MobileIron MDM Hessian-Based Java Deserialization Remote Code Execution
Posted by deepcore on January 26, 2021 – 8:30 am
This Metasploit module exploits an ACL bypass in MobileIron MDM products to execute a Groovy gadget against a Hessian-based Java deserialization endpoint.
Post a reply
You must be logged in to post a comment.