CVE-2019-2725 bypass pocscan and exp # CVE-2019-2725 bypass
## tips
coded in python3,payload[here](https://github.com/jiansiting/CVE-2019-2725 "here")</br>
that payload only work in jdk6</br>

## exp
usage: usage:exp.py 127.0.0.1:8080 whoami</br>
</br>
</br>
## poc
after edit the ip.txt,programe will check the ip in ip.txt,testing if the vulnerability exist or not :
</br>

[4.0K] /data/pocs/cda67edc741830288e31285e8490c54cb8b3a7be
├── [ 80K] bug.png
├── [ 40K] exp2.png
├── [ 19K] exp.png
├── [4.9K] poc.png
├── [ 617] README.md
└── [4.0K] weblogic
├── [4.0K] exp
│ ├── [172K] payload.txt
│ └── [ 582] weblogic_exp.py
├── [4.0K] poc
│ ├── [ 89] ip.txt
│ ├── [172K] payload.txt
│ ├── [ 37] readme.txt
│ └── [ 800] weblogic_poc.py
└── [ 53] readme.txt
3 directories, 12 files