Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Commons Text | unspecified ~ 1.9 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-42889 dockerized sample application (Apache Commons Text RCE) | https://github.com/0xst4n/CVE-2022-42889 | POC Details |
| 2 | Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889. | https://github.com/SeanWrightSec/CVE-2022-42889-PoC | POC Details |
| 3 | ClusterImagePolicy demo for cve-2022-42889 text4shell | https://github.com/chainguard-dev/text4shell-policy | POC Details |
| 4 | An intentionally vulnerable webapp to get your hands dirty with CVE-2022-42889. | https://github.com/tulhan/commons-text-goat | POC Details |
| 5 | Dockerized POC for CVE-2022-42889 Text4Shell | https://github.com/karthikuj/cve-2022-42889-text4shell-docker | POC Details |
| 6 | cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. | https://github.com/ClickCyber/cve-2022-42889 | POC Details |
| 7 | A simple application that shows how to exploit the CVE-2022-42889 vulnerability | https://github.com/korteke/CVE-2022-42889-POC | POC Details |
| 8 | None | https://github.com/eunomie/cve-2022-42889-check | POC Details |
| 9 | Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit. | https://github.com/kljunowsky/CVE-2022-42889-text4shell | POC Details |
| 10 | A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889 | https://github.com/securekomodo/text4shell-scan | POC Details |
| 11 | None | https://github.com/neerazz/CVE-2022-42889 | POC Details |
| 12 | 通过 jvm 启动参数 以及 jps pid进行拦截非法参数 | https://github.com/uk0/cve-2022-42889-intercept | POC Details |
| 13 | Proof of Concept Appliction for testing CVE-2022-42889 | https://github.com/securekomodo/text4shell-poc | POC Details |
| 14 | None | https://github.com/humbss/CVE-2022-42889 | POC Details |
| 15 | This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability | https://github.com/stavrosgns/Text4ShellPayloads | POC Details |
| 16 | python script for CVE-2022-42889 | https://github.com/s3l33/CVE-2022-42889 | POC Details |
| 17 | Dockerized PoC for CVE-2022-42889 Text4Shell | https://github.com/galoget/CVE-2022-42889-Text4Shell-Docker | POC Details |
| 18 | CVE-2022-42889 Text4Shell Exploit POC | https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC | POC Details |
| 19 | A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability. | https://github.com/akshayithape-devops/CVE-2022-42889-POC | POC Details |
| 20 | Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile | https://github.com/0xmaximus/Apache-Commons-Text-CVE-2022-42889 | POC Details |
| 21 | Vulnerability Scanner for CVE-2022-42889 (Text4Shell) | https://github.com/smileostrich/Text4Shell-Scanner | POC Details |
| 22 | CVE-2022-42889 aka Text4Shell research & PoC | https://github.com/cxzero/CVE-2022-42889-text4shell | POC Details |
| 23 | Text4Shell PoC Exploit | https://github.com/west-wind/CVE-2022-42889 | POC Details |
| 24 | None | https://github.com/Vulnmachines/text4shell-CVE-2022-42889 | POC Details |
| 25 | CVE-2022-42889 Blind-RCE Nuclei Template | https://github.com/Hack4rLIFE/CVE-2022-42889 | POC Details |
| 26 | Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) | https://github.com/cryxnet/CVE-2022-42889-RCE | POC Details |
| 27 | CVE-2022-42889 (a.k.a. Text4Shell) RCE Proof of Concept | https://github.com/sunnyvale-it/CVE-2022-42889-PoC | POC Details |
| 28 | Script to handle CVE 2022-42889 | https://github.com/QAInsights/cve-2022-42889-jmeter | POC Details |
| 29 | None | https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889 | POC Details |
| 30 | Python Script to exploit RCE of CVE-2022-42889 | https://github.com/pwnb0y/Text4shell-exploit | POC Details |
| 31 | CVE-2022-42889 - Text4Shell exploit | https://github.com/gokul-ramesh/text4shell-exploit | POC Details |
| 32 | text4shell(CVE-2022-42889) BurpSuite Scanner | https://github.com/f0ng/text4shellburpscanner | POC Details |
