Exploit Of Pre-auth RCE in Apache Ofbiz!!<h1 align="center">
CVE-2023-49070
<br>
</h1>
<h4 align="center">Pre-auth RCE in Apache Ofbiz!!</h4>
<p align="center">
<a href="https://github.com/0xrobiul/CVE-2023-49070">
<img src="https://img.shields.io/static/v1?label=Project&message=CVE-2023-49070&color=green">
</a>
<a href="https://twitter.com/0xrobiul">
<img src="https://img.shields.io/twitter/follow/0xrobiul?style=social">
</a>
<a href="https://youtu.be/gDzYb6YvBSQ">
<img src="https://img.shields.io/youtube/views/gDzYb6YvBSQ?style=social">
</a>
<a href="https://github.com/0xrobiul/CVE-2023-49070">
<img src="https://img.shields.io/static/v1?label=Version&message=1.0&color=green">
</a>
</p>
<h1 align="center">
<br>
<a href="https://github.com/0xrobiul/CVE-2023-49070"><img src="/Intro.png" alt="CVE-2023-49070"></a>
<br>
<br>
</h1>
<h1>Usagse</h1>
<h2>Install Open JDK 11 First!</h2>
<pre>
sudo apt install openjdk-11-jdk
</pre>
<h1 align="center">
<br>
<a href="https://github.com/0xrobiul/CVE-2023-49070"><img src="/POC.png" alt="Usagse"></a>
<br>
<br>
</h1>
Check POC Video: https://youtu.be/gDzYb6YvBSQ
[4.0K] /data/pocs/d0dc60ee7a76458d0387bd508aebfc15cd6118b7
├── [1.8K] CVE-2023-49070.py
├── [ 11K] Intro.png
├── [ 34K] LICENSE
├── [201K] POC.png
├── [1.1K] README.md
└── [ 57M] ysoserial-all.jar
0 directories, 6 files