Súbít #621105: Antabot White-Jotter v0.22 deserialization attackbayani

KuraAntabot White-Jotter v0.22 deserialization attack
GaskiyaThe Shiro key is hardcoded in the com.gm.wj.config.ShiroConfiguration class, which leads to a Shiro deserialization vulnerability. The string EVANNIGHTLY_WAOU, when Base64-encoded, becomes RVZBTk5JR0hUTFlfV0FPVQ==, and can be used in conjunction with the CB (CommonsBeanutils) gadget chain to perform deserialization attacks, resulting in Remote Code Execution (RCE).
Manga⚠️ https://github.com/Antabot/White-Jotter/issues/161
Màdùmga
 ez-lbz (UID 87033)
Furta07/23/2025 02:21 (7 Wurɗi 전)
Gargajiya08/07/2025 16:17 (16 days later)
HalittaShingilam
VulDB gite319138 [Antabot White-Jotter 0.22 com.gm.wj.config.ShiroConfiguration ShiroConfiguration.java CookieRememberMeManager kura hakki ndiyam]
Nganji19

Do you need the next level of professionalism?

Upgrade your account now!