漏洞描述 对于任何一个以对象为参数的RMI接口,攻击者可以发一个精心构建的对象,迫使服务器端将这个对象按任何一个存在于classpath中的可序列化类来反序列化。在反序列化的过程中调用系统命令执行的类及对应的方法,达到远程命令执行的效果。
相关漏洞推荐 POC CVE-2013-3827: Javafaces LFI POC CVE-2017-12637: SAP NetWeaver Application Server Java 7.5 - Local File Inclusion POC CVE-2020-6287: SAP NetWeaver AS JAVA 7.30-7.50 - Remote Admin Addition POC CVE-2021-37573: Tiny Java Web Server - Cross-Site Scripting POC CVE-2022-29078: Node.js Embedded JavaScript 3.1.6 - Template Injection POC CVE-2023-29827: Embedded JavaScript(EJS) 3.1.6 - Template Injection POC CVE-2025-46822: Java-springboot-codebase 1.1 - Arbitrary File Read POC CVE-2017-12149: Java/Jboss Deserialization [RCE] POC CVE-2018-15531: JavaMelody XXE POC javamelody-detect: JavaMelody Monitoring Exposed POC jinjava-ssti: Jinjava - Server Side Template Injection POC javascript-env-config: JavaScript Environment Configuration - Detect POC javascript-env: JavaScript Environment Configuration - Detect