Oracle Job Scheduler Named Pipe...

- AV AC AU C I A
发布: 2011-12-23
修订: 2024-04-28

This Metasploit module exploits the Oracle Job Scheduler to execute arbitrary commands. The Job Scheduler is implemented via the component extjob.exe which listens on a named pipe called "orcljsex<SID>" and execute arbitrary commands received throw this channel via CreateProcess(). In order to connect to the Named Pipe remotely SMB access is required. This Metasploit module has been tested on Oracle 10g Release 1 where the Oracle Job Scheduler runs as SYSTEM on Windows but it's disabled by default.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息