Skip to content

Module: Jboss 6.0.0M1 JMX Deploy Exploit

bcoles edited this page Jan 24, 2022 · 2 revisions

Summary

  • Objective: Deploy a JSP reverse or bind shell (Metasploit one) using the JMX exposed deploymentFileRepository MBean of JBoss. The first request made is a HEAD one to bypass auth and deploy the malicious JSP, the second request is a GET one that triggers the reverse connection to the specified MSF listener.
    Remember to run the MSF multi/handler listener with java/jsp_shell_reverse_tcp as payload, in case you are using the reverse payload.

  • Authors: antisnatchor, l33tb0y

  • Browsers: All

  • Code

Feedback

Clone this wiki locally