Skip to content

Commit e670167

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 21777b8 commit e670167

File tree

1 file changed

+167
-0
lines changed

1 file changed

+167
-0
lines changed

db/modules_metadata_base.json

Lines changed: 167 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106728,6 +106728,125 @@
106728106728
"session_types": false,
106729106729
"needs_cleanup": null
106730106730
},
106731+
"exploit_multi/http/flowise_custommcp_rce": {
106732+
"name": "Flowise Custom MCP Remote Code Execution",
106733+
"fullname": "exploit/multi/http/flowise_custommcp_rce",
106734+
"aliases": [],
106735+
"rank": 600,
106736+
"disclosure_date": "2025-08-14",
106737+
"type": "exploit",
106738+
"author": [
106739+
"Assaf Levkovich",
106740+
"Valentin Lobstein <[email protected]>"
106741+
],
106742+
"description": "This module exploits a remote code execution vulnerability in Flowise versions >= 2.2.7-patch.1\n and < 3.0.1. The vulnerability exists in the customMCP endpoint (/api/v1/node-load-method/customMCP)\n located in packages/components/nodes/tools/MCP/CustomMCP/CustomMCP.ts and packages/components/nodes/tools/MCP/core.ts,\n which allows users to execute arbitrary commands via StdioClientTransport by using the 'x-request-from: internal' header.\n When FLOWISE_USERNAME and FLOWISE_PASSWORD are not configured, the exploit works unauthenticated. If Basic Auth is\n enabled, the FLOWISE_USERNAME and FLOWISE_PASSWORD options must be set to provide credentials.",
106743+
"references": [
106744+
"CVE-2025-8943",
106745+
"URL-https://research.jfrog.com/vulnerabilities/flowise-os-command-remote-code-execution-jfsa-2025-001380578/"
106746+
],
106747+
"platform": "Linux,Unix,Windows",
106748+
"arch": "cmd",
106749+
"rport": 3000,
106750+
"autofilter_ports": [
106751+
80,
106752+
8080,
106753+
443,
106754+
8000,
106755+
8888,
106756+
8880,
106757+
8008,
106758+
3000,
106759+
8443
106760+
],
106761+
"autofilter_services": [
106762+
"http",
106763+
"https"
106764+
],
106765+
"targets": [
106766+
"Unix/Linux Command",
106767+
"Windows Command"
106768+
],
106769+
"mod_time": "2025-11-20 22:31:09 +0000",
106770+
"path": "/modules/exploits/multi/http/flowise_custommcp_rce.rb",
106771+
"is_install_path": true,
106772+
"ref_name": "multi/http/flowise_custommcp_rce",
106773+
"check": true,
106774+
"post_auth": false,
106775+
"default_credential": false,
106776+
"notes": {
106777+
"Stability": [
106778+
"crash-safe"
106779+
],
106780+
"Reliability": [
106781+
"repeatable-session"
106782+
],
106783+
"SideEffects": [
106784+
"ioc-in-logs"
106785+
]
106786+
},
106787+
"session_types": false,
106788+
"needs_cleanup": null
106789+
},
106790+
"exploit_multi/http/flowise_js_rce": {
106791+
"name": "Flowise JS Injection RCE",
106792+
"fullname": "exploit/multi/http/flowise_js_rce",
106793+
"aliases": [],
106794+
"rank": 600,
106795+
"disclosure_date": "2025-09-13",
106796+
"type": "exploit",
106797+
"author": [
106798+
"Kim SooHyun (im-soohyun)",
106799+
"nltt0",
106800+
"Valentin Lobstein <[email protected]>"
106801+
],
106802+
"description": "This module exploits a remote code execution vulnerability in Flowise versions >= 2.2.7-patch.1\n and < 3.0.6. The vulnerability exists in the customMCP endpoint (/api/v1/node-load-method/customMCP)\n located in packages/components/nodes/tools/MCP/CustomMCP/CustomMCP.ts, which allows users to execute\n arbitrary commands via JavaScript code injection in the mcpServerConfig parameter using the\n convertToValidJSONString function that uses Function('return ' + inputString)(). For versions < 3.0.1,\n the exploit can work unauthenticated if FLOWISE_USERNAME and FLOWISE_PASSWORD environment variables\n are not configured. For versions >= 3.0.1, authentication via FLOWISE_EMAIL and FLOWISE_PASSWORD is\n required due to JWT token verification.",
