BMC Server Automation RSCD Agent NSH Remote Command Execution

This Metasploit module exploits a weak access control check in the BMC Server Automation RSCD agent that allows arbitrary operating system commands to be executed without authentication. Note: Under Windows, non-powershell commands may need to be prefixed with ‘cmd /c’.

Leave a Reply