This Metasploit module can be used to execute a payload on JBoss servers that have an exposed HTTPAdaptor's JMX Invoker exposed on the "JMXInvokerServlet". By invoking the methods provided by jboss.admin:DeploymentFileRepository a stager is deployed to finally upload the selected payload to the target. The DeploymentFileRepository methods are only available on Jboss 4.x and 5.x.
c6b0010812e226801e4d081ec2319bf266148f85a99286b7a0ea268acccbcd45
This Metasploit module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer's createScriptDeployment() method.
8bc89c8613979d44be9747d0a887fce9f0459d5d6182d9efc465b994ee91205b
BibORB 1.3.2 is susceptible to SQL injection, cross site scripting, directory traversal, and arbitrary file upload vulnerabilities. Detailed exploitation provided.
6bbe10137333240ad47282adad90a3b7777a81f0dc780ee486ce04283ddce6b9