An intentionally vulnerable (CVE-2017-8046) SrpingData REST appl with Swagger Support for pentesting purposes# Vulnerable Spring DataRest App
This is an intentionally Spring Data REST Application to test and demostrate the CVE-2017-8046 vulnerability and the challenges of testing Command Injection and Remote Code Execution via REST apis
It has support for Swagger UI to use with tools where Swagger documention helps discovery and spidering, such as the OWASP Zend Attack Proxy (ZAP) plugin for Swagger
To use
- clone the repository locally
- build using maven
- run on
For more details on how this project was used in a pentesting exercise, see
[4.0K] /data/pocs/952cc0afcd914e68f3b9c07672e703e067fbde42
├── [8.9K] mvnw
├── [5.7K] mvnw.cmd
├── [4.2K] pom.xml
├── [ 551] README.md
└── [4.0K] src
├── [4.0K] main
│ ├── [4.0K] java
│ │ ├── [4.0K] com
│ │ │ └── [4.0K] raythos
│ │ │ └── [4.0K] cyberia
│ │ │ └── [4.0K] spingdata
│ │ │ └── [4.0K] rest
│ │ │ ├── [1.1K] DirectoryRepository.java
│ │ │ ├── [ 684] EmployeeLocation.java
│ │ │ ├── [ 811] SpringfoxConfiguration.java
│ │ │ └── [ 812] VulnerableApplication.java
│ │ └── [4.0K] META-INF
│ │ └── [ 95] MANIFEST.MF
│ └── [4.0K] resources
│ ├── [ 363] application.properties
│ └── [ 203] data.sql
└── [4.0K] test
└── [4.0K] java
└── [4.0K] com
└── [4.0K] raythos
└── [4.0K] cyberia
└── [4.0K] vulnerablerest
└── [ 442] VulnerablerestApplicationTests.java
16 directories, 12 files