Microsoft OMI Management Interface Authentication Bypass
By removing the authentication header, an attacker can issue an HTTP request to the OMI management endpoint that will cause it to execute an operating system command as the root user. This...
View ArticleMicrosoft OMI Management Interface Authentication Bypass
This Metasploit module demonstrates that by removing the authentication exchange, an attacker can issue requests to the local OMI management socket that will cause it to execute an operating system...
View Article
More Pages to Explore .....