关联漏洞
描述
Remote Code Execution exploit for PrimeFaces 5.x - EL Injection (CVE-2017-1000486)
介绍
# CVE-2017-1000486
Remote Code Execution exploit for PrimeFaces 5.x - EL Injection (CVE-2017-1000486)
This is basically the same exploit made by [Mogwailabs](https://github.com/mogwailabs/CVE-2017-1000486), but edited to work in closed environments without access to the internet or with blocked firewall outbound traffic.
It gives you results in HTTP response header, so in case you're trying doing blind RCEwith old exploit - not anymore.
### Usage
```
python3 primefaces.py -t vulnapp.com id
```
Feel free to edit _vuln_point_ variable for exact endpoint.
文件快照
[4.0K] /data/pocs/466683f09d3aa56a693004c95b54324e5fc13c8e
├── [ 43] payload.js
├── [5.5K] primefaces.py
├── [ 561] README.md
├── [ 23] requirements.txt
└── [ 32] sleep.js
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。