Skip to content

Latest commit

 

History

History
35 lines (21 loc) · 1.65 KB

README.md

File metadata and controls

35 lines (21 loc) · 1.65 KB

Spring4Shell Exploit POC

Exploit a Spring Application vulnerable to the Spring4Shell vulnerability. Read more about Spring4shell on our blog.

Usage

Requirements: Docker and docker-compose

$ ./exploit.sh 

asciicast

Vulnerable Spring Application

The vulnerable Spring application contains a GET and POST request handler for /helloworld/greeting. The exploit.sh script starts the app container running Tomcat 9.0 with the application packaged as a WAR and uses curl to write a webshell to http://localhost:8080/shell.jsp. The shell is used to grab the flag present at /flag inside the container's filesystem.

CVE-2022-22965

The CVE-2022-22965 with a CVSS score of 9.8 has been to the vulnerability in Spring Core allowing Remote Code Execution. The exploit is easy to achieve and hence the high CVSS score, pre-requisites for the exploit are:

  • JDK version 9+
  • Application built on Spring Or derived frameworks
  • Running Tomcat with WAR deployment

Resources

Credits

Based on the exploit and application by reznok.