Lucene search

K
Rapid7Metasploit

17 matches found

CVE
CVE
added 2017/03/02 8:59 p.m.157 views

CVE-2017-5231

All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi CommandDispatcher.cmd_download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploi...

7.1CVSS6.9AI score0.00299EPSS
CVE
CVE
added 2020/10/29 3:15 p.m.118 views

CVE-2020-7384

Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.

9.3CVSS7.4AI score0.65465EPSS
CVE
CVE
added 2020/04/22 10:15 p.m.95 views

CVE-2020-7350

Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be ...

7.8CVSS7AI score0.58671EPSS
CVE
CVE
added 2021/04/23 4:15 p.m.85 views

CVE-2020-7385

By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions. Since Metasploit Framework typically runs with e...

8.8CVSS8.3AI score0.00582EPSS
CVE
CVE
added 2019/11/06 7:15 p.m.64 views

CVE-2019-5642

Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same system where Metasploit Pro is installed to intercep...

3.3CVSS4AI score0.00095EPSS
CVE
CVE
added 2019/04/30 5:29 p.m.55 views

CVE-2019-5624

Rapid7 Metasploit Framework suffers from an instance of CWE-22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in the Zip import function of Metasploit. Exploiting this vulnerability can allow an attacker to execute arbitrary code in Metasploit at the privilege level...

7.4CVSS7.7AI score0.0812EPSS
CVE
CVE
added 2017/10/06 9:29 p.m.51 views

CVE-2017-15084

The web UI in Rapid7 Metasploit before 4.14.1-20170828 allows logout CSRF, aka R7-2017-22.

6.5CVSS6.4AI score0.00126EPSS
CVE
CVE
added 2017/06/15 2:29 p.m.44 views

CVE-2017-5244

Routes used to stop running Metasploit tasks (either particular ones or all tasks) allowed GET requests. Only POST requests should have been allowed, as the stop/stop_all routes change the state of the service. This could have allowed an attacker to stop currently-running Metasploit tasks by gettin...

3.5CVSS4.3AI score0.00203EPSS
CVE
CVE
added 2020/08/24 7:15 p.m.37 views

CVE-2020-7376

The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.

10CVSS8.4AI score0.00326EPSS
CVE
CVE
added 2017/03/02 8:59 p.m.36 views

CVE-2017-5229

All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter extapi Clipboard.parse_dump() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console ...

7.1CVSS6.9AI score0.00299EPSS
CVE
CVE
added 2023/02/01 11:15 p.m.35 views

CVE-2023-0599

Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Meta...

6.1CVSS5.4AI score0.00378EPSS
CVE
CVE
added 2017/03/02 8:59 p.m.34 views

CVE-2017-5235

Rapid7 Metasploit Pro installers prior to version 4.13.0-2017022101 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.

7.8CVSS7.5AI score0.00189EPSS
CVE
CVE
added 2020/09/01 3:15 p.m.33 views

CVE-2019-5645

By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the ...

7.5CVSS7.6AI score0.87878EPSS
CVE
CVE
added 2020/06/25 6:15 p.m.32 views

CVE-2020-7355

Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record o...

6.1CVSS5.5AI score0.00426EPSS
CVE
CVE
added 2017/03/02 8:59 p.m.31 views

CVE-2017-5228

All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi Dir.download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the...

7.1CVSS6.9AI score0.00299EPSS
CVE
CVE
added 2020/08/24 7:15 p.m.29 views

CVE-2020-7377

The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP...

8.1CVSS7.7AI score0.0041EPSS
CVE
CVE
added 2020/06/25 6:15 p.m.22 views

CVE-2020-7354

Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record...

6.1CVSS5.5AI score0.00426EPSS