From d5d317bb211af59d0708fd602d83bd80b61ae37b Mon Sep 17 00:00:00 2001 From: David Yesland Date: Mon, 8 Apr 2019 18:28:55 -0700 Subject: [PATCH] Add CVE-2019-0227 --- CVE-2019-0227/CVE-2019-0227.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CVE-2019-0227/CVE-2019-0227.py b/CVE-2019-0227/CVE-2019-0227.py index 0ecc92a..94cc36d 100644 --- a/CVE-2019-0227/CVE-2019-0227.py +++ b/CVE-2019-0227/CVE-2019-0227.py @@ -1,7 +1,7 @@ #+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++# # Apache Axis 1.4 Remote Code Execution CVE-2019-0227 # #https://rhinosecuritylabs.com/Application-Security/CVE-2019-0227-Expired-Domain-to-RCE-in-Apache-Axis # -# Author: David Yesland, Rhino Security Labs # +# Author: David Yesland @daveysec, Rhino Security Labs # # This exploits Apache Axis < 1.4 to upload and execute a JSP payload using MITM # # by forcing an http request using the default StockQuoteService.jws service. # # You need to be on the same network as the Axis server to make this work. #