module
Oracle MySQL for Microsoft Windows FILE Privilege Abuse
Disclosed | Created |
---|---|
2012-12-01 | 2018-05-30 |
Disclosed
2012-12-01
Created
2018-05-30
Description
This module takes advantage of a file privilege misconfiguration problem
specifically against Windows MySQL servers. This module abuses the FILE
privilege to write a payload to Microsoft's All Users Start Up directory
which will execute every time a user logs in. The default All Users Start
Up directory used by the module is present on Windows 7.
specifically against Windows MySQL servers. This module abuses the FILE
privilege to write a payload to Microsoft's All Users Start Up directory
which will execute every time a user logs in. The default All Users Start
Up directory used by the module is present on Windows 7.
Authors
sinn3r sinn3r@metasploit.com
Sean Verity veritysr1980@gmail.com
Sean Verity veritysr1980@gmail.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.