module
Oracle VM Server Virtual Server Agent Command Injection
Disclosed | Created |
---|---|
2010-10-12 | 2018-05-30 |
Disclosed
2010-10-12
Created
2018-05-30
Description
This module exploits a command injection flaw within Oracle\'s VM Server
Virtual Server Agent (ovs-agent) service.
By including shell meta characters within the second parameter to the 'utl_test_url'
XML-RPC methodCall, an attacker can execute arbitrary commands. The service
typically runs with root privileges.
NOTE: Valid credentials are required to trigger this vulnerable. The username
appears to be hardcoded as 'oracle', but the password is set by the administrator
at installation time.
Virtual Server Agent (ovs-agent) service.
By including shell meta characters within the second parameter to the 'utl_test_url'
XML-RPC methodCall, an attacker can execute arbitrary commands. The service
typically runs with root privileges.
NOTE: Valid credentials are required to trigger this vulnerable. The username
appears to be hardcoded as 'oracle', but the password is set by the administrator
at installation time.
Author
jduck jduck@metasploit.com
Platform
Linux,Unix
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.