Squiggle 1.7 SVG Browser Java Code Execution

newsbot

newsbot

RSS Feed
This Metasploit module abuses the SVG support to execute Java Code in the Squiggle Browser included in the Batik framework 1.7 through a crafted svg file referencing a jar file. In order to gain arbitrary code execution, the browser must meet the following conditions: (1) It must support at least SVG version 1.1 or newer, (2) It must support Java code and (3) The "Enforce secure scripting" check must be disabled. The module has been tested against Windows and Linux platforms.

Weiterlesen...
 

Ähnliche Themen

NGINX bietet intern abgerufene Seiten nur zum Download an, extern geht's

Nginx als Reverse Proxy für Nextcloud und Emby

SVG Java Execution Trigger

Samba 4 Gast Zugang unter Ubuntu funktioniert nicht

PostgreSQL for Linux Payload Execution

Zurück
Oben