Vulnerability & Exploit Database

Back to search

JBoss JMX Console Deployer Upload and Execute

This module can be used to execute a payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:MainDeployer functionality. To accomplish this, a temporary HTTP server is created to serve a WAR archive containing our payload. This method will only work if the target server allows outbound connections to us.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/multi/http/jboss_maindeployer

Authors

  • jduck <jduck [at] metasploit.com>
  • Patrick Hof
  • h0ng10

References

Targets

  • Automatic (Java based)
  • Windows Universal
  • Linux Universal
  • Java Universal

Platforms

  • java
  • linux
  • windows

Architectures

  • java
  • x86

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/jboss_maindeployer msf exploit(jboss_maindeployer) > show targets ...targets... msf exploit(jboss_maindeployer) > set TARGET <target-id> msf exploit(jboss_maindeployer) > show options ...show and set options... msf exploit(jboss_maindeployer) > exploit

Related Vulnerabilities

Related Modules