File tree Expand file tree Collapse file tree 1 file changed +9
-4
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +9
-4
lines changed Original file line number Diff line number Diff line change @@ -18,10 +18,15 @@ def initialize(info = {})
18
18
super ( update_info ( info ,
19
19
'Name' => 'Oracle Forms and Reports Remote Code Execution' ,
20
20
'Description' => %q{
21
- This module uses two vulnerabilities in Oracle forms and reports to get remote code execution on the host. The showenv url can be used to disclose
22
- information about a server. A second vulnerability that allows arbitrary reading and writing
23
- to the host filesystem can then be used to write a shell from a remote url to a known local path disclosed from the previous vulnerability.
24
- The local path being accessable from an URL then allows us to perform the remote code execution using for example a .jsp shell.
21
+ This module uses two vulnerabilities in Oracle forms and reports to get remote code execution
22
+ on the host. The showenv url can be used to disclose information about a server. A second
23
+ vulnerability that allows arbitrary reading and writing to the host filesystem can then be
24
+ used to write a shell from a remote url to a known local path disclosed from the previous
25
+ vulnerability.
26
+
27
+ The local path being accessable from an URL then allows us to perform the remote code
28
+ execution using for example a .jsp shell.
29
+
25
30
Tested on Windows and Oracle Forms and Reports 10.1.
26
31
} ,
27
32
'Author' =>
You can’t perform that action at this time.
0 commit comments