for Ubuntu 18.04, improve functions.# CVE-2020-9484
## Reference
Authored by redtimmysec, masahiro331<br>
https://packetstormsecurity.com/files/157924/CVE-2020-9484.tgz
<br><br>
# [+] I just analyzed 1-day exploit. then remodeled.
<br><br>
## Description
Compared to the before PoC, it has the following advantages.
[+] Environment Script for Ubuntu 18.04.
[+] You can edit command to use to Remote Code Execution.
[+] The cookie value has been set in advance in the PoC Code.
<br><br>
## Usage
```shell
# id : qerogram
# pw : 1234
$ cd /exploit
# Auto set the environment
$ sudo sh ./environ.sh
# Apply the PoC Source Code
$ sudo python3 ./exploit.py <cmd>
# Go to the Web -> result : Remote Code Execution!
```
<br><br>
## Install Link(VMWare Image - Ubuntu 18.04)
https://drive.google.com/file/d/16MGyX9FiJjl1couxJddFpaPzxWyzIAuN/view?usp=sharing
[4.0K] /data/pocs/e692d2a408478d38b2259395d459efea1d8130fb
├── [1.4K] context.xml
├── [ 790] environ.sh
├── [4.5K] exploit.py
├── [4.3M] groovy-2.3.9.jar
├── [ 312] index.jsp
├── [1.2M] POC.mov
└── [ 833] README.md
0 directories, 7 files