-
Notifications
You must be signed in to change notification settings - Fork 19
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
0 parents
commit e0bce97
Showing
1 changed file
with
32 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
# serialator | ||
Python script to exploit CVE-2015-4852. | ||
|
||
## Description | ||
During a recent engagement, I found that Nessus was now actively exploiting vulnerabilities for confirmation. When I checked the associated nasl script I found that the payload was generic enough to be used on a standalone script. Hence, I collected the payloads from all the nasl scripts that were part of the same RCE vulnerability (but for separate applications) and wrapped them with Python magic. | ||
Next time you see a vulnreable application, use this script. | ||
|
||
## Changelog: | ||
* Update 29/02/2016 | ||
** Initial commit. Ready for testing. | ||
|
||
## Author | ||
Nikhil Sreekumar (@roo7break) | ||
|
||
## Target applications | ||
* Websphere | ||
* JBoss | ||
* OpenNMS | ||
* Symantec Endpoint Protection Manager | ||
|
||
## Included scripts | ||
* serialator.py - Main exploit script | ||
* ICMPListener.py - To setup a ICMP listener using scapy. Used alongside serialator.py for testing if target is vulnerable or not. | ||
|
||
## Code details | ||
* Python3 | ||
No additional packages required | ||
|
||
## What next | ||
* Incorporate ysoserial.jar or its payload generation | ||
* Threaded exploiter - Weapon of mass exploitation :D | ||
* Automated testing |