pedrib/PoC

ISEpwn have a problem

Closed this issue · 2 comments

[+] Picked port 32801 to receive the shell
[+] Creating AMF payload...
Picked up _JAVA_OPTIONS: -Dawt.useSystemAAFontSettings=on -Dswing.aatext=true
Exception in thread "main" java.lang.IllegalAccessError: class uk.co.agileinfosec.acsflex.ACSFlex (in unnamed module @0x6b162892) cannot access class sun.rmi.transport.tcp.TCPEndpoint (in module java.rmi) because module java.rmi does not export sun.rmi.transport.tcp to unnamed module @0x6b162892
at uk.co.agileinfosec.acsflex.ACSFlex.generateUnicastRef(ACSFlex.java:26)
at uk.co.agileinfosec.acsflex.ACSFlex.main(ACSFlex.java:11)
ISEpwn.rb:141:in binread': No such file or directory @ rb_sysopen - /tmp/d20231212-361622-oix3mk/payload.ser (Errno::ENOENT) from ISEpwn.rb:141:in block in

'
from /usr/lib/ruby/3.1.0/tmpdir.rb:96:in mktmpdir' from ISEpwn.rb:130:in '

What Java version are you using? You probably need to use Java 8, it won't work with newer Java versions.

Java 11 might work, but no guarantees, this exploit was built for Java 8.

Closing this due to inactivity.