This Metasploit module exploits a weak access control check in the BMC Server Automation RSCD agent that allows arbitrary operating system commands to be executed without authentication. Note: Under Windows, non-powershell commands may need to be prefixed with 'cmd /c'.
020bc853633a23b3189378857da4cf64c9fbfa92972a9d8257b10605b54490ec
BMC BladeLogic version 8.3.00.64 suffers from a remote command execution vulnerability.
96811628a219d1a2d4e997236cfb9d820c95744d7700660a86a9edcebd7d80a0
A security vulnerability has been identified in BMC Server Automation (BSA) RSCD Agent on the Linux/Unix platforms. The vulnerability allows unauthorized remote user enumeration on a target server by using the Remote Procedure Call (RPC) API of the RSCD Agent. Windows agents are not affected. The flaw has been confirmed to exist in the following versions of BSA on Unix and Linux platforms: 8.2.x, 8.3.x, 8.5.x, 8.6.x and 8.7.x.
a506801b86750add5af2274f8925103e410c0309f514ee92ee12876afa8dc6fe