GHSA-XGWW-H98F-24QF
Vulnerability from github – Published: 2022-05-24 17:48 – Updated: 2023-05-05 02:25
VLAI?
Summary
Metasploit Framework user exposes Metasploit to same deserialization issue that is exploited by that module
Details
By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions. Since Metasploit Framework typically runs with elevated privileges, this can lead to a system compromise on the Metasploit workstation. Note that an attacker would have to lie in wait and entice the Metasploit user to run the affected module against a malicious endpoint in a "hack-back" type of attack. Metasploit is only vulnerable when the drb_remote_codeexec module is running. In most cases, this cannot happen automatically.
Severity ?
8.1 (High)
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "metasploit-framework"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.19.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-7385"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2023-05-05T02:25:19Z",
"nvd_published_at": "2021-04-23T16:15:00Z",
"severity": "HIGH"
},
"details": "By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions. Since Metasploit Framework typically runs with elevated privileges, this can lead to a system compromise on the Metasploit workstation. Note that an attacker would have to lie in wait and entice the Metasploit user to run the affected module against a malicious endpoint in a \"hack-back\" type of attack. Metasploit is only vulnerable when the drb_remote_codeexec module is running. In most cases, this cannot happen automatically.",
"id": "GHSA-xgww-h98f-24qf",
"modified": "2023-05-05T02:25:19Z",
"published": "2022-05-24T17:48:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7385"
},
{
"type": "WEB",
"url": "https://github.com/rapid7/metasploit-framework/pull/14300"
},
{
"type": "WEB",
"url": "https://github.com/rapid7/metasploit-framework/pull/14335"
},
{
"type": "PACKAGE",
"url": "https://github.com/rapid7/metasploit-framework"
},
{
"type": "WEB",
"url": "https://help.rapid7.com/metasploit/release-notes/archive/2020/10"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "Metasploit Framework user exposes Metasploit to same deserialization issue that is exploited by that module"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…