From e446fe4e83f623ef20698fc032a10904a4fa5e63 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Wed, 28 Sep 2022 10:17:23 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 59 ++++++++++++++++++++++++++++++++--- 1 file changed, 55 insertions(+), 4 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index d390feff20..bc2ca0fcd3 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -159734,6 +159734,57 @@ "session_types": false, "needs_cleanup": null }, + "exploit_windows/misc/mobile_mouse_rce": { + "name": "Mobile Mouse RCE", + "fullname": "exploit/windows/misc/mobile_mouse_rce", + "aliases": [ + + ], + "rank": 300, + "disclosure_date": "2022-09-20", + "type": "exploit", + "author": [ + "h00die", + "CHOKRI HAMMEDI" + ], + "description": "This module utilizes the Mobile Mouse Server by RPA Technologies, Inc protocol\n to deploy a payload and run it from the server. This module will only deploy\n a payload if the server is set without a password (default).\n Tested against 3.6.0.4, current at the time of module writing", + "references": [ + "EDB-51010", + "URL-https://mobilemouse.com/" + ], + "platform": "Windows", + "arch": "x64, x86", + "rport": 9099, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": [ + "default" + ], + "mod_time": "2022-09-27 14:51:03 +0000", + "path": "/modules/exploits/windows/misc/mobile_mouse_rce.rb", + "is_install_path": true, + "ref_name": "windows/misc/mobile_mouse_rce", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "artifacts-on-disk" + ] + }, + "session_types": false, + "needs_cleanup": true + }, "exploit_windows/misc/ms07_064_sami": { "name": "MS07-064 Microsoft DirectX DirectShow SAMI Buffer Overflow", "fullname": "exploit/windows/misc/ms07_064_sami", @@ -160697,7 +160748,7 @@ "targets": [ "pull" ], - "mod_time": "2022-09-20 16:44:05 +0000", + "mod_time": "2022-09-26 15:45:42 +0000", "path": "/modules/exploits/windows/misc/unified_remote_rce.rb", "is_install_path": true, "ref_name": "windows/misc/unified_remote_rce", @@ -160709,7 +160760,7 @@ "crash-safe" ], "Reliability": [ - "crash-service-down" + "repeatable-session" ], "SideEffects": [ "screen-effects", @@ -160895,7 +160946,7 @@ "targets": [ "stager" ], - "mod_time": "2022-09-23 14:20:18 +0000", + "mod_time": "2022-09-26 15:45:42 +0000", "path": "/modules/exploits/windows/misc/wifi_mouse_rce.rb", "is_install_path": true, "ref_name": "windows/misc/wifi_mouse_rce", @@ -160907,7 +160958,7 @@ "crash-safe" ], "Reliability": [ - "crash-service-down" + "repeatable-session" ], "SideEffects": [ "screen-effects",