Richsploit: Exploitation toolkit for RichFaces.
Overview
Richsploit can be used to exploit JSF endpoints using RichFaces. All versions from 3.1.0 and higher are vulnerable.
usage: Richsploit -c, --cookies <arg> Add cookies to the request -e, --exploit <arg> 0: CVE-2013-2165 1: CVE-2015-0279 2: CVE-2018-12532 3: CVE-2018-12533 (experimental) 4: CVE-2018-14667 -f, --filepath <arg> Exploit an arbitrary path -p, --payload <arg> The file containing serialized object (CVE-2013-2165), or Shell command to execute (all other CVE's), or an Expression (with -x) Use multiple -p to run more than one command -r, --regex <arg> Use regex to display the first group of the payload response (e.g. <pre>(.*?)</pre> ) -u, --url <arg> URL of richfaces application, i.e. http://example.com/app for RF4.x and http://example.com/app/a4j/g/3_3_3.Final for RF3.x -v, --version <arg> Richfaces branch, either 3 or 4 -V, --verbose Verbose mode -x, --expression Use payload as an expression instead of a command (not valid for CVE-2013-2165)
For more information about how to use the tool, please see this blog post.