Quantcast
Channel: Penetration Test – Security List Network™
Viewing all articles
Browse latest Browse all 1152

ysoserial v0.0.4 – A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

$
0
0

Changelog v0.0.4 borderline-beta:
+ Added Apache Commons Beanutils gadget chain.

ysoserial is a collection of utilities and property-oriented programming “gadget chains” discovered in common java libraries that can, under the right conditions, exploit Java applications performing unsafe deserialization of objects. The main driver program takes a user-specified command and wraps it in the user-specified gadget chain, then serializes these objects to stdout. When an application with the required gadgets on the classpath unsafely deserializes this data, the chain will automatically be invoked and cause the command to be executed on the application host.

yoserial borderline-beta

yoserial borderline-beta

It should be noted that the vulnerability lies in the application performing unsafe deserialization and NOT in having gadgets on the classpath.

Usage & Installation:

wget https://github.com/frohoff/ysoserial/releases/download/v0.0.4/ysoserial-0.0.4-all.jarz

or
git clone https://github.com/frohoff/ysoserial && cd ysoserial
mvn package
cd target
java -jar ysoserial-0.0.4-all.jar

or

Download : v0.0.4.tar.gz  | v0.0.4.zip | ysoserial-0.0.4-all.jar
Source : https://github.com/frohoff | Our Post Before


Viewing all articles
Browse latest Browse all 1152

Trending Articles