Vulnerabilities > Rapid7 > Metasploit

DATE CVE VULNERABILITY TITLE RISK
2023-02-01 CVE-2023-0599 Cross-site Scripting vulnerability in Rapid7 Metasploit
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request.
network
low complexity
rapid7 CWE-79
4.8
2021-04-23 CVE-2020-7385 Deserialization of Untrusted Data vulnerability in Rapid7 Metasploit
By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions.
network
low complexity
rapid7 CWE-502
8.8
2020-10-29 CVE-2020-7384 Command Injection vulnerability in Rapid7 Metasploit
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
local
low complexity
rapid7 CWE-77
7.8
2020-09-01 CVE-2019-5645 Resource Exhaustion vulnerability in Rapid7 Metasploit
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression.
network
low complexity
rapid7 CWE-400
7.5
2020-08-24 CVE-2020-7377 Path Traversal vulnerability in Rapid7 Metasploit
The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server.
network
low complexity
rapid7 CWE-22
7.5
2020-08-24 CVE-2020-7376 Path Traversal vulnerability in Rapid7 Metasploit
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.
network
low complexity
rapid7 CWE-22
critical
9.8
2020-06-25 CVE-2020-7355 Cross-site Scripting vulnerability in Rapid7 Metasploit
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface.
network
low complexity
rapid7 CWE-79
6.1
2020-06-25 CVE-2020-7354 Cross-site Scripting vulnerability in Rapid7 Metasploit
Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface.
network
low complexity
rapid7 CWE-79
5.4
2020-04-22 CVE-2020-7350 OS Command Injection vulnerability in Rapid7 Metasploit
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name.
local
low complexity
rapid7 CWE-78
7.8
2019-11-06 CVE-2019-5642 Incorrect Permission Assignment for Critical Resource vulnerability in Rapid7 Metasploit 4.15.0/4.15.1/4.16.0
Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions.
local
low complexity
rapid7 CWE-732
3.3