Oracle Weblogic Server Deserialization Remote Code Execution
Posted by deepcore on March 28, 2019 – 11:05 pm
This Metasploit module demonstrates that an unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object (weblogic.jms.common.StreamMessag eImpl) to the interface to execute code on vulnerable hosts.
Post a reply
You must be logged in to post a comment.