diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index c315b11570fe..71b57880db6c 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -20398,6 +20398,68 @@ } ] }, + "auxiliary_gather/argus_dvr_4_lfi_cve_2018_15745": { + "name": "Argus Surveillance DVR 4.0.0.0 - Directory Traversal", + "fullname": "auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745", + "aliases": [ + + ], + "rank": 300, + "disclosure_date": null, + "type": "auxiliary", + "author": [ + "Maxwell Francis", + "John Page" + ], + "description": "This module leverages an unauthenticated arbitrary file read for\n the Argus Surveillance 4.0.0.0 system which never saw an update since.\n As this is a Windows related application we recommend looking for common\n Windows file locations, especially C:\\ProgramData\\PY_Software\\Argus Surveillance DVR\\DVRParams.ini\n which houses another vulnerability in the Argus Surveillance system. This directory traversal vuln\n is being tracked as CVE-2018-15745", + "references": [ + "URL-https://argus-surveillance-dvr.soft112.com/#google_vignette", + "EDB-45296", + "CVE-2018-15745" + ], + "platform": "", + "arch": "", + "rport": 8080, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": null, + "mod_time": "2025-01-31 12:49:35 +0000", + "path": "/modules/auxiliary/gather/argus_dvr_4_lfi_cve_2018_15745.rb", + "is_install_path": true, + "ref_name": "gather/argus_dvr_4_lfi_cve_2018_15745", + "check": false, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "SideEffects": [ + + ], + "Reliability": [ + + ] + }, + "session_types": false, + "needs_cleanup": false, + "actions": [ + + ] + }, "auxiliary_gather/asrep": { "name": "Find Users Without Pre-Auth Required (ASREP-roast)", "fullname": "auxiliary/gather/asrep",