You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
…We just connect to the JMX RMI server using Java APIs, ask it to load this MLet file we supply containing a pointer to a JAR, which the server happily loads and will invoke methods on when asked – just like Oracle told us it would. Pretty straightforward.
Source: https://www.optiv.com/blog/exploiting-jmx-rmi
I was reading the above article, and I noticed that it appears as if Seldon-Core has this vulnerability. Does anyone know if this is a concern. What is the rationale behind these option values?
The text was updated successfully, but these errors were encountered: