module

Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)

Disclosed
2010-12-30
Created
2018-05-30

Description

This module logs in to an Axis2 Web Admin Module instance using a specific user/pass
and uploads and executes commands via deploying a malicious web service by using SOAP.

Authors

Joshua Abraham jabra@rapid7.com
Chris John Riley

Platform

Java,Linux,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/axis2_deployer
msf exploit(axis2_deployer) > show targets
...targets...
msf exploit(axis2_deployer) > set TARGET < target-id >
msf exploit(axis2_deployer) > show options
...show and set options...
msf exploit(axis2_deployer) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.