@@ -120,47 +120,47 @@ Version Test
120
120
121
121
参考 [ javaweb-sec] ( https://github.com/javaweb-sec/javaweb-sec ) 有很详细的例子
122
122
123
- - [x] Runtime
124
- - [x] ProcessBuilder
125
- - [x] ProcessImpl
126
- - [x] ProcessImpl & UnixProcess
127
- - [x] ProcessImpl & UnixProcess by unsafe + Native
128
- - [x] Thread
129
- - [x] ScriptEngine
130
- - [x] jni
123
+ - Runtime
124
+ - ProcessBuilder
125
+ - ProcessImpl
126
+ - ProcessImpl & UnixProcess
127
+ - ProcessImpl & UnixProcess by unsafe + Native
128
+ - Thread
129
+ - ScriptEngine
130
+ - jni
131
131
132
132
## [ 执行结果输出(InputStream 处理Demo)] ( Command )
133
133
134
- - [x] java.lang.StringBuilder
135
- - [x] java.io.ByteArrayOutputStream
136
- - [x] java.util.Scanner
137
- - [x] java.io.BufferedReader
138
- - [x] java.io.InputStream.readNBytes > JDK 9
139
- - [x] org.springframework: spring-core
140
- - [x] org.apache.commons: commons-io
134
+ - java.lang.StringBuilder
135
+ - java.io.ByteArrayOutputStream
136
+ - java.util.Scanner
137
+ - java.io.BufferedReader
138
+ - java.io.InputStream.readNBytes > JDK 9
139
+ - org.springframework: spring-core
140
+ - org.apache.commons: commons-io
141
141
142
142
# 0x04 [ Expression inject] ( Expression )
143
143
144
144
## [ OGNL] ( Expression/OGNLAttack )
145
145
146
- - [x] 普通执行demo、jsEngine:get、set方式
147
- - [x] 有sout的回显 (Ps. 通过 Servlet 的回显移到 RceEcho 章节介绍)
146
+ - 普通执行demo、jsEngine:get、set方式
147
+ - 有sout的回显 (Ps. 通过 Servlet 的回显移到 RceEcho 章节介绍)
148
148
- 明文
149
149
- 套一层base64加密
150
- - [x] 探测用Payload
150
+ - 探测用Payload
151
151
- DNSLOG、HTTPLOG
152
152
- 延时
153
153
154
154
## [ EL] ( Expression/ELAttack )
155
155
156
- - [x] runtime 回显
157
- - [x] jsEngine 回显
158
- - [x] Scriptlet 标记写法(放在这里对照)
156
+ - runtime 回显
157
+ - jsEngine 回显
158
+ - Scriptlet 标记写法(放在这里对照)
159
159
160
160
## [ SPEL] ( Expression/SPELAttack )
161
161
162
- - [x] runtime 回显
163
- - [x] 探测用Payload
162
+ - runtime 回显
163
+ - 探测用Payload
164
164
- DNSLOG、HTTPLOG
165
165
- 延时
166
166
@@ -170,70 +170,72 @@ Version Test
170
170
171
171
## [ Mysql] ( JDBCAttack/MysqlAttack )
172
172
173
- - [x] 文件读取
174
- - [x] 反序列化
173
+ - 文件读取
174
+ - 反序列化
175
175
- statementInterceptors
176
176
- detectCustomCollations
177
177
178
178
## [ PostgreSQL] ( JDBCAttack/PostgreSQLAttack )
179
179
180
- - [x] CVE-2022 -21724 RCE
180
+ - CVE-2022 -21724 RCE
181
181
- AbstractXmlApplicationContext 实现类
182
- - [x] 文件写入
182
+ - 文件写入
183
183
- loggerLevel / loggerFile
184
184
- 原始方式写入 EL
185
185
- 截断方式写入 jsp
186
186
187
187
## [ H2database] ( JDBCAttack/H2Attack )
188
188
189
- - [x] RUNSCRIPT 远程sql加载
190
- - [x] 代码执行
189
+ - RUNSCRIPT 远程sql加载
190
+ - 代码执行
191
191
- INIT转义分号
192
192
- TriggerJS
193
193
- Groovy
194
194
195
195
## [ IBMDB2] ( JDBCAttack/IBMDB2Attack )
196
196
197
- - [x] JNDI
197
+ - JNDI
198
198
199
199
## [ ModeShape] ( JDBCAttack/ModeShapeAttack )
200
200
201
- - [x] JNDI
201
+ - JNDI
202
202
203
203
## [ Apache Derby] ( JDBCAttack/DerbyAttack )
204
204
205
- - [x] Serialize
205
+ - Serialize
206
206
207
207
## [ Sqlite] ( JDBCAttack/SqliteAttack )
208
208
209
- - [x] RCE
209
+ - RCE
210
210
211
211
# 0x06 [ Serialization] ( Serialization )
212
212
213
213
## [ Class load] ( Serialization/ClassLoad )
214
214
215
- + AppClassLoader
216
- + URLCLassLoader
217
- + BCEL
218
- + TransletClassLoaderDemo
219
- + Unsafe
220
- + ReflectUtils
215
+ - AppClassLoader
216
+ - URLCLassLoader
217
+ - BCEL
218
+ - TransletClassLoaderDemo
219
+ - Unsafe
220
+ - ReflectUtils
221
221
222
222
## [ XMLSerialization] ( Serialization/XMLSerialization )
223
223
224
224
### [ JarBean] ( Serialization/XMLSerialization/JavaBean )
225
225
226
- - [x] 命令执行 Runtime、ProcessBuilder、js
227
- - [x] 探测用Payload
226
+ - 命令执行 Runtime、ProcessBuilder、js
227
+ - 探测用Payload
228
228
- DNSLOG、SOCKETLOG
229
229
- 延时
230
- - [x] JNDI
231
- - [x] BCEL
232
- - [x] RemoteJar
230
+ - JNDI
231
+ - BCEL
232
+ - RemoteJar
233
233
234
234
## [ ConstructorEXP] ( Serialization/ConstructorEXP )
235
235
236
- Class.forName 场景通过构造方法RCE
236
+ 通过构造方法触发RCE
237
+
238
+ - xml
237
239
238
240
### XStream
239
241
0 commit comments