module

Oracle VM Server Virtual Server Agent Command Injection

Disclosed
Oct 12, 2010
Created
May 30, 2018

Description

This module exploits a command injection flaw within Oracle\'s VM Server
Virtual Server Agent (ovs-agent) service.

By including shell meta characters within the second parameter to the 'utl_test_url'
XML-RPC methodCall, an attacker can execute arbitrary commands. The service
typically runs with root privileges.

NOTE: Valid credentials are required to trigger this vulnerable. The username
appears to be hardcoded as 'oracle', but the password is set by the administrator
at installation time.

Author

Platform

Linux,Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/unix/webapp/oracle_vm_agent_utl
msf exploit(oracle_vm_agent_utl) > show targets
...targets...
msf exploit(oracle_vm_agent_utl) > set TARGET < target-id >
msf exploit(oracle_vm_agent_utl) > show options
...show and set options...
msf exploit(oracle_vm_agent_utl) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.