| 33 | https://github.com/karthikuj/cve-2022-42889-text4shell-docker.git | https://github.com/WFS-Mend/vtrade-common | POC Details |
| 34 | Kubernetes Lab for CVE-2022-42889 | https://github.com/devenes/text4shell-cve-2022-42889 | POC Details |
| 35 | A demonstration of CVE-2022-42889 (text4shell) remote code execution vulnerability | https://github.com/hotblac/text4shell | POC Details |
| 36 | docker for CVE-2022-42889 | https://github.com/necroteddy/CVE-2022-42889 | POC Details |
| 37 | None | https://github.com/ReachabilityOrg/cve-2022-42889-text4shell-docker | POC Details |
| 38 | None | https://github.com/dgor2023/cve-2022-42889-text4shell-docker | POC Details |
| 39 | None | https://github.com/Dima2021/cve-2022-42889-text4shell | POC Details |
| 40 | None | https://github.com/RSA-Demo/cve-2022-42889-text4shell | POC Details |
| 41 | Dockerized POC for CVE-2022-42889 Text4Shell | https://github.com/aaronm-sysdig/text4shell-docker | POC Details |
| 42 | This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. | https://github.com/gustanini/CVE-2022-42889-Text4Shell-POC | POC Details |
| 43 | Text4Shell | https://github.com/Sic4rio/CVE-2022-42889 | POC Details |
| 44 | RCE PoC for Apache Commons Text vuln | https://github.com/34006133/CVE-2022-42889 | POC Details |
| 45 | None | https://github.com/DimaMend/cve-2022-42889-text4shell | POC Details |
| 46 | CVE-2022-42889 Blind-RCE Nuclei Template | https://github.com/Gotcha-1G/CVE-2022-42889 | POC Details |
| 47 | None | https://github.com/joshbnewton31080/cve-2022-42889-text4shell | POC Details |
| 48 | None | https://github.com/MendDemo-josh/cve-2022-42889-text4shell | POC Details |
| 49 | CVE-2022-42889 dockerized sample application (Apache Commons Text RCE) | https://github.com/rockmelodies/CVE-2022-42889 | POC Details |
| 50 | This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. | https://github.com/808ale/CVE-2022-42889-Text4Shell-POC | POC Details |
| 51 | A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889 | https://github.com/kiralab/text4shell-scan | POC Details |
| 52 | A custom Python-based proof-of-concept (PoC) exploit targeting Text4Shell (CVE-2022-42889), a critical remote code execution vulnerability in Apache Commons Text versions < 1.10. | https://github.com/chaudharyarjun/text4shell-exploit | POC Details |
| 53 | CVE-2022-42889 Blind-RCE Nuclei Template | https://github.com/Gotcha1G/CVE-2022-42889 | POC Details |
| 54 | Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. | https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2022/CVE-2022-42889.yaml | POC Details |
| 55 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Apache%20Commons%20Text%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-42889.md | POC Details |
| 56 | Python Script to exploit RCE of CVE-2022-42889 | https://github.com/vickyaryan7/Text4shell-exploit | POC Details |
| 57 | A custom Python-based proof-of-concept (PoC) exploit targeting Text4Shell (CVE-2022-42889), a critical remote code execution vulnerability in Apache Commons Text versions < 1.10. | https://github.com/Syndicate27/text4shell-exploit | POC Details |
| 58 | Log4Shell / Log4J Payload - CVE-2021-45046 and CVE-2022-42889 | https://github.com/ifconfig-me/Log4Shell-Payloads | POC Details |
| 59 | None | https://github.com/shoucheng3/asf__commons-text_CVE-2022-42889_1-9 | POC Details |
| 60 | Proof of Concept (PoC) for CVE-2022-42889 (Text4Shell) targeting Apache Commons Text versions prior to 1.10.0. This script automates Remote Code Execution (RCE) via script interpolation to establish a reverse shell. This version is a structured optimization based on the original exploit found at Exploit-DB (ID: 52261). | https://github.com/Goultarde/CVE-2022-42889-text4shell | POC Details |
No public POC found.
Login to generate AI POCNo comments yet