Skip to content

Commit 6549c12

Browse files
committed
automatic module_metadata_base.json update
1 parent 8cdaf97 commit 6549c12

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61028,6 +61028,68 @@
6102861028
},
6102961029
"needs_cleanup": null
6103061030
},
61031+
"exploit_linux/http/saltstack_salt_wheel_async_rce": {
61032+
"name": "SaltStack Salt API Unauthenticated RCE through wheel_async client",
61033+
"fullname": "exploit/linux/http/saltstack_salt_wheel_async_rce",
61034+
"aliases": [
61035+
61036+
],
61037+
"rank": 600,
61038+
"disclosure_date": "2021-02-25",
61039+
"type": "exploit",
61040+
"author": [
61041+
"Alex Seymour",
61042+
"Christophe De La Fuente"
61043+
],
61044+
"description": "This module leverages an authentication bypass and directory\n traversal vulnerabilities in Saltstack Salt's REST API to execute\n commands remotely on the `master` as the root user.\n\n Every 60 seconds, `salt-master` service performs a maintenance\n process check that reloads and executes all the `grains` on the\n `master`, including custom grain modules in the Extension Module\n directory. So, this module simply creates a Python script at this\n location and waits for it to be executed. The time interval is set to\n 60 seconds by default but can be changed in the `master`\n configuration file with the `loop_interval` option. Note that, if an\n administrator executes commands locally on the `master`, the\n maintenance process check will also be performed.\n\n It has been fixed in the following installation packages: 3002.5,\n 3001.6 and 3000.8.\n\n Also, a patch is available for the following versions: 3002.2,\n 3001.4, 3000.6, 2019.2.8, 2019.2.5, 2018.3.5, 2017.7.8, 2016.11.10,\n 2016.11.6, 2016.11.5, 2016.11.3, 2016.3.8, 2016.3.6, 2016.3.4,\n 2015.8.13 and 2015.8.10.\n\n This module has been tested successfully against versions 3001.4,\n 3002 and 3002.2 on Ubuntu 18.04.",
61045+
"references": [
61046+
"CVE-2021-25281",
61047+
"CVE-2021-25282",
61048+
"URL-https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/",
61049+
"URL-https://github.com/Immersive-Labs-Sec/CVE-2021-25281/blob/main/cve-2021-25281.py"
61050+
],
61051+
"platform": "Linux,Unix",
61052+
"arch": "cmd, x86, x64",
61053+
"rport": 8000,
61054+
"autofilter_ports": [
61055+
80,
61056+
8080,
61057+
443,
61058+
8000,
61059+
8888,
61060+
8880,
61061+
8008,
61062+
3000,
61063+
8443
61064+
],
61065+
"autofilter_services": [
61066+
"http",
61067+
"https"
61068+
],
61069+
"targets": [
61070+
"Unix Command",
61071+
"Linux Dropper"
61072+
],
61073+
"mod_time": "2021-03-31 17:48:35 +0000",
61074+
"path": "/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb",
61075+
"is_install_path": true,
61076+
"ref_name": "linux/http/saltstack_salt_wheel_async_rce",
61077+
"check": true,
61078+
"post_auth": false,
61079+
"default_credential": false,
61080+
"notes": {
61081+
"Stability": [
61082+
"crash-safe"
61083+
],
61084+
"Reliability": [
61085+
"repeatable-session"
61086+
],
61087+
"SideEffects": [
61088+
"ioc-in-logs"
61089+
]
61090+
},
61091+
"needs_cleanup": true
61092+
},
6103161093
"exploit_linux/http/samsung_srv_1670d_upload_exec": {
6103261094
"name": "Samsung SRN-1670D Web Viewer Version 1.0.0.193 Arbitrary File Read and Upload",
6103361095
"fullname": "exploit/linux/http/samsung_srv_1670d_upload_exec",

0 commit comments

Comments
 (0)