Vulnerability & Exploit Database

Back to search

Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)

This module logs in to an Axis2 Web Admin Module instance using a specific user/pass and uploads and executes commands via deploying a malicious web service by using SOAP.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/multi/http/axis2_deployer

Authors

  • Joshua Abraham <jabra [at] rapid7.com>
  • Chris John Riley

References

Targets

  • Automatic
  • Java
  • Windows Universal
  • Linux X86

Platforms

  • java
  • linux
  • windows

Architectures

  • java
  • x86

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/axis2_deployer msf exploit(axis2_deployer) > show targets ...targets... msf exploit(axis2_deployer) > set TARGET <target-id> msf exploit(axis2_deployer) > show options ...show and set options... msf exploit(axis2_deployer) > exploit

Related Vulnerabilities

Related Modules