Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-7961 PoC — Liferay Portal 代码问题漏洞

Source
Associated Vulnerability
Title:Liferay Portal 代码问题漏洞 (CVE-2020-7961)
Description:Liferay Portal是美国Liferay公司的一套基于J2EE的门户解决方案。该方案使用了EJB以及JMS等技术,并可作为Web发布和共享工作区、企业协作平台、社交网络等。 Liferay Portal 7.2.1 CE GA2之前版本中存在代码问题漏洞。远程攻击者可借助JSON Web服务利用该漏洞执行任意代码。
Description
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)
Readme
# CVE-2020-7961-payloads
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)



Step 1) Write Your payload in LifExp.java <br/>
Step 2) Compile it with javac <br/>
Step 3) make your log server (Maybe you want to use "Burp Collaborator Client")<br/>
Step 4) Run poc.py <br/>
<br/>
....enjoy it ;)   :innocent:
<br/>
<br/>
poc Code Writed by mzer0one  :pray: <br/>
https://github.com/mzer0one/CVE-2020-7961-POC

File Snapshot

[4.0K] /data/pocs/26b736a4217282c6dd7f44a687bbafb9eb44d100 ├── [ 654] Liferay_linux_payload.txt ├── [ 691] Liferay_Windows_payload.txt ├── [ 211] LifExp.java ├── [6.0K] poc.py └── [ 513] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.