106803+
"references": [
106804+
"CVE-2025-59528",
106805+
"EDB-52440"
106806+
],
106807+
"platform": "Linux,Unix,Windows",
106808+
"arch": "cmd",
106809+
"rport": 3000,
106810+
"autofilter_ports": [
106811+
80,
106812+
8080,
106813+
443,
106814+
8000,
106815+
8888,
106816+
8880,
106817+
8008,
106818+
3000,
106819+
8443
106820+
],
106821+
"autofilter_services": [
106822+
"http",
106823+
"https"
106824+
],
106825+
"targets": [
106826+
"Unix/Linux Command",
106827+
"Windows Command"
106828+
],
106829+
"mod_time": "2025-11-21 19:34:33 +0000",
106830+
"path": "/modules/exploits/multi/http/flowise_js_rce.rb",
106831+
"is_install_path": true,
106832+
"ref_name": "multi/http/flowise_js_rce",
106833+
"check": true,
106834+
"post_auth": false,
106835+
"default_credential": false,
106836+
"notes": {
106837+
"Stability": [
106838+
"crash-safe"
106839+
],
106840+
"Reliability": [
106841+
"repeatable-session"
106842+
],
106843+
"SideEffects": [
106844+
"ioc-in-logs"
106845+
]
106846+
},
106847+
"session_types": false,
106848+
"needs_cleanup": null
106849+
},
106731106850
"exploit_multi/http/fortra_goanywhere_mft_rce_cve_2024_0204": {
106732106851
"name": "Fortra GoAnywhere MFT Unauthenticated Remote Code Execution",
106733106852
"fullname": "exploit/multi/http/fortra_goanywhere_mft_rce_cve_2024_0204",
@@ -199533,6 +199652,54 @@
199533199652
"needs_cleanup": null,
199534199653
"actions": []
199535199654
},
199655+
"exploit_windows/persistence/notepadpp_plugin_persistence": {
199656+
"name": "Notepad++ Plugin Persistence",
199657+
"fullname": "exploit/windows/persistence/notepadpp_plugin_persistence",
199658+
"aliases": [],
199659+
"rank": 600,
199660+
"disclosure_date": "2005-12-11",
199661+
"type": "exploit",
199662+
"author": [
199663+
"msutovsky-r7"
199664+
],
199665+
"description": "This module create persistence by adding a malicious plugin to Notepad++, as it blindly loads and executes DLL from its plugin directory on startup, meaning that the payload will be executed every time Notepad++ is launched.",
199666+
"references": [
199667+
"URL-https://www.cybereason.com/blog/threat-analysis-report-abusing-notepad-plugins-for-evasion-and-persistence"
199668+
],
199669+
"platform": "Windows",
199670+
"arch": "x64, x86, aarch64",
199671+
"rport": null,
199672+
"autofilter_ports": [],
199673+
"autofilter_services": [],
199674+
"targets": [
199675+
"Automatic"
199676+
],
199677+
"mod_time": "2025-11-21 13:04:52 +0000",
199678+
"path": "/modules/exploits/windows/persistence/notepadpp_plugin_persistence.rb",
199679+
"is_install_path": true,
199680+
"ref_name": "windows/persistence/notepadpp_plugin_persistence",
199681+
"check": true,
199682+
"post_auth": false,
199683+
"default_credential": false,
199684+
"notes": {
199685+
"Stability": [
199686+
"crash-safe"
199687+
],
199688+
"Reliability": [
199689+
"repeatable-session",
199690+
"event-dependent"
199691+
],
199692+
"SideEffects": [
199693+
"artifacts-on-disk"
199694+
]
199695+
},
199696+
"session_types": [
199697+
"meterpreter",
199698+
"shell"
199699+
],
199700+
"needs_cleanup": null,
199701+
"actions": []
199702+
},
199536199703
"exploit_windows/persistence/registry": {
199537199704
"name": "Windows Registry Only Persistence",
199538199705
"fullname": "exploit/windows/persistence/registry",

0 commit comments

Comments
 (0)