From 4bccc0541fca74c126930f5e4e0b0a93f5d56652 Mon Sep 17 00:00:00 2001 From: Spencer McIntyre Date: Thu, 16 Sep 2021 17:08:23 -0400 Subject: [PATCH] Add a note about exploitable versions --- .../exploits/multi/http/opmanager_sumpdu_deserialization.rb | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb b/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb index f206e6c61ac8..a18f1d219243 100644 --- a/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb +++ b/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb @@ -27,6 +27,10 @@ def initialize(info = {}) commands in the context of the OpManager application (NT AUTHORITY\SYSTEM on Windows or root on Linux). This vulnerability is also present in other products that are built on top of the OpManager application. This vulnerability affects OpManager versions 12.1 - 12.5.328. + + Automatic CVE selection only works for newer targets when the build number is present in the logon page. Due + to issues with the serialized payload this module is incompatible with versions prior to 12.3.238 despite them + technically being vulnerable. }, 'Author' => [ 'Johannes Moritz', # Original Vulnerability Research