@
"Unix Command payload",
"Windows Command payload"
],
"mod_time": "2025-12-17 16:12:31 +0000",
"mod_time": "2026-05-05 17:12:22 +0000",
"path": "/modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb",
"is_install_path": true,
"ref_name": "multi/http/shiro_rememberme_v124_deserialize",