Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-40146 PoC — Apache XML Graphics Batik代码问题漏洞

Source
Associated Vulnerability
Title:Apache XML Graphics Batik代码问题漏洞 (CVE-2022-40146)
Description:Apache XML Graphics Batik是美国阿帕奇(Apache)基金会的一套基于Java的主要用于处理SVG格式图像的应用程序。 Apache XML Graphics Batik 1.0到 1.14版本存在安全漏洞,该漏洞源于允许攻击者使用 Jar url 访问文件。
Readme
# Apache Batik SSRF to RCE Jar Exploit

## Component link

https://github.com/apache/xmlgraphics-batik

## Blog

https://www.zerodayinitiative.com/blog/2022/10/28/vulnerabilities-in-apache-batik-default-security-controls-ssrf-and-rce-through-remote-class-loading

## Usage 

- Modify the line 11 in src/main/java/com.poc.Poc.java to change the command.
- Run `mvn clean package`
- Exploit can be found in target/

Then you need to navigate to the [Poc/](Poc) to use this exploit jar.

### Poc contains:

- SSRF
- RCE via jar
- RCE via ecmascript
File Snapshot

[4.0K] /data/pocs/4b3b7ea6fd2b8ee995af529f0960139f5de4c270 ├── [4.0K] Poc │   ├── [ 878] RCE_Jar.md │   ├── [ 750] RCE_Script.md │   └── [ 671] SSRF.md ├── [1.2K] pom.xml ├── [ 545] README.md └── [4.0K] src └── [4.0K] main ├── [4.0K] java │   └── [4.0K] com │   └── [4.0K] poc │   └── [ 517] Poc.java └── [4.0K] resources └── [4.0K] META-INF └── [ 53] MANIFEST.MF 8 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.