cve-2018-2628
时间: 2023-09-18 16:16:15 浏览: 104
CVE-2018-2628是一个Java反序列化漏洞。根据引用,可以通过执行特定的代码来利用该漏洞。具体来说,使用ysoserial-0.1-cve-2018-2628-all.jar工具生成恶意payload,然后通过JRMPClient2进行远程代码执行。在这个过程中,需要将靶机的IP和端口放入url.txt文件中(引用)。最后,我们可以在攻击机上使用java -jar ysoserial-0.1-cve-2018-2628-all.jar命令来执行payload(引用)。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* *3* [weblogic CVE-2018-2628复现](https://blog.csdn.net/qq_32731075/article/details/117933244)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 50%"]
- *2* [Weblogic反序列化漏洞(CVE-2018-2628)](https://blog.csdn.net/weixin_46411728/article/details/127874169)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]
阅读全文