From a653dbd51a69a607b8114be5cb8f621732c19dfa Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 13 Dec 2022 12:16:12 -0600 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 56 +++++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index ba33c28436..1dfb33d419 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -101684,6 +101684,62 @@ "session_types": false, "needs_cleanup": null }, + "exploit_osx/local/acronis_trueimage_xpc_privesc": { + "name": "Acronis TrueImage XPC Privilege Escalation", + "fullname": "exploit/osx/local/acronis_trueimage_xpc_privesc", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2020-11-11", + "type": "exploit", + "author": [ + "Csaba Fitzl", + "Shelby Pace" + ], + "description": "Acronis TrueImage versions 2019 update 1 through 2021 update 1\n are vulnerable to privilege escalation. The `com.acronis.trueimagehelper`\n helper tool does not perform any validation on connecting clients,\n which gives arbitrary clients the ability to execute functions provided\n by the helper tool with `root` privileges.", + "references": [ + "CVE-2020-25736", + "URL-https://kb.acronis.com/content/68061", + "URL-https://attackerkb.com/topics/a1Yrvagxt5/cve-2020-25736" + ], + "platform": "OSX", + "arch": "x64", + "rport": null, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": [ + "Auto" + ], + "mod_time": "2022-12-13 09:49:59 +0000", + "path": "/modules/exploits/osx/local/acronis_trueimage_xpc_privesc.rb", + "is_install_path": true, + "ref_name": "osx/local/acronis_trueimage_xpc_privesc", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "artifacts-on-disk", + "ioc-in-logs" + ] + }, + "session_types": [ + "shell", + "meterpreter" + ], + "needs_cleanup": true + }, "exploit_osx/local/cfprefsd_race_condition": { "name": "macOS cfprefsd Arbitrary File Write Local Privilege Escalation", "fullname": "exploit/osx/local/cfprefsd_race_condition",