Short Name |
SCAN:METASPLOIT:JAVA-APPLET |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
SCAN |
Keywords |
Metasploit Framework Java Applet In-Line Payload |
Release Date |
2012/04/26 |
Update Number |
2125 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects the behavior of the Metasploit Framework exploiting a Java vulnerability via an in-line Applet tag. Such activity is inherently malicious and should be investigated.
Oracle Java SE is prone to a remote code execution vulnerability in Java Runtime Environment. An attacker can exploit this issue to bypass the Java sandbox restriction and execute arbitrary code. This vulnerability affects the following supported versions: 7 Update 2, 6 Update 30, 5.0 Update 33