Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-42889 PoC — Apache Commons Text 代码注入漏洞

Source
Associated Vulnerability
Title:Apache Commons Text 代码注入漏洞 (CVE-2022-42889)
Description:Apache Commons Text是美国阿帕奇(Apache)基金会的一个专注于字符串算法的库。 Apache Commons Text 1.5至1.9版本存在安全漏洞,该漏洞源于默认的Lookup实例集包括可能导致任意代码执行或与远程服务器联系的插值器,可能容易受到远程代码执行或与远程服务器的无意接触的影响。
Readme
# CVE-2022-42889 Test application

This repository contains a simple application using Apache Commons Text < 1.10 which is vulnerable to CVE-2022-42889.

## Running the application

Replace `DemoApplication.java` nc command by your host ip address. 


Listening with netcat:

```sh
$ nc -l -p 30000
```

Build and run docker vulnerable code

```bash
docker build . -t vulnerable-app
docker run vulnerable-app
```

As you can see netcat will be able to execute remote commands
File Snapshot

[4.0K] /data/pocs/d1e517c117263aef74dd54428c3243e4f83b7368 ├── [ 378] Dockerfile ├── [9.8K] mvnw ├── [6.5K] mvnw.cmd ├── [1.1K] pom.xml ├── [ 476] README.md └── [4.0K] src └── [4.0K] main ├── [4.0K] java │   └── [4.0K] com │   └── [4.0K] example │   └── [4.0K] demo │   └── [ 439] DemoApplication.java └── [4.0K] resources └── [ 1] application.properties 7 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.