Java-Deserialization-Cheat-Sheet
The cheat sheet about Java Deserialization vulnerabilities (by GrrrDog)
marshalsec
By mbechler
Java-Deserialization-Cheat-Sheet | marshalsec | |
---|---|---|
1 | 7 | |
2,960 | 3,211 | |
- | - | |
2.2 | 0.0 | |
11 months ago | over 1 year ago | |
Java | ||
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Java-Deserialization-Cheat-Sheet
Posts with mentions or reviews of Java-Deserialization-Cheat-Sheet.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-02-20.
-
A Study Notes of Exploit Spring Boot Actuator
It can be known that this variable is used to specify the location of the bootstrap configuration file. The supported file formats include ymland properties. Friends who are familiar with Java security may think that the parsing of yml will have a problem of deserialization. If the content of the configuration file is here, we If you can control it, there is a possibility that it can be exploited.
marshalsec
Posts with mentions or reviews of marshalsec.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-02-20.
-
How do I construct a curl command for a log4shell ldap server?
I'm using this: https://github.com/mbechler/marshalsec as an LDAP server.
-
A Study Notes of Exploit Spring Boot Actuator
According to the introduction in https://github.com/mbechler/marshalsec/blob/master/marshalsec.pdf, in addition to the javax.script.ScriptEngineManager class , we can also use the com.sun.rowset.JdbcRowSetImplclass to complete the exploitation through JNDI injection. The payload is as follows
-
Log4Shell log4j vulnerability (CVE-2021-44228) - cheat-sheet reference guide
Not sure if that method actually works since LDAP is a different protocol than HTTP? If you're running an HTTP server as the receiver, then your server is just going to be confused by the connection and it might not log anything. You either want to run an LDAP server like https://github.com/mbechler/marshalsec , or have some logging method that triggers on any TCP connection, or use a service like dnslog.cn that can log for you. (although I've seen a lot of companies are now specifically blocking that domain which seems silly).
- GitHub taking down tools allowing defenders to reproduce the Log4j vulnerability
- WTH
- Java Unmarshaller Security – Turning your data into code execution
- Log4j RCE Found
What are some alternatives?
When comparing Java-Deserialization-Cheat-Sheet and marshalsec you can also consider the following projects:
PENTESTING-BIBLE - articles
Apache Log4j 2 - Apache Log4j 2 is a versatile, feature-rich, efficient logging API and backend for Java.