Skip to content

Commit 3547984

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent d7c307b commit 3547984

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed

db/modules_metadata_base.json

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27943,6 +27943,59 @@
2794327943
"needs_cleanup": false,
2794427944
"actions": []
2794527945
},
27946+
"auxiliary_gather/twonky_authbypass_logleak": {
27947+
"name": "Twonky Server Log Leak Authentication Bypass",
27948+
"fullname": "auxiliary/gather/twonky_authbypass_logleak",
27949+
"aliases": [],
27950+
"rank": 300,
27951+
"disclosure_date": null,
27952+
"type": "auxiliary",
27953+
"author": [
27954+
"remmons-r7"
27955+
],
27956+
"description": "This module leverages an authentication bypass in Twonky Server 8.5.2. By exploiting\n an authorization flaw to access a privileged web API endpoint and leak application logs,\n encrypted administrator credentials are leaked (CVE-2025-13315). The exploit will then decrypt\n these credentials using hardcoded keys (CVE-2025-13316) and login as the administrator.\n Expected module output is a username and plain text password for the administrator account.",
27957+
"references": [
27958+
"CVE-2025-13315",
27959+
"CVE-2025-13316",
27960+
"URL-https://www.rapid7.com/blog/post/cve-2025-13315-cve-2025-13316-critical-twonky-server-authentication-bypass-not-fixed/"
27961+
],
27962+
"platform": "",
27963+
"arch": "",
27964+
"rport": 9000,
27965+
"autofilter_ports": [
27966+
80,
27967+
8080,
27968+
443,
27969+
8000,
27970+
8888,
27971+
8880,
27972+
8008,
27973+
3000,
27974+
8443
27975+
],
27976+
"autofilter_services": [
27977+
"http",
27978+
"https"
27979+
],
27980+
"targets": null,
27981+
"mod_time": "2025-11-27 14:33:57 +0000",
27982+
"path": "/modules/auxiliary/gather/twonky_authbypass_logleak.rb",
27983+
"is_install_path": true,
27984+
"ref_name": "gather/twonky_authbypass_logleak",
27985+
"check": false,
27986+
"post_auth": false,
27987+
"default_credential": false,
27988+
"notes": {
27989+
"Stability": [
27990+
"crash-safe"
27991+
],
27992+
"SideEffects": [],
27993+
"Reliability": []
27994+
},
27995+
"session_types": false,
27996+
"needs_cleanup": false,
27997+
"actions": []
27998+
},
2794627999
"auxiliary_gather/upsmon_traversal": {
2794728000
"name": "POWERCOM UPSMON PRO Path Traversal (CVE-2022-38120) and Credential Harvester (CVE-2022-38121)",
2794828001
"fullname": "auxiliary/gather/upsmon_traversal",

0 commit comments

Comments
 (0)