Apache Continuum 1.4.2 Arbitrary Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 14 Jun 2016.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a command injection in Apache Continuum versions 1.4.2 and below. By injecting a command into the installation.varValue POST parameter to /continuum/saveInstallation.action, a shell can be spawned.

    Continue reading...
     

Share This Page

Loading...