CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. # CVE-2022-39197 patch
### CVE-2022-39197 Cobalt Strike XSS 漏洞的一个临时补丁
通过 hook javax.swing.plaf.basic.BasicHTML的isHTMLString方法来禁用swing的html支持
PS: 部分依赖html的页面无法正常渲染(例如 关于页面)
### 使用方法
将 patch.jar 放入cobaltstrike启动目录下
在cobaltstrike启动参数中加入javaagent 启用补丁
```
-javaagent:patch.jar
```
启动cobaltstrike 输出Successfully Patched. 即为禁用成功
```
====== CVE-2022-39197 patch @burpheart ======
Successfully Patched.
```
------------------
CVE-2022-39197 Cobalt Strike XSS vulnerability patch
Disable html support for swing by hooking the isHTMLString method of javax.swing.plaf.basic.
PS: Some html-dependent pages do not render properly ( Such as About page etc.)
Add javaagent to the cobaltstrike startup parameters to enable patching
```
-javaagent:patch.jar
```
Start cobaltstrike and output Successfully Patched.
```
====== CVE-2022-39197 patch @burpheart ======
Successfully Patched.
```
[4.0K] /data/pocs/2775f754a2bc631b4b6cd576ff07e8cfe6ee7597
├── [2.9K] pom.xml
├── [1.0K] README.md
└── [4.0K] src
└── [4.0K] main
└── [4.0K] java
└── [4.0K] org
└── [4.0K] patch
├── [ 939] Agent.java
└── [1.3K] Swinghtml.java
5 directories, 4 files