Skip to content

Commit

Permalink
Merge pull request vulhub#173 from shafr/patch-1
Browse files Browse the repository at this point in the history
[DOC] changed phrasing on External folder
  • Loading branch information
phith0n authored Jan 21, 2020
2 parents 79d2b31 + 6aad821 commit 273bc10
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion activemq/CVE-2015-5254/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ The exploit process is as follows:
2. send payload to port 61616
3. Access the web management page and read the serialization messages, then u can trigger vulnerability.

To exploit this environment we will use [jmet](https://github.com/matthiaskaiser/jmet) (Java Message Exploitation Tool). First download the jar file of jmet, and create an external folder in the same directory (otherwise it may occur the error that the folder does not exist).
To exploit this environment we will use [jmet](https://github.com/matthiaskaiser/jmet) (Java Message Exploitation Tool). First download the jar file of jmet, and create folder called **external** in the same directory (otherwise it may occur the error that the folder does not exist).

the jmet is to use ysoserial to generate Payload and send it (the jar comes with ysoserial, we don't no need to download it again), so we need to choose one that can be used in ysoserial as the gadget, such as ROME.

Expand Down

0 comments on commit 273bc10

Please sign in to comment.