Skip to content

Commit 632ea05

Browse files
committed
100 columns
1 parent 8da7ba1 commit 632ea05

File tree

1 file changed

+9
-4
lines changed

1 file changed

+9
-4
lines changed

modules/exploits/multi/http/oracle_reports_rce.rb

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,15 @@ def initialize(info = {})
1818
super(update_info(info,
1919
'Name' => 'Oracle Forms and Reports Remote Code Execution',
2020
'Description' => %q{
21-
This module uses two vulnerabilities in Oracle forms and reports to get remote code execution on the host. The showenv url can be used to disclose
22-
information about a server. A second vulnerability that allows arbitrary reading and writing
23-
to the host filesystem can then be used to write a shell from a remote url to a known local path disclosed from the previous vulnerability.
24-
The local path being accessable from an URL then allows us to perform the remote code execution using for example a .jsp shell.
21+
This module uses two vulnerabilities in Oracle forms and reports to get remote code execution
22+
on the host. The showenv url can be used to disclose information about a server. A second
23+
vulnerability that allows arbitrary reading and writing to the host filesystem can then be
24+
used to write a shell from a remote url to a known local path disclosed from the previous
25+
vulnerability.
26+
27+
The local path being accessable from an URL then allows us to perform the remote code
28+
execution using for example a .jsp shell.
29+
2530
Tested on Windows and Oracle Forms and Reports 10.1.
2631
},
2732
'Author' =>

0 commit comments

Comments
 (0)