Vulnerability & Exploit Database

Back to search

Sun Java Applet2ClassLoader Remote Code Execution

This module exploits a vulnerability in the Java Runtime Environment that allows an attacker to run an applet outside of the Java Sandbox. When an applet is invoked with: 1. A "codebase" parameter that points at a trusted directory 2. A "code" parameter that is a URL that does not contain any dots the applet will run outside of the sandbox. This vulnerability affects JRE prior to version 6 update 24.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/browser/java_codebase_trust

Authors

  • Frederic Hoguin
  • jduck <jduck [at] metasploit.com>

References

Targets

  • Generic (Java Payload)

Platforms

  • java

Architectures

  • java

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/browser/java_codebase_trust msf exploit(java_codebase_trust) > show targets ...targets... msf exploit(java_codebase_trust) > set TARGET <target-id> msf exploit(java_codebase_trust) > show options ...show and set options... msf exploit(java_codebase_trust) > exploit

Related Vulnerabilities