Subscribe via feed.

MobileIron MDM Hessian-Based Java Deserialization Remote Code Execution

Posted by deepcore on January 26, 2021 – 8:30 am

This Metasploit module exploits an ACL bypass in MobileIron MDM products to execute a Groovy gadget against a Hessian-based Java deserialization endpoint.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.