Skip to content

Commit c6bae91

Browse files
committed
automatic module_metadata_base.json update
1 parent 9cc02cb commit c6bae91

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed

db/modules_metadata_base.json

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72192,6 +72192,59 @@
7219272192
},
7219372193
"needs_cleanup": null
7219472194
},
72195+
"exploit_multi/http/openmrs_deserialization": {
72196+
"name": "OpenMRS Java Deserialization RCE",
72197+
"fullname": "exploit/multi/http/openmrs_deserialization",
72198+
"aliases": [
72199+
72200+
],
72201+
"rank": 300,
72202+
"disclosure_date": "2019-02-04",
72203+
"type": "exploit",
72204+
"author": [
72205+
"Nicolas Serra",
72206+
"mpgn",
72207+
"Shelby Pace"
72208+
],
72209+
"description": "OpenMRS is an open-source platform that supplies\n users with a customizable medical record system.\n\n There exists an object deserialization vulnerability\n in the `webservices.rest` module used in OpenMRS Platform.\n Unauthenticated remote code execution can be achieved\n by sending a malicious XML payload to a Rest API endpoint\n such as `/ws/rest/v1/concept`.\n\n This module uses an XML payload generated with Marshalsec\n that targets the ImageIO component of the XStream library.\n\n Tested on OpenMRS Platform `v2.1.2` and `v2.21` with Java\n 8 and Java 9.",
72210+
"references": [
72211+
"CVE-2018-19276",
72212+
"URL-https://talk.openmrs.org/t/critical-security-advisory-cve-2018-19276-2019-02-04/21607",
72213+
"URL-https://know.bishopfox.com/advisories/news/2019/02/openmrs-insecure-object-deserialization",
72214+
"URL-https://github.com/mpgn/CVE-2018-19276/"
72215+
],
72216+
"platform": "Linux,Unix",
72217+
"arch": "x86, x64",
72218+
"rport": 8081,
72219+
"autofilter_ports": [
72220+
80,
72221+
8080,
72222+
443,
72223+
8000,
72224+
8888,
72225+
8880,
72226+
8008,
72227+
3000,
72228+
8443
72229+
],
72230+
"autofilter_services": [
72231+
"http",
72232+
"https"
72233+
],
72234+
"targets": [
72235+
"Linux"
72236+
],
72237+
"mod_time": "2019-12-04 12:17:35 +0000",
72238+
"path": "/modules/exploits/multi/http/openmrs_deserialization.rb",
72239+
"is_install_path": true,
72240+
"ref_name": "multi/http/openmrs_deserialization",
72241+
"check": true,
72242+
"post_auth": false,
72243+
"default_credential": false,
72244+
"notes": {
72245+
},
72246+
"needs_cleanup": null
72247+
},
7219572248
"exploit_multi/http/openx_backdoor_php": {
7219672249
"name": "OpenX Backdoor PHP Code Execution",
7219772250
"fullname": "exploit/multi/http/openx_backdoor_php",

0 commit comments

Comments
 (0)