Last active
April 12, 2022 15:55
-
-
Save esell/c9731a7e2c5404af7716a6810dc33e1a to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
At this point, it is probably easier to just use something like this: https://github.com/reznok/Spring4Shell-POC | |
- clone https://spring.io/guides/gs/handling-form-submission/ | |
- you can skip right to gs-handling-form-submission/complete, no need to follow the tutorial | |
- modify it so that you can build a war file (https://www.baeldung.com/spring-boot-war-tomcat-deploy) | |
- install tomcat9 + java 11 (i did it on ubuntu 20.04) | |
- deploy the war file | |
- update the PoC (https://share.vx-underground.org/) to write the tomcatwar.jsp file to webapps/handling-form-submission instead of webapps/ROOT | |
- run PoC (ignore the URL it gives you for the webshell): python3 exp.py --url http://your.ip.here:8080/handling-form-submission-complete/greeting | |
- you should see the "tomcatwar.jsp" file now in webapps/handling-form-submission | |
- hit http://your.ip.here:8080/handling-form-submission/tomcatwar.jsp?pwd=j&cmd=id to see the results |
the zip file requires on https://share.vx-underground.org/ a password, what should I give ?
zip password is mentioned at second 12 in this clip: https://www.youtube.com/watch?v=n8FbMY-quW4
https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement
Am I Impacted?
These are the requirements for the specific scenario from the report:
- JDK 9 or higher
- Apache Tomcat as the Servlet container
- Packaged as WAR
- spring-webmvc or spring-webflux dependency
However, the nature of the vulnerability is more general, and there may be other ways to exploit it that have not been reported yet.
what is the zip password, bro?
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Does Spring Boot suffer from this vulnerability?