Interactive Spring4Shell PoC attack script written in Rust
- Rust
- Docker
- war file deployer
- interactive web shell
- JDK version 9.0+
- Spring framework and derivative framework spring-beans-*.jar exists
- Install docker
- Git clone lab repo and then build
git clone https://github.com/aancw/Spring4shell-poc-lab
cd Spring4shell-poc-lab
sh deploy.sh
- Wait until container is up
- Happy hacking!
- For JDK version, you can use
java -version
- To check if you are using Spring framework or derivative. Do a global search after "spring-beans-.jar" and "spring.jar"
find . -name spring-beans*.jar
$ root@aa3b00479589:/usr/local/tomcat# find . -name spring-beans*.jar
./webapps/spring_app/WEB-INF/lib/spring-beans-5.2.3.RELEASE.jar