Oracle MySQL UDF Payload Execution...

- AV AC AU C I A
发布: 2017-12-22
修订: 2025-04-13

This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the SELECT ... into DUMPFILE method of binary injection. On default Microsoft Windows installations of MySQL versions 5.5.9 and below, directory write permissions not enforced, and the MySQL service runs as LocalSystem. NOTE: This Metasploit module will leave a payload executable on the target system when the attack is finished, as well as the UDF DLL, and will define or redefine sys_eval() and sys_exec() functions.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息