Oracle Weblogic Server Deserialization Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 28 Mar 2019.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module demonstrates that an unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object (weblogic.jms.common.StreamMessag eImpl) to the interface to execute code on vulnerable hosts.

    Continue reading...
     

Share This Page

Loading...