Skip to content

Commit 0cbd4d1

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 8dd032e commit 0cbd4d1

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed

db/modules_metadata_base.json

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76401,6 +76401,70 @@
7640176401
"session_types": false,
7640276402
"needs_cleanup": null
7640376403
},
76404+
"exploit_linux/http/invoiceninja_unauth_rce_cve_2024_55555": {
76405+
"name": "Invoice Ninja unauthenticated PHP Deserialization Vulnerability",
76406+
"fullname": "exploit/linux/http/invoiceninja_unauth_rce_cve_2024_55555",
76407+
"aliases": [
76408+
76409+
],
76410+
"rank": 600,
76411+
"disclosure_date": "2024-12-13",
76412+
"type": "exploit",
76413+
"author": [
76414+
"h00die-gr3y <[email protected]>",
76415+
"Rémi Matasse",
76416+
"Mickaël Benassouli"
76417+
],
76418+
"description": "Invoice Ninja is a free invoicing software for small businesses, based on the PHP framework Laravel.\n A Remote Code Execution vulnerability in Invoice Ninja (>= 5.8.22 <= 5.10.10) allows remote unauthenticated\n attackers to conduct PHP deserialization attacks via endpoint `/route/<hash>` which accepts a Laravel\n ciphered value which is unsafe unserialized, if an attacker has access to the APP_KEY.\n As it allows remote code execution, adversaries could exploit this flaw to execute arbitrary commands,\n potentially resulting in complete system compromise, data exfiltration, or unauthorized access\n to sensitive information.",
76419+
"references": [
76420+
"CVE-2024-55555",
76421+
"URL-https://attackerkb.com/topics/xxxxx/cve-2024-55555",
76422+
"URL-https://www.synacktiv.com/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known"
76423+
],
76424+
"platform": "Linux,PHP,Unix",
76425+
"arch": "php, cmd",
76426+
"rport": 443,
76427+
"autofilter_ports": [
76428+
80,
76429+
8080,
76430+
443,
76431+
8000,
76432+
8888,
76433+
8880,
76434+
8008,
76435+
3000,
76436+
8443
76437+
],
76438+
"autofilter_services": [
76439+
"http",
76440+
"https"
76441+
],
76442+
"targets": [
76443+
"PHP",
76444+
"Unix/Linux Command"
76445+
],
76446+
"mod_time": "2025-02-24 15:51:32 +0000",
76447+
"path": "/modules/exploits/linux/http/invoiceninja_unauth_rce_cve_2024_55555.rb",
76448+
"is_install_path": true,
76449+
"ref_name": "linux/http/invoiceninja_unauth_rce_cve_2024_55555",
76450+
"check": true,
76451+
"post_auth": false,
76452+
"default_credential": false,
76453+
"notes": {
76454+
"Stability": [
76455+
"crash-safe"
76456+
],
76457+
"Reliability": [
76458+
"repeatable-session"
76459+
],
76460+
"SideEffects": [
76461+
"ioc-in-logs",
76462+
"artifacts-on-disk"
76463+
]
76464+
},
76465+
"session_types": false,
76466+
"needs_cleanup": null
76467+
},
7640476468
"exploit_linux/http/invokeai_rce_cve_2024_12029": {
7640576469
"name": "InvokeAI RCE",
7640676470
"fullname": "exploit/linux/http/invokeai_rce_cve_2024_12029",

0 commit comments

Comments
 (0)