Skip to content

Commit 056ed77

Browse files
committed
automatic module_metadata_base.json update
1 parent 59df04b commit 056ed77

File tree

1 file changed

+65
-0
lines changed

1 file changed

+65
-0
lines changed

db/modules_metadata_base.json

+65
Original file line numberDiff line numberDiff line change
@@ -101874,6 +101874,71 @@
101874101874
"session_types": false,
101875101875
"needs_cleanup": null
101876101876
},
101877+
"exploit_multi/http/mirth_connect_cve_2023_43208": {
101878+
"name": "Mirth Connect Deserialization RCE",
101879+
"fullname": "exploit/multi/http/mirth_connect_cve_2023_43208",
101880+
"aliases": [
101881+
101882+
],
101883+
"rank": 600,
101884+
"disclosure_date": "2023-10-25",
101885+
"type": "exploit",
101886+
"author": [
101887+
"r00t",
101888+
"Naveen Sunkavally",
101889+
"Spencer McIntyre"
101890+
],
101891+
"description": "A vulnerability exists within Mirth Connect due to its mishandling of deserialized data. This vulnerability\n can be leveraged by an attacker using a crafted HTTP request to execute OS commands within the context of the\n target application. The original vulnerability was identified by IHTeam and assigned CVE-2023-37679. Later,\n researchers from Horizon3.ai determined the patch to be incomplete and published a gadget chain which bypassed\n the deny list that the original had implemented. This second vulnerability was assigned CVE-2023-43208 and was\n patched in Mirth Connect version 4.4.1. This module has been tested on versions 4.1.1, 4.3.0 and 4.4.0.",
101892+
"references": [
101893+
"CVE-2023-37679",
101894+
"URL-https://www.ihteam.net/advisory/mirth-connect/",
101895+
"CVE-2023-43208",
101896+
"URL-https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/",
101897+
"URL-https://www.horizon3.ai/writeup-for-cve-2023-43208-nextgen-mirth-connect-pre-auth-rce/"
101898+
],
101899+
"platform": "Linux,Unix,Windows",
101900+
"arch": "cmd",
101901+
"rport": 8443,
101902+
"autofilter_ports": [
101903+
80,
101904+
8080,
101905+
443,
101906+
8000,
101907+
8888,
101908+
8880,
101909+
8008,
101910+
3000,
101911+
8443
101912+
],
101913+
"autofilter_services": [
101914+
"http",
101915+
"https"
101916+
],
101917+
"targets": [
101918+
"Unix Command",
101919+
"Windows Command"
101920+
],
101921+
"mod_time": "2024-01-29 13:52:49 +0000",
101922+
"path": "/modules/exploits/multi/http/mirth_connect_cve_2023_43208.rb",
101923+
"is_install_path": true,
101924+
"ref_name": "multi/http/mirth_connect_cve_2023_43208",
101925+
"check": true,
101926+
"post_auth": false,
101927+
"default_credential": false,
101928+
"notes": {
101929+
"Stability": [
101930+
"crash-safe"
101931+
],
101932+
"Reliability": [
101933+
"repeatable-session"
101934+
],
101935+
"SideEffects": [
101936+
"ioc-in-logs"
101937+
]
101938+
},
101939+
"session_types": false,
101940+
"needs_cleanup": null
101941+
},
101877101942
"exploit_multi/http/mma_backdoor_upload": {
101878101943
"name": "Th3 MMA mma.php Backdoor Arbitrary File Upload",
101879101944
"fullname": "exploit/multi/http/mma_backdoor_upload",

0 commit comments

Comments
 (0)