Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Jan 8, 2025
1 parent b2e28ef commit 6ac1d1e
Showing 1 changed file with 60 additions and 0 deletions.
60 changes: 60 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -26762,6 +26762,66 @@

]
},
"auxiliary_gather/selenium_file_read": {
"name": "Selenium arbitrary file read",
"fullname": "auxiliary/gather/selenium_file_read",
"aliases": [

],
"rank": 300,
"disclosure_date": "2020-10-01",
"type": "auxiliary",
"author": [
"Jon Stratton",
"Takahiro Yokoyama"
],
"description": "If there is an open selenium web driver, a remote attacker can send requests to the victims browser.\n In certain cases this can be used to access to the remote file system.",
"references": [
"URL-https://github.com/JonStratton/selenium-node-takeover-kit"
],
"platform": "Cisco",
"arch": "",
"rport": 4444,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2025-01-08 21:09:22 +0000",
"path": "/modules/auxiliary/gather/selenium_file_read.rb",
"is_install_path": true,
"ref_name": "gather/selenium_file_read",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [

]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_gather/shodan_honeyscore": {
"name": "Shodan Honeyscore Client",
"fullname": "auxiliary/gather/shodan_honeyscore",
Expand Down

0 comments on commit 6ac1d1e

Please sign in to comment.