CVE-2012-4681 Java 7 Applet Remote Code Execution Metasploit Demo(Java 0 Day Attack Demo)

preview_player
Показать описание
The exploit takes advantage of two issues in JDK 7: The ClassFinder and

replacement for classForName back in JDK 6. It allows untrusted code to obtain a

reference and have access to a restricted package in JDK 7, which can be used to

(but getField() must be public, and that's not always the case in JDK 6) in order

disable Security Manager. Once Security Manager is disabled, we can execute

arbitrary Java code.

Our exploit has been tested successfully against multiple platforms, including:

IE, Firefox, Safari, Chrome; Windows, Ubuntu, OS X, Solaris, etc

Demonstration Of Metasploit Framework With BackTrack 5 R3
----------------------------------------------------------
Author:Mzer0

Disclaimer
----------
Educational Purposes Only

Tested on Windows 7(x86)
-------------------------
Chrome 21.0.1180.83 m
Oracle Java SE jre-7u1 (1.7.0_01-b08)
Рекомендации по теме
Комментарии
Автор

i get error java_jre17_exec - Exception handling request: No such file or directory -

NeliverFun