Land #9413, Expand the number of class names searched when checking for an exploitable JMX server
parent
bb73d2c07e
commit
294a8e0ada
|
@ -193,10 +193,22 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def discover_endpoint
|
||||
rmi_classes_and_interfaces = [
|
||||
'javax.management.remote.rmi.RMIConnectionImpl',
|
||||
'javax.management.remote.rmi.RMIConnectionImpl_Stub',
|
||||
'javax.management.remote.rmi.RMIConnector',
|
||||
'javax.management.remote.rmi.RMIConnectorServer',
|
||||
'javax.management.remote.rmi.RMIIIOPServerImpl',
|
||||
'javax.management.remote.rmi.RMIJRMPServerImpl',
|
||||
'javax.management.remote.rmi.RMIServerImpl',
|
||||
'javax.management.remote.rmi.RMIServerImpl_Stub',
|
||||
'javax.management.remote.rmi.RMIConnection',
|
||||
'javax.management.remote.rmi.RMIServer'
|
||||
]
|
||||
ref = send_registry_lookup(name: datastore['JMXRMI'])
|
||||
return nil if ref.nil?
|
||||
|
||||
unless ref[:object] == 'javax.management.remote.rmi.RMIServerImpl_Stub'
|
||||
unless rmi_classes_and_interfaces.include? ref[:object]
|
||||
vprint_error("JMXRMI discovery returned unexpected object #{ref[:object]}")
|
||||
return nil
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue