First published: Fri Apr 23 2021(Updated: )
By launching the drb_remote_codeexec exploit, a Metasploit Framework user will inadvertently expose Metasploit to the same deserialization issue that is exploited by that module, due to the reliance on the vulnerable Distributed Ruby class functions. Since Metasploit Framework typically runs with elevated privileges, this can lead to a system compromise on the Metasploit workstation. Note that an attacker would have to lie in wait and entice the Metasploit user to run the affected module against a malicious endpoint in a "hack-back" type of attack. Metasploit is only vulnerable when the drb_remote_codeexec module is running. In most cases, this cannot happen automatically.
Credit: cve@rapid7.con cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 Metasploit | <4.19.0 |
Do not run the drb_remote_codeexec module. After commit 659137da94fa2fe56ce5c44d611db3692bf7d2e5, the Metasploit Framework no longer ships with the affected module.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7385 is a vulnerability that exposes Metasploit Framework to a deserialization issue when the drb_remote_codeexec exploit is launched.
Metasploit Framework versions up to and including 4.19.0 are affected by CVE-2020-7385.
To fix CVE-2020-7385, update Metasploit Framework to version 4.19.0 or newer.
CVE-2020-7385 has a severity rating of 8.8 (high).
The CWE ID for CVE-2020-7385 is 502.