diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 96c1df020f..3bce8c9290 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -68597,6 +68597,45 @@ "notes": { } }, + "exploit_multi/misc/weblogic_deserialize_unicastref": { + "name": "Oracle Weblogic Server Deserialization RCE - RMI UnicastRef", + "full_name": "exploit/multi/misc/weblogic_deserialize_unicastref", + "rank": 600, + "disclosure_date": "2017-01-25", + "type": "exploit", + "author": [ + "Andres Rodriguez", + "Jacob Baines", + "Aaron Soto" + ], + "description": "An unauthenticated attacker with network access to the Oracle Weblogic Server T3\n interface can send a serialized object (sun.rmi.server.UnicastRef)\n to the interface to execute code on vulnerable hosts.", + "references": [ + "CVE-2017-3248" + ], + "platform": "Solaris,Unix,Windows", + "arch": "", + "rport": 7001, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": [ + "Unix", + "Windows", + "Solaris" + ], + "mod_time": "2019-04-01 17:57:28 +0000", + "path": "/modules/exploits/multi/misc/weblogic_deserialize_unicastref.rb", + "is_install_path": true, + "ref_name": "multi/misc/weblogic_deserialize_unicastref", + "check": false, + "post_auth": false, + "default_credential": false, + "notes": { + } + }, "exploit_multi/misc/wireshark_lwres_getaddrbyname": { "name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow", "full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname",