Skip to content

Commit 053853a

Browse files
committed
automatic module_metadata_base.json update
1 parent 5334f05 commit 053853a

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed

db/modules_metadata_base.json

+50
Original file line numberDiff line numberDiff line change
@@ -16792,6 +16792,56 @@
1679216792
},
1679316793
"needs_cleanup": false
1679416794
},
16795+
"auxiliary_gather/fortios_vpnssl_traversal_creds_leak": {
16796+
"name": "FortiOS Path Traversal Credential Gatherer",
16797+
"fullname": "auxiliary/gather/fortios_vpnssl_traversal_creds_leak",
16798+
"aliases": [
16799+
16800+
],
16801+
"rank": 300,
16802+
"disclosure_date": null,
16803+
"type": "auxiliary",
16804+
"author": [
16805+
"lynx (Carlos Vieira)",
16806+
"mekhalleh (RAMELLA Sébastien)"
16807+
],
16808+
"description": "Fortinet FortiOS versions 5.4.6 to 5.4.12, 5.6.3 to 5.6.7 and 6.0.0 to\n 6.0.4 are vulnerable to a path traversal vulnerability within the SSL VPN\n web portal which allows unauthenticated attackers to download FortiOS system\n files through specially crafted HTTP requests.\n\n This module exploits this vulnerability to read the usernames and passwords\n of users currently logged into the FortiOS SSL VPN, which are stored in\n plaintext in the \"/dev/cmdb/sslvpn_websession\" file on the VPN server.",
16809+
"references": [
16810+
"CVE-2018-13379",
16811+
"URL-https://www.fortiguard.com/psirt/FG-IR-18-384",
16812+
"EDB-47287",
16813+
"EDB-47288"
16814+
],
16815+
"platform": "",
16816+
"arch": "",
16817+
"rport": 10443,
16818+
"autofilter_ports": [
16819+
80,
16820+
8080,
16821+
443,
16822+
8000,
16823+
8888,
16824+
8880,
16825+
8008,
16826+
3000,
16827+
8443
16828+
],
16829+
"autofilter_services": [
16830+
"http",
16831+
"https"
16832+
],
16833+
"targets": null,
16834+
"mod_time": "2021-02-26 14:04:00 +0000",
16835+
"path": "/modules/auxiliary/gather/fortios_vpnssl_traversal_creds_leak.rb",
16836+
"is_install_path": true,
16837+
"ref_name": "gather/fortios_vpnssl_traversal_creds_leak",
16838+
"check": false,
16839+
"post_auth": false,
16840+
"default_credential": false,
16841+
"notes": {
16842+
},
16843+
"needs_cleanup": false
16844+
},
1679516845
"auxiliary_gather/get_user_spns": {
1679616846
"name": "Gather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)",
1679716847
"fullname": "auxiliary/gather/get_user_spns",

0 commit comments

Comments
 (0)