### 简要描述:
java反序列化命令执行漏洞
### 详细说明:
http://125.35.22.15/
[<img src="https://images.seebug.org/upload/201512/16165632cbe55204bd1df36af54e04b7558a15df.png" alt="QQ截图20151216165802.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/16165632cbe55204bd1df36af54e04b7558a15df.png)
[<img src="https://images.seebug.org/upload/201512/161657280405b3d143306c96d405672e36d98332.png" alt="QQ截图20151216165820.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/161657280405b3d143306c96d405672e36d98332.png)
[<img src="https://images.seebug.org/upload/201512/16165733ad9a729eb4857c89f85d1245bc784c1b.png" alt="QQ截图20151216165842.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/16165733ad9a729eb4857c89f85d1245bc784c1b.png)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201512/16165903337a7015437b3564200b0711e5586e1e.png" alt="QQ截图20151216170033.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/16165903337a7015437b3564200b0711e5586e1e.png)
已成马场
[<img src="https://images.seebug.org/upload/201512/16170130338ac8af0ff93777c7c77112f1796510.png" alt="QQ截图20151216170255.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/16170130338ac8af0ff93777c7c77112f1796510.png)
http://125.35.22.15/is/index.jsp
密码:023
[<img src="https://images.seebug.org/upload/201512/1617023080eb743e0c3764c88ebb6a4dbd31704c.png" alt="QQ截图20151216170402.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/1617023080eb743e0c3764c88ebb6a4dbd31704c.png)
暂无评论