module

Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability

Disclosed
2010-07-13
Created
2018-05-30

Description

This module exploits an authentication bypass vulnerability
in login.php. In conjunction with the authentication bypass issue,
the 'jlist' parameter in property_box.php can be used to execute
arbitrary system commands.
This module was tested against Oracle Secure Backup version 10.3.0.1.0

Author

MC mc@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/http/osb_uname_jlist
msf exploit(osb_uname_jlist) > show targets
...targets...
msf exploit(osb_uname_jlist) > set TARGET < target-id >
msf exploit(osb_uname_jlist) > show options
...show and set options...
msf exploit(osb_uname_jlist) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.