automatic module_metadata_base.json update

4.x
Metasploit 2019-04-01 16:25:34 -07:00
parent 6dbecac2e9
commit e3aa147fd2
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 39 additions and 0 deletions

View File

@ -68597,6 +68597,45 @@
"notes": { "notes": {
} }
}, },
"exploit_multi/misc/weblogic_deserialize_unicastref": {
"name": "Oracle Weblogic Server Deserialization RCE - RMI UnicastRef",
"full_name": "exploit/multi/misc/weblogic_deserialize_unicastref",
"rank": 600,
"disclosure_date": "2017-01-25",
"type": "exploit",
"author": [
"Andres Rodriguez",
"Jacob Baines",
"Aaron Soto"
],
"description": "An unauthenticated attacker with network access to the Oracle Weblogic Server T3\n interface can send a serialized object (sun.rmi.server.UnicastRef)\n to the interface to execute code on vulnerable hosts.",
"references": [
"CVE-2017-3248"
],
"platform": "Solaris,Unix,Windows",
"arch": "",
"rport": 7001,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Unix",
"Windows",
"Solaris"
],
"mod_time": "2019-04-01 17:57:28 +0000",
"path": "/modules/exploits/multi/misc/weblogic_deserialize_unicastref.rb",
"is_install_path": true,
"ref_name": "multi/misc/weblogic_deserialize_unicastref",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_multi/misc/wireshark_lwres_getaddrbyname": { "exploit_multi/misc/wireshark_lwres_getaddrbyname": {
"name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow", "name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow",
"full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname", "full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname",