Rapid7 Vulnerability & Exploit Database

Zend Server Java Bridge Arbitrary Java Code Execution

Back to Search

Zend Server Java Bridge Arbitrary Java Code Execution

Disclosed
03/28/2011
Created
05/30/2018

Description

This module takes advantage of a trust relationship issue within the Zend Server Java Bridge. The Java Bridge is responsible for handling interactions between PHP and Java code within Zend Server. When Java code is encountered Zend Server communicates with the Java Bridge. The Java Bridge then handles the java code and creates the objects within the Java Virtual Machine. This interaction however, does not require any sort of authentication. This leaves the JVM wide open to remote attackers. Sending specially crafted data to the Java Bridge results in the execution of arbitrary java code.

Author(s)

  • bannedit <bannedit@metasploit.com>

Platform

Java

Architectures

java

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/misc/zend_java_bridge
msf exploit(zend_java_bridge) > show targets
    ...targets...
msf exploit(zend_java_bridge) > set TARGET < target-id >
msf exploit(zend_java_bridge) > show options
    ...show and set options...
msf exploit(zend_java_bridge) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;