Skip to content

Latest commit

 

History

History
35 lines (30 loc) · 1.58 KB

README.MD

File metadata and controls

35 lines (30 loc) · 1.58 KB

Richsploit

Richsploit: Exploitation toolkit for RichFaces.

Overview

Richsploit can be used to exploit JSF endpoints using RichFaces. All versions from 3.1.0 and higher are vulnerable.

 usage: Richsploit
 -c, --cookies  <arg>  Add cookies to the request
 -e, --exploit  <arg>  0: CVE-2013-2165
                       1: CVE-2015-0279
                       2: CVE-2018-12532
                       3: CVE-2018-12533 (experimental)
                       4: CVE-2018-14667
 -f, --filepath <arg>  Exploit an arbitrary path
 -p, --payload  <arg>  The file containing serialized object
                       (CVE-2013-2165), or
                       Shell command to execute (all other CVE's), or
                       an Expression (with -x)
                       Use multiple -p to run more than one command
 -r, --regex    <arg>  Use regex to display the first group of the payload
                       response (e.g. <pre>(.*?)</pre>
)
 -u, --url      <arg>  URL of richfaces application, i.e.
                       http://example.com/app for RF4.x and
                       http://example.com/app/a4j/g/3_3_3.Final for RF3.x
 -v, --version  <arg>  Richfaces branch, either 3 or 4
 -V, --verbose         Verbose mode
 -x, --expression      Use payload as an expression instead of a command
                       (not valid for CVE-2013-2165)

For more information about how to use the tool, please see this blog post.