Skip to content

Commit 64a908f

Browse files
Update README.md
1 parent 0a2f5d5 commit 64a908f

File tree

1 file changed

+19
-12
lines changed

1 file changed

+19
-12
lines changed

README.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,29 @@
44

55
![Docker Build](https://github.com/BobTheShoplifter/Spring4Shell-POC/actions/workflows/docker-publish.yml/badge.svg) ![Docker App Build](https://github.com/BobTheShoplifter/Spring4Shell-POC/actions/workflows/app-docker-publish.yml/badge.svg) ![Stars](https://img.shields.io/github/stars/BobTheShoplifter/Spring4Shell-POC?style=social) ![Docker Run](https://img.shields.io/github/followers/BobTheShoplifter?label=Follow&style=social)
66

7-
Spring4Shell (CVE-2022-22965) Proof Of Concept/Information + A vulnerable Tomcat server with a vulnerable spring4shell application.
7+
Spring4Shell (CVE-2022-22965) Proof Of Concept/Information + [A vulnerable Tomcat server with a vulnerable spring4shell application.](vulnerable-tomcat/)
88

99
Early this morning, multiple sources has informed of a possible RCE exploit in the popular java framework spring.
1010

1111
The naming of this flaw is based on the similarities to the infamous Log4j LOG4Shell.
1212

1313
## Details about this vulnerability
1414

15-
- [https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html](https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html)
16-
- [https://bugalert.org/content/notices/2022-03-29-spring.html](https://bugalert.org/content/notices/2022-03-29-spring.html)
1715
- [https://websecured.io/blog/624411cf775ad17d72274d16/spring4shell-poc](https://websecured.io/blog/624411cf775ad17d72274d16/spring4shell-poc)
1816
- [https://www.springcloud.io/post/2022-03/spring-0day-vulnerability](https://www.springcloud.io/post/2022-03/spring-0day-vulnerability)
1917
- [https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement](https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement)
2018

21-
## Vulnerable Tomcat server
22-
23-
I have now made a docker image for this, which includes a vulnerable spring + tomcat application.
19+
## POC Usage
2420

25-
The application should be enough to test this vulnerability.
21+
The usage is simple! You can either run the docker image, or just run the python script!
2622

27-
[Please see (vulnerable-tomcat/README.md)](vulnerable-tomcat/README.md)
23+
Please see vulnerable-tomcat for inscructions on setting up your own spring4shell vulnerable application [here!](vulnerable-tomcat/)
2824

29-
## Requirements
25+
### Requirements
3026

31-
- Python3 Or Docker
27+
- Python3 or [Docker](https://hub.docker.com/r/bobtheshoplifter/spring4shell-poc)
3228

33-
## Usage
29+
### Python
3430

3531
```python
3632
pip install -r requirements.txt
@@ -39,16 +35,27 @@ poc.py --help
3935

4036
![image](https://user-images.githubusercontent.com/22559547/161398549-05d279b2-51d6-49fb-9245-018747606321.png)
4137

38+
### Docker
39+
4240
```sh
41+
## Dockerhub
4342
docker pull bobtheshoplifter/spring4shell-poc:latest
44-
docker run ghcr.io/bobtheshoplifter/spring4shell-poc:main --url https://example.io/
43+
docker run bobtheshoplifter/spring4shell-poc:latest --url https://example.io/
4544
## Github docker repository
4645
docker pull ghcr.io/bobtheshoplifter/spring4shell-poc:main
4746
docker run ghcr.io/bobtheshoplifter/spring4shell-poc:main --url https://example.io/
4847
```
4948

5049
![image](https://user-images.githubusercontent.com/22559547/161400099-fb6c4f02-9d48-457a-8c91-041a9a8438b7.png)
5150

51+
## Vulnerable Tomcat server
52+
53+
I have now made a docker image for this, which includes a vulnerable spring + tomcat application.
54+
55+
The application should be enough to test this vulnerability.
56+
57+
[Please see (vulnerable-tomcat/README.md)](vulnerable-tomcat/README.md)
58+
5259
## Mitigations
5360

5461
!!(The following mitigations are only theoretical as nothing has been confirmed)!!

0 commit comments

Comments
 (0)