module
BMC Server Automation RSCD Agent NSH Remote Command Execution
Disclosed | Created |
---|---|
2016-03-16 | 2018-06-14 |
Disclosed
2016-03-16
Created
2018-06-14
Description
This module exploits a weak access control check in the BMC Server
Automation RSCD agent that allows arbitrary operating system commands
to be executed without authentication.
Note: Under Windows, non-powershell commands may need to be prefixed
with 'cmd /c'.
Automation RSCD agent that allows arbitrary operating system commands
to be executed without authentication.
Note: Under Windows, non-powershell commands may need to be prefixed
with 'cmd /c'.
Authors
Olga Yanushkevich, ERNW @yaole0
Nicky Bloor (@NickstaDB) nick@nickbloor.co.uk
Nicky Bloor (@NickstaDB) nick@nickbloor.co.uk
Platform
Linux,Unix,Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.