module
Oracle Application Testing Suite WebLogic Server Administration Console War Deployment
Disclosed | Created |
---|---|
2019-03-13 | 2019-05-24 |
Disclosed
2019-03-13
Created
2019-05-24
Description
This module abuses a feature in WebLogic Server's Administration Console to install
a malicious Java application in order to gain remote code execution. Authentication
is required, however by default, Oracle ships with a "oats" account that you could
log in with, which grants you administrator access.
a malicious Java application in order to gain remote code execution. Authentication
is required, however by default, Oracle ships with a "oats" account that you could
log in with, which grants you administrator access.
Authors
Steven Seeley
sinn3r sinn3r@metasploit.com
sinn3r sinn3r@metasploit.com
Platform
Java
Architectures
java
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.