Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9830 PoC — Code42 CrashPlan 安全漏洞

Source
Associated Vulnerability
Title:Code42 CrashPlan 安全漏洞 (CVE-2017-9830)
Description:Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and deserializes objects sent by TCP clients.
File Snapshot

[4.0K] /data/pocs/0f738744bcaf504501247b211e4d5363ce9d6714 ├── [3.5K] build.xml ├── [ 82] manifest.mf ├── [4.0K] nbproject │   ├── [ 79K] build-impl.xml │   ├── [ 467] genfiles.properties │   ├── [4.0K] private │   │   ├── [ 0] config.properties │   │   ├── [ 319] private.properties │   │   └── [ 336] private.xml │   ├── [2.6K] project.properties │   └── [ 572] project.xml └── [4.0K] src └── [4.0K] securifera ├── [3.3K] POC.java └── [ 792] Serializer.java 4 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →