CVE-2020-7376 – Rapid7 Metasploit Framework Relative Path Traversal in enum_osx module
https://notcve.org/view.php?id=CVE-2020-7376
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host. El módulo de Metasploit Framework "post/osx/gather/enum_osx module" está afectado por una vulnerabilidad de salto de ruta relativa en el método get_keychains que puede ser explotado para escribir archivos arbitrarios en ubicaciones arbitrarias en el sistema de archivos del host cuando el módulo se ejecuta en un host malicioso. • https://github.com/rapid7/metasploit-framework/issues/14008 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •
CVE-2020-7355 – Rapid7 Metasploit Pro Stored XSS in 'notes' field
https://notcve.org/view.php?id=CVE-2020-7355
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset. Una vulnerabilidad de tipo Cross-site Scripting (XSS) en el campo "notes" de un activo de escaneo detectado en Rapid7 Metasploit Pro, permite a un atacante con un servicio de red especialmente diseñado de un objetivo de escaneo almacenar una secuencia de tipo XSS en la consola de Metasploit Pro, que se activará cuando el operador visualiza el registro de ese host escaneado en la interfaz de Metasploit Pro. Este problema afecta a Rapid7 Metasploit Pro versión 4.17.1-20200427 y versiones anteriores, y es corregido en Metasploit Pro versión 4.17.1-20200514. • https://avalz.it/research/metasploit-pro-xss-to-rce https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-7354 – Rapid7 Metasploit Pro Stored XSS in 'host' field
https://notcve.org/view.php?id=CVE-2020-7354
Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset. Una vulnerabilidad de tipo Cross-site Scripting (XSS) en el campo "host" de un activo de escaneo detectado en Rapid7 Metasploit Pro, permite a un atacante con un servicio de red especialmente diseñado de un objetivo de escaneo almacenar una secuencia de tipo XSS en la consola Metasploit Pro, que se activará cuando el operador visualiza el registro de ese host escaneado en la interfaz Metasploit Pro. Este problema afecta a Rapid7 Metasploit Pro versión 4.17.1-20200427 y versiones anteriores, y es corregido en Metasploit Pro versión 4.17.1-20200514. • https://avalz.it/research/metasploit-pro-xss-to-rce https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-7350 – Metasploit Framework Plugin Libnotify Command Injection
https://notcve.org/view.php?id=CVE-2020-7350
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command. Las versiones de Rapid7 Metasploit Framework anteriores a la versión 5.0.85 sufren de una instancia de CWE-78: Inyección de comandos del sistema operativo, en la que el complemento libnotify acepta datos no seguros proporcionados por el usuario a través del nombre de host o nombre de servicio de un ordenador remoto. • https://github.com/rapid7/metasploit-framework/issues/13026 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2019-5647 – Rapid7 AppSpider Chrome Plugin Insufficient Session Expiration
https://notcve.org/view.php?id=CVE-2019-5647
The Chrome Plugin for Rapid7 AppSpider can incorrectly keep browser sessions active after recording a macro, even after a restart of the Chrome browser. This behavior could make future session hijacking attempts easier, since the user could believe a session was closed when it was not. This issue affects Rapid7 AppSpider version 3.8.213 and prior versions, and is fixed in version 3.8.215. El Plugin de Chrome para Rapid7 AppSpider puede mantener activas las sesiones del navegador incorrectamente después de grabar una macro, inclusive después de reiniciar el navegador Chrome. Este comportamiento podría facilitar los futuros intentos de secuestro de sesión, ya que el usuario podría creer que una sesión fue cerrada cuando no era así. • https://help.rapid7.com/appspiderenterprise/release-notes/?rid=3.8.215 • CWE-613: Insufficient Session Expiration •