Files
nuclei-templates/vulnerabilities/rce-via-java-deserialization.yaml
un-fmunozs 03eb473c7b Update rce-via-java-deserialization.yaml
Add rce-via-java-deserialization id
2020-08-05 22:57:52 -05:00

22 lines
618 B
YAML

id: rce-via-java-deserialization
info:
name: Java Deserialization [RCE]
author: uhnysh
severity: critical
# This can only be used to detect the vuln, please make sure to run ysoserial over the URLs to verify.
requests:
- method: GET
path:
- "{{BaseURL}}/josso/%5C../invoker/EJBInvokerServlet/"
- "{{BaseURL}}/josso/%5C../invoker/JMXInvokerServlet/"
- "{{BaseURL}}/invoker/JMXInvokerServlet/"
- "{{BaseURL}}/invoker/EJBInvokerServlet/"
matchers:
- type: word
words:
- "org.jboss.invocation.MarshalledValue"
- "java.lang"
condition: or