Java RMI Server Insecure Default Configuration RCE Vulnerability
Java RMI Server Insecure Default Configuration RCE Vulnerability
Requirements
Kali Linux
The Kali Linux VM (or any other type of installation)
Laboratory Workflow
1. Launch the Metasploit Framework
2. Search for the appropriate module
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 auxiliary/gather/java_rmi_registry normal No Java RMI Registry Interfaces Enumeration
1 exploit/multi/misc/java_rmi_server 2011-10-15 excellent Yes Java RMI Server Insecure Default Configuration Java Code Execution
2 auxiliary/scanner/misc/java_rmi_server 2011-10-15 normal No Java RMI Server Insecure Endpoint Code Execution Scanner
3 exploit/multi/browser/java_rmi_connection_impl 2010-03-31 excellent No Java RMIConnectionImpl Deserialization Privilege Escalationhelp3. Use the module
4. Check the module options
5. Set the appropriate options
6. Run the exploit
7. Meterpreter session
8. Open a shell on the target machine
Video

Questions
Last updated