module

Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability

Disclosed
Jul 13, 2010
Created
May 30, 2018

Description

This module exploits an authentication bypass vulnerability
in login.php. In conjunction with the authentication bypass issue,
the 'jlist' parameter in property_box.php can be used to execute
arbitrary system commands.
This module was tested against Oracle Secure Backup version 10.3.0.1.0

Author

MC mc@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/http/osb_uname_jlist
msf exploit(osb_uname_jlist) > show targets
...targets...
msf exploit(osb_uname_jlist) > set TARGET < target-id >
msf exploit(osb_uname_jlist) > show options
...show and set options...
msf exploit(osb_uname_jlist) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.