Skip to content

roo7break/serialator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

serialator

Python script to exploit CVE-2015-4852.

Description

During a recent engagement, I found that Nessus was now actively exploiting vulnerabilities for confirmation. When I checked the associated nasl script I found that the payload was generic enough to be used on a standalone script. Hence, I collected the payloads from all the nasl scripts that were part of the same RCE vulnerability (but for separate applications) and wrapped them with Python magic. Next time you see a vulnreable application, use this script.

Changelog:

  • Update 29/02/2016 ** Initial commit. Ready for testing.

Author

Nikhil Sreekumar (@roo7break)

Target applications

  • Websphere
  • JBoss
  • OpenNMS
  • Symantec Endpoint Protection Manager

Included scripts

  • serialator.py - Main exploit script
  • ICMPListener.py - To setup a ICMP listener using scapy. Used alongside serialator.py for testing if target is vulnerable or not.

Code details

  • Python3 No additional packages required

What next

  • Incorporate ysoserial.jar or its payload generation
  • Threaded exploiter - Weapon of mass exploitation :D
  • Automated testing

About

Python script to exploit CVE-2015-4852.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages