Rapid7 Vulnerability & Exploit Database

JBoss Seam 2 File Upload and Execute

Back to Search

JBoss Seam 2 File Upload and Execute

Disclosed
08/05/2010
Created
05/30/2018

Description

Versions of the JBoss Seam 2 framework < 2.2.1CR2 fails to properly sanitize inputs to some JBoss Expression Language expressions. As a result, attackers can gain remote code execution through the application server. This module leverages RCE to upload and execute a given payload. Versions of the JBoss application server (AS) admin-console are known to be vulnerable to this exploit, without requiring authentication. Tested against JBoss AS 5 and 6, running on Linux with JDKs 6 and 7. This module provides a more efficient method of exploitation - it does not loop to find desired Java classes and methods.

Author(s)

  • vulp1n3 <vulp1n3@gmail.com>

Platform

Java

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/jboss_seam_upload_exec
msf exploit(jboss_seam_upload_exec) > show targets
    ...targets...
msf exploit(jboss_seam_upload_exec) > set TARGET < target-id >
msf exploit(jboss_seam_upload_exec) > show options
    ...show and set options...
msf exploit(jboss_seam_upload_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;