Tag
#auth
This Metasploit module exploits a vulnerability in Fortra GoAnywhere MFT that allows an unauthenticated attacker to create a new administrator account. This can be leveraged to upload a JSP payload and achieve RCE. GoAnywhere MFT versions 6.x from 6.0.1, and 7.x before 7.4.1 are vulnerable.
This code serves as both a vulnerability detector and a proof of concept for CVE-2023-36845. It executes the phpinfo() function on the login page of the target device, allowing to inspect the PHP configuration. This script also has the option to save the phpinfo() output to a file for further analysis.
PCMan FTP Server version 2.0 pwn remote buffer overflow exploit.
Proxmox VE versions 5.4 through 7.4-1 suffer from a TOTP brute forcing vulnerability.
TP-LINK TL-WR740N suffers from an html injection vulnerability.
GoAhead Web Server version 2.5 suffers from an html injection vulnerability.
Ricoh printers suffer from directory and file exposure vulnerabilities.
Bank Locker Management System suffers from a remote SQL injection vulnerability.
Grocy versions 4.0.2 and below suffer from a cross site request forgery vulnerabilities.
WebCatalog versions prior to 48.8 call the Electron shell.openExternal function without verifying that the URL is for an http or https resource. This vulnerability allows an attacker to potentially execute code through arbitrary protocols on the victims machine by having users sync pages with malicious URLs. The victim has to interact with the link, which can then enable an attacker to bypass security measures for malicious file delivery.