Exploit for Deserialization of Untrusted Data in Snakeyaml Project Snakeyaml exploit

11 months ago 82
BOOK THIS SPACE FOR AD
ARTICLE AD

Share

## https://sploitus.com/exploit?id=BD422242-6FE1-5AFE-BB69-531FB858E966 # snakeyaml_cve_poc SnakeYAML-CVE-2022-1471-POC ## build Either build the jar on your host with `mvn clean compile assembly:single` Or use `docker` to build an image with `docker build -t snakeyaml .` ## run Run the container with `docker run --rm -p8080:8080 snakeyaml` or the jar if you built on your host with `java -jar target/snakeyaml-1.0-SNAPSHOT-jar-with-dependencies.jar` ## use Send a get request to serialize object of student class and send yaml as response ![](images/image1.png) Send a post request with yaml to read YAML object as custom java object - deserialization ![](images/image2.png) ## exploit Execute `python3 -m http.server 8000` to run the http server Send a post request with yaml containing exploit ![](images/image2.png) You should observe a HTTP GET request on the listner
Read Entire Article