All Systems Operational

CVE Hub

beta
CVE-2023-0599
MEDIUM [6.1]
Last Modified: 11/21/2024
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
docs.rapid7.com logo
https://docs.rapid7.com/release-notes/metasploit/20230130/
docs.rapid7.com logo
https://docs.rapid7.com/release-notes/metasploit/20230130/
CVE-2020-7385
deserialization
HIGH [8.1]
Last Modified: 11/21/2024
By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions. Since Metasploit Framework typically runs with elevated privileges, this can lead to a system compromise on the Metasploit workstation. Note that an attacker would have to lie in wait and entice the Metasploit user to run the affected module against a malicious endpoint in a "hack-back" type of attack. Metasploit is only vulnerable when the drb_remote_codeexec module is running. In most cases, this cannot happen automatically.
github.com logo
https://github.com/rapid7/metasploit-framework/pull/14300
github.com logo
https://github.com/rapid7/metasploit-framework/pull/14335
github.com logo
https://github.com/rapid7/metasploit-framework/pull/14300
+3
CVE-2020-7384
HIGH [7.0]
Last Modified: 11/21/2024
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
github.com logo
https://github.com/rapid7/metasploit-framework/pull/14288
github.com logo
https://github.com/rapid7/metasploit-framework/pull/14288
packetstormsecurity.com logo
http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html
+3
CVE-2019-5645
rce
HIGH [7.5]
Last Modified: 11/21/2024
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
github.com logo
https://github.com/rapid7/metasploit-framework/pull/12433
github.com logo
https://github.com/rapid7/metasploit-framework/pull/12433
CVE-2020-7377
path traversal
HIGH [8.1]
Last Modified: 11/21/2024
The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server.
github.com logo
https://github.com/rapid7/metasploit-framework/issues/14015
github.com logo
https://github.com/rapid7/metasploit-framework/issues/14015
CVE-2020-7376
path traversal
HIGH [7.1]
Last Modified: 11/21/2024
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.
github.com logo
https://github.com/rapid7/metasploit-framework/issues/14008
github.com logo
https://github.com/rapid7/metasploit-framework/issues/14008
CVE-2020-7352
HIGH [8.4]
Last Modified: 11/21/2024
The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software.
github.com logo
https://github.com/rapid7/metasploit-framework/pull/13444
github.com logo
https://github.com/rapid7/metasploit-framework/pull/13444
positronsecurity.com logo
https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/
+1
CVE-2020-7355
cross-site scripting
MEDIUM [6.1]
Last Modified: 11/21/2024
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset.
avalz.it logo
https://avalz.it/research/metasploit-pro-xss-to-rce/
avalz.it logo
https://avalz.it/research/metasploit-pro-xss-to-rce/
help.rapid7.com logo
https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514
+1
CVE-2020-7354
cross-site scripting
MEDIUM [6.1]
Last Modified: 11/21/2024
Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset.
avalz.it logo
https://avalz.it/research/metasploit-pro-xss-to-rce/
avalz.it logo
https://avalz.it/research/metasploit-pro-xss-to-rce/
help.rapid7.com logo
https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514
+1
CVE-2020-7350
command injection
MEDIUM [6.1]
Last Modified: 11/21/2024
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command.
github.com logo
https://github.com/rapid7/metasploit-framework/issues/13026
github.com logo
https://github.com/rapid7/metasploit-framework/issues/13026
CVE-2019-5642
rce
LOW [3.3]
Last Modified: 11/21/2024
Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same system where Metasploit Pro is installed to intercept otherwise private communications to the Metasploit Pro web interface.
help.rapid7.com logo
https://help.rapid7.com/metasploit/release-notes/?rid=4.16.0-2019091001
help.rapid7.com logo
https://help.rapid7.com/metasploit/release-notes/?rid=4.16.0-2019091001
CVE-2019-5624
path traversal
HIGH [7.3]
Last Modified: 11/21/2024
Rapid7 Metasploit Framework suffers from an instance of CWE-22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in the Zip import function of Metasploit. Exploiting this vulnerability can allow an attacker to execute arbitrary code in Metasploit at the privilege level of the user running Metasploit. This issue affects: Rapid7 Metasploit Framework version 4.14.0 and prior versions.
github.com logo
https://github.com/rapid7/metasploit-framework/pull/11716
github.com logo
https://github.com/rapid7/metasploit-framework/pull/11716
blog.doyensec.com logo
https://blog.doyensec.com/2019/04/24/rubyzip-bug.html
+3
CVE-2017-15084
csrf
MEDIUM [6.5]
Last Modified: 11/21/2024
The web UI in Rapid7 Metasploit before 4.14.1-20170828 allows logout CSRF, aka R7-2017-22.
blog.rapid7.com logo
https://blog.rapid7.com/2017/10/06/vulnerabilities-affecting-four-rapid7-products-fixed/
blog.rapid7.com logo
https://blog.rapid7.com/2017/10/06/vulnerabilities-affecting-four-rapid7-products-fixed/
CVE-2017-5244
csrf
LOW [3.5]
Last Modified: 11/21/2024
Routes used to stop running Metasploit tasks (either particular ones or all tasks) allowed GET requests. Only POST requests should have been allowed, as the stop/stop_all routes change the state of the service. This could have allowed an attacker to stop currently-running Metasploit tasks by getting an authenticated user to execute JavaScript. As of Metasploit 4.14.0 (Update 2017061301), the routes for stopping tasks only allow POST requests, which validate the presence of a secret token to prevent CSRF attacks.
community.rapid7.com logo
https://community.rapid7.com/community/metasploit/blog/2017/06/15/r7-2017-16-cve-2017-5244-lack-of-csrf-protection-for-stopping-tasks-in-metasploit-pro-express-and-community-editions-fixed
community.rapid7.com logo
https://community.rapid7.com/community/metasploit/blog/2017/06/15/r7-2017-16-cve-2017-5244-lack-of-csrf-protection-for-stopping-tasks-in-metasploit-pro-express-and-community-editions-fixed
securityfocus.com logo
http://www.securityfocus.com/bid/99082
+3
CVE-2017-5235
HIGH [7.8]
Last Modified: 11/21/2024
Rapid7 Metasploit Pro installers prior to version 4.13.0-2017022101 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
securityfocus.com logo
http://www.securityfocus.com/bid/96548
+1
CVE-2017-5231
directory traversal
HIGH [7.1]
Last Modified: 11/21/2024
All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi CommandDispatcher.cmd_download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
securityfocus.com logo
http://www.securityfocus.com/bid/96954
+1
CVE-2017-5229
directory traversal
HIGH [7.1]
Last Modified: 11/21/2024
All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter extapi Clipboard.parse_dump() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
securityfocus.com logo
http://www.securityfocus.com/bid/96954
+1
CVE-2017-5228
directory traversal
HIGH [7.1]
Last Modified: 11/21/2024
All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi Dir.download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
community.rapid7.com logo
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products
securityfocus.com logo
http://www.securityfocus.com/bid/96954
+1
CVE-2010-5143
LOW [2.6]
Last Modified: 11/21/2024
McAfee VirusScan Enterprise before 8.8 allows local users to disable the product by leveraging administrative privileges to execute an unspecified Metasploit Framework module.
kc.mcafee.com logo
https://kc.mcafee.com/corporate/index?page=content&id=SB10014
kc.mcafee.com logo
https://kc.mcafee.com/corporate/index?page=content&id=SB10014
CVE-2011-1056
MEDIUM [6.2]
Last Modified: 11/21/2024
The installer for Metasploit Framework 3.5.1, when running on Windows, uses weak inherited permissions for the Metasploit installation directory, which allows local users to gain privileges by replacing critical files with a Trojan horse.
blog.metasploit.com logo
http://blog.metasploit.com/2011/02/metasploit-framework-352-released.html
blog.metasploit.com logo
http://blog.metasploit.com/2011/02/metasploit-framework-352-released.html
osvdb.org logo
http://osvdb.org/70857
+5
CVE-2005-2482
MEDIUM [5.0]
Last Modified: 11/20/2024
The StateToOptions function in msfweb in Metasploit Framework 2.4 and earlier, when running with the -D option (defanged mode), allows attackers to modify temporary environment variables before the "_Defanged" environment option is checked when processing the Exploit command.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/21705
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/21705
metasploit.com logo
http://metasploit.com/archive/framework/msg00469.html
+7