POC详情: 38f24874f8ac9b9e2bf83dab3ab1a83a49ece963

来源
关联漏洞
标题: Spring Framework 代码注入漏洞 (CVE-2022-22965)
描述:Spring Framework是美国Spring团队的一套开源的Java、JavaEE应用程序框架。该框架可帮助开发人员构建高质量的应用。 Spring Framework 存在代码注入漏洞,该漏洞源于 JDK 9+ 上的数据绑定的 RCE。以下产品和版本受到影响:5.3.0 至 5.3.17、5.2.0 至 5.2.19、较旧的和不受支持的版本也会受到影响。
描述
CVE-2022-22965 Spring4Shell research & PoC
介绍
# CVE-2022-22965-spring4shell
CVE-2022-22965 Spring4Shell research & PoC for learning purposes

## Blog post
A more detailed analysis and explanation of the vulnerability can be found on my [blog post](https://medium.com/@cxzero/spring4shell-cve-2022-22965-vulnerability-analysis-and-exploitation-fae244dfd3eb).

## Comments on initial research
Based on the initial research I did on https://github.com/GuayoyoCyber/CVE-2022-22965 with these additions:
- modifications on HelloWorld class and helloworld.jsp for a better understanding of the vulnerability 
- added Apache Tomcat 9.0.60 embed library dependency for debugging purposes

## Compilation
```
sudo apt install maven
mvn clean package
```
Apache Tomcat 9.0.60 can be downloaded from https://archive.apache.org/dist/tomcat/tomcat-9/v9.0.60/bin/apache-tomcat-9.0.60.zip

Smart Tomcat IntelliJ plugin can be used to speed up running and debugging: https://plugins.jetbrains.com/plugin/9492-smart-tomcat

## Docker
```
sudo docker build -t spring4shell .
```
or
```
sudo docker build -t spring4shell -f Dockerfile2 .
```
```
sudo docker run -p 8082:8080 spring4shell
```

## References
- https://medium.com/@cxzero/spring4shell-cve-2022-22965-vulnerability-analysis-and-exploitation-fae244dfd3eb
- http://blog.o0o.nu/2010/06/cve-2010-1622.html
- https://mp.weixin.qq.com/s/kgw-O4Hsd9r2vfme3Y2Ynw
- https://www.microsoft.com/security/blog/2022/04/04/springshell-rce-vulnerability-guidance-for-protecting-against-and-detecting-cve-2022-22965/
- https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/
- https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/
文件快照

[4.0K] /data/pocs/38f24874f8ac9b9e2bf83dab3ab1a83a49ece963 ├── [4.0K] exploits │   ├── [2.9K] exploit1.py │   ├── [4.3K] exploit2.py │   ├── [3.1K] exploit3.py │   ├── [5.0K] exploit4b.py │   └── [4.9K] exploit4.py ├── [1.6K] README.md └── [4.0K] springmvc5-helloworld-exmaple ├── [ 124] Dockerfile ├── [ 457] Dockerfile2 ├── [2.8K] pom.xml ├── [4.0K] src │   └── [4.0K] main │   ├── [4.0K] java │   │   └── [4.0K] net │   │   └── [4.0K] javaguides │   │   └── [4.0K] springmvc │   │   └── [4.0K] helloworld │   │   ├── [4.0K] config │   │   │   ├── [ 862] AppConfig.java │   │   │   └── [ 620] SpringMvcDispatcherServletInitializer.java │   │   ├── [4.0K] controller │   │   │   └── [ 886] HelloWorldController.java │   │   └── [4.0K] model │   │   ├── [ 361] Auxiliar.java │   │   └── [ 776] HelloWorld.java │   └── [4.0K] webapp │   ├── [ 72] index.jsp │   └── [4.0K] WEB-INF │   └── [4.0K] views │   └── [ 484] helloworld.jsp └── [4.0K] target └── [9.2M] example.war 16 directories, 17 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。