add clarification about c3p0
This commit is contained in:
@@ -15,6 +15,8 @@ Exploiting this vulnerability will result in remote code execution as the root u
|
||||
Authentication is required, the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY, which should be fed to the module.
|
||||
Any authenticated user can exploit this vulnerability, even the lowest privileged ones.
|
||||
|
||||
The exploit uses a modified ysoserial c3p0 payload. The only part that is modified is that c3p0 is built using version 0.9.1.2, so that the serialVersionUid of the target is the same as the exploit. This can be achieved by patching ysoserial's pom.xml.
|
||||
|
||||
For more information refer to the advisory link:
|
||||
* https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md
|
||||
|
||||
|
||||
Reference in New Issue
Block a user