Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12149 PoC — Red Hat JBoss Enterprise Application Platform Jboss Application Server 安全漏洞

Source
Associated Vulnerability
Title:Red Hat JBoss Enterprise Application Platform Jboss Application Server 安全漏洞 (CVE-2017-12149)
Description:In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
Description
JBoss CVE-2017-12149 (Insecure Deserialization - RCE) Exploitation Lab.
Readme
# JBoss Insecure Deserialization to RCE via CVE-2017-12149.
### JBoss Insecure Deserialization - RCE Exploitation Lab.


The idea here is to setup a lab with an old JBoss version (<7.0) in order to exploit the vulnerability.

We can use Docker to facilitate all the process. For this, we're gonna need an Oracle JDK rpm package, that's because JBoss 6.0.0 final works with a JDK 6 runtime. We're also gonna need the Dockerfile present in the repository, and obviously Docker installed on the system. Just make sure to have all files in the same directory.

1. Clone this repository with `git clone https://github.com/Xcatolin/jboss-deserialization`
2. Download the [jdk-6u45-linux-x64-rpm.bin](https://www.oracle.com/java/technologies/javase-java-archive-javase6-downloads.html#jdk-6u45-oth-JPR) package and move it into the same directory as the Dockerfile (you can use an temporary e-mail address to register)
3. Build the image with `docker build -t ovanekem/docker-jboss-6.0.0.final .
`
4. Run the image with `docker run -it -p 8080:8080 ovanekem/docker-jboss-6.0.0.final
`
5. Click [here](http://localhost:8080) to validate if it worked, you should see the JBoss main page


## Reference and All Credits to
* [ovanekem/docker-jboss-6.0.0.final](https://github.com/ovanekem/docker-jboss-6.0.0.final)
File Snapshot

[4.0K] /data/pocs/b10c6d6b595e485e158786a6edb6fddfdb98e39a ├── [1.8K] Dockerfile └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →