Page 2 of 17 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host. El módulo de Metasploit Framework "post/osx/gather/enum_osx module" está afectado por una vulnerabilidad de salto de ruta relativa en el método get_keychains que puede ser explotado para escribir archivos arbitrarios en ubicaciones arbitrarias en el sistema de archivos del host cuando el módulo se ejecuta en un host malicioso. • https://github.com/rapid7/metasploit-framework/issues/14008 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 6.1EPSS: 0%CPEs: 76EXPL: 1

Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset. Una vulnerabilidad de tipo Cross-site Scripting (XSS) en el campo "notes" de un activo de escaneo detectado en Rapid7 Metasploit Pro, permite a un atacante con un servicio de red especialmente diseñado de un objetivo de escaneo almacenar una secuencia de tipo XSS en la consola de Metasploit Pro, que se activará cuando el operador visualiza el registro de ese host escaneado en la interfaz de Metasploit Pro. Este problema afecta a Rapid7 Metasploit Pro versión 4.17.1-20200427 y versiones anteriores, y es corregido en Metasploit Pro versión 4.17.1-20200514. • https://avalz.it/research/metasploit-pro-xss-to-rce https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 76EXPL: 1

Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset. Una vulnerabilidad de tipo Cross-site Scripting (XSS) en el campo "host" de un activo de escaneo detectado en Rapid7 Metasploit Pro, permite a un atacante con un servicio de red especialmente diseñado de un objetivo de escaneo almacenar una secuencia de tipo XSS en la consola Metasploit Pro, que se activará cuando el operador visualiza el registro de ese host escaneado en la interfaz Metasploit Pro. Este problema afecta a Rapid7 Metasploit Pro versión 4.17.1-20200427 y versiones anteriores, y es corregido en Metasploit Pro versión 4.17.1-20200514. • https://avalz.it/research/metasploit-pro-xss-to-rce https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command. Las versiones de Rapid7 Metasploit Framework anteriores a la versión 5.0.85 sufren de una instancia de CWE-78: Inyección de comandos del sistema operativo, en la que el complemento libnotify acepta datos no seguros proporcionados por el usuario a través del nombre de host o nombre de servicio de un ordenador remoto. • https://github.com/rapid7/metasploit-framework/issues/13026 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 3.3EPSS: 0%CPEs: 5EXPL: 0

Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same system where Metasploit Pro is installed to intercept otherwise private communications to the Metasploit Pro web interface. Rapid7 Metasploit Pro versión 4.16.0-2019081901 y anterior, sufre de una instancia de CWE-732, en la que el único server.key es escrito en el sistema de archivos durante la instalación con permisos de tipo world-readable. Esto puede permitir a otros usuarios del mismo sistema donde está instalado Metasploit Pro, por otra parte interceptar comunicaciones privadas a la interfaz web de Metasploit Pro. • https://help.rapid7.com/metasploit/release-notes/?rid=4.16.0-2019091001 • CWE-732: Incorrect Permission Assignment for Critical Resource •