root@deepquest.code511.com:~# 

>> Oracle Weblogic Server Deserialization Remote Code Execution

This Metasploit module demonstrates that an unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object (weblogic.jms.common.StreamMessag eImpl) to the interface to execute code on vulnerable hosts.

> POST_COMMENT