Rapid7

Metasploit

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.79%
  • Veröffentlicht 01.02.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:37:27

Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and scri...

Exploit
  • EPSS 0.58%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:37:08

By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions....

Exploit
  • EPSS 70.09%
  • Veröffentlicht 29.10.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:37:08

Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.

  • EPSS 87.88%
  • Veröffentlicht 01.09.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:45:17

By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being es...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 24.08.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:37:08

The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file ...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 24.08.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:37:07

The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when th...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 25.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:37:06

Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which ...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 25.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:37:06

Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, whic...

Exploit
  • EPSS 58.67%
  • Veröffentlicht 22.04.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:37:05

Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a ...

  • EPSS 0.1%
  • Veröffentlicht 06.11.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:45:17

Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same sys...