关联漏洞
Description
Proof-of-Concept of CVE-2023-45612
介绍
# CVE-2023-45612 Reproduction Steps
### My Versions
- **Java 17**
- **Gradle 8.14.3**
- **Python 3.13.7** (for POC script)
### Steps
```
git clone git@github.com:bbugdigger/ktor-xxe-poc.git
cd ktor-xxe-poc
.\gradlew build
.\gradlew run
```
In new tab with same folder destination run PoC script
```
python .\xxe_poc.py
```
文件快照
[4.0K] /data/pocs/ac65fb282d1f3d08fbea5dc11a516b07ce330965
├── [ 659] build.gradle.kts
├── [4.0K] gradle
│ ├── [1.1K] libs.versions.toml
│ └── [4.0K] wrapper
│ ├── [ 43K] gradle-wrapper.jar
│ └── [ 253] gradle-wrapper.properties
├── [ 27] gradle.properties
├── [8.5K] gradlew
├── [2.8K] gradlew.bat
├── [ 327] README.md
├── [ 17] requirements.txt
├── [ 124] settings.gradle.kts
├── [4.0K] src
│ └── [4.0K] main
│ ├── [4.0K] kotlin
│ │ ├── [ 221] Application.kt
│ │ ├── [3.9K] Routing.kt
│ │ └── [6.7K] Serialization.kt
│ └── [4.0K] resources
│ ├── [ 122] application.yaml
│ └── [ 425] logback.xml
└── [2.0K] xxe_poc.py
7 directories, 16 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。