From 4521c9f3d3022fa65b27f54ca17d38d14da99a26 Mon Sep 17 00:00:00 2001 From: jenkins-metasploit Date: Thu, 23 Apr 2026 12:03:13 +0000 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 114 +++++++++++++++++----------------- 1 file changed, 57 insertions(+), 57 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index ab5342f080..619b125ef7 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -91181,7 +91181,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/abrt_raceabrt_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/abrt_raceabrt_priv_esc", @@ -91235,7 +91235,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/abrt_sosreport_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/abrt_sosreport_priv_esc", @@ -91292,7 +91292,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/af_packet_chocobo_root_priv_esc", @@ -91350,7 +91350,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/af_packet_packet_set_ring_priv_esc", @@ -91460,7 +91460,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/apport_abrt_chroot_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/apport_abrt_chroot_priv_esc", @@ -91512,7 +91512,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/asan_suid_executable_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/asan_suid_executable_priv_esc", @@ -91570,7 +91570,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/blueman_set_dhcp_handler_dbus_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/blueman_set_dhcp_handler_dbus_priv_esc", @@ -91627,7 +91627,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/bpf_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/bpf_priv_esc", @@ -91697,7 +91697,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/bpf_sign_extension_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/bpf_sign_extension_priv_esc", @@ -91807,7 +91807,7 @@ "targets": [ "Auto" ], - "mod_time": "2023-02-02 18:17:02 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpe.rb", "is_install_path": true, "ref_name": "linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpe", @@ -91856,7 +91856,7 @@ "x86_64", "aarch64" ], - "mod_time": "2023-02-02 18:17:02 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/cve_2021_3493_overlayfs.rb", "is_install_path": true, "ref_name": "linux/local/cve_2021_3493_overlayfs", @@ -91968,7 +91968,7 @@ "x86", "aarch64" ], - "mod_time": "2023-02-02 18:17:02 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/cve_2021_4034_pwnkit_lpe_pkexec.rb", "is_install_path": true, "ref_name": "linux/local/cve_2021_4034_pwnkit_lpe_pkexec", @@ -92074,7 +92074,7 @@ "targets": [ "Ubuntu Linux 5.13.0-37" ], - "mod_time": "2024-09-09 14:19:20 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/cve_2022_0995_watch_queue.rb", "is_install_path": true, "ref_name": "linux/local/cve_2022_0995_watch_queue", @@ -92126,7 +92126,7 @@ "targets": [ "Auto" ], - "mod_time": "2023-03-22 12:52:15 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/cve_2022_1043_io_uring_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/cve_2022_1043_io_uring_priv_esc", @@ -92225,7 +92225,7 @@ "Linux x86", "Linux x86_64" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/desktop_privilege_escalation.rb", "is_install_path": true, "ref_name": "linux/local/desktop_privilege_escalation", @@ -92329,7 +92329,7 @@ "targets": [ "Automatic" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb", "is_install_path": true, "ref_name": "linux/local/docker_daemon_privilege_escalation", @@ -92537,7 +92537,7 @@ "targets": [ "Exim 4.87 - 4.91" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/exim4_deliver_message_priv_esc", @@ -92618,7 +92618,7 @@ "bwatters-r7", "gardnerapp" ], - "description": "This module exploits the use of unsafe functions in a number of Ubuntu kernels\n utilizing vunerable versions of overlayfs. To mitigate CVE-2021-3493 the Linux\n kernel added a call to vfs_setxattr during ovl_do_setxattr. Due to independent\n changes to the kernel by the Ubuntu development team __vfs_setxattr_noperm is\n called during ovl_do_setxattr without calling the intermediate safety function\n vfs_setxattr. Ultimatly this module allows for root access to be achieved by\n writing setuid capabilities to a file which are not sanitized after being unioned\n with the upper mounted directory.", + "description": "This module exploits the use of unsafe functions in a number of Ubuntu kernels\n utilizing vulnerable versions of overlayfs. To mitigate CVE-2021-3493 the Linux\n kernel added a call to