Skip to content

Commit f9b6189

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent b6330ac commit f9b6189

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111861,6 +111861,68 @@
111861111861
"session_types": false,
111862111862
"needs_cleanup": true
111863111863
},
111864+
"exploit_multi/http/monsta_ftp_downloadfile_rce": {
111865+
"name": "Monsta FTP downloadFile Remote Code Execution",
111866+
"fullname": "exploit/multi/http/monsta_ftp_downloadfile_rce",
111867+
"aliases": [],
111868+
"rank": 600,
111869+
"disclosure_date": "2025-11-07",
111870+
"type": "exploit",
111871+
"author": [
111872+
"watchTowr Labs",
111873+
"Valentin Lobstein <chocapikk@leakix.net>",
111874+
"msutovsky-r7"
111875+
],
111876+
"description": "This module exploits a pre-authenticated remote code execution vulnerability\n in Monsta FTP versions < 2.11.3. The vulnerability exists in the downloadFile\n action which allows an attacker to connect to a malicious FTP or SFTP server\n and download arbitrary files to arbitrary locations on the Monsta FTP server.\n This module uses FTP to exploit the vulnerability.",
111877+
"references": [
111878+
"CVE-2025-34299",
111879+
"URL-https://labs.watchtowr.com/monsta-ftp-remote-code-execution-cve-2025-34299/"
111880+
],
111881+
"platform": "Linux,PHP,Unix,Windows",
111882+
"arch": "php, cmd",
111883+
"rport": 80,
111884+
"autofilter_ports": [
111885+
80,
111886+
8080,
111887+
443,
111888+
8000,
111889+
8888,
111890+
8880,
111891+
8008,
111892+
3000,
111893+
8443
111894+
],
111895+
"autofilter_services": [
111896+
"http",
111897+
"https"
111898+
],
111899+
"targets": [
111900+
"PHP In-Memory",
111901+
"Unix/Linux Command Shell",
111902+
"Windows Command Shell"
111903+
],
111904+
"mod_time": "2025-11-26 18:27:52 +0000",
111905+
"path": "/modules/exploits/multi/http/monsta_ftp_downloadfile_rce.rb",
111906+
"is_install_path": true,
111907+
"ref_name": "multi/http/monsta_ftp_downloadfile_rce",
111908+
"check": true,
111909+
"post_auth": false,
111910+
"default_credential": false,
111911+
"notes": {
111912+
"Stability": [
111913+
"crash-safe"
111914+
],
111915+
"Reliability": [
111916+
"repeatable-session"
111917+
],
111918+
"SideEffects": [
111919+
"artifacts-on-disk",
111920+
"ioc-in-logs"
111921+
]
111922+
},
111923+
"session_types": false,
111924+
"needs_cleanup": true
111925+
},
111864111926
"exploit_multi/http/monstra_fileupload_exec": {
111865111927
"name": "Monstra CMS Authenticated Arbitrary File Upload",
111866111928
"fullname": "exploit/multi/http/monstra_fileupload_exec",

0 commit comments

Comments
 (0)