Files
metasploit-gs/documentation/modules/exploit/multi/http
Jack Heysel 84ea514180 Land #19026, Add pgadmin exploit CVE-2024-2044
This adds an exploit for pgAdmin <= 8.3 which is a path traversal
vulnerability in the session management that allows a Python pickle
object to be loaded and deserialized. This also adds a new Python
deserialization gadget chain to execute the code in a new thread so the
target application doesn't block the HTTP request.
2024-04-16 14:12:41 -07:00
..
2023-03-15 13:24:33 -05:00
2024-02-02 11:45:51 +01:00
2020-01-16 10:36:38 -05:00
2023-10-10 14:46:18 -04:00
2020-01-16 11:46:36 -05:00
2016-09-15 13:29:06 -04:00
2018-10-18 12:45:53 +08:00
2022-10-03 19:57:25 +07:00
2020-03-24 09:36:17 -04:00
2017-11-07 10:58:28 -05:00
2024-03-05 14:47:04 +00:00
2023-10-10 14:46:18 -04:00
2020-01-16 10:49:22 -05:00
2023-03-15 01:54:36 +01:00
2020-01-20 21:26:59 -05:00
2020-02-17 18:25:10 +01:00
2023-10-10 14:46:18 -04:00
2023-10-10 14:46:18 -04:00
2021-01-09 08:13:19 -05:00
2021-12-08 16:45:19 -05:00
2023-10-10 14:46:18 -04:00