Update description

bug/bundler_fix
sinn3r 2014-07-03 14:08:31 -05:00
parent 1acd5e76cb
commit c207d14d1f
1 changed files with 6 additions and 6 deletions

View File

@ -18,12 +18,12 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Oracle Event Processing FileUploadServlet Arbitrary File Upload',
'Description' => %q{
This module exploits an Arbitrary File Upload vulnerability in Oracle Event Processing
11.1.1.7.0. The vulnerability exists in the FileUploadServlet, where an arbitrary file
can be uploaded without authentication, and due to a directory traversal, to an arbitrary
location. By default Oracle Event Processing uses a Jetty Application Server with JSP
support not configured. Because of it, this module only targets Windows 2003 SP2, where
the WMI service can be abused to convert the file upload into remote code execution without
user interaction.
11.1.1.7.0. The FileUploadServlet component, which requires no authentication, can be
abused to upload a malicious file onto an arbitrary location due to a directory traversal
flaw, and compromise the server. By default Oracle Event Processing uses a Jetty
Application Server without JSP support, which limits the attack to WbemExec. The current
WbemExec technique only requires arbitrary write to the file system, but at the moment the
module only supports Windows 2003 SP2 or older.
},
'License' => MSF_LICENSE,
'Author' =>