|
72192 | 72192 | },
|
72193 | 72193 | "needs_cleanup": null
|
72194 | 72194 | },
|
| 72195 | + "exploit_multi/http/openmrs_deserialization": { |
| 72196 | + "name": "OpenMRS Java Deserialization RCE", |
| 72197 | + "fullname": "exploit/multi/http/openmrs_deserialization", |
| 72198 | + "aliases": [ |
| 72199 | + |
| 72200 | + ], |
| 72201 | + "rank": 300, |
| 72202 | + "disclosure_date": "2019-02-04", |
| 72203 | + "type": "exploit", |
| 72204 | + "author": [ |
| 72205 | + "Nicolas Serra", |
| 72206 | + "mpgn", |
| 72207 | + "Shelby Pace" |
| 72208 | + ], |
| 72209 | + "description": "OpenMRS is an open-source platform that supplies\n users with a customizable medical record system.\n\n There exists an object deserialization vulnerability\n in the `webservices.rest` module used in OpenMRS Platform.\n Unauthenticated remote code execution can be achieved\n by sending a malicious XML payload to a Rest API endpoint\n such as `/ws/rest/v1/concept`.\n\n This module uses an XML payload generated with Marshalsec\n that targets the ImageIO component of the XStream library.\n\n Tested on OpenMRS Platform `v2.1.2` and `v2.21` with Java\n 8 and Java 9.", |
| 72210 | + "references": [ |
| 72211 | + "CVE-2018-19276", |
| 72212 | + "URL-https://talk.openmrs.org/t/critical-security-advisory-cve-2018-19276-2019-02-04/21607", |
| 72213 | + "URL-https://know.bishopfox.com/advisories/news/2019/02/openmrs-insecure-object-deserialization", |
| 72214 | + "URL-https://github.com/mpgn/CVE-2018-19276/" |
| 72215 | + ], |
| 72216 | + "platform": "Linux,Unix", |
| 72217 | + "arch": "x86, x64", |
| 72218 | + "rport": 8081, |
| 72219 | + "autofilter_ports": [ |
| 72220 | + 80, |
| 72221 | + 8080, |
| 72222 | + 443, |
| 72223 | + 8000, |
| 72224 | + 8888, |
| 72225 | + 8880, |
| 72226 | + 8008, |
| 72227 | + 3000, |
| 72228 | + 8443 |
| 72229 | + ], |
| 72230 | + "autofilter_services": [ |
| 72231 | + "http", |
| 72232 | + "https" |
| 72233 | + ], |
| 72234 | + "targets": [ |
| 72235 | + "Linux" |
| 72236 | + ], |
| 72237 | + "mod_time": "2019-12-04 12:17:35 +0000", |
| 72238 | + "path": "/modules/exploits/multi/http/openmrs_deserialization.rb", |
| 72239 | + "is_install_path": true, |
| 72240 | + "ref_name": "multi/http/openmrs_deserialization", |
| 72241 | + "check": true, |
| 72242 | + "post_auth": false, |
| 72243 | + "default_credential": false, |
| 72244 | + "notes": { |
| 72245 | + }, |
| 72246 | + "needs_cleanup": null |
| 72247 | + }, |
72195 | 72248 | "exploit_multi/http/openx_backdoor_php": {
|
72196 | 72249 | "name": "OpenX Backdoor PHP Code Execution",
|
72197 | 72250 | "fullname": "exploit/multi/http/openx_backdoor_php",
|
|
0 commit comments