From ced68536ab9c40be59b4c14b6dd25b94a3143464 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 2 Apr 2019 13:04:27 -0700 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 3bce8c9290..53017b67d6 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -48150,8 +48150,7 @@ "description": "This module exploits the command injection vulnerability of MailCleaner Community Edition product. An authenticated user can execute an\n operating system command under the context of the web server user which is root.\n\n /admin/managetracing/search/search endpoint takes several user inputs and then pass them to the internal service which is responsible for executing\n operating system command. One of the user input is being passed to the service without proper validation. That cause a command injection vulnerability.", "references": [ "URL-https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/", - "CVE-2018-20323", - "CVE-2018-1000999" + "CVE-2018-20323" ], "platform": "Python,Unix", "arch": "python, cmd", @@ -48175,7 +48174,7 @@ "Python payload", "Command payload" ], - "mod_time": "2019-01-23 09:27:12 +0000", + "mod_time": "2019-04-02 12:51:09 +0000", "path": "/modules/exploits/linux/http/mailcleaner_exec.rb", "is_install_path": true, "ref_name": "linux/http/mailcleaner_exec",