automatic module_metadata_base.json update

master
Metasploit 2019-03-26 16:52:37 -07:00
parent 6a0a7c996a
commit 1981e9be0c
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 6 additions and 6 deletions

View File

@ -68367,19 +68367,19 @@
}
},
"exploit_multi/misc/weblogic_deserialize_rawobject": {
"name": "Oracle Weblogic Server Deserialization RCE - RMI UnicastRef",
"name": "Oracle Weblogic Server Deserialization RCE - Raw Object",
"full_name": "exploit/multi/misc/weblogic_deserialize_rawobject",
"rank": 600,
"disclosure_date": "2017-01-25",
"disclosure_date": "2015-01-28",
"type": "exploit",
"author": [
"Andres Rodriguez",
"Jacob Baines",
"Stephen Breen",
"Aaron Soto"
],
"description": "An unauthenticated attacker with network access to the Oracle Weblogic Server T3\n interface can send a serialized object (sun.rmi.server.UnicastRef)\n to the interface to execute code on vulnerable hosts.",
"description": "An unauthenticated attacker with network access to the Oracle Weblogic Server T3\n interface can send a serialized object (weblogic.jms.common.StreamMessageImpl)\n to the interface to execute code on vulnerable hosts.",
"references": [
"CVE-2017-3248"
"CVE-2015-4852"
],
"platform": "Solaris,Unix,Windows",
"arch": "",
@ -68395,7 +68395,7 @@
"Windows",
"Solaris"
],
"mod_time": "2019-03-26 16:45:17 +0000",
"mod_time": "2019-03-26 17:44:52 +0000",
"path": "/modules/exploits/multi/misc/weblogic_deserialize_rawobject.rb",
"is_install_path": true,
"ref_name": "multi/misc/weblogic_deserialize_rawobject",