PHP code execution and Overshare[point] Here in the Northern Hemisphere, Spring is in the air: flowers, bees, pollen… a new Metasploit 6.4 release, and now, fresh on the heels of this new release is a bountiful crop of exploits, features, and bug-fixes. Leading the pack is a pair of 2024 PHP code execution vulnerabilities in Artica Proxy and the Bricks Builder WordPress theme, and not to be outshone is a pair of Sharepoint vulnerabilities chained to give unauthenticated code execution as administrator. New module content (3) Artica Proxy Unauthenticated PHP Deserialization Vulnerability Authors: Jaggar Henry of KoreLogic Inc. and h00die-gr3y h00die.gr3y@gmail.com Type: Exploit Pull request: #18967 contributed by h00die-gr3y Path: linux/http/artica_proxy_unauth_rce_cve_2024_2054 AttackerKB reference: CVE-2024-2054 Description: The PR adds a module targeting CVE-2024-2054, a command injection vulnerability in Artica Proxy appliance version 4.50 and 4.40. The exploit allows remote unauthenticated attackers to run arbitrary commands as the www-data user. Unauthenticated RCE in Bricks Builder Theme Authors: Calvin Alkan and Valentin Lobstein Type: Exploit Pull request: #18891 contributed by Chocapikk Path: multi/http/wp_bricks_builder_rce AttackerKB reference: CVE-2024-25600 Description: This PR adds an exploit module that targets a known vulnerability, CVE-2024-25600, in the WordPress Bricks Builder Theme, versions prior to 1.9.6. Sharepoint Dynamic Proxy Generator Unauth RCE…Read More