Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2018-2628 #9

Open
syrius01 opened this issue Apr 19, 2018 · 5 comments
Open

CVE-2018-2628 #9

syrius01 opened this issue Apr 19, 2018 · 5 comments

Comments

@syrius01
Copy link

Hi kkirsche!

This issue is not really an issue but I was wondering if you plan to add support for CVE-2018-2628 to the tools on this repository that you shared with the community? I'm asking since it's the best tool I've found yet, really enjoy the way it's made :)

Thank you for your time!

@kkirsche
Copy link
Owner

Hm, that sounds interesting. Let me take a look at it and see if I can put something together for it

@syrius01
Copy link
Author

Yes CVS score is high (9.8/10), looks very critical. So far all the PoCs I've found are only for detecting if the server is vulnerable but no way on verify if we can execute remote code on the potential vulnerable server.

@syrius01
Copy link
Author

Hi kkirsche!

update; so far I am able to proceed to the handshake and sending the payload but I'm having issues getting the reverse shell, probably because I didn't create the payload the proper way to get a reverse shell with ysoserial.

Did you have any luck on your side?

Thanks!

@kkirsche
Copy link
Owner

kkirsche commented May 3, 2018

I've been able to get it to work relatively reliably but hate having to rely on ysoserial, so the time consuming part has been getting an easy conversion tool in place to build the final payload. I hope to have something for this, but not sure if that's a realistic goal. I just hate having to install and run java stuff like ysoserial.

@syrius01
Copy link
Author

syrius01 commented May 4, 2018

That would be great if it could work without ysoserial but I would be very happy also to find out why I'm not getting the reverse shell, maybe the way I've generated the payload is wrong, can I ask you which syntax did you use to generate your payload in order to obtain the reverse shell?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants