Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5347 PoC — Apache Wicket 跨站脚本漏洞

Source
Associated Vulnerability
Title:Apache Wicket 跨站脚本漏洞 (CVE-2015-5347)
Description:Apache Wicket是美国阿帕奇(Apache)软件基金会的一套开源、轻量、基于组件的框架,它提供了一种面向对象的方式来开发基于Web的动态UI应用程序。 Apache Wicket的org.apache.wicket.extensions.ajax.markup.html.modal.ModalWindow文件中的‘getWindowOpenJavaScript’函数存在跨站脚本漏洞。远程攻击者可借助ModalWindow标题利用该漏洞注入任意Web脚本或HTML。以下版本受到影响:Apache
Description
PoC for cve-2015-5347
File Snapshot

[4.0K] /data/pocs/40af97bd631659b9aeededa4a1df97d0504ba08c ├── [ 99] Dockerfile ├── [5.9K] pom.xml └── [4.0K] src ├── [4.0K] main │   ├── [4.0K] java │   │   └── [4.0K] no │   │   └── [4.0K] hackeriet │   │   ├── [ 533] HomePage.html │   │   ├── [ 928] HomePage.java │   │   └── [ 660] WicketApplication.java │   ├── [4.0K] resources │   │   └── [ 538] log4j2.xml │   └── [4.0K] webapp │   ├── [ 12K] logo.png │   ├── [1.3K] style.css │   └── [4.0K] WEB-INF │   └── [1.1K] web.xml └── [4.0K] test ├── [4.0K] java │   └── [4.0K] no │   └── [4.0K] hackeriet │   ├── [3.3K] Start.java │   └── [ 525] TestHomePage.java ├── [4.0K] jetty │   ├── [2.3K] jetty-https.xml │   ├── [2.0K] jetty-http.xml │   ├── [2.1K] jetty-ssl.xml │   └── [1.0K] jetty.xml └── [4.0K] resources └── [1.4K] keystore 14 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.