Metasploit Weekly Wrap-Up 10/04/2024

Metasploit Weekly Wrap-Up 10/04/2024

New module content (3)


cups-browsed Information Disclosure


Authors: bcoles and evilsocket
Type: Auxiliary
Pull request: #19510 contributed by bcoles
Path: scanner/misc/cups_browsed_info_disclosure


Description: Adds scanner module to retrieve CUPS version and kernel version information from cups-browsed services.


Acronis Cyber Infrastructure default password remote code execution


Authors: Acronis International GmbH and h00die-gr3y
Type: Exploit
Pull request: #19463 contributed by h00die-gr3y
Path: linux/http/acronis_cyber_infra_cve_2023_45249
AttackerKB reference: CVE-2023-45249


Description: This module exploits a default password vulnerability in Acronis Cyber Infrastructure (ACI) which allows an attacker to access the ACI PostgreSQL database and gain administrative access to the ACI Web Portal. This allows for the attacker to upload ssh keys that enables root access to the appliance/server. This attack can be remotely executed over the WAN as long as the PostgreSQL and SSH services are exposed to the outside world.


VICIdial Authenticated Remote Code Execution


Authors: Jaggar Henry of KoreLogic, Inc. and Valentin Lobstein
Type: Exploit
Pull request: #19456 contributed by Chocapikk
Path: unix/webapp/vicidial_agent_authenticated_rce
AttackerKB reference: CVE-2024-8504


Description: This adds a module to exploit CVE-2024-8504 an authenticated RCE in VICIdial.


Enhancements and features (3)


metasploit weekly