BMC Server Automation RSCD Agent NSH Remote Command Execution
Posted on 01 February 2018
This Metasploit module exploits a weak access control check in the BMC Server Automation RSCD agent that allows arbitrary operating system commands to be executed without authentication. Note: Under Windows, non-powershell commands may need to be prefixed with 'cmd /c'.