vfs_setxattr during ovl_do_setxattr. Due to independent\n changes to the kernel by the Ubuntu development team __vfs_setxattr_noperm is\n called during ovl_do_setxattr without calling the intermediate safety function\n vfs_setxattr. Ultimatly this module allows for root access to be achieved by\n writing setuid capabilities to a file which are not sanitized after being unioned\n with the upper mounted directory.", "references": [ "URL-https://www.crowdstrike.com/blog/crowdstrike-discovers-new-container-exploit/", "URL-https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", @@ -92637,7 +92637,7 @@ "Linux_Binary", "Linux_Command" ], - "mod_time": "2024-12-17 16:52:24 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/gameoverlay_privesc.rb", "is_install_path": true, "ref_name": "linux/local/gameoverlay_privesc", @@ -92703,7 +92703,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-12-17 16:12:31 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/glibc_ld_audit_dso_load_priv_esc", @@ -92759,7 +92759,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-12-17 16:12:31 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/glibc_origin_expansion_priv_esc", @@ -92815,7 +92815,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/glibc_realpath_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/glibc_realpath_priv_esc", @@ -92974,7 +92974,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-12-17 16:12:31 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/hp_xglance_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/hp_xglance_priv_esc", @@ -93071,7 +93071,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/juju_run_agent_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/juju_run_agent_priv_esc", @@ -93172,7 +93172,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/ktsuss_suid_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/ktsuss_suid_priv_esc", @@ -93222,7 +93222,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-10-06 17:15:11 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/lastore_daemon_dbus_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/lastore_daemon_dbus_priv_esc", @@ -93276,7 +93276,7 @@ "targets": [ "Auto" ], - "mod_time": "2023-02-02 18:17:02 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/libuser_roothelper_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/libuser_roothelper_priv_esc", @@ -93388,7 +93388,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/nested_namespace_idmap_limit_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/nested_namespace_idmap_limit_priv_esc", @@ -93443,7 +93443,7 @@ "targets": [ "Auto" ], - "mod_time": "2022-09-30 09:57:54 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/netfilter_nft_set_elem_init_privesc.rb", "is_install_path": true, "ref_name": "linux/local/netfilter_nft_set_elem_init_privesc", @@ -93499,7 +93499,7 @@ "targets": [ "Ubuntu" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/netfilter_priv_esc_ipv4.rb", "is_install_path": true, "ref_name": "linux/local/netfilter_priv_esc_ipv4", @@ -93608,7 +93608,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/network_manager_vpnc_username_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/network_manager_vpnc_username_priv_esc", @@ -93659,7 +93659,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/ntfs3g_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/ntfs3g_priv_esc", @@ -93707,7 +93707,7 @@ "targets": [ "Micro Focus (HPE) Data Protector <= 10.40 build 118" ], - "mod_time": "2023-02-02 18:17:02 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/omniresolve_suid_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/omniresolve_suid_priv_esc", @@ -93759,7 +93759,7 @@ "CVE-2015-1328", "CVE-2015-8660" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/overlayfs_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/overlayfs_priv_esc", @@ -93863,7 +93863,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/pkexec.rb", "is_install_path": true, "ref_name": "linux/local/pkexec", @@ -93966,7 +93966,7 @@ "targets": [ "Automatic" ], - "mod_time": "2025-10-06 17:15:11 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb", "is_install_path": true, "ref_name": "linux/local/progress_flowmon_sudo_privesc_2024", @@ -94074,7 +94074,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/ptrace_sudo_token_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/ptrace_sudo_token_priv_esc", @@ -94127,7 +94127,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/ptrace_traceme_pkexec_helper.rb", "is_install_path": true, "ref_name": "linux/local/ptrace_traceme_pkexec_helper", @@ -94187,7 +94187,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/rds_atomic_free_op_null_pointer_deref_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/rds_atomic_free_op_null_pointer_deref_priv_esc", @@ -94244,7 +94244,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-20 13:20:44 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/rds_rds_page_copy_user_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/rds_rds_page_copy_user_priv_esc", @@ -94299,7 +94299,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-23 12:43:46 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/recvmmsg_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/recvmmsg_priv_esc", @@ -94348,7 +94348,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/reptile_rootkit_reptile_cmd_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/reptile_rootkit_reptile_cmd_priv_esc", @@ -94563,7 +94563,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/servu_ftp_server_prepareinstallation_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/servu_ftp_server_prepareinstallation_priv_esc", @@ -94619,7 +94619,7 @@ "targets": [ "Linux x86" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/sock_sendpage.rb", "is_install_path": true, "ref_name": "linux/local/sock_sendpage", @@ -94671,7 +94671,7 @@ "targets": [ "Linux x86" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/sophos_wpa_clear_keys.rb", "is_install_path": true, "ref_name": "linux/local/sophos_wpa_clear_keys", @@ -94717,7 +94717,7 @@ "Linux x86", "Linux x86_64" ], - "mod_time": "2025-12-17 16:12:31 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/su_login.rb", "is_install_path": true, "ref_name": "linux/local/su_login", @@ -94848,7 +94848,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-08-27 17:58:11 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/sudo_chroot_cve_2025_32463.rb", "is_install_path": true, "ref_name": "linux/local/sudo_chroot_cve_2025_32463", @@ -94963,7 +94963,7 @@ "targets": [ "Auto" ], - "mod_time": "2026-04-05 02:15:16 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/systemtap_modprobe_options_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/systemtap_modprobe_options_priv_esc", @@ -95120,7 +95120,7 @@ "targets": [ "Auto" ], - "mod_time": "2023-02-02 18:17:02 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/ubuntu_enlightenment_mount_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/ubuntu_enlightenment_mount_priv_esc", @@ -95334,7 +95334,7 @@ "targets": [ "Auto" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/ufo_privilege_escalation.rb", "is_install_path": true, "ref_name": "linux/local/ufo_privilege_escalation", @@ -95495,7 +95495,7 @@ "Linux x86", "Linux x64" ], - "mod_time": "2025-06-25 09:25:53 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/vmware_alsa_config.rb", "is_install_path": true, "ref_name": "linux/local/vmware_alsa_config", @@ -95548,7 +95548,7 @@ "targets": [ "Automatic" ], - "mod_time": "2025-02-28 09:35:28 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/vmware_mount.rb", "is_install_path": true, "ref_name": "linux/local/vmware_mount", @@ -95593,7 +95593,7 @@ "targets": [ "Automatic" ], - "mod_time": "2023-03-13 10:31:27 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/vmware_workspace_one_access_certproxy_lpe.rb", "is_install_path": true, "ref_name": "linux/local/vmware_workspace_one_access_certproxy_lpe", @@ -95645,7 +95645,7 @@ "Unix Command", "Linux Dropper" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/vmware_workspace_one_access_cve_2022_22960.rb", "is_install_path": true, "ref_name": "linux/local/vmware_workspace_one_access_cve_2022_22960", @@ -95745,7 +95745,7 @@ "targets": [ "Auto" ], - "mod_time": "2022-10-17 15:00:56 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/zimbra_postfix_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/zimbra_postfix_priv_esc", @@ -95794,7 +95794,7 @@ "targets": [ "Auto" ], - "mod_time": "2023-03-27 16:46:07 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/zimbra_slapper_priv_esc.rb", "is_install_path": true, "ref_name": "linux/local/zimbra_slapper_priv_esc", @@ -95843,7 +95843,7 @@ "Command payload", "Linux x86" ], - "mod_time": "2025-12-17 17:11:13 +0000", + "mod_time": "2026-04-22 11:57:34 +0000", "path": "/modules/exploits/linux/local/zpanel_zsudo.rb", "is_install_path": true, "ref_name": "linux/local/zpanel_zsudo",