From ad4266fb4e6f9b881cf7ab0a97ae38ae7e750c9d Mon Sep 17 00:00:00 2001 From: Metasploit Date: Thu, 30 Aug 2018 04:20:03 -0700 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 63 ++++++++++++++++++----------------- 1 file changed, 32 insertions(+), 31 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index c6f64cbdd9..524098bb8a 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -48351,6 +48351,38 @@ "post_auth": true, "default_credential": false }, + "exploit_multi/misc/weblogic_deserialize": { + "name": "Oracle Weblogic Server Deserialization RCE", + "full_name": "exploit/multi/misc/weblogic_deserialize", + "rank": 0, + "disclosure_date": "2018-04-17", + "type": "exploit", + "author": [ + "brianwrf", + "Jacob Robles" + ], + "description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.", + "references": [ + "CVE-2018-2628", + "EDB-44553" + ], + "is_server": false, + "is_client": true, + "platform": "", + "arch": "", + "rport": 7001, + "targets": [ + "Unix", + "Windows" + ], + "mod_time": "2018-08-29 14:56:31 +0000", + "path": "/modules/exploits/multi/misc/weblogic_deserialize.rb", + "is_install_path": true, + "ref_name": "multi/misc/weblogic_deserialize", + "check": true, + "post_auth": false, + "default_credential": false + }, "exploit_multi/misc/wireshark_lwres_getaddrbyname": { "name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow", "full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname", @@ -86299,37 +86331,6 @@ "post_auth": false, "default_credential": false }, - "exploit_windows/misc/weblogic_deserialize": { - "name": "Oracle Weblogic Server Deserialization RCE", - "full_name": "exploit/windows/misc/weblogic_deserialize", - "rank": 0, - "disclosure_date": "2018-04-17", - "type": "exploit", - "author": [ - "brianwrf", - "Jacob Robles" - ], - "description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.", - "references": [ - "CVE-2018-2628", - "EDB-44553" - ], - "is_server": false, - "is_client": true, - "platform": "", - "arch": "", - "rport": 7001, - "targets": [ - "Windows" - ], - "mod_time": "2018-08-09 14:51:56 +0000", - "path": "/modules/exploits/windows/misc/weblogic_deserialize.rb", - "is_install_path": true, - "ref_name": "windows/misc/weblogic_deserialize", - "check": false, - "post_auth": false, - "default_credential": false - }, "exploit_windows/misc/windows_rsh": { "name": "Windows RSH Daemon Buffer Overflow", "full_name": "exploit/windows/misc/windows_rsh",