This script automates the exploitation of a Java deserialization vulnerability in Oracle PeopleSoft, originally discovered by Vahagn Vardanyan.
This exploit requires ysoserial.jar to generate cross-platform serialized Java payloads. ysoserial must be in the same directory as this script.
PS: It uses ysoserial-modified.jar, which can be found in https://github.com/pimps/ysoserial-modified/
Copyright 2016-2018, Blaze Information Security