Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24816 PoC — JAI-EXT 代码注入漏洞

Source
Associated Vulnerability
Title:JAI-EXT 代码注入漏洞 (CVE-2022-24816)
Description:JAI-EXT是一个 API。能够在多线程环境中处理图像。 JAI-EXT 存在代码注入漏洞,该漏洞允许攻击者通过网络请求提供 Jiffle 脚本的程序并导致远程代码执行。
Description
Programs run on GeoServer before 1.2.2 which use jt-jiffle and allow Jiffle script to be provided via network request are susceptible to remote code execution. The Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects downstream GeoServer 1.1.22.
File Snapshot

id: CVE-2022-24816 info: name: GeoServer <1.2.2 - Remote Code Execution author: mukundbhuva s ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.