Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-7961 PoC — Liferay Portal 代码问题漏洞

Source
Associated Vulnerability
Title:Liferay Portal 代码问题漏洞 (CVE-2020-7961)
Description:Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
Description
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)
Readme
# CVE-2020-7961-payloads
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)



Step 1) Write Your payload in LifExp.java <br/>
Step 2) Compile it with javac <br/>
Step 3) make your log server (Maybe you want to use "Burp Collaborator Client")<br/>
Step 4) Run poc.py <br/>
<br/>
....enjoy it ;)   :innocent:
<br/>
<br/>
poc Code Writed by mzer0one  :pray: <br/>
https://github.com/mzer0one/CVE-2020-7961-POC

File Snapshot

[4.0K] /data/pocs/26b736a4217282c6dd7f44a687bbafb9eb44d100 ├── [ 654] Liferay_linux_payload.txt ├── [ 691] Liferay_Windows_payload.txt ├── [ 211] LifExp.java ├── [6.0K] poc.py └── [ 513] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →