### [CVE-2017-7504](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7504) ![](https://img.shields.io/static/v1?label=Product&message=JBoss&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%204.x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502&color=brighgreen) ### Description HTTPServerILServlet.java in JMS over HTTP Invocation Layer of the JbossMQ implementation, which is enabled by default in Red Hat Jboss Application Server <= Jboss 4.X does not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized data. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0day666/Vulnerability-verification - https://github.com/20142995/Goby - https://github.com/ARPSyndicate/cvemon - https://github.com/AabyssZG/AWD-Guide - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/ArrestX/--POC - https://github.com/Awrrays/FrameVul - https://github.com/BarrettWyman/JavaTools - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/DSO-Lab/pocscan - https://github.com/GGyao/jbossScan - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/HimmelAward/Goby_POC - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes - https://github.com/MrE-Fog/jbossScan - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/Sathyasri1/JavaDeserH2HC - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Weik1/Artillery - https://github.com/Z0fhack/Goby_POC - https://github.com/ZTK-009/RedTeamer - https://github.com/Zero094/Vulnerability-verification - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/chaosec2021/fscan-POC - https://github.com/cyberharsh/jboss7504 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/dudek-marcin/Poc-Exp - https://github.com/enomothem/PenTestNote - https://github.com/fengjixuchui/RedTeamer - https://github.com/fupinglee/JavaTools - https://github.com/gallopsec/JBossScan - https://github.com/hungslab/awd-tools - https://github.com/ianxtianxt/CVE-2015-7501 - https://github.com/joaomatosf/JavaDeserH2HC - https://github.com/klausware/Java-Deserialization-Cheat-Sheet - https://github.com/koutto/jok3r-pocs - https://github.com/lnick2023/nicenice - https://github.com/mamba-2021/fscan-POC - https://github.com/merlinepedra/JavaDeserH2HC - https://github.com/merlinepedra25/JavaDeserH2HC - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet - https://github.com/ozkanbilge/Java-Reverse-Shell - https://github.com/password520/RedTeamer - https://github.com/pen4uin/awesome-vulnerability-research - https://github.com/pen4uin/vulnerability-research - https://github.com/pen4uin/vulnerability-research-list - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/r0eXpeR/redteam_vul - https://github.com/shengshengli/fscan-POC - https://github.com/tdcoming/Vulnerability-engine - https://github.com/xbl3/awesome-cve-poc_qazbnm456