module
BMC Server Automation RSCD Agent NSH Remote Command Execution
Disclosed | Created |
---|---|
Mar 16, 2016 | Jun 14, 2018 |
Disclosed
Mar 16, 2016
Created
Jun 14, 2018
Description
This module exploits a weak access control check in the BMC Server
Automation RSCD agent that allows arbitrary operating system commands
to be executed without authentication.
Note: Under Windows, non-powershell commands may need to be prefixed
with 'cmd /c'.
Automation RSCD agent that allows arbitrary operating system commands
to be executed without authentication.
Note: Under Windows, non-powershell commands may need to be prefixed
with 'cmd /c'.
Authors
Olga Yanushkevich, ERNW @yaole0
Nicky Bloor (@NickstaDB) nick@nickbloor.co.uk
Nicky Bloor (@NickstaDB) nick@nickbloor.co.uk
Platform
Linux,Unix,Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.