Subscribe via feed.

Apache Continuum 1.4.2 Arbitrary Command Execution

Posted by deepcore on June 14, 2016 – 10:26 pm

This Metasploit module exploits a command injection in Apache Continuum versions 1.4.2 and below. By injecting a command into the installation.varValue POST parameter to /continuum/saveInstallation.action, a shell can be spawned.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.