Show filters
18 Total Results
Displaying 11-18 of 18
Sort by:
Attacker Value
Unknown
CVE-2017-15084
Disclosure Date: October 06, 2017 (last updated November 26, 2024)
The web UI in Rapid7 Metasploit before 4.14.1-20170828 allows logout CSRF, aka R7-2017-22.
0
Attacker Value
Unknown
CVE-2017-5244
Disclosure Date: June 15, 2017 (last updated November 26, 2024)
Routes used to stop running Metasploit tasks (either particular ones or all tasks) allowed GET requests. Only POST requests should have been allowed, as the stop/stop_all routes change the state of the service. This could have allowed an attacker to stop currently-running Metasploit tasks by getting an authenticated user to execute JavaScript. As of Metasploit 4.14.0 (Update 2017061301), the routes for stopping tasks only allow POST requests, which validate the presence of a secret token to prevent CSRF attacks.
0
Attacker Value
Unknown
CVE-2017-5235
Disclosure Date: March 02, 2017 (last updated November 26, 2024)
Rapid7 Metasploit Pro installers prior to version 4.13.0-2017022101 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.
0
Attacker Value
Unknown
CVE-2017-5229
Disclosure Date: March 02, 2017 (last updated November 26, 2024)
All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter extapi Clipboard.parse_dump() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
0
Attacker Value
Unknown
CVE-2017-5228
Disclosure Date: March 02, 2017 (last updated November 26, 2024)
All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi Dir.download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
0
Attacker Value
Unknown
CVE-2017-5231
Disclosure Date: March 02, 2017 (last updated November 26, 2024)
All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi CommandDispatcher.cmd_download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
0
Attacker Value
Unknown
CVE-2011-1056
Disclosure Date: February 21, 2011 (last updated October 04, 2023)
The installer for Metasploit Framework 3.5.1, when running on Windows, uses weak inherited permissions for the Metasploit installation directory, which allows local users to gain privileges by replacing critical files with a Trojan horse.
0
Attacker Value
Unknown
CVE-2005-2482
Disclosure Date: August 07, 2005 (last updated February 22, 2025)
The StateToOptions function in msfweb in Metasploit Framework 2.4 and earlier, when running with the -D option (defanged mode), allows attackers to modify temporary environment variables before the "_Defanged" environment option is checked when processing the Exploit command.
0