module

Oracle VM Server Virtual Server Agent Command Injection

Disclosed
2010-10-12
Created
2018-05-30

Description

This module exploits a command injection flaw within Oracle\'s VM Server
Virtual Server Agent (ovs-agent) service.

By including shell meta characters within the second parameter to the 'utl_test_url'
XML-RPC methodCall, an attacker can execute arbitrary commands. The service
typically runs with root privileges.

NOTE: Valid credentials are required to trigger this vulnerable. The username
appears to be hardcoded as 'oracle', but the password is set by the administrator
at installation time.

Author

jduck jduck@metasploit.com

Platform

Linux,Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/unix/webapp/oracle_vm_agent_utl
msf exploit(oracle_vm_agent_utl) > show targets
...targets...
msf exploit(oracle_vm_agent_utl) > set TARGET < target-id >
msf exploit(oracle_vm_agent_utl) > show options
...show and set options...
msf exploit(oracle_vm_agent_utl) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.