mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
99 lines
5.0 KiB
Markdown
99 lines
5.0 KiB
Markdown
![]() |
### [CVE-2015-7501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
|
||
|
- https://www.oracle.com/security-alerts/cpujul2020.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0day666/Vulnerability-verification
|
||
|
- https://github.com/0xh4di/PayloadsAllTheThings
|
||
|
- https://github.com/20142995/Goby
|
||
|
- https://github.com/3vikram/Application-Vulnerabilities-Payloads
|
||
|
- https://github.com/84KaliPleXon3/Payloads_All_The_Things
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/AabyssZG/AWD-Guide
|
||
|
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/AfvanMoopen/tryhackme-
|
||
|
- https://github.com/AlexisRippin/java-deserialization-exploits
|
||
|
- https://github.com/BarrettWyman/JavaTools
|
||
|
- https://github.com/BrittanyKuhn/javascript-tutorial
|
||
|
- https://github.com/CVEDB/awesome-cve-repo
|
||
|
- https://github.com/CVEDB/top
|
||
|
- https://github.com/Coalfire-Research/java-deserialization-exploits
|
||
|
- https://github.com/Delishsploits/PayloadsAndMethodology
|
||
|
- https://github.com/GGyao/jbossScan
|
||
|
- https://github.com/GhostTroops/TOP
|
||
|
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/GuynnR/Payloads
|
||
|
- https://github.com/HimmelAward/Goby_POC
|
||
|
- https://github.com/MrE-Fog/jbossScan
|
||
|
- https://github.com/Muhammd/Awesome-Payloads
|
||
|
- https://github.com/Nieuport/PayloadsAllTheThings
|
||
|
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
||
|
- https://github.com/Pav-ksd-pl/PayloadsAllTheThings
|
||
|
- https://github.com/PhroggDev/THM_Rooms
|
||
|
- https://github.com/R0B1NL1N/java-deserialization-exploits
|
||
|
- https://github.com/Ra7mo0on/PayloadsAllTheThings
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/Shadowshusky/java-deserialization-exploits
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
||
|
- https://github.com/Weik1/Artillery
|
||
|
- https://github.com/XPR1M3/Payloads_All_The_Things
|
||
|
- https://github.com/Z0fhack/Goby_POC
|
||
|
- https://github.com/Zero094/Vulnerability-verification
|
||
|
- https://github.com/andrysec/PayloadsAllVulnerability
|
||
|
- https://github.com/anhtu97/PayloadAllEverything
|
||
|
- https://github.com/apkadmin/PayLoadsAll
|
||
|
- https://github.com/asa1997/topgear_test
|
||
|
- https://github.com/auditt7708/rhsecapi
|
||
|
- https://github.com/bakery312/Vulhub-Reproduce
|
||
|
- https://github.com/catsecorg/CatSec-TryHackMe-WriteUps
|
||
|
- https://github.com/chanchalpatra/payload
|
||
|
- https://github.com/dudek-marcin/Poc-Exp
|
||
|
- https://github.com/enomothem/PenTestNote
|
||
|
- https://github.com/falocab/PayloadsAllTheThings
|
||
|
- https://github.com/fengjixuchui/RedTeamer
|
||
|
- https://github.com/fupinglee/JavaTools
|
||
|
- https://github.com/gallopsec/JBossScan
|
||
|
- https://github.com/gredler/aegis4j
|
||
|
- https://github.com/hellochunqiu/PayloadsAllTheThings
|
||
|
- https://github.com/hktalent/TOP
|
||
|
- https://github.com/ianxtianxt/CVE-2015-7501
|
||
|
- https://github.com/just0rg/Security-Interview
|
||
|
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/koutto/jok3r-pocs
|
||
|
- https://github.com/ksw9722/PayloadsAllTheThings
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/mrhacker51/ReverseShellCommands
|
||
|
- https://github.com/nevidimk0/PayloadsAllTheThings
|
||
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits
|
||
|
- https://github.com/password520/RedTeamer
|
||
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research-list
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/ranjan-prp/PayloadsAllTheThings
|
||
|
- https://github.com/ravijainpro/payloads_xss
|
||
|
- https://github.com/sobinge/--1
|
||
|
- https://github.com/sobinge/PayloadsAllTheThings
|
||
|
- https://github.com/sobinge/PayloadsAllThesobinge
|
||
|
- https://github.com/sourcery-ai-bot/Deep-Security-Reports
|
||
|
- https://github.com/testermas/tryhackme
|
||
|
- https://github.com/winterwolf32/PayloadsAllTheThings
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
- https://github.com/zema1/oracle-vuln-crawler
|
||
|
|