Metasploit Weekly Release Static...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

* Author: Justin Steven * OVE ID: OVE-20160904-0002 * Private disclosure date: 2016-09-04 * Public disclosure date: 2016-09-19 * Vendor advisory: https://community.rapid7.com/community/metasploit/blog/2016/09/15/important-security-fixes-in-metasploit-4120-2016091401 * Affected versions: Metasploit 4.12.0-2016061501 up to and including 4.12.0-2016083001 Metasploit Community, Express and Pro, after having had any of a particular set of Weekly Release updates applied, will have a static and publicly discoverable `secret_key_base` value for its Web UI. This allows a remote unauthenticated attacker to craft a signed cookie that will be deserialized by the application. Due to the fact that Metasploit has its `config.action_dispatch.cookies_serializer` setting set to `:hybrid`, this allows a remote unauthenticated attacker to cause the deserialization of arbitrary Marshalled objects, resulting in pre-auth RCE as the `daemon` user. The known `secret_key_base` values are as follows: ```text...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息