Releases: federicodotta/Java-Deserialization-Scanner
Releases · federicodotta/Java-Deserialization-Scanner
Java Deserialization Scanner v0.7
- Added configurable Java path in the Exploitation pane (recent Java major versions do not allow to run ysoserial properly)
Java Deserialization Scanner v0.6
Changelog
- New URLDNS for active detection of Java deserialization without vulnerable libraries
- 6 new gadgets (CommonsCollection7, MozillaRhino1, MozillaRhino2, Vaadin, JavasstistWeld, JbossInspectors
- Custom encoding in Manual Testing and Exploitation tabs (thanks András Veres-Szentkirályi)
- Response time in Manual Testing tab
- Small fixes to improve detection
- Hibernate5 switch in exploitation tab
- Body of issues reviewed
Java Deserialization Scanner v0.5
Changelog
- New detection engines: DNS and CPU.
1.1. DNS mode uses Burp Collaborator to detect deserialization vulnerabilities thought DNS resolutions and can be used both in manual testing and directly in Burp Suite Active Scanner.
1.2. CPU mode can be used only in manual testing and must be use with caution. Based on SerialDOS code written by Wouter Coekaerts, it detect serialization vulnerabilities without the presence of any vulnerable library, by employing objects that waste many CPU cycles and time for the deserialization process. It may cause DOS condition if used against old systems or more than a time concurrently against the same system. - New payloads: JDK8 (<= jdk8u20) and Apache Commons BeanUtils
- New encoding methods (GZIP and Base64 GZIP), thanks to the contribution of Jeremy Goldstein
- New test cases
- Various bug fixes
Java Deserialization Scanner v0.5 pre-release
Changelog
- New detection engines: DNS and CPU.
1.1. DNS mode uses Burp Collaborator to detect deserialization vulnerabilities thought DNS resolutions and can be used both in manual testing and directly in Burp Suite Active Scanner.
1.2. CPU mode can be used only in manual testing and must be use with caution. Based on SerialDOS code written by Wouter Coekaerts, it detect serialization vulnerabilities without the presence of any vulnerable library, by employing objects that waste many CPU cycles and time for the deserialization process. It may cause DOS condition if used against old systems or more than a time concurrently against the same system. - New payloads: JDK8 (<= jdk8u20) and Apache Commons BeanUtils
- New encoding methods (GZIP and Base64 GZIP), thanks to the contribution of Jeremy Goldstein
- New test cases
- Various bug fixes
This is only a pre-release. After some more testing the 0.5 release will be published. If you find bugs or errors please open a bug in GitHub. Thank you!
Java Deserialization Scanner v0.4
Changelog
- New exploitation tab
- New chains added to the scanner
- Ascii Hex encoding support
- Fix issues in Linux environment
Java Deserialization Scanner v0.3
Changelog
- Added new Frohoff payloads, with modified sleep payloads (Jdk7u21, alternate payload for Commons Collections 3, alternate payload for Commons Collections 4)
- Added new tab for manual testing