Files
CVEs-PoC/2017/CVE-2017-7504.md
T
2024-07-25 21:25:12 +00:00

73 lines
3.3 KiB
Markdown

### [CVE-2017-7504](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7504)
![](https://img.shields.io/static/v1?label=Product&message=JBoss&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%204.x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502&color=brighgreen)
### Description
HTTPServerILServlet.java in JMS over HTTP Invocation Layer of the JbossMQ implementation, which is enabled by default in Red Hat Jboss Application Server <= Jboss 4.X does not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized data.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/20142995/Goby
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AabyssZG/AWD-Guide
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/ArrestX/--POC
- https://github.com/Awrrays/FrameVul
- https://github.com/BarrettWyman/JavaTools
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/DSO-Lab/pocscan
- https://github.com/GGyao/jbossScan
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/MrE-Fog/jbossScan
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/Sathyasri1/JavaDeserH2HC
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Weik1/Artillery
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZTK-009/RedTeamer
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/chaosec2021/fscan-POC
- https://github.com/cyberharsh/jboss7504
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dudek-marcin/Poc-Exp
- https://github.com/enomothem/PenTestNote
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/fupinglee/JavaTools
- https://github.com/gallopsec/JBossScan
- https://github.com/hungslab/awd-tools
- https://github.com/ianxtianxt/CVE-2015-7501
- https://github.com/joaomatosf/JavaDeserH2HC
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
- https://github.com/koutto/jok3r-pocs
- https://github.com/lnick2023/nicenice
- https://github.com/mamba-2021/fscan-POC
- https://github.com/merlinepedra/JavaDeserH2HC
- https://github.com/merlinepedra25/JavaDeserH2HC
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/onewinner/VulToolsKit
- https://github.com/ozkanbilge/Java-Reverse-Shell
- https://github.com/password520/RedTeamer
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/r0eXpeR/redteam_vul
- https://github.com/shengshengli/fscan-POC
- https://github.com/tdcoming/Vulnerability-engine
- https://github.com/xbl3/awesome-cve-poc_qazbnm456