44
55![ Docker Build] ( https://github.com/BobTheShoplifter/Spring4Shell-POC/actions/workflows/docker-publish.yml/badge.svg ) ![ Docker App Build] ( https://github.com/BobTheShoplifter/Spring4Shell-POC/actions/workflows/app-docker-publish.yml/badge.svg ) ![ Stars] ( https://img.shields.io/github/stars/BobTheShoplifter/Spring4Shell-POC?style=social ) ![ Docker Run] ( https://img.shields.io/github/followers/BobTheShoplifter?label=Follow&style=social )
66
7- Spring4Shell (CVE-2022 -22965) Proof Of Concept/Information + A vulnerable Tomcat server with a vulnerable spring4shell application.
7+ Spring4Shell (CVE-2022 -22965) Proof Of Concept/Information + [ A vulnerable Tomcat server with a vulnerable spring4shell application.] ( vulnerable-tomcat/ )
88
99Early this morning, multiple sources has informed of a possible RCE exploit in the popular java framework spring.
1010
1111The naming of this flaw is based on the similarities to the infamous Log4j LOG4Shell.
1212
1313## Details about this vulnerability
1414
15- - [ https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html ] ( https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html )
16- - [ https://bugalert.org/content/notices/2022-03-29-spring.html ] ( https://bugalert.org/content/notices/2022-03-29-spring.html )
1715- [ https://websecured.io/blog/624411cf775ad17d72274d16/spring4shell-poc ] ( https://websecured.io/blog/624411cf775ad17d72274d16/spring4shell-poc )
1816- [ https://www.springcloud.io/post/2022-03/spring-0day-vulnerability ] ( https://www.springcloud.io/post/2022-03/spring-0day-vulnerability )
1917- [ https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement ] ( https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement )
2018
21- ## Vulnerable Tomcat server
22-
23- I have now made a docker image for this, which includes a vulnerable spring + tomcat application.
19+ ## POC Usage
2420
25- The application should be enough to test this vulnerability.
21+ The usage is simple! You can either run the docker image, or just run the python script!
2622
27- [ Please see ( vulnerable-tomcat/README.md) ] ( vulnerable-tomcat/README.md )
23+ Please see vulnerable-tomcat for inscructions on setting up your own spring4shell vulnerable application [ here! ] ( vulnerable-tomcat/ )
2824
29- ## Requirements
25+ ### Requirements
3026
31- - Python3 Or Docker
27+ - Python3 or [ Docker] ( https://hub.docker.com/r/bobtheshoplifter/spring4shell-poc )
3228
33- ## Usage
29+ ### Python
3430
3531``` python
3632pip install - r requirements.txt
@@ -39,16 +35,27 @@ poc.py --help
3935
4036![ image] ( https://user-images.githubusercontent.com/22559547/161398549-05d279b2-51d6-49fb-9245-018747606321.png )
4137
38+ ### Docker
39+
4240``` sh
41+ # # Dockerhub
4342docker pull bobtheshoplifter/spring4shell-poc:latest
44- docker run ghcr.io/ bobtheshoplifter/spring4shell-poc:main --url https://example.io/
43+ docker run bobtheshoplifter/spring4shell-poc:latest --url https://example.io/
4544# # Github docker repository
4645docker pull ghcr.io/bobtheshoplifter/spring4shell-poc:main
4746docker run ghcr.io/bobtheshoplifter/spring4shell-poc:main --url https://example.io/
4847```
4948
5049![ image] ( https://user-images.githubusercontent.com/22559547/161400099-fb6c4f02-9d48-457a-8c91-041a9a8438b7.png )
5150
51+ ## Vulnerable Tomcat server
52+
53+ I have now made a docker image for this, which includes a vulnerable spring + tomcat application.
54+
55+ The application should be enough to test this vulnerability.
56+
57+ [ Please see (vulnerable-tomcat/README.md)] ( vulnerable-tomcat/README.md )
58+
5259## Mitigations
5360
5461!!(The following mitigations are only theoretical as nothing has been confirmed)!!
0 commit comments