You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
# Java Deserialization Scanner
2
-
Java Deserialization Scanner is a Burp Suite plugin aimed at detect and exploit Java deserialization vulnerabilities. It was written by Federico Dotta, a Security Advisor at @ Mediaservice.net.
2
+
Java Deserialization Scanner is a Burp Suite plugin aimed at detect and exploit Java deserialization vulnerabilities. It was written by Federico Dotta, Principal Security Analyst at HN Security.
3
3
4
4
The plugin is made up of three different components:
5
5
@@ -8,15 +8,15 @@ The plugin is made up of three different components:
8
8
3. Exploiter, that allow to actively exploit Java deserialization vulnerabilies, using frohoff ysoserial (https://github.com/frohoff/ysoserial)
9
9
10
10
# Author
11
-
- Federico Dotta, Security Advisor at @ Mediaservice.net
11
+
- Federico Dotta, Principal Security Analyst at HN Security
12
12
13
13
# Contributors
14
14
- Jeremy Goldstein
15
15
- Andras Veres-Szentkiralyi
16
16
17
17
# Mini walkthrough (24/05/17)
18
18
A brief article containing a mini walkthrough on how to use the various components of the plugin can be found at the following URL:
# Integration with Burp Suite active and passive scanner
22
22
Java Deserialization Scanner uses custom payloads generated with a modified version of "ysoserial", tool created by frohoff and gebl, to detect Java deserialization vulnerabilities. The original tool (https://github.com/frohoff/ysoserial) generate payloads for the execution of commands on the system, using the Runtime.exec function. Usually, however, it is not possible to see the output of the command and consequently it is not simple to write a scanner based on this kind of function. For this reason, a modified version of ysoserial is used to generate different types of payloads, usefull for the detection of the issue instead of the exploitation:
@@ -40,7 +40,7 @@ Currently, the passive checks of the Java Deserialiation Scanner reported the pr
40
40
12. Mozilla Rhino (two different chains)
41
41
13. Vaadin
42
42
43
-
Furthermore, **URLSNDS payload has been introduced** to actively **detect Java deserialization without any vulnerable libraris**. If the plugin find only the URLDNS issue (and no vulnerable libraries), the attacker probably can execute DoS attacks but to achieve Remote Code Execution it is necessary more effort. Refer to [this link](https://techblog.mediaservice.net/2020/04/java-deserialization-scanner-0-6-is-out/) for more details.
43
+
Furthermore, **URLSNDS payload has been introduced** to actively **detect Java deserialization without any vulnerable libraris**. If the plugin find only the URLDNS issue (and no vulnerable libraries), the attacker probably can execute DoS attacks but to achieve Remote Code Execution it is necessary more effort. Refer to [this link](https://web.archive.org/web/20210312114921/https://techblog.mediaservice.net/2020/04/java-deserialization-scanner-0-6-is-out/) for more details.
44
44
45
45
All the components of the plugin supports the following encodings:
Copy file name to clipboardExpand all lines: src/main/java/burp/BurpExtender.java
+19-6Lines changed: 19 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -149,8 +149,9 @@ public class BurpExtender implements IBurpExtender, IScannerCheck, ITab, ActionL
149
149
150
150
privateJTabbedPanemainPanel;
151
151
152
+
privateJTextFieldjavaPath;
152
153
privateJTextFieldysoserialPath;
153
-
154
+
154
155
privateStringdialogTitle;
155
156
privateStringdialogMessage;
156
157
privateString[] dialogButtonsMessages;
@@ -390,7 +391,7 @@ public void registerExtenderCallbacks(final IBurpExtenderCallbacks callbacks)
390
391
391
392
urlBodyAlreadyScanned = newArrayList<String>();
392
393
393
-
stdout.println("Java Deserialization Scanner v0.5 - The all-in-one plugin for the detection and the exploitation of Java deserialization vulnerabilities");
394
+
stdout.println("Java Deserialization Scanner v0.7 - The all-in-one plugin for the detection and the exploitation of Java deserialization vulnerabilities");
394
395
stdout.println("Created by: Federico Dotta");
395
396
stdout.println("Contributors: Jeremy Goldstein, Andras Veres-Szentkiralyi");
0 commit comments