module
Samsung Security Manager 1.4 ActiveMQ Broker Service PUT Method Remote Code Execution
Disclosed | Created |
---|---|
Aug 5, 2016 | May 30, 2018 |
Disclosed
Aug 5, 2016
Created
May 30, 2018
Description
This is an exploit against Samsung Security Manager that bypasses the patch in ZDI-15-156 & ZDI-16-481
by exploiting the vulnerability against the client-side. This exploit has been tested successfully using
IE, FireFox and Chrome by abusing a GET request XSS to bypass CORS and reach the vulnerable PUT. Finally
a traversal is used in the PUT request to upload the code just where we want it and gain RCE as SYSTEM.
by exploiting the vulnerability against the client-side. This exploit has been tested successfully using
IE, FireFox and Chrome by abusing a GET request XSS to bypass CORS and reach the vulnerable PUT. Finally
a traversal is used in the PUT request to upload the code just where we want it and gain RCE as SYSTEM.
Author
mr_me mr_me@offensive-security.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.